22 resultados para security indicators

em Indian Institute of Science - Bangalore - Índia


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The power system network is assumed to be in steady-state even during low frequency transients. However, depending on generator dynamics, and toad and control characteristics, the system model and the nature of power flow equations can vary The nature of power flow equations describing the system during a contingency is investigated in detail. It is shown that under some mild assumptions on load-voltage characteristics, the power flow equations can be decoupled in an exact manner. When the generator dynamics are considered, the solutions for the load voltages are exact if load nodes are not directly connected to each other

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The main objective of on-line dynamic security assessment is to take preventive action if required or decide remedial action if a contingency actually occurs. Stability limits are obtained for different contingencies. The mode of instability is one of the outputs of dynamic security analysis. When a power system becomes unstable, it splits initially into two groups of generators, and there is a unique cutset in the transmission network known as critical cutset across which the angles become unbounded. The knowledge of critical cutset is additional information obtained from dynamic security assessment, which can be used for initiating preventive control actions, deciding emergency control actions, and adaptive out-of-step relaying. In this article, an analytical technique for the fast prediction of the critical cutset by system simulation for a short duration is presented. Case studies on the New England ten-generator system are presented. The article also suggests the applications of the identification of critical cutsets.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Security in a mobile communication environment is always a matter for concern, even after deploying many security techniques at device, network, and application levels. The end-to-end security for mobile applications can be made robust by developing dynamic schemes at application level which makes use of the existing security techniques varying in terms of space, time, and attacks complexities. In this paper we present a security techniques selection scheme for mobile transactions, called the Transactions-Based Security Scheme (TBSS). The TBSS uses intelligence to study, and analyzes the security implications of transactions under execution based on certain criterion such as user behaviors, transaction sensitivity levels, and credibility factors computed over the previous transactions by the users, network vulnerability, and device characteristics. The TBSS identifies a suitable level of security techniques from the repository, which consists of symmetric, and asymmetric types of security algorithms arranged in three complexity levels, covering various encryption/decryption techniques, digital signature schemes, andhashing techniques. From this identified level, one of the techniques is deployed randomly. The results shows that, there is a considerable reduction in security cost compared to static schemes, which employ pre-fixed security techniques to secure the transactions data.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An application of direct methods to dynamic security assessment of power systems using structure-preserving energy functions (SPEF) is presented. The transient energy margin (TEM) is used as an index for checking the stability of the system as well as ranking the contigencies based on their severity. The computation of the TEM requires the evaluation of the critical energy and the energy at fault clearing. Usually this is done by simulating the faulted trajectory, which is time-consuming. In this paper, a new algorithm which eliminates the faulted trajectory estimation is presented to calculate the TEM. The system equations and the SPEF are developed using the centre-of-inertia (COI) formulation and the loads are modelled as arbitrary functions of the respective bus voltages. The critical energy is evaluated using the potential energy boundary surface (PEBS) method. The method is illustrated by considering two realistic power system examples.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The channel volatiles in cordierites of the Precambrian high-grade metapelites from southern and eastern Karnataka northern Tamil Nadu and southern Kerala were analyzed in an attempt to use them as metamorphic fluid fugacity indicators. Infrared powder absorption spectra, used to characterize the channel volatiles, showed that all the 21 analyzed cordierites have H2O and CO2 as the channel volatiles, indicating the predominantly H2O-CO2 composition of the metamorphic fluids. The H2O fraction in the metamorphic fluid was computed using a published thermodynamic method in conjunction with gravimetrically determined cordierite channel H2O content, available P - T estimates and an appropriate equation of state for the H2O - CO2 fluids. The IR data and these calculated X(H2O) values indicate an overall correlation between the variation in the relative proportion of H2O and CO2 in the fluids and the metamorphic grade. The average computed X(H2O) values are: 0.78 for the amphibolite facies eastern Karnataka pelites, 0.36 for the amphibolite facies southern Karnataka pelites, 0.19 for the southern Karnataka transitional zone rocks and 0.13 for the northern Tamil Nadu granulites. Consistently low X(H2O) values, at about 0.2, were obtained for the orthopyroxene-bearing assemblages.