The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The IEC 61850 protocol suite for electrical sub-station automation enables substation configuration and design for protection, communication, and control. These power system applications can be formally verified through use of object models, common data classes, and message classes. The IEC 61850-7-420 DER (Distributed Energy Resource) extension further defines object classes for assets such as types...
The inadequate, and oftentimes scarce, infrastructure in Africa is largely hinged on poor electricity generation and transmission in the continent. To combat this, several projects have commenced in different regions and countries to boost electricity supply. This affords the continent the opportunity to pool together their different electricity resources and generation capabilities in a bid to stimulate...
Power Africa is an initiative launched by US President Barack Obama in July 2013 to bring power to unelectrified communities in Sub-Saharan Africa. We developed a power system model of the rural village of Katumbi, Tanzania. Utilizing RTDS, a cutting edge technology for power system simulation, we built and verified a microgrid based on real data from Katumbi. The microgrid is powered by distributed...
Cyber-physical systems (CPS), such as smart grids, include cyber assets for monitoring, control, and communication in order to maintain safe and efficient operation of a physical process. We propose that CPS intrusion detection systems (CPS IDS) should seek not just to detect attacks in the host audit logs and network traffic (cyber plane), but should consider how attacks are reflected in measurements...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.