In response to theemergence of new challenges in the digitization of the power grid, disaster recovery construction, driven by laws and regulations, is gradually becoming normalized. Disaster recovery has become a fu...
详细信息
ISBN:
(纸本)9798350377477;9798350377460
In response to theemergence of new challenges in the digitization of the power grid, disaster recovery construction, driven by laws and regulations, is gradually becoming normalized. Disaster recovery has become a fundamental compliance requirement for key industries. Considering the issue of low resource utilization and high costs associated with traditional scheduling data disaster recovery solutions, enhancing grid data processing efficiency and strengthening grid risk prevention capabilities have become focal points in the construction of power systems. Under this backdrop, this paper proposes integrating cloud computing technology with smart grid systems and puts forward a disaster recovery business solution featuring dual-active in the same city and multi-active in different locations. Leveraging theefficient data computing capabilities of cloud computing, a unified platform tailored for security zones is designed to enhancegrid big data processing efficiency. This platform achieves minute-level one-way synchronization of data across instances. Additionally, exploring business-oriented scheduling methods on this foundation, a comprehensive disaster recovery strategy for power scheduling data based on cloud computing technology is formulated.
This paper introduces CM-ReTS, a 4-Level address Communication Model designed specifically for real-time simulation of electromagnetic transients in power systems. CM-ReTS incorporates a unique 4-Level address scheme ...
详细信息
ISBN:
(纸本)9798350381993;9798350382006
This paper introduces CM-ReTS, a 4-Level address Communication Model designed specifically for real-time simulation of electromagnetic transients in power systems. CM-ReTS incorporates a unique 4-Level address scheme and leverages Remote Direct Memory Access (RDMA) technology to enableefficient and reliable data exchanges between computing nodes in a distributed system. By effectively distributing computational load, CM-ReTS facilitates faster and more realistic simulations, ensuring precise and timely data exchanges within a 5 mu s time step to capture transients in real time. experimental results validate theeffectiveness and efficiency of CM-ReTS in achieving accurate and real-time simulations of electromagnetic transients. With its robust and cost-effective solution, CM-ReTS provides researchers and engineers with the means to perform detailed analysis and studies on power systems under various transient conditions.
Smart grid is widely deployed in the modern smart city. However, the frequent network attacks on smart grid today have raised concerns about the privacy and security of individual fine-grained information collection. ...
详细信息
ISBN:
(纸本)9798350304817
Smart grid is widely deployed in the modern smart city. However, the frequent network attacks on smart grid today have raised concerns about the privacy and security of individual fine-grained information collection. Moreover, once the secret key held by the data control center is disclosed, any adversary could easily break the indistinguishability of ciphertexts, thereby revealing users privacy. To this end, we propose an enabling efficient multidimensional encrypted data aggregation scheme for fog-cloud-based smart grid by using the improved Boneh-Goh-Nissim cryptosystem and the super-increasing vector technique, which can realizeefficient multi-source multidimensional encrypted data aggregation in the fog-cloud architecture. The security analysis demonstrates that our scheme can satisfy security requirements of smart grid, i.e. it achieves the usage data privacy protection and confidentiality, multidimensional aggregation data integrity, and key-disclosure resistance. The performanceevaluations show that our scheme is moreefficient than related data aggregation schemes.
As the data traffic in the power grid and the real-time requirements of control services continue to grow, smart grid faced urgent requirements on data transmission and acquisition, which brings a series of new challe...
详细信息
ISBN:
(纸本)9798350309461
As the data traffic in the power grid and the real-time requirements of control services continue to grow, smart grid faced urgent requirements on data transmission and acquisition, which brings a series of new challenges to wireless communication. For the traditional electric power communication network, in terms of transmission capability, the augment-ability and transmission capacity are restricted;in terms of data acquisition capabilities, the access for Massive Machine Type Communication is difficult;in terms of collaborative interaction capabilities, the coordination and control methods of Internet of Things' terminals, power source, power grid, electricity load, and electric energy storage are insufficient. In order to make up for the above deficiencies, this paper proposes an end-to-end deterministic network architecture for theelectricity-energy Internet, which provides a theoretical basis for the realization of key technologies including deterministic expression of network performance under multi-service quality indicators, mechanism of influencing performance determinism, and realization of real-time high-quality energy data transmission.
This study investigates enhancing airfoil grid generation's automation and computational efficiency in aerospaceengineering using reinforcement learning and Graph Convolutional Networks (GCNs). Traditional grid g...
详细信息
Smart grid has high security requirements for communication technology. Smart distribution transformer (SDT) combine terminals are installed in the intelligent collection and control terminal in the low-voltage statio...
