923 resultados para network protection systems
Resumo:
The realisation of an eventual low-voltage (LV) Smart Grid with a complete communication infrastructure is a gradual process. During this evolution the protection scheme of distribution networks should be continuously adapted and optimised to fit the protection and cost requirements at the time. This paper aims to review practices and research around the design of an effective, adaptive and economical distribution network protection scheme. The background of this topic is introduced and potential problems are defined from conventional protection theories and new Smart Grid technologies. Challenges are identified with possible solutions defined as a pathway to the ultimate flexible and reliable LV protection systems.
Resumo:
Loss-of-mains protection is an important component of the protection systems of embedded generation. The role of loss-of-mains is to disconnect the embedded generator from the utility grid in the event that connection to utility dispatched generation is lost. This is necessary for a number of reasons, including the safety of personnel during fault restoration and the protection of plant against out-of-synchronism reclosure to the mains supply. The incumbent methods of loss-of-mains protection were designed when the installed capacity of embedded generation was low, and known problems with nuisance tripping of the devices were considered acceptable because of the insignificant consequence to system operation. With the dramatic increase in the installed capacity of embedded generation over the last decade, the limitations of current islanding detection methods are no longer acceptable. This study describes a new method of loss-of-mains protection based on phasor measurement unit (PMU) technology, specifically using a low cost PMU device of the authors' design which has been developed for distribution network applications. The proposed method addresses the limitations of the incumbent methods, providing a solution that is free of nuisance tripping and has a zero non-detection zone. This system has been tested experimentally and is shown to be practical, feasible and effective. Threshold settings for the new method are recommended based on data acquired from both the Great Britain and Ireland power systems.
Resumo:
Thèse réalisée en cotutelle avec l'Université de Montréal et l'Université Panthéon-Assas Paris II
Resumo:
One of the most effective techniques offering QoS routing is minimum interference routing. However, it is complex in terms of computation time and is not oriented toward improving the network protection level. In order to include better levels of protection, new minimum interference routing algorithms are necessary. Minimizing the failure recovery time is also a complex process involving different failure recovery phases. Some of these phases depend completely on correct routing selection, such as minimizing the failure notification time. The level of protection also involves other aspects, such as the amount of resources used. In this case shared backup techniques should be considered. Therefore, minimum interference techniques should also be modified in order to include sharing resources for protection in their objectives. These aspects are reviewed and analyzed in this article, and a new proposal combining minimum interference with fast protection using shared segment backups is introduced. Results show that our proposed method improves both minimization of the request rejection ratio and the percentage of bandwidth allocated to backup paths in networks with low and medium protection requirements
Resumo:
This work presents a methodology to analyze transient stability for electric energy systems using artificial neural networks based on fuzzy ARTMAP architecture. This architecture seeks exploring similarity with computational concepts on fuzzy set theory and ART (Adaptive Resonance Theory) neural network. The ART architectures show plasticity and stability characteristics, which are essential qualities to provide the training and to execute the analysis. Therefore, it is used a very fast training, when compared to the conventional backpropagation algorithm formulation. Consequently, the analysis becomes more competitive, compared to the principal methods found in the specialized literature. Results considering a system composed of 45 buses, 72 transmission lines and 10 synchronous machines are presented. © 2003 IEEE.
