861 resultados para Grid-Connected InvertersInverter
Resumo:
Rationale, aims and objectives: This study aims to examine the public's knowledge and perceptions of connected health (CH).
Methods: A structured questionnaire was administered by face-to-face interview to an opportunistic sample of 1003 members of the public in 11 shopping centres across Northern Ireland (NI). Topics included public knowledge of CH, opinions about who should provide CH and views about the use of computers in health care. Multivariable analyses were conducted to assess respondents' willingness to use CH in the future.
Results: Sixty-seven per cent of respondents were female, 31% were less than 30 years old and 22% were over 60 years. Most respondents had never heard of CH (92%). Following a standard definition, the majority felt CH was a good idea (≈90%) and that general practitioners were in the best position to provide CH; however, respondents were equivocal about reductions in health care professionals' workload and had some concerns about the ease of device use. Factors positively influencing willingness to use CH in the future included knowledge of someone who has a chronic disease, residence in NI since birth and less concern about the use of information technology (IT) in health care. Those over 60 years old or who felt threatened by the use of IT to store personal health information were less willing to use CH in the future.
Conclusion: Increased public awareness and education about CH is required to alleviate concerns and increase the acceptability of this type of care.
Resumo:
In this paper a model of grid computation that supports both heterogeneity and dynamicity is presented. The model presupposes that user sites contain software components awaiting execution on the grid. User sites and grid sites interact by means of managers which control dynamic behaviour. The orchestration language ORC [9,10] offers an abstract means of specifying operations for resource acquisition and execution monitoring while allowing for the possibility of non-responsive hardware. It is demonstrated that ORC is sufficiently expressive to model typical kinds of grid interactions.
Resumo:
Following earlier work demonstrating the utility of Orc as a means of specifying and reasoning about grid applications we propose the enhancement of such specifications with metadata that provide a means to extend an Orc specification with implementation oriented information. We argue that such specifications provide a useful refinement step in allowing reasoning about implementation related issues ahead of actual implementation or even prototyping. As examples, we demonstrate how such extended specifications can be used for investigating security related issues and for evaluating the cost of handling grid resource faults. The approach emphasises a semi-formal style of reasoning that makes maximum use of programmer domain knowledge and experience.
Resumo:
Due to the intermittent nature of renewable generation it is desirable to consider the potential of controlling the demand-side load to smooth overall system demand. The architecture and control methodologies of such a system on a large scale would require careful consideration. Some of these considerations are discussed in this paper; such as communications infrastructure, systems architecture, control methodologies and security. A domestic fridge is used in this paper as an example of a controllable appliance. A layered approach to smart-grid is introduced and it can be observed how each smart-grid component from physical cables, to the end-devices (or smart-applications) can be mapped to these set layers. It is clear how security plays an integral part in each component of the smart-grid so this is also an integral part of each layer. The controllable fridge is described in detail and as one potential smart-grid application which maps to the layered approach. A demonstration system is presented which involves a Raspberry Pi (a low-power, low-cost device representing the appliance controller).
Resumo:
A ditopic ligand (1), containing two tridentate bis(acylhydrazone) subunits and bearing both long alkyl chains and hydrogen-bonding groups, has been synthesised. Metal cation binding in the presence of a base leads to hierarchical self-assembly, forming first a neutral [2 x 2] grid-type complex (2) that hierarchically assembles into metallosupramolecular polymer gels in toluene.
Resumo:
The development of appropriate Electric Vehicle (EV) charging strategies has been identified as an effective way to accommodate an increasing number of EVs on Low Voltage (LV) distribution networks. Most research studies to date assume that future charging facilities will be capable of regulating charge rates continuously, while very few papers consider the more realistic situation of EV chargers that support only on-off charging functionality. In this work, a distributed charging algorithm applicable to on-off based charging systems is presented. Then, a modified version of the algorithm is proposed to incorporate real power system constraints. Both algorithms are compared with uncontrolled and centralized charging strategies from the perspective of both utilities and customers. © 2013 IEEE.
Resumo:
High Voltage Direct Current (HVDC) lines allow large quantities of power to be
transferred between two points in an electrical power system. A Multi-Terminal HVDC (MTDC) grid consists of a meshed network of HVDC lines, and this allows energy reserves to be shared between a number of AC areas in an efficient manner. Secondary Frequency Control (SFC) algorithms return the frequencies in areas connected by AC or DC lines to their original setpoints after Primary Frequency Controllers have been called following a contingency. Where multiple
TSOs are responsible for different parts of a MTDC grid it may not be possible to implement SFC from a centralised location. Thus, in this paper a simple gain based distributed Model Predictive Control strategy is proposed for Secondary Frequency Control of MTDC grids which allows TSOs to cooperatively perform SFC without the need for centralised coordination.
