Spelling suggestions: "subject:"delay"" "subject:"relay""
311 |
Ajuste e ensaio de sistemas de proteção de geradores síncronos. / Regeneration of productive systems through dynamic reallocation of resources with functional flexibility.Omar Chayña Chayña Velásquez 28 May 2015 (has links)
Os sistemas de proteção dos elementos da rede elétrica desempenham um papel de fundamental importância na segurança e confiabilidade dos sistemas de potência. A não atuação ou a atuação incorreta dos relés de proteção durante uma falta localizada em um componente da rede pode transformar-se em um evento sistêmico de grandes proporções (blecaute). Esses eventos trazem riscos e elevados prejuízos econômicos à sociedade. A proteção dos geradores síncronos, apesar do alto custo e complexidade deste tipo de equipamento, não recebe a mesma atenção na literatura que a dedicada à proteção de outros elementos da rede, como, por exemplo, a das linhas de transmissão. Isso decorre do menor número de geradores existentes na rede e também da ideia que as faltas neste tipo de equipamento são menos frequentes. Este trabalho aborda os principais aspectos envolvidos com o projeto de um sistema de proteção para geradores síncronos de grande porte. Incialmente, discutese os principais conceitos associados com os geradores, de interesse para a tarefa de proteção. Particular atenção é dedicada às formas de aterramento e aos critérios adotados para projeto do resistor de aterramento utilizado nesse equipamento. Em seguida, apresentam-se as principais funções de proteção aplicáveis aos geradores, particularmente aquelas voltadas para a detecção de faltas nos enrolamentos do estator. Discute-se também os critérios de ajustes dos parâmetros dessas funções. Descreve-se o uso de uma plataforma laboratorial, baseada em simulador de tempo real (RTDS), para ensaio e análise do sistema de proteção visando validar seu correto desempenho frente às possíveis condições operativas que podem ser encontradas em campo. Finalmente, utilizando os conceitos desenvolvidos ao longo do trabalho, desenvolve-se um estudo de caso, onde é realizado o projeto e implementação do sistema de proteção dos geradores de uma usina hidrelétrica hipotética. Para avaliar e analisar o desempenho do sistema de proteção dessa rede exemplo, parametrizou-se o IED G60 (GE) e realizou-se inúmeras simulações na plataforma de testes proposta. / Protection systems play a critical role in the safety and reliability of electric power systems. The non-operation or wrong operation of protective relays during a fault in a network element can evolve to a systemic event in large scale (blackout). These events bring risks and high economic losses to society. Despite the high cost and complexity, the protection of synchronous generators has not received much attention in the literature devoted to protection of other network elements, such as transmission lines. This stems from the smaller number of generators in the network and also the idea that the faults in this type of equipment are less frequent. This research discusses the main aspects involved in the design of a protection system for large synchronous generators. Initially, it discusses the key concepts of interest to the generation protection. Particular attention is given to grounding techniques and the criteria adopted for the design of grounding resistors used in those equipment. Then the main protection functions applicable to generators are presented, particularly those related to fault detection in the stator windings. The criteria for setting the parameters of these functions are also discussed. After that, the use of a laboratory shelf, based on Real-Time Digital Simulator (RTDS) for testing and analysis of the protection system, is described in order to validate the correct performance in face of possible operating conditions in the field. Finally, a study case is developed using the concepts developed throughout the research. Then, the design and implementation of the protection system of generators of a hypothetical hydroelectric plant are carried out. To evaluate and analyze the performance of this example network protection system, parameterized up IED G60 (GE) and held numerous simulations in the proposed test platform.