Resumo:
Species belonging to the Culicoides complexes (Diptera, Ceratopogonidae), obsoletus and pulicaris, in Switzerland, are potential vectors of both bluetongue virus (BTV) and African horse sickness virus (AHSV). The epidemic of BTV in 2006 and 2007 in Europe has highlighted the risk of introduction and spread of vector-borne diseases in previously non-endemic areas. As a measure of prevention, as part of an integrated control programme in the event of an outbreak of African horse sickness (AHS), it is of utmost importance to prevent, or substantially reduce, contact between horses and Culicoides. The aim of the present study was to compare the effect of three protection systems, net, fan, repellent, or combinations thereof, with regard to their potential to reduce contact between horses and Culicoides. Three different equine housing systems, including individual boxes (BX), group housing systems (GR), and individual boxes with permanently accessible paddock (BP) were used. The efficacy of the protection systems were evaluated by comparing the total number counts of collected female Culicoides, of non-blood-fed and blood-fed Culicoides, respectively, with UV black light traps. The study was conducted over 3 summer months during 2012 and 2013 each and focused on the efficacy and practicality of the protection systems. The repellent was tested in 2012 only and not further investigated in 2013, as it showed no significant effect in reducing Culicoides collected in the light traps. Net protection system provided the best overall protection for the total number of female Culicoides, non-blood-fed and blood-fed Culicoides in all tested housing systems. The net, with a pore size of 0.1825 mm(2), reduced the total number of Culicoides collected in the housing systems BP, GR and BX by 98%, 85% and 67%, respectively. However, in the GR housing system, no significant difference between the effectiveness of the fan and the net were determined for any of the three Culicoides categories. The results of the present study demonstrated that horse owners can substantially reduce their horses' exposure to Culicoides, by using net protection in the housing systems BX, BP and GR. In GR housing systems, protection against Culicoides using a fan is also recommended.
Resumo:
With the rise of ubiquitous computing in recent years, concepts of spatiality have become a significant topic of discussion in design and development of multimedia systems. This article investigates spatial practices at the intersection of youth, technology, and urban space in Seoul, and examines what the author calls ‘transyouth’: in the South Korean context, these people are between the ages of 18 and 24, situated on the delicate border between digital natives and immigrants in Prensky’s (2001) terms. In the first section, the article sets out the technosocial environment of contemporary Seoul. This is followed by a discussion of social networking processes derived from semi-structured interviews conducted in 2007-8 with Seoul transyouth about their ‘lived experiences of the city.’ Interviewees reported how they interact to play, work, and live with and within the city’s unique environment. The article develops a theme of how technosocial convergence (re)creates urban environments and argues for a need to consider such user-driven spatial recreation in designing cities as (ubiquitous) urban networks in recognition of its changing technosocial contours of connections. This is explored in three spaces of different scales: Cyworld as an online social networking space; cocoon housing – a form of individual residential space which is growing rapidly in many Korean cities – as a private living space; and u-City (ubiquitous City) as the future macro-space of Seoul.
Resumo:
Network RTK (Real-Time Kinematic) is a technology that is based on GPS (Global Positioning System) or more generally on GNSS (Global Navigation Satellite System) measurements to achieve centimeter-level accuracy positioning in real-time. Reference station placement is an important problem in the design and deployment of network RTK systems as it directly affects the quality of the positioning service and the cost of the network RTK systems. This paper identifies a new reference station placement for network RTK, namely QoS-aware regional network RTK reference station placement problem, and proposes an algorithm for the new reference station placement problem. The algorithm can always produce a reference station placement solution that completely covers the region of network RTK.
Resumo:
Current approaches to managing and supporting staff and addressing turnover in child protection predominantly rely on deficit-based models that focus on limitations, shortcomings, and psychopathology. This article explores an alternative approach, drawing on models of resilience, which is an emerging field linked to trauma and adversity. To date, the concept of resilience has seen limited application to staff and employment issues. In child protection, staff typically face a range of adverse and traumatic experiences that have flow-on implications, creating difficulties for staff recruitment and retention and reduced service quality. This article commences with discussion of the multifactorial influences of the troubled state of contemporary child protection systems on staffing problems. Links between these and difficulties with the predominant deficit models are then considered. The article concludes with a discussion of the relevance and utility of resilience models in developing alternative approaches to child protection staffing issues.
Resumo:
Design talks LOUDLY!!! Is a series of interactive presentations exploring issues and opportunities involving professional design. --------------- These seminars are organised by the Industrial Design Network Queensland (IDnetQLD) in coordination with the Design Institute of Australia (DIA). This event was held at the State Library of Queensland (SLQ) with invited public presentations by a panel of industry experts from the Australian Government – IP Australia. --------------- The first seminar "Intellectual Property : designing 4 success" highlighted to design professionals how the various forms of Intellectual Property interact, what protections and pitfalls exist, and how these impact upon the work and responsibilities of designers. The overlaps, gaps and in congruencies in the various IP protection systems were highlighted by the expert line-up of speakers. --------------- The underlying message is that a clear understanding of all IP types is necessary in order to gain the best advantage from IP protection and therefore eliminate potential IP ownership issues before they become a problem.
