Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
A Smart Transformers (ST) is an automated transformer based on the latest power electronics and communication technologies. It aims not only at replacing the traditional transformer, but at providing also ancillary services to the grid, thanks to the greater flexibility offered by power electronics. However, in the case of grid overload caused by high load demand or high production from renewable...
This paper presents a model to include a security constraint for wind power plant in a hydrothermal dispatch problem. The proposed Unit Commitment (UC) is an augmented problem to take into account different scenarios of wind speed during the day. The wind farms are represented by a linear model that the generations are considered proportional to the availability of wind. The proposed optimization...
nowadays, power system tends to be operated in heavily stressed load, which can cause voltage stability problem. Moreover, occurrence probability of contingency is increasing due to growth of power system size and complexity. This paper proposes a new preventive control scheme based on voltage stability and security monitoring by means of wide area monitoring systems (WAMS). The proposed control scheme...
Risk-based security indexes can be used as a constraint in OPF to determine the most economic generation dispatch while ensuring that the risk of power system operation stays below a given value. Existing approaches only limit the total risk, which can result in some system states having significantly higher values of risk compared to others. In this paper, a risk-constrained AC OPF that limits the...
In this paper an algorithm is developed for solving the Optimal Power Flow (OPF) and Security Constrained OPF (SCOPF) problem in mixed AC/DC grids. Non-linear models are used for power lines and AC/DC and DC/DC converters. The converter models include terminal losses and power rating constraints. The formulation of the SCOPF problem is such that it works for preventive OPF where no corrective actions...
With rapidly increasing complexity of power grids in Europe, North America and Asia, liberalization of electricity markets and increasing penetration of renewable energy, the risk of large-scale emergencies and blackouts increases. This paper proposes a novel approach for development of software for modelling of decentralized intelligent systems for security monitoring and control in power systems...
Scan based Design for Testability structures are highly vulnerable to unauthorized access to the internal signals of a chip. This paper proposes a secure scan based design which prevents this unauthorized access without any compromise in the testability. The proposed secure architecture employs unique keys for each test vector. These unique keys are generated by a linear feedback shift register and...
Voltage collapse is a critical problem that impacts power system operational security. Timely and accurate assessment of voltage security is necessary to detect alarm states in order to prevent a large-scale blackout. This paper presents an on-line voltage security assessment scheme using periodically updated random forest-based decision trees. We demonstrated the proposed method on the modified 53-bus...
This paper discusses some problems related with the current Brazilian electricity market, brings out some dilemmas that should be examined in order to implement a more market oriented approach, and proposes a new market design to overcome these issues. The proposed market design is based on the concept of energy right accounts as virtual reservoirs and aims at enhancing the flexibility to enable market...
System Protection Schemes (SPS) have the potential to greatly enhance the utilization of the network, often by automatically disconnecting generators in response to contingency events. However, malfunctions of such systems may expose the system to harmful blackouts. The operation of unreliable SPS is therefore subject to a cost-benefit balance between the benefits of increased system utilization and...
In the past few years, the share of renewable power generation has been growing significantly, leading to increased uncertainties in power system operation. In this paper, the effect of wind in-feed uncertainties on power flow in the AC grid is investigated. The wind power in-feed deviations from initial forecast are modelled as Gaussian random variables. To assess the influence of wind power deviations...
This paper presents a design of a True Random Number Generator (TRNG) using a Spin Transfer Torque Magnetic Tunnel Junction (STT-MTJ) device. Since the probability of the STT-MTJ-based TRNG is locked using a digitally controlled feedback loop, the sensitivity of the feedback gain can be reduced greatly, which eliminates a high-gain amplifier in the feedback loop. It is demonstrated using the circuit...
We introduce a new family of binary linear codes suitable for steganographic matrix embedding. The main characteristic of the codes is the staircase random block structure of the generator matrix. We propose an efficient list decoding algorithm for the codes that finds a close codeword to a given random word. We provide both theoretical analysis of the performance and stability of the decoding algorithm,...
In order to enhance the system operator's awareness of the remaining margins towards critical system states in the transmission system the P/V-Analysis is a suitable tool for the on-line security assessment. This paper presents a method to reduce the computational effort needed to meet the stringent time constraints of the control room environment. It is shown how the information from the P/V-Analysis...
The paper describes a critical infrastructure testbed environment for SCADA (Supervisory Control and Data Acquisition) cyber security evaluation and assessment. This includes results of the performed analysis of important features of the critical infrastructure for determination of testbed architecture. As a result the ontology of security for critical infrastructure domain, ontology of protection...
Nowadays the level of penetration of nonprogrammable renewable (NPRE) power systems in some countries is quite high and it is going to increase in the next years. Of course such systems have an impact on national power systems, especially in those regions that are weakly connected with the main national grid, e.g. islands power systems. This paper addresses the general problem of finding some parameters...
In order to eliminate the cascading overload caused by power flow transferring, the paper puts forward a method for fast search of dangerous lines in power flow transferring and an emergency control strategy considering the balancing machine. When the fault line is disconnected, search the shortest path between the end nodes of the broken line. Monitor the lines on the path emphatically. If the lines...
This white paper describes preliminary research on the use of progressive control strategies to improve the advanced electric power grid's resilience to major grid disturbances. The proposed approach calls to leverage real-time wide-area monitoring and control capabilities to provide globally coordinated distributed control actions under stressed conditions. To that end, the paper illustrates the...
Recently, Steganography is widely used for communicating data secretly. It can be divided into two domains spatial and frequency. One of the most used frequency transformation is Discrete Cosine Transform DCT. There are many techniques based on DCT. The most common is the DCT steganography based on Least Significant Bit LSB. Many proposed methods rely on it such as the LSB-DCT randomized bit embedding...
Because software developers are not necessarily security experts, identifying potential threats and vulnerabilities in the early stage of the development process (e.g., the requirement- or design-phase) is insufficient. Even if these issues are addressed at an early stage, it does not guarantee that the final software product actually satisfies security requirements. To realize secure designs, we...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.