Preview

Dynamic State Estimation Based Protection Case Study

Better Essays
Open Document
Open Document
1166 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Dynamic State Estimation Based Protection Case Study
DSE BASED ZONE PROTECTION:
The dynamic state estimation based protection (also known as setting-less protection) has been inspired from the differential protection function and can be considered as an extension and generalization as illustrated in Figure 1. In current differential protection the electric currents at all terminals of a protection zone are measured and their weighted sum must be equal to zero (generalized Kirchhoff’s current law). Thus the current differential protection function consists of measuring the sum of the currents and as long as it is zero or near zero no action is taken. In dynamic state estimation based protection, all existing measurements in the protection zone are utilized. These measurements include: currents and voltages at the terminals of the protection zone, currents and voltages inside the protection zone (as in capacitor bank protection), speed and torque (as in rotating machinery), or other internal measurements including thermal measurement. All above measurements should obey the physical laws for the protection zone (physical laws such as KCL, KVL, motion laws and thermodynamic laws). The physical laws of the protection zone are captured in the dynamic model of the protection zone.
This means that in absence of an
…show more content…
Following a failure of the ac voltage input there would be a misrepresentation of the phase voltages on the power system, as measured by the relay, which may result in maloperation. The VTS logic in the relay is designed to detect the voltage failure, and automatically adjust the configuration of protection elements whose stability would otherwise be compromised. A time-delayed alarm output is also available. There are three main aspects to consider regarding the failure of the VT supply. These are defined below: Loss of one or two phase voltages Loss of all three phase voltages under load conditions Absence of three phase voltages upon line

You May Also Find These Documents Helpful

  • Better Essays

    of the System/Application domain is loss of data. System/application attacks are generalized into three categories: denial or destruction, alteration,…

    • 1234 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    In the WAN domain, enforce encryption, and VPN tunneling for remote connections. Configure routers, and network firewalls to block Ping requests to reduce chance of Denial of Service attacks. Deployment of…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    HP’s IRF (Intelligent Resilient Framework) is designed to combine the benefits of box-type devices (simple, standalone switches for example) and chassis-based distributed devices, such as a blade switch. The argument is that box-type devices are cost-effective, but can be less reliable…

    • 571 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    A Procedural safeguard under Due Process Clause of the Fourteenth Amendment is that a parents or guardians should be present during the interview, and proceedings. I believe that this is a very good safeguard to use with Juveniles. I believe this is a good safeguard because as a child one might not fully understand what is happening. With the safeguard in place the juvenile’s parents are now involved and they may have more of an understanding of what is happening. In the case of Grant Gault, it looks as if the court did not inform them of this right and proceeded anyway. Another reason it is a good idea to involve the parents is because the court wants to make sure the confessions are trustworthy. Sometime Juveniles might be intimidated…

    • 146 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 10 Exercise 1

    • 265 Words
    • 1 Page

    If you want to protect only the system state data, you must use the Ntdsutil.exe command-line tool. To do so, you must use the new IFM subcommand available in Ntdsutil.exe to capture this information for Install From Media installations. If the installation is for a read-only DC, this tool automatically strips AD DS secrets from the data to create secure installation media.…

    • 265 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    a. Closing off unused ports via a firewall to reduce the chance of unwanted network access…

    • 299 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    This MLS plan will give a brief overview of the security strategies that will be implemented at each level of the IT infrastructure.…

    • 506 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Safeguarding Case Study

    • 615 Words
    • 3 Pages

    1. Leroy may be the victim of neglect as there is evidence that his parents are persistently failing to meet his basic physical and psychological needs and that this is likely to cause impairment to his health and development. HM Government (2006). Maccoby and Martin (1983) assert that a child may suffer neglect if that child’s needs form a low priority within the family unit. In addition to neglect, Leroy may well be the experiencing emotional abuse. Emotional abuse involves the “persistent maltreatment of a child such as to cause severe and persistent effect on their emotional development.” HM Government (2006:39). This may include conveying a feeling of worthlessness; being unloved; inappropriate expectations of a child’s ability or level of responsibility, which are out of kilter with that child’s age and stage and being witness to the maltreatment and abuse of others.…