|
312 |
Ajuste e ensaio de sistemas de proteção de geradores síncronos. / Regeneration of productive systems through dynamic reallocation of resources with functional flexibility.Chayña Velásquez, Omar Chayña 28 May 2015 (has links)
Os sistemas de proteção dos elementos da rede elétrica desempenham um papel de fundamental importância na segurança e confiabilidade dos sistemas de potência. A não atuação ou a atuação incorreta dos relés de proteção durante uma falta localizada em um componente da rede pode transformar-se em um evento sistêmico de grandes proporções (blecaute). Esses eventos trazem riscos e elevados prejuízos econômicos à sociedade. A proteção dos geradores síncronos, apesar do alto custo e complexidade deste tipo de equipamento, não recebe a mesma atenção na literatura que a dedicada à proteção de outros elementos da rede, como, por exemplo, a das linhas de transmissão. Isso decorre do menor número de geradores existentes na rede e também da ideia que as faltas neste tipo de equipamento são menos frequentes. Este trabalho aborda os principais aspectos envolvidos com o projeto de um sistema de proteção para geradores síncronos de grande porte. Incialmente, discutese os principais conceitos associados com os geradores, de interesse para a tarefa de proteção. Particular atenção é dedicada às formas de aterramento e aos critérios adotados para projeto do resistor de aterramento utilizado nesse equipamento. Em seguida, apresentam-se as principais funções de proteção aplicáveis aos geradores, particularmente aquelas voltadas para a detecção de faltas nos enrolamentos do estator. Discute-se também os critérios de ajustes dos parâmetros dessas funções. Descreve-se o uso de uma plataforma laboratorial, baseada em simulador de tempo real (RTDS), para ensaio e análise do sistema de proteção visando validar seu correto desempenho frente às possíveis condições operativas que podem ser encontradas em campo. Finalmente, utilizando os conceitos desenvolvidos ao longo do trabalho, desenvolve-se um estudo de caso, onde é realizado o projeto e implementação do sistema de proteção dos geradores de uma usina hidrelétrica hipotética. Para avaliar e analisar o desempenho do sistema de proteção dessa rede exemplo, parametrizou-se o IED G60 (GE) e realizou-se inúmeras simulações na plataforma de testes proposta. / Protection systems play a critical role in the safety and reliability of electric power systems. The non-operation or wrong operation of protective relays during a fault in a network element can evolve to a systemic event in large scale (blackout). These events bring risks and high economic losses to society. Despite the high cost and complexity, the protection of synchronous generators has not received much attention in the literature devoted to protection of other network elements, such as transmission lines. This stems from the smaller number of generators in the network and also the idea that the faults in this type of equipment are less frequent. This research discusses the main aspects involved in the design of a protection system for large synchronous generators. Initially, it discusses the key concepts of interest to the generation protection. Particular attention is given to grounding techniques and the criteria adopted for the design of grounding resistors used in those equipment. Then the main protection functions applicable to generators are presented, particularly those related to fault detection in the stator windings. The criteria for setting the parameters of these functions are also discussed. After that, the use of a laboratory shelf, based on Real-Time Digital Simulator (RTDS) for testing and analysis of the protection system, is described in order to validate the correct performance in face of possible operating conditions in the field. Finally, a study case is developed using the concepts developed throughout the research. Then, the design and implementation of the protection system of generators of a hypothetical hydroelectric plant are carried out. To evaluate and analyze the performance of this example network protection system, parameterized up IED G60 (GE) and held numerous simulations in the proposed test platform.
|
313 |
Semi-synchronous video for deaf telephony with an adapted synchronous codecMa, Zhenyu January 2009 (has links)
Masters of Science / Communication tools such as text-based instant messaging, voice and video relay
services, real-time video chat and mobile SMS and MMS have successfully been used among Deaf people. Several years of field research with a local Deaf community revealed that disadvantaged South African Deaf people preferred to communicate with both Deaf and hearing peers in South African Sign Language as opposed to text.Synchronous video chat and video relay services provided such opportunities. Both types of services are commonly available in developed regions, but not in developing countries like South Africa. This thesis reports on a workaround approach to design and develop an asynchronous video communication tool that adapted synchronous video codecs to store-and-forward video delivery. This novel asynchronous video tool provided high quality South African Sign Language video chat at the expense of some additional latency. Synchronous video codec adaptation consisted of comparing codecs,and choosing one to optimise in order to minimise latency and preserve video quality.Traditional quality of service metrics only addressed real-time video quality and related services. There was no such standard for asynchronous video communication.
