Research on Protection Strategy and Scheme of DC Distribution and Consumption System

Author(s):  
Tonghua Wu ◽  
Wei Dai ◽  
Xindong Li ◽  
Yuping Zheng ◽  
Weicheng Ma ◽  
...  
Author(s):  
Wei Zhang ◽  
Yuanhong Liu ◽  
Yanyan Cui ◽  
Mingxin Zhao ◽  
Tao Wei ◽  
...  

Energies ◽  
2019 ◽  
Vol 12 (20) ◽  
pp. 4002
Author(s):  
Yao ◽  
Jianfu ◽  
Lu ◽  
Zhanqing ◽  
Zipan ◽  
...  

The connection mode of the direct current (DC) power distribution system and the alternating current (AC) system is the foundation of system design, and it is also one of key technologies of the DC power distribution network. Based on the topology structure, grounding method, main equipment parameters, load parameters and system control protection strategy of the DC power distribution system, this paper establishes the system simulation model in the case of configuring the connection transformer and not configuring the connection transformer. Simulation results show that, when no connecting transformer is installed, the interaction between AC and DC systems will be great when faults occur, and the cost of converter valves and DC reactors will be increased. When connecting transformers are installed, the interaction between AC and DC systems can be effectively isolated, and the operation reliability of the system will be greatly improved while the cost is saved. Therefore, it is recommended to configure an independent connection transformer in the DC distribution system.


2020 ◽  
Vol 140 (7) ◽  
pp. 499-507
Author(s):  
Masahiro Yonemoto ◽  
Hiroshi Arita ◽  
Mitsuyoshi Kanoh ◽  
Takashi Ochikubo ◽  
Yasuhiro Shibata ◽  
...  

2011 ◽  
Vol 131 (4) ◽  
pp. 362-368 ◽  
Author(s):  
Yasunobu Yokomizu ◽  
Doaa Mokhtar Yehia ◽  
Daisuke Iioka ◽  
Toshiro Matsumura

2019 ◽  
Vol 13 (4) ◽  
pp. 325-333
Author(s):  
Xu Liu ◽  
Xiaoqiang Di ◽  
Jinqing Li ◽  
Huamin Yang ◽  
Ligang Cong ◽  
...  

Background: User behavior models have been widely used to simulate attack behaviors in the security domain. We revised all patents related to response to attack behavior models. How to decide the protected target against multiple models of attack behaviors is studied. Methods: We utilize one perfect rational and three bounded rational behavior models to simulate attack behaviors in cloud computing, and then investigate cloud provider’s response based on Stackelberg game. The cloud provider plays the role of defender and it is assumed to be intelligent enough to predict the attack behavior model. Based on the prediction accuracy, two schemes are built in two situations. Results: If the defender can predict the attack behavior model accurately, a single-objective game model is built to find the optimal protection strategy; otherwise, a multi-objective game model is built to find the optimal protection strategy. Conclusion: The numerical results prove that the game theoretic model performs better in the corresponding situation.


Sign in / Sign up

Export Citation Format

Share Document