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article addresses uncertainty effect on the health monitoring of a smart structure using control gain shifts as damage indicators. A finite element model of the smart composite plate with surface-bonded piezoelectric sensors and actuators is formulated using first-order shear deformation theory and a matrix crack model is integrated into the finite element model. A constant gain velocity/position feedback control algorithm is used to provide active damping to the structure. Numerical results show that the response of the structure is changed due to matrix cracks and this change can be compensated by actively tuning the feedback controller. This change in control gain can be used as a damage indicator for structural health monitoring. Monte Carlo simulation is conducted to study the effect of material uncertainty on the damage indicator by considering composite material properties and piezoelectric coefficients as independent random variables. It is found that the change in position feedback control gain is a robust damage indicator.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The influence of riparian land use on the diversity an~ distribution were investigated by sampling 113 localities covering 4 districts in south-western Karnataka. A total of 55 species in 12 families were recorded. Streams, rivers and lakes had higher diversity than marshes and sea coast. However, lakes had low endemism than streams and rivers. Streams flowing through evergreen forests had higher diversity and endemism. Human impacted riparian zones such as paddy fields had relatively lower species richness. However, streams flowing through forestry plantations had higher diversity than other natural riparian zones such as dry deciduous, moist deciduous and semi evergreen forests. Myristica swamps-a relict evergreen forest marsh had low diversity and high endemism. Odonate communities of lentic ecosystems, and human impacted streams and rivers were characterized by widespread generalist species. Endemics and habitat specialists were. restricted to streams and rivers with undisturbed riparian zone. The study documents possible odonate community change due to human impact: The influence of riparian 'Ianduse change on odonate community is also discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Electric power systems are exposed to various contingencies. Network contingencies often contribute to over-loading of network branches, unsatisfactory voltages and also leading to problems of stability/voltage collapse. To maintain security of the systems, it is desirable to estimate the effect of contingencies and plan suitable measures to improve system security/stability. This paper presents an approach for selection of unified power flow controller (UPFC) suitable locations considering normal and network contingencies after evaluating the degree of severity of the contingencies. The ranking is evaluated using composite criteria based fuzzy logic for eliminating masking effect. The fuzzy approach, in addition to real power loadings and bus voltage violations, voltage stability indices at the load buses also used as the post-contingent quantities to evaluate the network contingency ranking. The selection of UPFC suitable locations uses the criteria on the basis of improved system security/stability. The proposed approach for selection of UPFC suitable locations has been tested under simulated conditions on a few power systems and the results for a 24-node real-life equivalent EHV power network and 39-node New England (modified) test system are presented for illustration purposes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In space application the precision level measurement of cryogenic liquids in the storage tanks is done using triple redundant capacitance level sensor, for control and safety point of view. The linearity of each sensor element depends upon the cylindricity and concentricity of the internal and external electrodes. The complexity of calibrating all sensors together has been addressed by two step calibration methodology which has been developed and used for the calibration of six capacitance sensors. All calibrations are done using Liquid Nitrogen (LN2) as a cryogenic fluid. In the first step of calibration, one of the elements of Liquid Hydrogen (LH2) level sensor is calibrated using 700mm eleven point discrete diode array. Four wire method has been used for the diode array. Thus a linearity curve for a single element of LH2 is obtained. In second step of calibration, using the equation thus obtained for the above sensor, it is considered as a reference for calibrating remaining elements of the same LH2 sensor and other level sensor (either Liquid Oxygen (LOX) or LH2). The elimination of stray capacitance for the capacitance level probes has been attempted. The automatic data logging of capacitance values through GPIB is done using LabVIEW 8.5.