Cloud-Based Dynamic Line Rating

2022 ◽  
pp. 488-505
Author(s):  
Valentina V. Timčenko

Introduction of the Dynamic Line Rating (DLR) concept has an important role in implementing smart grids in the power utility's transmission network. DLR assumes real-time control of the overhead transmission line, based on the continuous evaluation of the actual thermal and other operating conditions, and further estimation of the maximum transmission line's load and other relevant parameters that determine operational limitations. This chapter presents cloud-based DLR systems in terms of architecture, cloud services, and cyber security issues. DLR systems are explored with regards to cloud computing in industry, applicable cloud services and infrastructures, and communication system's performance. Security and privacy of cloud-based DLR systems have been addressed in terms of public and private services. A secure hybrid cloud-based architecture to support DLR is proposed.

Author(s):  
Valentina V. Timčenko

Introduction of the Dynamic Line Rating (DLR) concept has an important role in implementing smart grids in the power utility's transmission network. DLR assumes real-time control of the overhead transmission line, based on the continuous evaluation of the actual thermal and other operating conditions, and further estimation of the maximum transmission line's load and other relevant parameters that determine operational limitations. This chapter presents cloud-based DLR systems in terms of architecture, cloud services, and cyber security issues. DLR systems are explored with regards to cloud computing in industry, applicable cloud services and infrastructures, and communication system's performance. Security and privacy of cloud-based DLR systems have been addressed in terms of public and private services. A secure hybrid cloud-based architecture to support DLR is proposed.


2016 ◽  
Vol 20 (suppl. 2) ◽  
pp. 393-406 ◽  
Author(s):  
Vlado Porobic ◽  
Evgenije Adzic ◽  
Milan Rapaic

Hardware-in-the-Loop (HIL) emulation is poised to become unsurpassed design tool for development, testing, and optimization of real-time control algorithms for grid connected power electronics converters for distributed generation, active filters and smart grid applications. It is strongly important to examine and test how grid connected converters perform under different operating conditions including grid disturbances and faults. In that sense, converter?s controller is a key component responsible for ensuring safe and high-performance operation. This paper demonstrates an example how ultra-low latency and high fidelity HIL emulator is used to easily, rapidly and exhaustively test and validate standard control strategy for grid connected power electronics converters, without need for expensive hardware prototyping and laboratory test equipment.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Amr M. Sauber ◽  
Passent M. El-Kafrawy ◽  
Amr F. Shawish ◽  
Mohamed A. Amin ◽  
Ismail M. Hagag

The main goal of any data storage model on the cloud is accessing data in an easy way without risking its security. A security consideration is a major aspect in any cloud data storage model to provide safety and efficiency. In this paper, we propose a secure data protection model over the cloud. The proposed model presents a solution to some security issues of cloud such as data protection from any violations and protection from a fake authorized identity user, which adversely affects the security of the cloud. This paper includes multiple issues and challenges with cloud computing that impairs security and privacy of data. It presents the threats and attacks that affect data residing in the cloud. Our proposed model provides the benefits and effectiveness of security in cloud computing such as enhancement of the encryption of data in the cloud. It provides security and scalability of data sharing for users on the cloud computing. Our model achieves the security functions over cloud computing such as identification and authentication, authorization, and encryption. Also, this model protects the system from any fake data owner who enters malicious information that may destroy the main goal of cloud services. We develop the one-time password (OTP) as a logging technique and uploading technique to protect users and data owners from any fake unauthorized access to the cloud. We implement our model using a simulation of the model called Next Generation Secure Cloud Server (NG-Cloud). These results increase the security protection techniques for end user and data owner from fake user and fake data owner in the cloud.


Author(s):  
Amtul Waheed ◽  
Jana Shafi

Smart cities are established on some smart components such as smart governances, smart economy, science and technology, smart politics, smart transportation, and smart life. Each and every smart object is interconnected through the internet, challenging the security and privacy of citizen's sensitive information. A secure framework for smart cities is the only solution for better and smart living. This can be achieved through IoT infrastructure and cloud computing. The combination of IoT and Cloud also increases the storage capacity and computational power and make services pervasive, cost-effective, and accessed from anywhere and any device. This chapter will discuss security issues and challenges of smart city along with cyber security framework and architecture of smart cities for smart infrastructures and smart applications. It also presents a general study about security mechanism for smart city applications and security protection methodology using IOT service to stand against cyber-attacks.


