The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With ongoing efforts to make the power grid smarter, there is a large emphasis on the automation and data analytics. Substation automation is a key enabling technology for online monitoring, diagnosis, and prediction for the health condition of the substation assets. Circuit breakers (CBs) are one of the most vital components in a substation for the tripping action required during fault occurrence,...
With the increasing loads, changing generation mix, environmental limitations on the expansion of transmission system and increasing system complexity, power systems are being pushed to their stability limits. System instability behavior is often characterized by voltage instability, sometimes even leading to a blackout. With the installation of synchrophasor devices, real time voltage stability problem...
With the advent of synchrophasor technology, real time voltage stability analysis using synchrophasor data has been the focus of many researchers resulting in the development of several new algorithms. These developed algorithms have several advantages as well as limitations. This paper discusses briefly about the shortcomings of some existing synchrophasor measurement based voltage stability indicators...
A network Intrusion Detection System (IDS) is a device or software that monitors network activities and raises alerts on detection of malicious behavior. State-transition based framework like Finite State Machines (FSM), extended FSM, timed FSM, Discrete Event Systems (DES) etc. are widely used in network IDSs because the framework enables formal modeling, analysis, verification etc. The attack detection...
Our contribution in this paper is two fold. First we provide preliminary investigation results establishing program based anomaly detection is effective if short system call sequences are modeled along with their occurrence frequency. Second as a consequence of this, built normal program model can tolerate some level of contamination in the training dataset. We describe an experimental system Sequencegram,...
In this paper, we describe a reliability model which can be used to analyze the performance and power consumption in resource constrained, data rate scarce, mobile agent-based wireless sensor network (WSN) systems. The primary model is referred to as a generalize access structure congestion (GGC) system which is an extended model from a circular sequential k-out-of-n congestion (CSknC). There are...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.