详细信息
ISBN:
(纸本)9798350309461
Smart grid has high security requirements for communication technology. Smart distribution transformer (SDT) combine terminals are installed in the intelligent collection and control terminal in the low-voltage station area to support marketing, power distribution and emerging business development needs. In this paper, we propose an SDT combine terminal design scheme based on Wireless LAN Authentication and Privacy Infrastructure (WAPI) communication technology. A security enhancement mechanism is introduced for designed terminal scheme. We also analyzed application scenarios in smart grids for our scheme. Our proposed solution is verified on the real SDT combine terminal by integrating software development kit into WAPI communication module.
Serverless computing is an emerging cloud computing abstraction wherein the cloud platform transparently manages all resources, including explicitly provisioning resources and geographical load balancing when the dema...
详细信息
ISBN:
(纸本)9798331528690;9798331528706
Serverless computing is an emerging cloud computing abstraction wherein the cloud platform transparently manages all resources, including explicitly provisioning resources and geographical load balancing when the demand for service spikes. Users provide code as functions, and the cloud platform runs these functions handling all aspects of function execution. While prior work has primarily focused on optimizing performance, this paper focuses on reducing the carbon footprint of these systems making variations in grid carbon intensity and intermittency from renewables transparent to the user. We introduce GreenWhisk, a carbon-aware serverless computing platform built upon Apache OpenWhisk, operating in two modes - grid-connected and grid-isolated - addressing intermittency challenges arising from renewables and thegrid's carbon footprint. Moreover, we develop carbon-aware load balancing algorithms that leverageenergy and carbon information to reduce the carbon footprint. Our evaluation results show that GreenWhisk can easily incorporate carbon-aware algorithms, thereby reducing the carbon footprint of functions without significantly impacting the performance of function execution. In doing so, our system design enables the integration of new carbon-aware strategies into a serverless computing platform.
In recent years, frequent and highly destructive megafires become one of the biggest climate-induced disasters. Fire behavior models using data from many emerging sources can inform decision support tools to respond t...
详细信息
ISBN:
(纸本)9798350365627;9798350365610
In recent years, frequent and highly destructive megafires become one of the biggest climate-induced disasters. Fire behavior models using data from many emerging sources can inform decision support tools to respond to and mitigate such megafires. emerging edge sensing and computing technologies within the fireenvironment can enhance the speed, reliability, and efficiency of wildland fire management, leading to better prevention, faster response times, and moreeffective mitigation of fire-related disasters. However, a unified system that streamlines the integration of edge technology advances within firescience and management workflows is needed. This paper presents the design and demonstrated case studies of the WIFIReedge Platform that facilitates the integration of sensing and AI capabilities at theedge. The initial attack and prescribed burn concept scenarios are described, highlighting the sensor deployment and utilization at the fire front.
The voltage source converter (VSC) has been widely used in the new power system. Its electromagnetic transient simulation has the characteristics of low simulation speed and high resource consumption. In this paper, t...
详细信息
ISBN:
(纸本)9798350377477;9798350377460
The voltage source converter (VSC) has been widely used in the new power system. Its electromagnetic transient simulation has the characteristics of low simulation speed and high resource consumption. In this paper, the small-step real-time simulator for VSC based on field programmable gate array (FPGA) is established. Firstly, the fixed-admittance model for VSC is established to improve the calculation speed of the primary system. At the same time, the parallel computing process of the primary system is designed to achieve small-step real-timecomputing of the primary system for VSC based on the parallel computing architecture of FPGA. Secondly, according to the logic of the control system for VSC, the serial-parallel computing process of the control system is designed, and the controller for VSC is implemented based on FPGA. Finally, the performance of theestablished FPGA simulator is verified based on the control experiments on PSCAD/eMTDC.
In wireless sensor networks (WSNs) of power system, the sensor nodes are resource-limited and usually deployed in unattended environments. Thus, it is difficult to adopt high-cost and high-performance protection techn...
详细信息
ISBN:
(纸本)9798350309461
In wireless sensor networks (WSNs) of power system, the sensor nodes are resource-limited and usually deployed in unattended environments. Thus, it is difficult to adopt high-cost and high-performance protection techniques to prevent sensitive information leakage. To solve this problem, this paper proposes a lightweight identity authentication protocol based on Physically Unclonable Function (PUF) to reduce the risk of WSN devices being maliciously controlled during operation. The BAN logic and ProVerif tool are used to formally verify and analyze the security of the proposed protocol. Furthermore, the informal security analysis and performance comparison are carried out. The results show that, compared with other existing authentication schemes, the proposed protocol can effectively prevent node impersonation and node capture attacks and has more comprehensive security features and better performance. This protocol can provide a more reliable guarantee for the continuous credibility evaluation of WSN devices.
暂无评论