Author(s):  
Bashar Alohali ◽  
Kashif Kifayat ◽  
Qi Shi ◽  
William Hurst

Over the last decade, Internet of Things (IoTs) have brought radical changes to the means and forms of communication for monitoring and control of a large number of applications including Smart Grid (SG). Traditional energy networks have been modernized to SGs to boost the energy industry in the context of efficient and effective power management, performance, real-time control and information flow using two-way communication between utility provides and end-users. However, integrating two-way communication in SG comes at the cost of cyber security vulnerabilities and challenges. In the context of SG, node compromise is a severe security threat due to the fact that a compromised node can significantly impact the operations and security of the SG network. Therefore, in this chapter, Key Management Scheme for Communication Layer in the Smart Grid (KMS-CL-SG) has proposed. In order to achieve a secure end-to-end communication we assign a unique key to each node in the group.


Author(s):  
Bashar Alohali ◽  
Kashif Kifayat ◽  
Qi Shi ◽  
William Hurst

Over the last decade, Internet of Things (IoTs) have brought radical changes to the means and forms of communication for monitoring and control of a large number of applications including Smart Grid (SG). Traditional energy networks have been modernized to SGs to boost the energy industry in the context of efficient and effective power management, performance, real-time control and information flow using two-way communication between utility provides and end-users. However, integrating two-way communication in SG comes at the cost of cyber security vulnerabilities and challenges. In the context of SG, node compromise is a severe security threat due to the fact that a compromised node can significantly impact the operations and security of the SG network. Therefore, in this chapter, Key Management Scheme for Communication Layer in the Smart Grid (KMS-CL-SG) has proposed. In order to achieve a secure end-to-end communication we assign a unique key to each node in the group.


1994 ◽  
Vol 29 (1-2) ◽  
pp. 409-417 ◽  
Author(s):  
Andrea G. Capodaglio

According to the present state-of-the-art, sewerage systems, sewage treatment plants and their subsequent improvements are often planned and designed as totally separate entities, each subject to a specific set of performance objectives. As a result, sewage treatment efficiency is subject to considerable variability, depending both on general hydrologic conditions in the urban watershed (wet versus dry periods), and on specific “instantaneous” operating conditions. It has been postulated that the integration of urban drainage and wastewater treatment design and operation could allow minimization of the harmful effects of discharges from treatment plants, overflows and surface water runoff. This “ideal condition” can be achieved through the introduction of so-called “real-time control” technology in sewerage collection and treatment operations. To be a feasible goal, this technology poses the demand for more powerful simulation models of either aspect of the system - or, ideally, of a unified sewer-and-treatment plant model - than most of those currently available. This paper examines the requirements of rainfall/runoff transformation and sewer flow models with respect to real-time control applications, and focuses on the methodology of stochastic, transfer function modelling, reporting application examples. Modalities and limitations of the extraction of information from the models thus derived are also analyzed.


2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Wei Wang ◽  
Zhenjiang Cai ◽  
Shaofei Liu

A real-time control is proposed for plug-in-hybrid electric vehicles (PHEVs) based on dynamic programming (DP) and equivalent fuel consumption minimization strategy (ECMS) in this study. Firstly, the resulting controls of mode selection and series mode are stored in tables through offline simulation of DP, and the parallel HEV mode uses ECMS-based real-time algorithm to reduce the application of maps and avoid manual adjustment of parameters. Secondly, the feedback energy management system (FMES) is built based on feedback from SoC, which takes into account the charge and discharge reaction (CDR) of the battery, and in order to make full use of the energy stored in the battery, the reference SoC is introduced. Finally, a comparative simulation on the proposed real-time controller is conducted against DP, the results show that the controller has a good performance, and the fuel consumption value of the real-time controller is close to the value using DP. The engine operating conditions are concentrated in the low fuel consumption area of the engine, and when the driving distance is known, the SoC can follow the reference SoC well to make full use of the energy stored in the battery.


Sign in / Sign up

Export Citation Format

Share Document