The use of non-power frequency components for protection measurements in an area that has received relatively little attention. Although work on the use of switched stack tuners has been reported for fault detection, ...The use of non-power frequency components for protection measurements in an area that has received relatively little attention. Although work on the use of switched stack tuners has been reported for fault detection, the sensitivity of switched arrangements is limited by scnsitivity of directional detectors for switching purposes. This paper presents an alternative non-switching scheme which is relatively simple.A simplified typical 400kV system with the line trap, stack tuner, coupling capacitor and bus capacitance to earth is considered. Fault studies by using the EMTP have been carried out, frequency-dependent pararnctcrs are used for the line representation. Arcing faults have also bccn investigated and the results show a great promise of the scheme.展开更多
Aiming at digital relay protection system, a novel hidden failure Markov reliability model is presented for a single main protection and double main protection systems according to hidden failure and protection functi...Aiming at digital relay protection system, a novel hidden failure Markov reliability model is presented for a single main protection and double main protection systems according to hidden failure and protection function under Condition-Based Maintenance (CBM) circumstance and reliability indices such as probability of protection system hidden failure state are calculated. Impacts of different parameters (containing impacts of human errors) to hidden failure state probability and the optimal measures to improve reliability by variable parameter method are also analyzed. It’s demonstrated here that: Compared to a single main protection, double main protection system has an increased hidden failure probability, thus the real good state probability decreases, two main protections’ reliability must be improved at the same time, so configuration of the whole protection system for the component being protected can’t be complicated. Through improving means of on-line self-checking and monitoring system in digital protection system and human reliability, the real application of CBM can decrease hidden failure state probability. Only through this way can we assure that the protection systems work in good state. It has a certain reference value to protection system reliability engineering.展开更多
The paper is concerned with the Power System Protection schemes and the resulting design requirement that enhances stability as well as control with the implementation of TCP/IP. It discusses the architecture that upg...The paper is concerned with the Power System Protection schemes and the resulting design requirement that enhances stability as well as control with the implementation of TCP/IP. It discusses the architecture that upgrades the existing scheme by controlling all the control signals traffic between generating units, transmission system, connected loads and protection devices that are sensitive to control signals using TCP/IP and results are compared using Graphics User Interface (GUI) in MATLAB/Simulink. Protection system describes latest breakers circuit using indirect tripping command from generating units that protects load side through load breakers that receives action signal from local controllers that have a direct communication linkage with main server having strong data base, directly monitors everything through TCP/IP platform using GUI.展开更多
With the development of large-scale complicated modern power systems, the requirement for the associated protection scheme tends to be more stringent and its combination more complex. However, it is very difficult to ...With the development of large-scale complicated modern power systems, the requirement for the associated protection scheme tends to be more stringent and its combination more complex. However, it is very difficult to figure out the factors of failure of such systems. This paper proposes a Petri net model of a transmission line protection relaying system, including three types of relays as well as an automatic reclosing device, and shows how to diagnose serial failure of the system by analyzing invariant sets of the model. Furthermore, it gives four basic types of failure sequences and its execution is much more intuitive and effective than the traditional method.展开更多
It is a basic requirement of eco-garden city construction to establish a biodiversity protection system,and also a concrete requirement of ecological development for an eco-garden city.Biodiversity protection system o...It is a basic requirement of eco-garden city construction to establish a biodiversity protection system,and also a concrete requirement of ecological development for an eco-garden city.Biodiversity protection system of the eco-garden city includes the following contents:clarifying hierarchical requirements of the urban biodiversity protection,that is,classified protection of planning hierarchy and biodiversity hierarchy;achieving biodiversity protection via the planning system;establishing a quantity index system of urban biodiversity protection.Major strategies for establishing the biodiversity protection system were given as below:giving proper ecological planning and design;providing policy and law support;enhancing the construction of humanistic and education environment.Study on biodiversity protection system in eco-garden city may become an important support for the future quality evaluation of urban construction.展开更多