Therefore, we also enhanced traditional objective video quality metrics with subjective assessment metrics conducted with the local Deaf community.
|
314 |
Setting frequency relays and voltage relays to protect synchronous distributed generators against islanding and abnormal frequencies and voltagesBabi, Bombay 11 1900 (has links)
This study concerns frequency relays and voltage relays applied to the protection of
synchronous distributed generators operating in reactive power control mode without
a frequency regulation function. The effect of active and reactive powers combination,
load power factor, and reactive power imbalance are investigated for their implication
for the anti-islanding setting of the frequency relay. Results reveal that the effect of
these factors must be considered when setting the relay for islanding detection. For
the voltage relay, results reveal that the effect of active and reactive powers
combination, load power factor, and active power imbalance must be considered when
setting the relay for islanding detection. The effect of multi-stage tripping on the
frequency relay ability to detect island was also investigated. Results show that multistage
tripping can improve the anti-islanding performance of the frequency relay. / Electrical Engineering / M. Tech. (Electrical Engineering)
|
315 |
Identificação de sistemas usando modelos Hammerstein e Wiener utilizando método do Relé. / Identification of systems using Hammerstein and Wiener models using relay method.SILVA, Moisés Tavares da. 21 April 2018 (has links)
Submitted by Johnny Rodrigues (johnnyrodrigues@ufcg.edu.br) on 2018-04-21T15:01:16Z
No. of bitstreams: 1
MOISÉS TAVARES DA SILVA - DISSERTAÇÃO PPGEE 2014..pdf: 2264297 bytes, checksum: 0373ed53c40783016694166232616bf6 (MD5) / Made available in DSpace on 2018-04-21T15:01:16Z (GMT). No. of bitstreams: 1
MOISÉS TAVARES DA SILVA - DISSERTAÇÃO PPGEE 2014..pdf: 2264297 bytes, checksum: 0373ed53c40783016694166232616bf6 (MD5)
Previous issue date: 2014-09 / Neste trabalho utiliza-se um método do Relé sob condições de não-linearidade e perturbação estática para identificação de modelos não-lineares do tipo Hammstein e Wiener. Este método do relé modificado garante uma saída simétrica do relé quando um estado estacionário cíclico é obtido, independente da perturbação estática, enquanto o método do relé original mostra uma saída assimétrica para processos não-lineares. Para modelos do tipo Wiener, é proposto um sinal de excitação que incorpora as vantagens do método do relé modificado e além disso, obtém as características da baixa frequência da excitação a partir da utilização de um pulso retangular. Para identificação de modelos do tipo Hammterin, inicialmente, o método do relé modificado é aplicado e assim os dados da resposta em frequência do subsistema dinâmico linear são obtidos. em seguida, um sinal triangular é utilizado para identificar a função estática não-linear da entrada. A principal dificuldade na identificação de modelos Hammstein e Wiener é a indisponibilidade do sinal intermediário. Dessa forma, são apresentados procedimentos para obtenção do sinal intermediário a partir do método do relé sob condições de não-linearidade. As técnicas de identificação apresentadas ao longo da dissertação são avaliadas em casos simulados e experimentais para verificar o desempenho de cada uma. / In this work is used a method of the relay feedback under conditions of non-linearity and static disturbance for identification of Hammerstein and Wiener-type nonlinear process. The relay feedback approach used guarantees a symmetrical output relay when a cyclic steady state is obtained, regardless of static disturbance, while the original method shows an asymmetric output relay in such conditions. For Wiener-type process is proposed an exitation signal that incorporates the advantages of the modified method relay feedback and in addition, characteristics of the obtained low frequency excitation from the use of a rectangular pulse. for identification of Hummerstein-type process, initially the method of modified relay is applied and so the data of frequency response of the linear dynamic subsystem are obtained. Then, a triangular signal is used to identify the static nonlinear function. The principal difficulty in the identification of Hammerstein and Wiener process is the unavailability of intermediate signal. Therefore, procedures for obtaining intermediate signal are presented from the relay feedback under conditions of non-linearity. The identification techniques presented throughout in this work are evaluated simulated and experimental cases to verify the performance of each