Resumo:
The next-generation smart grid will rely highly on telecommunications infrastructure for data transfer between various systems. Anywhere we have data transfer in a system is a potential security threat. When we consider the possibility of smart grid data being at the heart of our critical systems infrastructure it is imperative that we do all we can to ensure the confidentiality, availability and integrity of the data. A discussion on security itself is outside the scope of this paper, but if we assume the network to be as secure as possible we must consider what we can do to detect when that security fails, or when the attacks comes from the inside of the network. One way to do this is to setup a hacker-trap, or honeypot. A honeypot is a device or service on a network which appears legitimate, but is in-fact a trap setup to catch breech attempts. This paper identifies the different types of honeypot and describes where each may be used. The authors have setup a test honeypot system which has been live for some time. The test system has been setup to emulate a device on a utility network. The system has had many hits, which are described in detail by the authors. Finally, the authors discuss how larger-scale systems in utilities may benefit from honeypot placement.
Resumo:
The availability of electricity is fundamental to modern society. It is at the top of the list of critical infrastructures and its interruption can have severe consequences. This highly important system is now evolving to become more reliable, efficient, and clean. This evolving infrastructure has become known as the smart grid; and these future smart grid systems will rely heavily on ICT. This infrastructure will require many servers and due to the nature of the grid, many of these systems will be geographically diverse requiring communication links. At the heart of this ICT infrastructure will be security. At each level of the smart grid from smart metering right through to remote sensing and control networks, security will be a key factor for system design consideration. With an increased number of ICT systems in place the security risk also increases. In this paper the authors discuss the changing nature of security in relation to the smart grid by looking at the move from legacy systems to more modern smart grid systems. The potential planes of attack for future smart grid systems are identified, and the general anatomy of a cyber-attack is presented. The authors then introduce the various threat levels of different types of attack and the mitigation techniques that could be put in place for each. Finally, the authors' introduce a Phasor Measurement Unit (PMU) communication system (operated by the authors) that can be used as a test-bed for some of the proposed future security research.
Resumo:
This paper describes a fridge-freezer smart load model, which responds to external signals from the wholesale electricity market to support grid operations while switching the fridge-freezer on and off to maintain optimum operations for the owner. The key parameters of the model are the appliance dimensions, thermal mass, the fridge and freezer thermal time constants and the compressor power consumption. The model demonstrates that control strategies help to minimise load at times when the grid is under stress from high demand, and shift some load to a lower wholesale price or when there is excess renewable power. Three control strategies are proposed, based on peak shaving and valley filling, price signals and wind availability.
Resumo:
This paper presents a novel analysis of the utilisation of small grid scale energy storage to mitigate negative system operational impacts due to high penetrations of wind power. This was investigated by artificially lowering the minimum stable generation level of a gas thermal generating unit coupled to a storage device over a five hour storage charging window using a unit commitment and economic dispatch model. The key findings of the analysis were a 0.18% reduction in wind curtailment, a 2.35 MW/min reduction in the ramping rate required to be met by all generators in the test system during a representative period and a total generation cost reduction of €6.5 million.
Resumo:
Experiences from smart grid cyber-security incidents in the past decade have raised questions on the applicability and effectiveness of security measures and protection mechanisms applied to the grid. In this chapter we focus on the security measures applied under real circumstances in today’s smart grid systems. Beginning from real world example implementations, we first review cyber-security facts that affected the electrical grid, from US blackout incidents, to the Dragonfly cyber-espionage campaign currently focusing on US and European energy firms. Provided a real world setting, we give information related to energy management of a smart grid looking also in the optimization techniques that power control engineers perform into the grid components. We examine the application of various security tools in smart grid systems, such as intrusion detection systems, smart meter authentication and key management using Physical Unclonable Functions, security analytics and resilient control algorithms. Furthermore we present evaluation use cases of security tools applied on smart grid infrastructure test-beds that could be proved important prior to their application in the real grid, describing a smart grid intrusion detection system application and security analytics results. Anticipated experimental results from the use-cases and conclusions about the successful transitions of security measures to real world smart grid operations will be presented at the end of this chapter.
Resumo:
The future European power system will have a hierarchical structure created by layers of system control from a Supergrid via regional high-voltage transmission through to medium and low-voltage distribution. Each level will have generation sources such as large-scale offshore wind, wave, solar thermal, nuclear directly connected to this Supergrid and high levels of embedded generation, connected to the medium-voltage distribution system. It is expected that the fuel portfolio will be dominated by offshore wind in Northern Europe and PV in Southern Europe. The strategies required to manage the coordination of supply-side variability with demand-side variability will include large scale interconnection, demand side management, load aggregation and storage in the context of the Supergrid combined with the Smart Grid. The design challenge associated with this will not only include control topology, data acquisition, analysis and communications technologies, but also the selection of fuel portfolio at a macro level. This paper quantifies the amount of demand side management, storage and so-called 'back-up generation' needed to support an 80% renewable energy portfolio in Europe by 2050. © 2013 IEEE.