The utilization levels of the transmission network can be enhanced by the use of automated protection schemes that rapidly respond to disturbances. However,such corrective systems may suffer from malfunctions that hav...The utilization levels of the transmission network can be enhanced by the use of automated protection schemes that rapidly respond to disturbances. However,such corrective systems may suffer from malfunctions that have the potential to exacerbate the impact of the disturbance. This paper addresses the challenge of jointly optimizing the dispatch of generators and protection settings in this context. This requires a holistic assessment of the cyber(protection logic) and physical(network) systems,considering the failures in each part and their interplay.Special protection schemes are used as a prototypical example of such a system. An iterative optimization method is proposed that relies on power system response simulations in order to perform detailed impact assessments and compare candidate solutions. The candidate solutions are generated on the basis of a security-constrained dispatch that also secures the system against a set of cyber failure modes. A case study is developed for a generation rejection scheme on the IEEE reliability testsystem(RTS): candidate solutions are produced based on a mixed integer linear programming optimisation model, and loss-of-load costs are computed using a basic cascading outage algorithm. It is shown that the partial security approach is able to identify solutions that provide a good balance of operational costs and loss-of-load risks, both in a fixed dispatch and variable dispatch context.展开更多
Rice is one of the main staple food crops in the world, but it may suffer serious water stress during growth period. Water stress during grain filling results in decreased grain yeild, but its mechanism generating and...Rice is one of the main staple food crops in the world, but it may suffer serious water stress during growth period. Water stress during grain filling results in decreased grain yeild, but its mechanism generating and scavenging the active oxygen is unclear under continuance of the water stress. The experiment was carried out in growth chamber to investigate the effects of water stress on the production of superoxide free radical (O2), hydrogen peroxide (H202), malondialdehyde (MDA), reduced glutathione (GSH), ascorbic acid (AsA), and antioxidative enzyme activities in three rice hybrids with differing drought resistant under both normal and drought conditions during grain-filling stage. The results showed that water stress aggravated the membrane lipid peroxidation in rice leaves, which was more severe in less drought resistant hybrids than that in more tolerant ones. Also O2' and H2O2 accumulated more rapidly in less drought resistant hybrids than that in more tolerant ones. During water stress, decreases of GSH, AsA, chlorophyll, and relative water contents in more drought resistant hybrids were obvious less than those in less tolerant ones. Activities of superoxide dismutase (SOD), catalase (CAT) and peroxidase (POD) in/eaves increased obviously in 0-14 d after heading and subsequently decreased rapidly, and those in more drought resistant hybrids were more than those in less tolerant ones. The results showed that changes of O2, H2O2, MDA, GSH, and AsA contents and antioxidative enzyme activities correlated significantly to drought resistance of rice hybrids, and more drought resistant hybrids possessed high ant oxidation capacity.展开更多
The three-dimensional Navier Stokes equation and the k-ε viscous model are used to simulate the attack angle characteristics of a hemisphere nose-tip with an opposing jet thermal protection system in supersonic flow ...The three-dimensional Navier Stokes equation and the k-ε viscous model are used to simulate the attack angle characteristics of a hemisphere nose-tip with an opposing jet thermal protection system in supersonic flow conditions. The numerical method is validated by the relevant experiment. The flow field parameters, aerodynamic forces, and surface heat flux distributions for attack angles of 0°, 2°, 5°, 7°, and 10° are obtained. The detailed numerical results show that the cruise attack angle has a great influence on the flow field parameters, aerodynamic force, and surface heat flux distribution of the supersonic vehicle nose-tip with an opposing jet thermal protection system. When the attack angle reaches 10°, the heat flux on the windward generatrix is close to the maximal heat flux on the wall surface of the nose-tip without thermal protection system, thus the thermal protection has failed.展开更多
Wind and sand control are important factors in combating desertification and protecting oases.An oasis protective system can provide these benefits,but quantitative research on protection effects has been lacking to d...Wind and sand control are important factors in combating desertification and protecting oases.An oasis protective system can provide these benefits,but quantitative research on protection effects has been lacking to date.This research describes an oasis protective system in the southeastern border of the Tengger Desert.The system consists of a sand barrier belt,a shrub and herbaceous plant belt,and a farmland shelter belt.The system was compared to a bare dunes area as the control zone.The study investigated windproof effect,sediment transport,and erosion through field observations.Results showed that the roughness of the shrub and herbaceous plant belt,farmland shelter belt,and sand barrier belt were increased compared with bare dunes.The shrub and herbaceous plant belt provided the highest windproof effect values for the same wind velocity measurement height,and the windproof effect values for