104 resultados para Grid-Connected InvertersInverter
Resumo:
Optimal fault ride-through (FRT) conditions for a doubly-fed induction generator (DFIG) during a transient grid fault are analyzed with special emphasis on improving the active power generation profile. The transition states due to crowbar activation during transient faults are investigated to exploit the maximum power during the fault and post-fault period. It has been identified that operating slip, severity of fault and crowbar resistance have a direct impact on the power capability of a DFIG, and crowbar resistance can be chosen to optimize the power capability. It has been further shown that an extended crowbar period can deliver enhanced inertial response following the transient fault. The converter protection and drive train dynamics have also been analyzed while choosing the optimum crowbar resistance and delivering enhanced inertial support for an extended crowbar period.
Resumo:
The doubly-fed induction generator (DFIG) now represents the dominant technology in wind turbine design. One consequence of this is limited damping and inertial response during transient grid disturbances. A dasiadecoupledpsila strategy is therefore proposed to operate the DFIG grid-side converter (GSC) as a static synchronous compensator (STATCOM) during a fault, supporting the local voltage, while the DFIG operates as a fixed-speed induction generator (FSIG) providing an inertial response. The modeling aspects of the decoupled control strategy, the selection of protection control settings, the significance of the fault location and operation at sub- and super-synchronous speeds are analyzed in detail. In addition, a case study is developed to validate the proposed strategy under different wind penetrations levels. The simulations show that suitable configuration of the decoupled strategy can be deployed to improve system voltage stability and inertial response for a range of scenarios, especially at high wind penetration. The conclusions are placed in context of the practical limitations of the technology employed and the system conditions.
Resumo:
Healing algorithms play a crucial part in distributed peer-to-peer networks where failures occur continuously and frequently. Whereas there are approaches for robustness that rely largely on built-in redundancy, we adopt a responsive approach that is more akin to that of biological networks e.g. the brain. The general goal of self-healing distributed graphs is to maintain certain network properties while recovering from failure quickly and making bounded alterations locally. Several self-healing algorithms have been suggested in the recent literature [IPDPS'08, PODC'08, PODC'09, PODC'11]; they heal various network properties while fulfilling competing requirements such as having low degree increase while maintaining connectivity, expansion and low stretch of the network. In this work, we augment the previous algorithms by adding the notion of edge-preserving self-healing which requires the healing algorithm to not delete any edges originally present or adversarialy inserted. This reflects the cost of adding additional edges but more importantly it immediately follows that edge preservation helps maintain any subgraph induced property that is monotonic, in particular important properties such as graph and subgraph densities. Density is an important network property and in certain distributed networks, maintaining it preserves high connectivity among certain subgraphs and backbones. We introduce a general model of self-healing, and introduce xheal+, an edge-preserving version of xheal[PODC'11]. © 2012 IEEE.
Resumo:
This paper investigates the pull-out behaviour (particularly the bearing resistance) of a steel grid reinforcement embedded in silty sand using laboratory tests and numerical analyses. It is demonstrated that the various common analytical equations for calculating the bearing component of pull-out resistance give a wide range of calculated values, up to about 200% disparity. The disparity will increase further if the issue of whether to use the peak or critical state friction angle is brought in. Furthermore, these equations suggest that the bearing resistance factor, N, is only a function of soil friction angle which is not consistent with some design guidelines. In this investigation, a series of large scale laboratory pull-out tests under different test pressures were conducted. The test results unambiguously confirmed that the N factor is a function of test pressure. A modified equation for calculating N is also proposed. To have more in-depth understanding of the pull-out behaviour, the tests were modelled numerically. The input parameters for the numerical analysis were obtained from laboratory triaxial tests. The analysis results were compared with the experimental results. Good agreement between experimental and numerical results was achieved if the strain-softening behaviour from peak strength to critical state condition was captured by the soil model used. © 2013 Elsevier Ltd.
Resumo:
We consider the ground-state entanglement in highly connected many-body systems consisting of harmonic oscillators and spin-1/2 systems. Varying their degree of connectivity, we investigate the interplay between the enhancement of entanglement, due to connections, and its frustration, due to monogamy constraints. Remarkably, we see that in many situations the degree of entanglement in a highly connected system is essentially of the same order as in a low connected one. We also identify instances in which the entanglement decreases as the degree of connectivity increases.
Resumo:
Rationale, aims and objectives: This study aims to examine the public's knowledge and perceptions of connected health (CH).
Methods: A structured questionnaire was administered by face-to-face interview to an opportunistic sample of 1003 members of the public in 11 shopping centres across Northern Ireland (NI). Topics included public knowledge of CH, opinions about who should provide CH and views about the use of computers in health care. Multivariable analyses were conducted to assess respondents' willingness to use CH in the future.