    • 615 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Sports Rhetoric

    • 943 Words
    • 4 Pages

    This is an interesting year in the NBA because there are plenty of notable names that will be free agents at the end of the season. The summer could bring on the ultimate game of musical chairs for players, swapping teams for more lucrative contracts and a better chance at winning a championship. Of all the free agents, LeBron James has probably been the most talked about when it comes to 2010 restricted free agency. There has been plenty of speculation about the teams he will go to next year if he decides to leave Cleveland. After a loss tonight in game 6 of the Eastern Conference semi-finals, the talk has already begun to escalate as LeBron’s decision becomes more imminent. For that reason I choose to evaluate LeBron’s post-game press conference from the game 6 loss to the Celtics. It is not the typical press conference because of the aforementioned free agency. Moreover, it is an opportunity for him to talk to the fans of Cleveland, and almost apologize for not living up to this year’s expectations. It is also different from the typical press conference because there is some persuading on James’ part. Convincing the reporters in the room, and consequently the people paying attention to the situation, that he has not given any thought to what team he going sign with in the off season.…

    • 943 Words
    • 4 Pages
    Good Essays
  • Better Essays

    The war in Vietnam waged by America was unwinnable through the type of warfare that was used by the US . If they had concentrated on certain key aspects they may have prevented the spread of communism to South Vietnam and achieved their ultimate goal. Americas inability to obtain the “Hearts and Minds “of the Vietnamese led to a continual supply of fighters. The US was unable to fight against an ever-increasing civilian army. In Vietnam the US relied tremendously on their advanced and superior firepower to defeat the Vietcong and the ARVN. There technology and training was inadequate in the foreign Vietnamese terrain. The Vietnamese were allied to other communist nations, if their defeat was too humiliating they may have escalated the cold war to a hot war.…

    • 1201 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Internal controls for Information Technology are important as they help protect the company’s assets. Internal controls are necessary to comply with the security of the company’s information. Internal controls will be reviewed in this document as well as how can the company review its security over their internal controls.…

    • 643 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Up to now, majority of organizations have their physical and logical access systems operating as independent structures, with each being run by a totally separate department. The information technology security system, which controls access to information technology infrastructure including mail servers, the internet, database applications and web servers was managed by the department of information technology. The physical security system, which incorporates door access into buildings, systems of life support such as CCTV and Fire, and the badging process of employees, was run by the department of facilities (Mehdizadeh, Y, 2003).…

    • 4782 Words
    • 16 Pages
    Good Essays
  • Good Essays

    Hardware and software are key pieces of any organization’s infrastructure. Components in each domain of the seven domains of the IT infrastructure may connect to a network or to the internet, and can be vulnerable to malicious attacks. Malicious attacks on hardware and software can also lead to more widespread problems. These problems can include loss of critical data or theft of financial information or intellectual property. Unprotected IT and network infrastructure assets can offer attackers and cybercriminals the widest opening to access sensitive resources. The ease of access makes assets that are connected to the internet the most common first point of attack. That means those assets should be you first line of defense. Technical failure and human error are the most common causes of unintentional downtime. Malicious attacks can occur and cause downtime in all seven domains of an IT infrastructure, but you are more likely to see them in the User, Workstation, LAN, and WAN domains. Opportunity cost is the amount of money a company losses due to downtime. The downtime can be either intentional or unintentional. Some organizations refer to opportunity cost as true downtime cost. It usually measures the loss of productivity experienced by an organization due to downtime. One of the most important things that information security professionals try to protect is their organization’s reputation and brand image. Companies that suffer from security breaches and malicious attacks that expose any assets are likely to face serious negative consequences in the public eye. In the popular usage and in the media, the term hacker often describes someone who breaks into a computer system without authorization. In most cases that means the hacker tries to take control of a remote computer through a network, or software cracking. The media and the general public also use the word hacker to describe anyone accused of using technology for terrorism, vandalism, credit card fraud,…

    • 1126 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    3. David J. Perreault, Vahe Caliskan. Automotive Power Generation and Control. Transactions on power electronics, vol. 19, no. 3, may 2004.…

    • 2746 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Many times organizations use the same wireless SSID for corporate wireless user’s access to the corporate resources and the Guest user’s access to the internet.…

    • 732 Words
    • 3 Pages
    Good Essays