different protective belts were as follows:shrub and herbaceous plant belt>farmland shelter belt>sand barrier belt.The sand barrier belt provided effective wind and sand control at heights from 0 to 50 cm above the ground.The total sediment transport for each protective belt is as follows:bare dunes>sand barrier belt>shrub and herbaceous plant belt>farmland shelter belt.The sediment transport decreased exponentially as the height increased.In the bare dunes and protective systems,the sediment transport is mainly within 30 cm of the ground surface.The wind erosion intensity for this protective system was as follows:bare dunes>sand barrier belt>shrub and herbaceous plant belt>farmland shelter belt.This research offers quantitative evidence for how oasis protective systems can effectively intercept sand and prevent erosion in oases.The results of this study can be applied in similar regions.展开更多
The intelligent substation realizes the digitization of information in the whole substation and thus time synchronization system becomes more and more important. This paper introduces time synchronization technology o...The intelligent substation realizes the digitization of information in the whole substation and thus time synchronization system becomes more and more important. This paper introduces time synchronization technology of intelligent substation and puts forward the principles for designing intelligent substation time synchronization system. According to some relay protection malfunction examples caused by time synchronization system fault, analyze the influence of time synchronization system fault to relay protection and correspondingly put forward some improving measures.展开更多
The authors have studied the effects of Pyrroioguinloine quinone (PQQ) on superoxide dismutase (SOD), Ascorbid acid(AsA) peroxidase (AsAPOD), glutathion (GSH) and electrolytic leakage of cotyledon in cucumber seedling...The authors have studied the effects of Pyrroioguinloine quinone (PQQ) on superoxide dismutase (SOD), Ascorbid acid(AsA) peroxidase (AsAPOD), glutathion (GSH) and electrolytic leakage of cotyledon in cucumber seedling under low temperature stress, meanwhile, 8-hydroquinone (8-HQ) and AsA (activeoxiygen scavengers) have been made use of in comparison with PQQ. The results indicate that the activities of SOD, AsAPOD and content of GSH can be increased by PQQ. The relative conductivity of cotyledon in cucumber seedling is decreased for PQQ possesses the ability of cleaning up free redical of oxygen. We came to the conclusion that PQQ can act as a kind of active oxygen scavenger and adjust the metabolism on free radical of oxygen to balance in plants and enhance resistance finally in plants.展开更多
The article discusses the possibility of further modernization of the standard microprocessor relay protection of AC overhead system feeders DPA-27.5-TNF, which is operated on the Trans-Baikal Railway by creating an a...The article discusses the possibility of further modernization of the standard microprocessor relay protection of AC overhead system feeders DPA-27.5-TNF, which is operated on the Trans-Baikal Railway by creating an additional automated system of unified templates necessary for the occurrence of “trainability” elements. The templates will be formed via a separate dedicated channel for transmission, processing and storage of the necessary information, not related to the operation of the terminal, with its subsequent visualization at the workplace of the duty personnel of traction substations, together with information from the “GID” software received via another dedicated wired channel. With the help of such a base of unified preset templates, in the future, it will be possible not only to identify the specific causes of each emergency shutdown but also to reduce their number by dynamically adjusting the existing presets of the standard operation algorithm.展开更多
In this paper security systems deployed over an area are regarded abstractly as a diagram of security network. We propose the Neyman-Pearson protection model for security systems, which can be used to determine the pr...In this paper security systems deployed over an area are regarded abstractly as a diagram of security network. We propose the Neyman-Pearson protection model for security systems, which can be used to determine the protection probability of a security system and find the weakest breach path of a security network. We present the weakest breach path problem formulation, which is defined by the breach protection probability of an unauthorized target passing through a guard field, and provide a solution for this problem by using the Dijkstra’s shortest path algorithm. Finally we study the variation of the breach protection probability with the change of the parameters of the model.展开更多
This paper studies mainly how to make use of Multi- Agent technology to solve the complex problems which are caused by unsuitable coordination between protection and untimely action and protection fault activity in la...This paper studies mainly how to make use of Multi- Agent technology to solve the complex problems which are caused by unsuitable coordination between protection and untimely action and protection fault activity in large power system, and realizes timely the coordination among protections effectively in when losing some or all information. Thus it overcomes the difficult of solving single or shore range information, enhances correspond and coordination among the intelligent protect Agent, raises the stable and reliable property, and promotes the process of power network for large area.展开更多
