The planning of distribution network has a crucial impact on the reliability, economy and stability of the power network. In order to improve the rationality of distribution network path planning, A research method of...
详细信息
ISBN:
(数字)9798350377033
ISBN:
(纸本)9798350377040;9798350377033
The planning of distribution network has a crucial impact on the reliability, economy and stability of the power network. In order to improve the rationality of distribution network path planning, A research method of path planning based on fusion improved A* and ant colony algorithm is proposed. The differential distribution of pheromones accelerated the initial convergence of ant colonies. Three influencing factors are introduced into the heuristic function and the distance bias function is integrated into the transfer probability, so that ants can better search the path towards the target point and improve the search efficiency. At the same time, a special reward and punishment mechanism is used to update pheromone to solve the problem that the algorithm is easy to fall into local optimal. By comparing with the ACO algorithm and the improved ACO algorithm, the effectiveness of the improved algorithm is verified.
With the large-scale integration of new energy sources, the issue of harmonics has become increasingly prominent. Active power filters, renowned for their excellent harmonic suppression capabilities, are widely utiliz...
详细信息
ISBN:
(纸本)9798350377040;9798350377033
With the large-scale integration of new energy sources, the issue of harmonics has become increasingly prominent. Active power filters, renowned for their excellent harmonic suppression capabilities, are widely utilized for harmonic control. However, in harsh operating environments, the parameters of these filters often suffer from mismatches, which can degrade their performance. To address the decline in harmonic control efficiency caused by parameter mismatch and related control errors, this paper proposes an online parameter identification method based on an adaptive forgetting factor recursive least squares (RLS) algorithm. By dynamically adjusting the parameters of the control system, the method enhances the precision of harmonic suppression even under parameter mismatch conditions. Furthermore, the adaptive adjustment of the forgetting factor balances the trade-off between identification accuracy and convergence speed, effectively preventing parameter saturation.
The power grid dispatch system is faced with challenges when dealing with the integration of a large-scale grid and distributed power generation resources. In this paper, we propose a construction method for an intell...
详细信息
This paper presents a novel method, the Automated Custom Wavelet Generation-Deep Learning-based classifier (ACWGDL), for cyberattack detection in smart grids. The proposed method generates custom wavelets for enhanced...
详细信息
ISBN:
(纸本)9798350371635;9798350371628
This paper presents a novel method, the Automated Custom Wavelet Generation-Deep Learning-based classifier (ACWGDL), for cyberattack detection in smart grids. The proposed method generates custom wavelets for enhanced feature extraction of cyberattacks on substation automation systems (SASs). Physical and network data from a substation is converted into time-frequency spectrograms using the Discrete Wavelet Transform (DWT) with the custom generated wavelets. Deep learning is implemented with a convolutional neural network to classify the generated spectrograms as cyberattacks from normal cases and power quality disturbance cases. The proposed method has been tested on two publicly available datasets from two different substation automation systems. The results have shown that the use of the custom wavelets was able to enhance the detection accuracy of the cyberattacks by up to 11% compared to the existing benchmark wavelets. The proposed method is versatile and has demonstrated its effectiveness in enhancing the detection accuracy of the cyberattacks irrespective of the choice of the datasets.
The scale of dispatch automation systems is constantly expanding due to the large-scale integration of new power system entities, and the operation and maintenance requirements of power grid automation systems are inc...
详细信息
The low-lovage ride-through (LVRT) of inverters plays a significant role in power system stability. In this paper, a LVRT strategy is proposed and validated by building a two-stage PV grid-connected inverter model. Th...
详细信息
ISBN:
(纸本)9798350377040;9798350377033
The low-lovage ride-through (LVRT) of inverters plays a significant role in power system stability. In this paper, a LVRT strategy is proposed and validated by building a two-stage PV grid-connected inverter model. The proposed model is designed to manage the MPPT link and adjust the active output, which ensures that the DC bus voltage remains stable. Additionally, the model is capable of detecting voltage dips and automatically adjusting its control structure. This automatic adjustment is crucial for providing reactive power support when a fault occurs. A voltage feed-forward in the current loop is used to counteract the effect of grid voltage on the current during grid faults. Besides, this paper employs a dual SOGI-based PLL for positive and negative sequence separation, enabling rapid and accurate grid signal tracking and measurement during faults. A case study is carried out to verify the proposed approach.
