Optimized coordination of transmission network outages in interconnected power grids

2019 ◽  
Vol 170 ◽  
pp. 72-80
Author(s):  
Rainer Zanghi ◽  
Julio C. Stacchini de Souza ◽  
Milton B. Do Coutto Filho ◽  
Tatiana M.L. Assis
2021 ◽  
Vol 11 (2) ◽  
pp. 530
Author(s):  
Fang Liu ◽  
Sisi Lin ◽  
Chonggang Chen ◽  
Kangzhi Liu ◽  
Runmin Zou ◽  
...  

The paper presents a multiaspect analysis of multivalues and the broadband nature of system oscillation. By analyzing the ambient signal caused by random small disturbances during the normal operation of interconnected power grids, many system operation characteristics can be obtained. The traditional signal processing method cannot extract the information from ambient signals effectively. Aiming at the problem of broadband oscillation mode superposition and the difficulty of extracting information from ambient signals, an iterative adaptive variational mode decomposition (IA-VMD) method is proposed based on frequency domain analysis and signal energy. Additionally, the IA-VMD method, combined with a bandpass filter and the Prony algorithm, is used to realize the modal identification of broadband oscillation and ambient signals. Simulation experiments show that the IA-VMD method has good adaptability, antinoise characteristics, and a certain significant engineering application value as well.


2014 ◽  
Vol 568-570 ◽  
pp. 1417-1421
Author(s):  
Qing Xue Li ◽  
Long Hua Mu

SCADA (Supervisory Control and Data Acquisition) is an important concern about national security of our country and its security professionals. During those early days, a so called "security by obscurity" helped provide a palpable layer of cyber security and defense and a general feeling of immunity kinds of security problems that have started emerging networks to emerge in the mid 1980's, starting with the known Morris Worm. However, with the global standardization of TCP/IP protocol, and for the past 20 years, with the migration of autonomous systems SCADA interconnected power grids, security risks have increased exponentially. The security officials can no longer rely on the isolated nature of these systems to provide protection. Unfortunately, the security of SCADA systems has not kept pace with advances in computer technology. According to a 2003 report by Sandia National Laboratories, the SCADA security is generally five to ten years behind compared to typical systems of information technology. As threat, the contradictory range has expanded to include not only domestic but foreign terrorists, disgruntled internal, organized crime and even international competitors. This volatile convergence of global computer network and critical weaknesses in the operating system and application software system are well understood by opponents. Although a catastrophic failure is unlikely, these risks could be very problematic and cause disruptions in essential services and billions of euros in losses. This study includes a description of the state of the art of attacks against these systems and the reasons for the vulnerability of these systems. [1, 2, 3]


Sign in / Sign up

Export Citation Format

Share Document