Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Power system security assessment through analog computation

View through CrossRef
This dissertation proposes a methodology for power system security assessment through analog computation. By exploiting the strengths of analog computation a more robust security assessment can be performed as compared to traditional methods. Security assessment is currently performed by power system operators utilizing digital computers and determines the power system structure, states and level of security based on telemetered data and knowledge of the system. Ideally this process would occur in real time but due to the limitations of digital computers and telemetry systems the security assessment is currently conducted at periodic intervals of ten to fifteen minutes. This process requires a tremendous amount of computation for large systems. In order to provide updated assessment at such time intervals, not even in real time, numerous assumptions and simplifications of the power system models and analyses are required to simplify and speed up the digital computations. Due to its inherent speed and computational efficiency analog computation is proving to be a viable alternative. Analog computation by definition is continuous in time and embodies an entirely different paradigm to computing as compared to discrete time methods. Security assessment for digital computers consists of topology estimations, state estimation and contingency analysis. The theory and practical approaches to these tasks through digital, discrete time, computational methods are fairly mature at this point in time but do not translate directly to analog computation. A robust analog computation engine along with corresponding computational theory is required in order to make use of analog methods for power system security assessment. This dissertation provides the relevant theory, hardware realization and application of an analog computer for power system security assessment.
Title: Power system security assessment through analog computation
Description:
This dissertation proposes a methodology for power system security assessment through analog computation.
By exploiting the strengths of analog computation a more robust security assessment can be performed as compared to traditional methods.
Security assessment is currently performed by power system operators utilizing digital computers and determines the power system structure, states and level of security based on telemetered data and knowledge of the system.
Ideally this process would occur in real time but due to the limitations of digital computers and telemetry systems the security assessment is currently conducted at periodic intervals of ten to fifteen minutes.
This process requires a tremendous amount of computation for large systems.
In order to provide updated assessment at such time intervals, not even in real time, numerous assumptions and simplifications of the power system models and analyses are required to simplify and speed up the digital computations.
Due to its inherent speed and computational efficiency analog computation is proving to be a viable alternative.
Analog computation by definition is continuous in time and embodies an entirely different paradigm to computing as compared to discrete time methods.
Security assessment for digital computers consists of topology estimations, state estimation and contingency analysis.
The theory and practical approaches to these tasks through digital, discrete time, computational methods are fairly mature at this point in time but do not translate directly to analog computation.
A robust analog computation engine along with corresponding computational theory is required in order to make use of analog methods for power system security assessment.
This dissertation provides the relevant theory, hardware realization and application of an analog computer for power system security assessment.

Related Results

THE SECURITY AND PRIVACY MEASURING SYSTEM FOR THE INTERNET OF THINGS DEVICES
THE SECURITY AND PRIVACY MEASURING SYSTEM FOR THE INTERNET OF THINGS DEVICES
The purpose of the article: elimination of the gap in existing need in the set of clear and objective security and privacy metrics for the IoT devices users and manufacturers and a...
Formulation and Emulation of Quantum-Inspired Dynamical Systems With Classical Analog Circuits
Formulation and Emulation of Quantum-Inspired Dynamical Systems With Classical Analog Circuits
Abstract Quantum dynamical systems are capable of powerful computation but are hard to emulate on digital computers. We show that four novel analog circuit parts can...
[RETRACTED] Keto Max Power - BURN FATINSTEAD OF CARBS with Keto Max Power! v1
[RETRACTED] Keto Max Power - BURN FATINSTEAD OF CARBS with Keto Max Power! v1
[RETRACTED]Keto Max Power Reviews: Warning! Don’t Buy Dragons Den Pills Fast Until You Read This UK Latest Report Weight gain’s principle of “energy intake exceeding energy spent”...
Public budget security administration: development of primary mechanisms
Public budget security administration: development of primary mechanisms
The current state of public administration of budget security indicates its actual absence. With the extremely important role of budget security, both in the life of the country as...
EPD Electronic Pathogen Detection v1
EPD Electronic Pathogen Detection v1
Electronic pathogen detection (EPD) is a non - invasive, rapid, affordable, point- of- care test, for Covid 19 resulting from infection with SARS-CoV-2 virus. EPD scanning techno...
Circular Economy: Rethinking Security Sustainability Through Ransom Project
Circular Economy: Rethinking Security Sustainability Through Ransom Project
Abstract As part of PETRONAS approach to sustainability, the organization has made more concerted effort to purposefully adopt Circular Economy (CE) across PETRONAS ...
Ultrahigh-precision analog computing using memory-switching geometric ratio of transistors
Ultrahigh-precision analog computing using memory-switching geometric ratio of transistors
Analog computing has gained increasing attention for its potential in artificial intelligence hardware. The computation in traditional analog systems relies on use of intrinsic phy...
SECURITY REQUIREMENTS VALIDATION FOR MOBILE APPS: A SYSTEMATIC LITERATURE REVIEW
SECURITY REQUIREMENTS VALIDATION FOR MOBILE APPS: A SYSTEMATIC LITERATURE REVIEW
Security requirements are important to increase the confidence of mobile users to perform many online transactions, such as banking, booking and payment via mobile devices.  Object...

Back to Top