Results: Sixty-seven per cent of respondents were female, 31% were less than 30 years old and 22% were over 60 years. Most respondents had never heard of CH (92%). Following a standard definition, the majority felt CH was a good idea (≈90%) and that general practitioners were in the best position to provide CH; however, respondents were equivocal about reductions in health care professionals' workload and had some concerns about the ease of device use. Factors positively influencing willingness to use CH in the future included knowledge of someone who has a chronic disease, residence in NI since birth and less concern about the use of information technology (IT) in health care. Those over 60 years old or who felt threatened by the use of IT to store personal health information were less willing to use CH in the future.
Conclusion: Increased public awareness and education about CH is required to alleviate concerns and increase the acceptability of this type of care.
Resumo:
In this paper a model of grid computation that supports both heterogeneity and dynamicity is presented. The model presupposes that user sites contain software components awaiting execution on the grid. User sites and grid sites interact by means of managers which control dynamic behaviour. The orchestration language ORC [9,10] offers an abstract means of specifying operations for resource acquisition and execution monitoring while allowing for the possibility of non-responsive hardware. It is demonstrated that ORC is sufficiently expressive to model typical kinds of grid interactions.
Resumo:
Following earlier work demonstrating the utility of Orc as a means of specifying and reasoning about grid applications we propose the enhancement of such specifications with metadata that provide a means to extend an Orc specification with implementation oriented information. We argue that such specifications provide a useful refinement step in allowing reasoning about implementation related issues ahead of actual implementation or even prototyping. As examples, we demonstrate how such extended specifications can be used for investigating security related issues and for evaluating the cost of handling grid resource faults. The approach emphasises a semi-formal style of reasoning that makes maximum use of programmer domain knowledge and experience.
Resumo:
Due to the intermittent nature of renewable generation it is desirable to consider the potential of controlling the demand-side load to smooth overall system demand. The architecture and control methodologies of such a system on a large scale would require careful consideration. Some of these considerations are discussed in this paper; such as communications infrastructure, systems architecture, control methodologies and security. A domestic fridge is used in this paper as an example of a controllable appliance. A layered approach to smart-grid is introduced and it can be observed how each smart-grid component from physical cables, to the end-devices (or smart-applications) can be mapped to these set layers. It is clear how security plays an integral part in each component of the smart-grid so this is also an integral part of each layer. The controllable fridge is described in detail and as one potential smart-grid application which maps to the layered approach. A demonstration system is presented which involves a Raspberry Pi (a low-power, low-cost device representing the appliance controller).
Resumo:
A ditopic ligand (1), containing two tridentate bis(acylhydrazone) subunits and bearing both long alkyl chains and hydrogen-bonding groups, has been synthesised. Metal cation binding in the presence of a base leads to hierarchical self-assembly, forming first a neutral [2 x 2] grid-type complex (2) that hierarchically assembles into metallosupramolecular polymer gels in toluene.
Resumo:
The development of appropriate Electric Vehicle (EV) charging strategies has been identified as an effective way to accommodate an increasing number of EVs on Low Voltage (LV) distribution networks. Most research studies to date assume that future charging facilities will be capable of regulating charge rates continuously, while very few papers consider the more realistic situation of EV chargers that support only on-off charging functionality. In this work, a distributed charging algorithm applicable to on-off based charging systems is presented. Then, a modified version of the algorithm is proposed to incorporate real power system constraints. Both algorithms are compared with uncontrolled and centralized charging strategies from the perspective of both utilities and customers. © 2013 IEEE.
Resumo:
High Voltage Direct Current (HVDC) lines allow large quantities of power to be
transferred between two points in an electrical power system. A Multi-Terminal HVDC (MTDC) grid consists of a meshed network of HVDC lines, and this allows energy reserves to be shared between a number of AC areas in an efficient manner. Secondary Frequency Control (SFC) algorithms return the frequencies in areas connected by AC or DC lines to their original setpoints after Primary Frequency Controllers have been called following a contingency. Where multiple
TSOs are responsible for different parts of a MTDC grid it may not be possible to implement SFC from a centralised location. Thus, in this paper a simple gain based distributed Model Predictive Control strategy is proposed for Secondary Frequency Control of MTDC grids which allows TSOs to cooperatively perform SFC without the need for centralised coordination.
Resumo:
The next-generation smart grid will rely highly on telecommunications infrastructure for data transfer between various systems. Anywhere we have data transfer in a system is a potential security threat. When we consider the possibility of smart grid data being at the heart of our critical systems infrastructure it is imperative that we do all we can to ensure the confidentiality, availability and integrity of the data. A discussion on security itself is outside the scope of this paper, but if we assume the network to be as secure as possible we must consider what we can do to detect when that security fails, or when the attacks comes from the inside of the network. One way to do this is to setup a hacker-trap, or honeypot. A honeypot is a device or service on a network which appears legitimate, but is in-fact a trap setup to catch breech attempts. This paper identifies the different types of honeypot and describes where each may be used. The authors have setup a test honeypot system which has been live for some time. The test system has been setup to emulate a device on a utility network. The system has had many hits, which are described in detail by the authors. Finally, the authors discuss how larger-scale systems in utilities may benefit from honeypot placement.