|
316 |
Analysis and Optimization of Cooperative Amplify-and-Forward Relaying with Imperfect Channel EstimatesBharadwaj, Sachin January 2013 (has links) (PDF)
Relay-based cooperation promises significant gains in a wireless network as it provides an inde-pendent path between a source and a destination. Using simple single antenna nodes, it exploits the spatial diversity provided by the geographically separated nodes in a network to improve the robustness of the communication system against fading. Among the cooperative commu¬nication schemes, the amplify-and-forward (AF) relaying scheme is considered to be easy to implement since the relay does not need to decode its received signal. Instead, it just forwards to the destination the signal it receives from the source.
We analyze the performance of fixed-gain AF relaying with imperfect channel knowledge that is acquired through an AF relay-specific training protocol. The analysis is challenging because the received signal at the destination contains the product (or cascade) of source-relay (SR) and relay-destination (RD) complex baseband channel gains, and additional products terms that arise due to imperfect estimation related errors. We focus on the time-efficient cascaded channel estimation (CCE) protocol to acquire the channel estimates at the destination. Using it, the destination can only estimate the product of SR and RD complex baseband channel gains, but not the two separately.
Our analysis encompasses a single AF relay system and an opportunistic system with mul¬tiple AF relays, among which one is selected to forward its received signal to the destination, based on its SR and RD complex baseband channel gains. For a single relay system, we first de¬velop a novel SEP expression and a tight SEP upper bound. We then analyze the opportunistic multi-relay system, in which both selection and coherent demodulation use imperfect channel estimates.
A distinctive aspect of our approach is the use of as few simplifying approximations as possible. It results in a new analysis that is accurate at signal-to-noise-ratios as low as 1 dB for single and multi-relay systems. Further, the training protocol is an integral part of the model and analysis. Using an insightful asymptotic analysis, we then present a simple, closed-form, nearly-optimal solution for allocation of energy between pilot and data symbols at the source and relay(s). Further, the optimal energy allocation between a source and a relay is characterized when both together operate under a sum energy constraint, as has often been assumed in the literature. In summary, the sum total of the results in this work provides a rigorous and accurate performance characterization and optimization of cascaded channel estimation for AF relaying.
|
317 |
Behavior of Distance Relay Characteristics on Interconnecting Lines Fed From Wind FarmsSrivastava, Sachin January 2015 (has links) (PDF)
Distance relays due to their selectivity and operating speed are used in HV/EHV line protection. The dynamic nature of Mho characteristic, which happens to be most primitive technique in line protection implemented with distance relaying, is built by using the measurement of local voltage and current signals. These signals have been influenced substantially by fault resistance and the source impedance feeding the line. In case of different generation sources, the source impedance and fault characteristic also change accordingly.
Environmental benefit of wind turbine technology is making it a potential source of energy. These wind turbine-generating units (WTGU) use rugged induction/synchronous machines along with power electronics converters as controlling equipment. This gives a new challenge to distance relays, as the fault current contribution of these sources depends on the converter operational principle.
In this thesis a typical wind farm of Indian systems are modeled in an IN-HOUSE tool developed as part of fault analysis on wind farm system. Directly connected and front-end converter based wind turbines with their interconnections are modeled in this simulation tool. Fault voltage and current waveforms are obtained for all types of wind turbine-generating units with both radial and LILO (Loop in Loop out) connection. PSCAD based modeling has been done for DFIG type of wind turbines. The fault waveforms are generated to evaluate relay performance. Five case studies having both Radial and Loop in Loop out (LILO) connection of wind farms are simulated. These case studies generate approximately 20000 cases, which are analyzed for distance relay performance studies.
