Research and Application of Static Security Check for Monthly Maintenance Schedule

2014 ◽  
Vol 1070-1072 ◽  
pp. 1511-1515
Author(s):  
Chuan Cheng Zhang ◽  
Cui Hui Yan ◽  
Sai Dai ◽  
Dan Xu ◽  
Yi Zhu ◽  
...  

Monthly maintenance schedule has an important guiding significance to day ahead maintenance arrangement. However, the current management of monthly maintenance schedule is short of quantitative analysis methods. Consequently it can’t effectively take the security risk that may exist under monthly maintenance schedule. This paper presents a static security checking method for monthly maintenance schedule. First, established the monthly power grid network model based on the realtime model and device state changes, including the commissioning and decommissioning devices and maintenance devices. Next, the month-contract energy was decomposed to every day and every hour, then combined with monthly load forecast and maintenance schedule, the power system typical operation modes were generated automatically. Finally, quantitative assessment of monthly maintenance schedule was completed by power flow calculation, security analysis and evaluation indexes, including load supply adequacy and equivalent generation capacity loss. This method is instructive for monthly maintenance arrangement and its feasibility is proved by practical application.

2012 ◽  
Vol 614-615 ◽  
pp. 900-906
Author(s):  
Jun Liu ◽  
Ling Ling Pan ◽  
Yi Jun Yu ◽  
Shu Hai Feng ◽  
Feng Li ◽  
...  

In this paper, a calculation method of static security analysis based on section topology relation is proposed. When topological structure of current data section is the same as that of the basecase section, it fully utilizes the factor tables of Jacobian matrix, and inverse matrix information of the basecase data section in rapid filtration of DC power flow. On the contrary, If topology changes compared with the basecase section, it adopts substation partial topological analysis technology as well as the method of partial factor table correction to increase the speed of calculation. Case studies with a practical power system indicate that the proposed method is correct and reasonable.


2013 ◽  
Vol 732-733 ◽  
pp. 669-676
Author(s):  
Feng Li ◽  
Zhi Hua Wang ◽  
Hu Cheng Li

It’s important to improve the speed of security analysis of 96 period generation scheduling cases. Based on the characteristics of 96 period cases’ security analysis, four technical proposals were presented. They were following as fast scanning and analysis technology based on DC power flow screening, multiple thread parallel computing adapted to a multiple contingency case, multiple process parallel computing technology adapted to multiple period cases. Detailed test examples showed that the proposed methods could contribute much to fast security analysis of 96 period cases’ day-ahead dispatching schedule.


2021 ◽  
Vol 54 (4) ◽  
pp. 1-36
Author(s):  
Fei Chen ◽  
Duming Luo ◽  
Tao Xiang ◽  
Ping Chen ◽  
Junfeng Fan ◽  
...  

Recent years have seen the rapid development and integration of the Internet of Things (IoT) and cloud computing. The market is providing various consumer-oriented smart IoT devices; the mainstream cloud service providers are building their software stacks to support IoT services. With this emerging trend even growing, the security of such smart IoT cloud systems has drawn much research attention in recent years. To better understand the emerging consumer-oriented smart IoT cloud systems for practical engineers and new researchers, this article presents a review of the most recent research efforts on existing, real, already deployed consumer-oriented IoT cloud applications in the past five years using typical case studies. Specifically, we first present a general model for the IoT cloud ecosystem. Then, using the model, we review and summarize recent, representative research works on emerging smart IoT cloud system security using 10 detailed case studies, with the aim that the case studies together provide insights into the insecurity of current emerging IoT cloud systems. We further present a systematic approach to conduct a security analysis for IoT cloud systems. Based on the proposed security analysis approach, we review and suggest potential security risk mitigation methods to protect IoT cloud systems. We also discuss future research challenges for the IoT cloud security area.


Electronics ◽  
2020 ◽  
Vol 9 (6) ◽  
pp. 989 ◽  
Author(s):  
Anhao Xiang ◽  
Jun Zheng

Home area networks (HANs) are the most vulnerable part of smart grids since they are not directly controlled by utilities. Device authentication is one of most important mechanisms to protect the security of smart grid-enabled HANs (SG-HANs). In this paper, we propose a situation-aware scheme for efficient device authentication in SG-HANs. The proposed scheme utilizes the security risk information assessed by the smart home system with a situational awareness feature. A suitable authentication protocol with adequate security protection and computational and communication complexity is then selected based on the assessed security risk level. A protocol design of the proposed scheme considering two security risk levels is presented in the paper. The security of the design is verified by using both formal verification and informal security analysis. Our performance analysis demonstrates that the proposed scheme is efficient in terms of computational and communication costs.


1986 ◽  
Vol PER-6 (8) ◽  
pp. 19-20
Author(s):  
G. Durga Prasad ◽  
M. Hanmandlu ◽  
Tapan K. Saha

1979 ◽  
Vol PAS-98 (2) ◽  
pp. 498-508 ◽  
Author(s):  
A. Monticelli ◽  
S. Deckmann ◽  
A. Garcia ◽  
B. Stott

2020 ◽  
Vol 14 (1) ◽  
pp. 1183-1194 ◽  
Author(s):  
Juarez Machado da Silva ◽  
Iverson Costa ◽  
Jose Vicente Canto dos Santos ◽  
Jorge Luis Victoria Barbosa ◽  
Torsten Braun ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document