The proceedings contain 409 papers. The topics discussed include: vibration modal analysis of decay-like composite insulator rod;estimation of torsional stiffness of turbine generator lumped spring mass shaft model ba...
ISBN:
(纸本)9798350300222
The proceedings contain 409 papers. The topics discussed include: vibration modal analysis of decay-like composite insulator rod;estimation of torsional stiffness of turbine generator lumped spring mass shaft model based on eigenvectors orthogonality and Newton-Raphson method;design and development of three-level inverter;diagnosis of power transformer internal fault based on denoising autoencoder and optimized convolutional neural network;simulation analysis of main insulation field of power transformer considering typical bubble defect and temperature;MIMO-MPC based coordinated load frequency control considering the SOC of battery and EV;small-signal stability analysis of islanded microgrid with grid-forming and grid-following inverter-based resources;and capacity optimization of distributed photovoltaic hydrogen production and hydrogenation electrochemical energy storage integrated station.
The proceedings contain 34 papers. The topics discussed include: the outflow characteristics of PV water lifting systems based on multiple tracking strategies;new topology design and on-line charging and discharging t...
The proceedings contain 34 papers. The topics discussed include: the outflow characteristics of PV water lifting systems based on multiple tracking strategies;new topology design and on-line charging and discharging technology of substation DC system;technologies related to intelligent grounding box of high-voltage transmission cable;research on operational status monitoring technology of the secondary circuit of intelligent substation based on virtual circuit visualization;research and design of substation positioning system based on ultra-wide band;a coordinated reclosing strategy for maintained transformer in offshore wind powersystems;design of carbon dioxide reduction electrolysis stacks and trial production of electrolytic cell prototype;and optimal configuration of voltage sag monitoring points considering branch current based on war strategy optimization algorithm.
The concept of solar cell is changing the world in obtaining a clean energy that is an environment user friendly source of energy. Solar arrays process and convert the irradiance which is representing the quantity of ...
详细信息
The application of high-resolution satellite images in deep learning-based change detection methods has become increasingly popular. However, the down-sampling and cropping strategies deployed to fit the GPU memory co...
详细信息
Two sets of vertical-shaft Francis turbine-generator unit of 10MWcapacity are installed in Genyem hydropower station in Indonesia with 192.33m rated water head. Adopting the spectrum of turbine series models, turbine ...
详细信息
In this paper, a novel algorithm had been proposed to improve the efficiency performance of the wind energy conversion system (WECS) to reach the maximum possible captured power under fast varying wind speed. The perm...
详细信息
In recent years, the power grid in Jiangxi Province has entered a new phase of construction in the context of a new powersystem. However, the traditional network security protection system of the company is facing in...
详细信息
ISBN:
(纸本)9783031807121;9783031807138
In recent years, the power grid in Jiangxi Province has entered a new phase of construction in the context of a new powersystem. However, the traditional network security protection system of the company is facing increasing security risks [1]. This paper first elucidates the network structure characteristics of the new powersystem and identifies the security risks it faces. Subsequently, combining the characteristics of boundary protection and static protection in the existing network security protection system, this paper analyzes the challenges faced by the protection system from aspects such as power source structure, grid configuration, business models, and technical foundations. Based on the content of security challenges, the paper proposes the requirements for network security protection in terms of trusted access, intelligent perception, and precise protection. Lastly, in conjunction with the development trends of security systems and new technologies, the paper summarizes the technological development directions in areas such as perception technology, blocking technology, security detection and evaluation technology, and validation technology.
Bi-directional DC-DC converters have many applications in in-vehicle power supplies and microgrids. Bi-directional DAB (dual active bridge) converters are proposed to optimize the charging system for electric vehicles...
详细信息
In order to understand the optimization system of hydraulic power generation system based on particle swarm optimization algorithm, the optimization technique of hydraulic power generation system based on particle swa...
详细信息
In the last decade, blockchain technology has garnered significant attention for its potential to transform a variety of industries and also powersystems. This review aims to provide a detailed view on blockchain tec...
详细信息
暂无评论