Safety system testing is one of the most rigorous and time-consuming requirements in the verification and validation process for reactor protection systems(RPSs).This paper presents the development of a test system fo...Safety system testing is one of the most rigorous and time-consuming requirements in the verification and validation process for reactor protection systems(RPSs).This paper presents the development of a test system for the fully digital and field-programmable gate array-based RPS of the solid fuel(SF) thorium-breeding molten salt pebble bed fluoride salt-cooled reactor(TMSR),denoted as the TMSR-SF1 project,developed by the Chinese Academy of Sciences.The test system is applied to the RPS to ensure that it fully meets its designed functions and system specifications.We first introduce the testing principles and methods.Then,the hardware component designs and the software program development of the test system are discussed.Finally,the test process and test results are discussed and summarized.展开更多
There are no explicit laws concerning food recalls in China; moreover, some related regulations have weaknesses. China should first create a system of laws and regulations governing food recalls, establish a system to...There are no explicit laws concerning food recalls in China; moreover, some related regulations have weaknesses. China should first create a system of laws and regulations governing food recalls, establish a system to recall defective food, and strengthen administrative and legal remedial mechanisms related to consumer rights.展开更多
For the purpose of the monitor system in digital protection, the embedded real-time operating system (RTOS) and the embedded GUI (Graphical User Interface) is introduced to design the monitor system. Combining the nec...For the purpose of the monitor system in digital protection, the embedded real-time operating system (RTOS) and the embedded GUI (Graphical User Interface) is introduced to design the monitor system. Combining the necessity and the application value of the operation system, the choice of embedded Linux and Qt/Embedded is completely viable for the monitor system in digital protection for generator-transformer sets. The design with embedded Linux and embedded GUI enriches system information, increases developing efficiency and improve the generality.展开更多
This article is dedicated to the creation of the analytical model of quantitative estimation of cybersecurity of Information Systems of Critical Infrastructure (ISCI). The model takes into consideration the existence,...This article is dedicated to the creation of the analytical model of quantitative estimation of cybersecurity of Information Systems of Critical Infrastructure (ISCI). The model takes into consideration the existence, in the discussed ISCI, of both the intelligent tools of detection, analysis and identification of threats and vulnerabilities and means for restauration and elimination of their consequences. The development of the model also takes into consideration probabilistic nature of flow of events happening in ISCI and transferring the system between different states of cybersecurity. Among such probabilistic events we mean any operational perturbations (that can cause extreme situations) happening in ISCI under the influence of cyber-threats, as well as events concerning restoration and elimination of consequences of such cyber-threats. In this work, as methods of modelling, there have been used methods of system-oriented analysis based on theory of probability, theory of reliability and theory of queues. These methods enabled to describe analytically dependence of effectiveness indices of ISCI operation on abovementioned probabilistic processes.展开更多
文摘The use of non-power frequency components for protection measurements in an area that has received relatively little attention. Although work on the use of switched stack tuners has been reported for fault detection, the sensitivity of switched arrangements is limited by scnsitivity of directional detectors for switching purposes. This paper presents an alternative non-switching scheme which is relatively simple.A simplified typical 400kV system with the line trap, stack tuner, coupling capacitor and bus capacitance to earth is considered. Fault studies by using the EMTP have been carried out, frequency-dependent pararnctcrs are used for the line representation. Arcing faults have also bccn investigated and the results show a great promise of the scheme.
文摘Aiming at digital relay protection system, a novel hidden failure Markov reliability model is presented for a single main protection and double main protection systems according to hidden failure and protection function under Condition-Based Maintenance (CBM) circumstance and reliability indices such as probability of protection system hidden failure state are calculated. Impacts of different parameters (containing impacts of human errors) to hidden failure state probability and the optimal measures to improve reliability by variable parameter method are also analyzed. It’s demonstrated here that: Compared to a single main protection, double main protection system has an increased hidden failure probability, thus the real good state probability decreases, two main protections’ reliability must be improved at the same time, so configuration of the whole protection system for the component being protected can’t be complicated. Through improving means of on-line self-checking and monitoring system in digital protection system and human reliability, the real application of CBM can decrease hidden failure state probability. Only through this way can we assure that the protection systems work in good state. It has a certain reference value to protection system reliability engineering.
