The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
System Protection Schemes (SPS) have the potential to greatly enhance the utilization of the network, often by automatically disconnecting generators in response to contingency events. However, malfunctions of such systems may expose the system to harmful blackouts. The operation of unreliable SPS is therefore subject to a cost-benefit balance between the benefits of increased system utilization and...
In the past few years, the share of renewable power generation has been growing significantly, leading to increased uncertainties in power system operation. In this paper, the effect of wind in-feed uncertainties on power flow in the AC grid is investigated. The wind power in-feed deviations from initial forecast are modelled as Gaussian random variables. To assess the influence of wind power deviations...
This paper presents a design of a True Random Number Generator (TRNG) using a Spin Transfer Torque Magnetic Tunnel Junction (STT-MTJ) device. Since the probability of the STT-MTJ-based TRNG is locked using a digitally controlled feedback loop, the sensitivity of the feedback gain can be reduced greatly, which eliminates a high-gain amplifier in the feedback loop. It is demonstrated using the circuit...
We introduce a new family of binary linear codes suitable for steganographic matrix embedding. The main characteristic of the codes is the staircase random block structure of the generator matrix. We propose an efficient list decoding algorithm for the codes that finds a close codeword to a given random word. We provide both theoretical analysis of the performance and stability of the decoding algorithm,...
In order to enhance the system operator's awareness of the remaining margins towards critical system states in the transmission system the P/V-Analysis is a suitable tool for the on-line security assessment. This paper presents a method to reduce the computational effort needed to meet the stringent time constraints of the control room environment. It is shown how the information from the P/V-Analysis...
The paper describes a critical infrastructure testbed environment for SCADA (Supervisory Control and Data Acquisition) cyber security evaluation and assessment. This includes results of the performed analysis of important features of the critical infrastructure for determination of testbed architecture. As a result the ontology of security for critical infrastructure domain, ontology of protection...
Nowadays the level of penetration of nonprogrammable renewable (NPRE) power systems in some countries is quite high and it is going to increase in the next years. Of course such systems have an impact on national power systems, especially in those regions that are weakly connected with the main national grid, e.g. islands power systems. This paper addresses the general problem of finding some parameters...
In order to eliminate the cascading overload caused by power flow transferring, the paper puts forward a method for fast search of dangerous lines in power flow transferring and an emergency control strategy considering the balancing machine. When the fault line is disconnected, search the shortest path between the end nodes of the broken line. Monitor the lines on the path emphatically. If the lines...
This white paper describes preliminary research on the use of progressive control strategies to improve the advanced electric power grid's resilience to major grid disturbances. The proposed approach calls to leverage real-time wide-area monitoring and control capabilities to provide globally coordinated distributed control actions under stressed conditions. To that end, the paper illustrates the...
Recently, Steganography is widely used for communicating data secretly. It can be divided into two domains spatial and frequency. One of the most used frequency transformation is Discrete Cosine Transform DCT. There are many techniques based on DCT. The most common is the DCT steganography based on Least Significant Bit LSB. Many proposed methods rely on it such as the LSB-DCT randomized bit embedding...
Because software developers are not necessarily security experts, identifying potential threats and vulnerabilities in the early stage of the development process (e.g., the requirement- or design-phase) is insufficient. Even if these issues are addressed at an early stage, it does not guarantee that the final software product actually satisfies security requirements. To realize secure designs, we...
Transmission switching as a powerful tool is utilized to change network topology during operations which, in turn, would lead to higher economic benefits of a power system. However, network reconfiguration includes a chain of time sequencing switching actions which can bring disturbances into systems. This paper proposes a model addresses the process of transmission switching. The objective is to...
Ground faults in generator stator and field/rotor circuits are serious events that can lead to damage, costly repair, extended outage and loss of revenue. This paper explores advances in field/rotor circuit ground fault and stator ground fault protection. These advanced protection strategies employ AC injection and other tactics to provide benefits in security, sensitivity and speed.
The EMVco consortium recently released a tokenization technical framework addressing POS and on-line transactions. This paper introduces a new architecture for Token-Generators based on Cloud of Secure Elements (CoSE), and user/administrator relationships with Token-Providers. Mobiles equipped with HCE interfaces remotely access Token- Generator applications hosted in the CoSE.
Probabilistic risk-based approaches to system security provide a quantitative measure to evaluate the security of system operation. However, incorporating the risk-based security index as a constraint into the optimal power flow problem results in a complex optimization problem, which is difficult to solve in a centralized manner for large-scale power systems. In this paper, the application of so-called...
System operators need to constantly assess the security of a power system and take actions in order to maintain safe operation. To do this, they need to quantify the proximity of the security constraints, determine the most critical ones, and then execute a set of actions designed to restore safety margins. A particularly important set of security constraints is thermal overload limits of transformers...
An ideal multi-objective optimization method for economic emission load dispatch (EELD) with non-linear fuel cost and emission level functions in power system operation is presented. In this paper, the problem treats economy, emission, and transmission line security as vital objectives. The load constraints and operating constraints are taken into account. Assuming goals for individual objective functions,...
Network traffic generation was the subject of many research projects in the past, but none of them could generate network data which has the same nature as a traffic from human or machine behavior. In this paper we introduce a related work in this field of area focusing on advantages and disadvantages, such as authenticity, inaccuracy, wrong timings and real-time generation. Further, we propose a...
Recent studies suggest that in medium and long terms, distributed solar photo-voltaic generator (SPVG) will become commercially so attractive that large-scale implementation of this type can be seen in many parts of the world. The increase in the amount of renewable energy will cause stability and security issues in power system. An effective method is used to find out the maximum allowable penetration...
Under deregulated environment transmission congestion is managed in many different ways. Most utilities create; update their own rules of how the congestion is managed. The common output in most cases is temporary congestion relief and higher costs of energy to the end user. Transmission congestion problem is studied from different aspects, i.e. congestion relief, energy price reduction, congestion...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.