In addition, the analysis is further verified on relay hardware having three characteristics, namely Self Polarized Mho (SPM), Quadrature Polarized Mho (QPM) and Quadrilateral (QUAD) characteristics. The detailed studies are carried out in this thesis to ensure and suggest the system operators with appropriate relay characteristics to be used for transmission line protection in the case of wind farms interconnected to Grid.
Based on the studies carried out in the thesis, LILO connection has no impact on distance relay characteristic. In radially connected wind farms, grid side relay will operate reliably for all types of faults. It has been recommended in the thesis that wind farm side distance relay characteristics should be adjusted based on the types of wind turbines (Type-1, Type-2, Type-3 and Type-4). Based on the investigations carried out in the thesis, voltage based phase selector has been recommended for Type-4 WTGU based wind farms.
|
318 |
Physical Layer Security vs. Network Layer Secrecy: Who Wins on the Untrusted Two-Way Relay Channel?Richter, Johannes, Franz, Elke, Engelmann, Sabrina, Pfennig, Stefan, Jorswieck, Eduard A. January 2013 (has links)
We consider the problem of secure communications in a Gaussian two-way relay network where two nodes exchange confidential messages only via an untrusted relay. The relay is assumed to be honest but curious, i.e., an eavesdropper that conforms to the system rules and applies the intended relaying scheme. We analyze the achievable secrecy rates by applying network coding on the physical layer or the network layer and compare the results in terms of complexity, overhead, and efficiency. Further, we discuss the advantages and disadvantages of the respective approaches.
|
319 |
Management-Buy-In bei eigentümergeführten Unternehmen: Erfolgsfaktoren und Erfolgseinfluss der Relay SuccessionWallraff, Thomas 20 June 2013 (has links)
Der Anteil der externen Nachfolge bei eigentümergeführten bzw. Familienunternehmen nimmt stetig zu. Eine Möglichkeit ist dabei ein Management-Buy-In, bei dem ein externer Manager die Position des Altinhabers übernimmt. In einer solchen Situation kann die Nachfolge in Form einer Relay Succession erfolgen, eine zeitlich gestaffelte Übergabe vom alten an den neuen Inhaber. In dieser Arbeit werden die Relay Succession, ihre Vor- und Nachteile, relevante Einflussfaktoren und Prozessempfehlungen in qualitativen Fallstudien untersucht.:Vorwort … II
Inhaltsverzeichnis … III
Abbildungsverzeichnis … VIII
Tabellenverzeichnis … IX
Abkürzungsverzeichnis … X
1 Einleitung … 1
2 Management-Buy-In bei eigentümergeführten Unternehmen … 6
2.1 Definition eigentümergeführter Unternehmen und Familienunternehmen in dieser Untersuchung … 7
2.2 Wirtschaftliche Bedeutung … 9
2.3 Bedeutung des Geschäftsführers und seiner Nachfolge … 13
2.4 Externe Nachfolge in eigentümergeführten Familienunternehmen … 16
3 Aktuelle Forschung … 27
3.1 Rahmengebende Forschungsfelder … 28
3.2 Zusammenfassende Beurteilung der theoretischen Grundlagen … 66
4 Untersuchungsmethode und empirische Betrachtung … 80
4.1 Qualitativer Fallstudienansatz … 80
4.2 Selektion und Akquirierung von Fallstudienkandidaten … 85
4.3 Interviewführung und fortlaufende Auswertung … 89
4.4 Datenanalyse und Hypothesengenerierung … 97
4.5 Sicherstellung der Reliabilität und Validität der Fallstudienuntersuchung … 102
5 Beschreibung und individuelle Beurteilung („within analysis“) der Fallstudien … 107
5.1 Fallstudie Fenster … 107
5.2 Fallstudie Karton … 114
5.3 Fallstudie Kunststoff … 121
5.4 Fallstudie Logistik … 131
5.5 Fallstudie Medizin … 140
5.6 Fallstudie Metall … 147
5.7 Fallstudie Möbel … 157