文摘The paper is concerned with the Power System Protection schemes and the resulting design requirement that enhances stability as well as control with the implementation of TCP/IP. It discusses the architecture that upgrades the existing scheme by controlling all the control signals traffic between generating units, transmission system, connected loads and protection devices that are sensitive to control signals using TCP/IP and results are compared using Graphics User Interface (GUI) in MATLAB/Simulink. Protection system describes latest breakers circuit using indirect tripping command from generating units that protects load side through load breakers that receives action signal from local controllers that have a direct communication linkage with main server having strong data base, directly monitors everything through TCP/IP platform using GUI.
文摘With the development of large-scale complicated modern power systems, the requirement for the associated protection scheme tends to be more stringent and its combination more complex. However, it is very difficult to figure out the factors of failure of such systems. This paper proposes a Petri net model of a transmission line protection relaying system, including three types of relays as well as an automatic reclosing device, and shows how to diagnose serial failure of the system by analyzing invariant sets of the model. Furthermore, it gives four basic types of failure sequences and its execution is much more intuitive and effective than the traditional method.
文摘It is a basic requirement of eco-garden city construction to establish a biodiversity protection system,and also a concrete requirement of ecological development for an eco-garden city.Biodiversity protection system of the eco-garden city includes the following contents:clarifying hierarchical requirements of the urban biodiversity protection,that is,classified protection of planning hierarchy and biodiversity hierarchy;achieving biodiversity protection via the planning system;establishing a quantity index system of urban biodiversity protection.Major strategies for establishing the biodiversity protection system were given as below:giving proper ecological planning and design;providing policy and law support;enhancing the construction of humanistic and education environment.Study on biodiversity protection system in eco-garden city may become an important support for the future quality evaluation of urban construction.
基金supported by the UK Engineering and Physical Sciences Research Council(EPSRC)(No.EP/K036173/1)(ACCEPT)
文摘The utilization levels of the transmission network can be enhanced by the use of automated protection schemes that rapidly respond to disturbances. However,such corrective systems may suffer from malfunctions that have the potential to exacerbate the impact of the disturbance. This paper addresses the challenge of jointly optimizing the dispatch of generators and protection settings in this context. This requires a holistic assessment of the cyber(protection logic) and physical(network) systems,considering the failures in each part and their interplay.Special protection schemes are used as a prototypical example of such a system. An iterative optimization method is proposed that relies on power system response simulations in order to perform detailed impact assessments and compare candidate solutions. The candidate solutions are generated on the basis of a security-constrained dispatch that also secures the system against a set of cyber failure modes. A case study is developed for a generation rejection scheme on the IEEE reliability testsystem(RTS): candidate solutions are produced based on a mixed integer linear programming optimisation model, and loss-of-load costs are computed using a basic cascading outage algorithm. It is shown that the partial security approach is able to identify solutions that provide a good balance of operational costs and loss-of-load risks, both in a fixed dispatch and variable dispatch context.
基金supported by the National 863 Program of China (2002AA2Z4011)the Foundation for Personnel of Henan University of Science and Technology China.
文摘Rice is one of the main staple food crops in the world, but it may suffer serious water stress during growth period. Water stress during grain filling results in decreased grain yeild, but its mechanism generating and scavenging the active oxygen is unclear under continuance of the water stress. The experiment was carried out in growth chamber to investigate the effects of water stress on the production of superoxide free radical (O2), hydrogen peroxide (H202), malondialdehyde (MDA), reduced glutathione (GSH), ascorbic acid (AsA), and antioxidative enzyme activities in three rice hybrids with differing drought resistant under both normal and drought conditions during grain-filling stage. The results showed that water stress aggravated the membrane lipid peroxidation in rice leaves, which was more severe in less drought resistant hybrids than that in more tolerant ones. Also O2' and H2O2 accumulated more rapidly in less drought resistant hybrids than that in more tolerant ones. During water stress, decreases of GSH, AsA, chlorophyll, and relative water contents in more drought resistant hybrids were obvious less than those in less tolerant ones. Activities of superoxide dismutase (SOD), catalase (CAT) and peroxidase (POD) in/eaves increased obviously in 0-14 d after heading and subsequently decreased rapidly, and those in more drought resistant hybrids were more than those in less tolerant ones. The results showed that changes of O2, H2O2, MDA, GSH, and AsA contents and antioxidative enzyme activities correlated significantly to drought resistance of rice hybrids, and more drought resistant hybrids possessed high ant oxidation capacity.