The flexible DC transmission system has been widely used in China's power system, and the reliability of its core equipment, the flexible DC converter valve, directly affects the safe and stable operation of the p...
详细信息
ISBN:
(数字)9798350377033
ISBN:
(纸本)9798350377040;9798350377033
The flexible DC transmission system has been widely used in China's power system, and the reliability of its core equipment, the flexible DC converter valve, directly affects the safe and stable operation of the power grid. In order to ensure the safe and stable operation of the power grid, it is necessary to timely and effectively identify and locate faulty bridge arms. Based on the analysis of the working principle of the three-phase bridge of the converter, this article proposes a fault diagnosis method for the bridge arm through consistency testing. Firstly, the residual formula for the voltage of each phase bridge arm is constructed, and then the specific rules for locating the fault branch through residual threshold are introduced. Finally, the proposed method was simulated and validated using PSCAD software, demonstrating the effectiveness of the fault diagnosis method.
This paper addresses the review and the numerical comparison of different state-of-the-art methods for the steadystate calculation of the polarization curve in Proton Exchange Membrane Fuel Cells (PEMFCs). The main av...
详细信息
ISBN:
(纸本)9798350358513;9798350358520
This paper addresses the review and the numerical comparison of different state-of-the-art methods for the steadystate calculation of the polarization curve in Proton Exchange Membrane Fuel Cells (PEMFCs). The main available methods to model the different losses contribution affecting the fuel cell output voltage are described, and their performances are compared in detail in order to draw important conclusions about the best-performing simulation model to implement. A sensitivity analysis of the polarization curve to different parameters is then performed, followed by the verification of the conclusions obtained in terms of best-performing method to compute the polarization curve in a dynamic scenario as well.
Intrusion detection systems (IDSs) are widely used for generating alarms indicating potential network security risks based on network traffic monitoring in industrial control systems (ICSs). However, it is a big burde...
详细信息
ISBN:
(纸本)9798350358513;9798350358520
Intrusion detection systems (IDSs) are widely used for generating alarms indicating potential network security risks based on network traffic monitoring in industrial control systems (ICSs). However, it is a big burden for security analysts to handle numerous alarms in real time. Also, most alarms are falsely triggered by normal operations, which makes the real attack risks hard to find. In this paper, we propose MNSSA, a meso-level network security situation awareness method that conducts graph evolution analysis on the ICS alarms. MNSSA can semi-automatically filter low-risk false alarms in bulk and detect attack events. It can better analyze the network security situation and improve alarm processing efficiency.
With the fast development of computer network technology, the Session Initiation Protocol (SIP) has been widely applied in multimedia communications. However, the security mechanism of SIP is relatively weak, with sec...
详细信息
ISBN:
(纸本)9798350377040;9798350377033
With the fast development of computer network technology, the Session Initiation Protocol (SIP) has been widely applied in multimedia communications. However, the security mechanism of SIP is relatively weak, with security risks such as insufficient identity authentication, brute-force attacks. Therefore, the security of conferencing systems based on the SIP protocol urgently needs enhancement, especially in some key business areas, such as in the electric power industry. This paper proposes a new protocol, Reliable-SIP (R-SIP), to protect the SIP protocol in the multimedia collaborative office system in the dedicated network of the power industry. The R-SIP includes two protocol schemes: the User Authentication-SIP (UA-SIP) scheme and the Message Security-SIP (MS-SIP) scheme. UA-SIP is an extension of the standard SIP protocol providing identity mutual authentication services. MS-SIP is a variant of the standard SIP protocol securing communications and facilitating session key exchange between communication entities. Experimental results show that the proposed R-SIP effectively reduces potential security threats, optimizes the availability and reliability of the system, and provides a more solid security guarantee for multimedia communications in the electric power industry.
暂无评论