5.8 Fallstudie Netzwerk … 166
5.9 Fallstudie Präsentation … 174
5.10 Fallstudie Zahn … 181
6 Übergreifende Diskussion („cross-case analysis“) … 188
6.1 Ergebnisse … 189
7 Fazit … 241
7.1 Zusammenfassung … 241
7.2 Implikationen für die Praxis … 243
7.3 Einschränkungen und Grenzen … 247
7.4 Zukünftiger Forschungsbedarf … 249
A Appendix … A-I
Literaturverzeichnis … A-XLIX
|
320 |
Distributed Relay/Replay Attacks on GNSS SignalsLenhart, Malte January 2022 (has links)
In modern society, Global Navigation Satellite Systems (GNSSs) are ubiquitously relied upon by many systems, among others in critical infrastructure, for navigation and time synchronization. To overcome the prevailing vulnerable state of civilian GNSSs, many detection schemes for different attack types (i.e., jamming and spoofing) have been proposed in literature over the last decades. With the launch of Galileo Open Service Navigation Message Authentication (OSNMA), certain, but not all, types of GNSS spoofing are prevented. We therefore analyze the remaining attack surface of relay/replay attacks in order to identify a suitable and effective combination of detection schemes against these. One shortcoming in the evaluation of countermeasures is the lack of available test platforms, commonly limiting evaluation to mathematical description, simulation and/or test against a well defined set of recorded spoofing incidents. In order to allow researchers to test countermeasures against more diverse threats, this degree project investigates relay/replay attacks against GNSS signals in realworld setups. For this, we consider colluding adversaries, relaying/replaying on signal and on messagelevel in realtime, over consumer grade Internet, and with Commercially off the Shelf (COTS) hardware. We thereby highlight how effective and simple relay/replay attacks can be on existent and likely on upcoming authenticated signals. We investigate the requirements for such colluding attacks and present their limitations and impact, as well as highlight possible detection points. / Det moderna samhället förlitar sig på ständigt tillgängliga satellitnavigeringssystem (GNSSs) för navigering och tidssynkronisering i bland annat kritisk infrastruktur. För att åtgärda det rådande såbara tillståndet i civila GNSSs har många detektionssystem för olika attacktyper (dvs. jamming och förfalskning) blivit förslagna i den vetenskapliga litteraturen under de senaste årtiondena. Införandet av Galileo Open Service Navigation Message Authentication (OS NMA) förhindrar vissa, men inte alla typer av förfalskningsattacker. Därför analyserar vi den övriga angreppsytan för replay attacker för att identifiera en kvalificerad och effektiv kombination av detektionssystem emot dem. Ett tillkortakommande i utvärdering av detektionssystemen är bristen på tillgängliga testplattformar, vilket får konsekvensen att utvärderingen ofta är begränsad till matematiska beskrivningar, simuleringar, och/eller testning mot ett väldefinierat set av genererad förfalskningsattacker. För att hjälpa forskarna testa detektionssystemen mot mer varierade angrepp undersöker detta examensarbete replay attacker mot GNSS signaler i realistiska situationer. För dessa syften betraktar vi kollaborerande angripare som utför replay attacker på signal och meddelandennivå i realtid över konsumentkvalité Internet med vanlig hårdvara. Vi framhäver därmed hur effektiva och enkla replay attacker kan vara mot befintliga och kommande autentiserade signaler. Vi undersöker förutsättningar för sådana kollaborerande attacker och presenterar deras begränsningar och verkan, samt möjliga kännetecken.
|
Page generated in 0.0342 seconds