基金Project supported by the National Natural Science Foundation of China (Grant No. 90916018)the Research Fund for the Doctoral Program of Higher Education of China (Grant No. 200899980006)the Natural Science Foundation of Hunan Province,China(Grant No. 09JJ3109)
文摘The three-dimensional Navier Stokes equation and the k-ε viscous model are used to simulate the attack angle characteristics of a hemisphere nose-tip with an opposing jet thermal protection system in supersonic flow conditions. The numerical method is validated by the relevant experiment. The flow field parameters, aerodynamic forces, and surface heat flux distributions for attack angles of 0°, 2°, 5°, 7°, and 10° are obtained. The detailed numerical results show that the cruise attack angle has a great influence on the flow field parameters, aerodynamic force, and surface heat flux distribution of the supersonic vehicle nose-tip with an opposing jet thermal protection system. When the attack angle reaches 10°, the heat flux on the windward generatrix is close to the maximal heat flux on the wall surface of the nose-tip without thermal protection system, thus the thermal protection has failed.
基金sponsored as a sub-project of the National Key Research and Development Program of China-Desertification Land Management and Sand Industry Technology Research and Development and Demonstration in Inner Mongolia Desertification Area,named Key Techniques and Demonstration of Sand Damage Control in Oasis and Saline-alkali Lake(2016YFC0501003)Central Government’s Special Fund for Guiding Local Science and Technology Development:Inner Mongolia Desertification Control and Innovation Research Center
文摘Wind and sand control are important factors in combating desertification and protecting oases.An oasis protective system can provide these benefits,but quantitative research on protection effects has been lacking to date.This research describes an oasis protective system in the southeastern border of the Tengger Desert.The system consists of a sand barrier belt,a shrub and herbaceous plant belt,and a farmland shelter belt.The system was compared to a bare dunes area as the control zone.The study investigated windproof effect,sediment transport,and erosion through field observations.Results showed that the roughness of the shrub and herbaceous plant belt,farmland shelter belt,and sand barrier belt were increased compared with bare dunes.The shrub and herbaceous plant belt provided the highest windproof effect values for the same wind velocity measurement height,and the windproof effect values for different protective belts were as follows:shrub and herbaceous plant belt>farmland shelter belt>sand barrier belt.The sand barrier belt provided effective wind and sand control at heights from 0 to 50 cm above the ground.The total sediment transport for each protective belt is as follows:bare dunes>sand barrier belt>shrub and herbaceous plant belt>farmland shelter belt.The sediment transport decreased exponentially as the height increased.In the bare dunes and protective systems,the sediment transport is mainly within 30 cm of the ground surface.The wind erosion intensity for this protective system was as follows:bare dunes>sand barrier belt>shrub and herbaceous plant belt>farmland shelter belt.This research offers quantitative evidence for how oasis protective systems can effectively intercept sand and prevent erosion in oases.The results of this study can be applied in similar regions.
文摘The intelligent substation realizes the digitization of information in the whole substation and thus time synchronization system becomes more and more important. This paper introduces time synchronization technology of intelligent substation and puts forward the principles for designing intelligent substation time synchronization system. According to some relay protection malfunction examples caused by time synchronization system fault, analyze the influence of time synchronization system fault to relay protection and correspondingly put forward some improving measures.
文摘The authors have studied the effects of Pyrroioguinloine quinone (PQQ) on superoxide dismutase (SOD), Ascorbid acid(AsA) peroxidase (AsAPOD), glutathion (GSH) and electrolytic leakage of cotyledon in cucumber seedling under low temperature stress, meanwhile, 8-hydroquinone (8-HQ) and AsA (activeoxiygen scavengers) have been made use of in comparison with PQQ. The results indicate that the activities of SOD, AsAPOD and content of GSH can be increased by PQQ. The relative conductivity of cotyledon in cucumber seedling is decreased for PQQ possesses the ability of cleaning up free redical of oxygen. We came to the conclusion that PQQ can act as a kind of active oxygen scavenger and adjust the metabolism on free radical of oxygen to balance in plants and enhance resistance finally in plants.
