scispace - formally typeset
Search or ask a question

Answers from top 9 papers

More filters
Papers (9)Insight
Proceedings ArticleDOI
Mini S. Thomas, Anupama Prakash, Nizamuddin 
01 Oct 2008
6 Citations
If the conclusion is that the relay IEDs did not operate as expected, the user may change the settings and test the relay by replaying the recorded fault waveform through a test device to check the performance.
This creative approach to relay testing allows relay technicians and engineers to comprehensively check line relays and evaluate their dynamic response to faults without staging actual faults on energized transmission lines.
One method detects conditions of system stress that can lead to unintended relay operation, and initiates a supervisory signal to modify relay response in real time to avoid false trips.
Perhaps instead the relay establishes a threshold that requires a signal of minimum proportion or duration to be overcome before a response is seen.
In this paper we propose a new fuzzy logic-based decision-making procedure for relay selection unlike to many existing works where Signal-to-Interference-plus-Noise Ratio (SINR) is considered as the only parameter for relay selection.
Thus, a Stat-dependent unidentified relay signal is necessary for inducing supernumerary PC death.
By exploiting the fact that the jamming signal can be stored at the relay nodes, we also propose a hybrid algorithm to set a signal-to-interference and noise ratio (SINR) threshold at the node to determine the type of signal stored at the relay node.
Open accessProceedings ArticleDOI
01 Dec 2016
13 Citations
The untrusted relay which helps to forward the source signal towards the destination, could also be regarded as a potential eavesdropper.
According to the tests on a 110 kV power system, this prototype can correctly check the relay setting values for the given power system so that it can be used as an efficient aid for relay engineers in power system dispatch centers.

See what other people are reading

What is the significance of symmetrical output voltage swing in power electronics systems?
4 answers
How fractals involved in glass art?
5 answers
How fractals involved in glass art?
5 answers
What is state estimation?
5 answers
What are the GE standalone companies and why GE separate into three companies?
5 answers
What are the current advancements in machine learning techniques for power forecasting?
5 answers
Recent advancements in machine learning techniques for power forecasting include the development of models tailored for different renewable energy sources. For wind power forecasting, machine learning algorithms like LightGBM, random forest, CatBoost, and XGBoost have been utilized, with CatBoost showing superior performance in very-short-term predictions. In solar photovoltaic (PV) power forecasting, advanced ML models such as long short-term memory and gated recurrent unit models have outperformed traditional methods, addressing the intermittent nature of solar PV-generated power. Additionally, for electricity demand forecasting, models like Bi-directional LSTM (BiLSTM) have shown better performance compared to other models like LSTM, ANN, DNN, RNN, and GRU, emphasizing the importance of accurate prediction for energy strategy formulation. Moreover, BiLSTM models have been proposed for state estimation in power systems, showcasing robustness in the presence of uncertainties and missing data points.
How to build ML model genetator?
5 answers
To build an ML model generator, one can consider various approaches outlined in the provided contexts. Firstly, integrating a ML-FEM coupled model can accurately simulate and predict the transient behavior of faults in generators, enhancing protection schemes. Additionally, leveraging a hybrid gateway in a peripheral I/O device allows for dual domains, enabling communication between compute resources and hosts for ML applications. Furthermore, utilizing a deep auto-encoder model like MLP-SAE can predict gene expression changes based on genetic variants, showcasing the effectiveness of deep learning in genomics research. By amalgamating these insights, one can develop a robust ML model generator that incorporates advanced simulation techniques, domain-specific communication structures, and predictive genetic modeling methodologies.
What is the main methodology formulation in environmnrtal impact assessment on distribution of electrical power?
4 answers
The main methodology formulation in environmental impact assessment on the distribution of electrical power involves analyzing the electric and magnetic fields produced by high voltage overhead transmission lines and ensuring compliance with international exposure guidelines. Additionally, the integration of smart monitoring in power distribution systems plays a crucial role in enhancing overall system reliability, with a focus on communication infrastructure and real-time monitoring. Furthermore, the transition to electric vehicles for transportation introduces challenges to power distribution networks, necessitating a methodological framework to assess the impact of plug-in electric vehicles on system loading and voltage regulation. Overall, these methodologies encompass evaluating field distributions, reliability indices, and power flow calculations to address environmental impacts and enhance the efficiency and reliability of electrical power distribution systems.
How often does faults due to vibrations occur in ships?
5 answers
Faults due to vibrations in ships are a significant concern, with various studies shedding light on their occurrence. Research indicates that wave-induced vibrations can contribute up to 50% of fatigue damage in large ocean-going ships, emphasizing the impact of vibrations on ship structures. Additionally, equipment fault detection in engines for boats focuses on shock and vibration information, with a high probability (98%) of engine fault determination and 72% probability of fault detection. Furthermore, metal fatigue in vessels, caused by dynamic movement, has been diagnosed using vibration analysis, highlighting the importance of reliability engineering in detecting faults related to vibrations. Overall, these studies underscore the frequency and significance of faults attributed to vibrations in ships, necessitating effective monitoring and diagnostic strategies for ensuring maritime safety.
What are OSAT in semiconductor?
6 answers
Outsourced Semiconductor Assembly and Test (OSAT) companies play a crucial role in the semiconductor manufacturing process by providing specialized services that include the assembly, packaging, and testing of semiconductor devices. These services are financially advantageous as they allow semiconductor companies to outsource key steps of the production process to firms with the necessary expertise and infrastructure, thereby reducing capital expenditure and focusing on core competencies such as design and innovation. OSAT companies are equipped to handle various aspects of semiconductor packaging and testing, including the development of fine pitch Through-Silicon Vias (TSVs) interposers, which are essential for creating high-density interconnections in multi-chip modules. This capability is significant as it provides a commercially viable technology path for semiconductor companies looking to leverage advanced packaging techniques without the need for extensive in-house facilities. However, outsourcing to OSAT companies is not without risks, particularly concerning the security of on-chip assets. The process of testing at OSAT facilities can potentially expose sensitive design and functionality details to untrusted parties. To mitigate these risks, techniques such as scan chain obfuscation are employed to hide the actual scan data from testers by inserting logic driven by a secret key between the scan cells. Despite these measures, recent studies have shown that attacks like ScanSAT can break these obfuscation techniques, highlighting the ongoing challenge of securing semiconductor designs in the OSAT environment. In summary, OSAT companies are integral to the semiconductor industry, offering essential assembly and testing services that enable the production of complex semiconductor devices. While they offer significant cost and efficiency benefits, the security of intellectual property remains a critical concern that requires ongoing attention and innovation.
What are the negative impact of Drones in terms of Vulnerability to Hacking for Defense and military sector?
5 answers
Drones, particularly in defense and military sectors, face significant vulnerabilities to hacking, posing various negative impacts. These unmanned aerial vehicles (UAVs) are susceptible to cyber-attacks like GPS spoofing, de-authentication, denial of services, and injecting false information. The onboard resources limitations and weaknesses in existing policies contribute to the challenge of implementing effective cybersecurity solutions. Cyber-attacks on UAVs can lead to severe consequences such as data theft, UAV deactivation, or unauthorized control by malicious entities. Communication security is crucial as UAVs often carry sensitive information, making them prime targets for adversaries. To mitigate these risks, it is essential to address vulnerabilities proactively and implement robust defense mechanisms in UAV systems.