Resumo:
Generative music systems can be performed by manipulating the values of their algorithmic parameters, and their semi-autonomous nature provides an opportunity for coordinated interaction amongst a network of systems, a practice we call Network Jamming. This paper outlines the characteristics of this networked performance practice and discusses the types of mediated musical relationships and ensemble configurations that can arise. We have developed and tested the jam2jam network jamming software over recent years. We describe this system, draw from our experiences with it, and use it to illustrate some characteristics of Network Jamming.
Resumo:
We present the design and deployment results for PosNet - a large-scale, long-duration sensor network that gathers summary position and status information from mobile nodes. The mobile nodes have a fixed-sized memory buffer to which position data is added at a constant rate, and from which data is downloaded at a non-constant rate. We have developed a novel algorithm that performs online summarization of position data within the buffer, where the algorithm naturally accommodates data input and output rate mismatch, and also provides a delay-tolerant approach to data transport. The algorithm has been extensively tested in a large-scale long-duration cattle monitoring and control application.
Resumo:
Australian child protection systems have been subject to sustained and significant criticism for many decades. As a central part of that system Children’s Courts have been implicated: three recent inquiries into the child protection system in Victoria all criticised the Family Division of the Children’s Court.1 In the resulting debate two diametrically opposed points of view surfaced about the Children’s Court and the role that legal procedures and professionals should play in child protection matters. On one side bodies like the Children’s Court of Victoria, Victoria Legal Aid (‘VLA’), the Law Institute of Victoria (‘LIV’), and the Federation of Community Legal Centres (‘FCLC’) argued that the Children’s Court plays a vital role in child protection and should continue to play that role.2 On the other side a coalition of human service and child protection agencies called for major change including the removal of the Children’s Court from the child protection system. Victoria’s Department of Human Services (‘DHS’) has been critical of the Court3 as have community sector organisations like Anglicare, Berry Street, MacKillop Family Services and the Salvation Army — all agencies the DHS funds to deliver child protection services.4 Victoria’s Child Safety Commissioner has also called for major reform, publicly labelling the Court a ‘lawyers’ playground’ and recommending abolishing the Court’s involvement in child protection completely.
Resumo:
To minimise the number of load sheddings in a microgrid (MG) during autonomous operation, islanded neighbour MGs can be interconnected if they are on a self-healing network and an extra generation capacity is available in the distributed energy resources (DER) of one of the MGs. In this way, the total load in the system of interconnected MGs can be shared by all the DERs within those MGs. However, for this purpose, carefully designed self-healing and supply restoration control algorithm, protection systems and communication infrastructure are required at the network and MG levels. In this study, first, a hierarchical control structure is discussed for interconnecting the neighbour autonomous MGs where the introduced primary control level is the main focus of this study. Through the developed primary control level, this study demonstrates how the parallel DERs in the system of multiple interconnected autonomous MGs can properly share the load of the system. This controller is designed such that the converter-interfaced DERs operate in a voltage-controlled mode following a decentralised power sharing algorithm based on droop control. DER converters are controlled based on a per-phase technique instead of a conventional direct-quadratic transformation technique. In addition, linear quadratic regulator-based state feedback controllers, which are more stable than conventional proportional integrator controllers, are utilised to prevent instability and weak dynamic performances of the DERs when autonomous MGs are interconnected. The efficacy of the primary control level of the DERs in the system of multiple interconnected autonomous MGs is validated through the PSCAD/EMTDC simulations considering detailed dynamic models of DERs and converters.
Resumo:
Network coding is a method for achieving channel capacity in networks. The key idea is to allow network routers to linearly mix packets as they traverse the network so that recipients receive linear combinations of packets. Network coded systems are vulnerable to pollution attacks where a single malicious node floods the network with bad packets and prevents the receiver from decoding correctly. Cryptographic defenses to these problems are based on homomorphic signatures and MACs. These proposals, however, cannot handle mixing of packets from multiple sources, which is needed to achieve the full benefits of network coding. In this paper we address integrity of multi-source mixing. We propose a security model for this setting and provide a generic construction.