文摘The article discusses the possibility of further modernization of the standard microprocessor relay protection of AC overhead system feeders DPA-27.5-TNF, which is operated on the Trans-Baikal Railway by creating an additional automated system of unified templates necessary for the occurrence of “trainability” elements. The templates will be formed via a separate dedicated channel for transmission, processing and storage of the necessary information, not related to the operation of the terminal, with its subsequent visualization at the workplace of the duty personnel of traction substations, together with information from the “GID” software received via another dedicated wired channel. With the help of such a base of unified preset templates, in the future, it will be possible not only to identify the specific causes of each emergency shutdown but also to reduce their number by dynamically adjusting the existing presets of the standard operation algorithm.
文摘In this paper security systems deployed over an area are regarded abstractly as a diagram of security network. We propose the Neyman-Pearson protection model for security systems, which can be used to determine the protection probability of a security system and find the weakest breach path of a security network. We present the weakest breach path problem formulation, which is defined by the breach protection probability of an unauthorized target passing through a guard field, and provide a solution for this problem by using the Dijkstra’s shortest path algorithm. Finally we study the variation of the breach protection probability with the change of the parameters of the model.
基金Province natural science fund in Guangdong subsidizes item(05300167)
文摘This paper studies mainly how to make use of Multi- Agent technology to solve the complex problems which are caused by unsuitable coordination between protection and untimely action and protection fault activity in large power system, and realizes timely the coordination among protections effectively in when losing some or all information. Thus it overcomes the difficult of solving single or shore range information, enhances correspond and coordination among the intelligent protect Agent, raises the stable and reliable property, and promotes the process of power network for large area.
基金supported by the Leading Science and Technology Project of Chinese Academy of Sciences(No.XD02001003)
文摘Safety system testing is one of the most rigorous and time-consuming requirements in the verification and validation process for reactor protection systems(RPSs).This paper presents the development of a test system for the fully digital and field-programmable gate array-based RPS of the solid fuel(SF) thorium-breeding molten salt pebble bed fluoride salt-cooled reactor(TMSR),denoted as the TMSR-SF1 project,developed by the Chinese Academy of Sciences.The test system is applied to the RPS to ensure that it fully meets its designed functions and system specifications.We first introduce the testing principles and methods.Then,the hardware component designs and the software program development of the test system are discussed.Finally,the test process and test results are discussed and summarized.
文摘There are no explicit laws concerning food recalls in China; moreover, some related regulations have weaknesses. China should first create a system of laws and regulations governing food recalls, establish a system to recall defective food, and strengthen administrative and legal remedial mechanisms related to consumer rights.
文摘For the purpose of the monitor system in digital protection, the embedded real-time operating system (RTOS) and the embedded GUI (Graphical User Interface) is introduced to design the monitor system. Combining the necessity and the application value of the operation system, the choice of embedded Linux and Qt/Embedded is completely viable for the monitor system in digital protection for generator-transformer sets. The design with embedded Linux and embedded GUI enriches system information, increases developing efficiency and improve the generality.
文摘This article is dedicated to the creation of the analytical model of quantitative estimation of cybersecurity of Information Systems of Critical Infrastructure (ISCI). The model takes into consideration the existence, in the discussed ISCI, of both the intelligent tools of detection, analysis and identification of threats and vulnerabilities and means for restauration and elimination of their consequences. The development of the model also takes into consideration probabilistic nature of flow of events happening in ISCI and transferring the system between different states of cybersecurity. Among such probabilistic events we mean any operational perturbations (that can cause extreme situations) happening in ISCI under the influence of cyber-threats, as well as events concerning restoration and elimination of consequences of such cyber-threats. In this work, as methods of modelling, there have been used methods of system-oriented analysis based on theory of probability, theory of reliability and theory of queues. These methods enabled to describe analytically dependence of effectiveness indices of ISCI operation on abovementioned probabilistic processes.