期刊文献+
共找到11篇文章
< 1 >
每页显示 20 50 100
Prediction of Instability Separation Modes and Its Application in Practical Dynamic Security Region
1
作者 曾沅 余贻鑫 +3 位作者 王红梅 闵亮 张沛 LEES T 《Transactions of Tianjin University》 EI CAS 2007年第3期157-162,共6页
The transient critical boundary of dynamic security region (DSR) can be approximated by a few hyper planes correlated with instability separation modes. A method to fast predict instability separation modes is propose... The transient critical boundary of dynamic security region (DSR) can be approximated by a few hyper planes correlated with instability separation modes. A method to fast predict instability separation modes is proposed for DSR calculation in power injection space. The method identifies coherent generation groups by the developed K-medoids algorithm, taking a similarity matrix derived from the reachability Grammian as the index. As an experimental result, reachability Grammian matrices under local injections are approximately invariant. It indicates that the generator coherency identifications are nearly consistent for different injections. Then instability separation modes can be predicted at the normal operating point, while average initial acceleration is considered as the measure of the critical generator group to amend the error. Moreover, based on these predicted instability separation modes, a critical point search strategy for DSR calculation is illustrated in the reduced injection space of the critical generators. The proposed method was evaluated using New England Test System, and the computation accuracy and speed in determining the practical DSR were improved. 展开更多
关键词 instability separation mode dynamic security region K-medoids algorithm reachability Grammian
下载PDF
Critical Contingencies Ranking for Dynamic Security Assessment Using Neural Networks
2
作者 Gustavo Schweickardt Juan Manuel Gimenez-Alvarez 《Journal of Energy and Power Engineering》 2012年第10期1663-1672,共10页
A number of contingencies simulated during dynamic security assessment do not generate unacceptable values of power system state variables, due to their small influence on system operation. Their exclusion from the se... A number of contingencies simulated during dynamic security assessment do not generate unacceptable values of power system state variables, due to their small influence on system operation. Their exclusion from the set of contingencies to be simulated in the security assessment would achieve a significant reduction in computation time. This paper defines a critical contingencies selection method for on-line dynamic security assessment. The selection method results from an off-line dynamical analysis, which covers typical scenarios and also covers various related aspects like frequency, voltage, and angle analyses among others. Indexes measured over these typical scenarios are used to train neural networks, capable of performing on-line estimation of a critical contingencies list according to the system state. 展开更多
关键词 Critical contingencies dynamic security assessment neural networks.
下载PDF
Understanding Discrepancy of Power System Dynamic Security Assessment with Unknown Faults: A Reliable Transfer Learning-based Method
3
作者 Chao Ren Han Yu +1 位作者 Yan Xu Zhao Yang Dong 《CSEE Journal of Power and Energy Systems》 SCIE EI CSCD 2024年第1期427-431,共5页
This letter proposes a reliable transfer learning(RTL)method for pre-fault dynamic security assessment(DSA)in power systems to improve DSA performance in the presence of potentially related unknown faults.It takes ind... This letter proposes a reliable transfer learning(RTL)method for pre-fault dynamic security assessment(DSA)in power systems to improve DSA performance in the presence of potentially related unknown faults.It takes individual discrepancies into consideration and can handle unknown faults with incomplete data.Extensive experiment results demonstrate high DSA accuracy and computational efficiency of the proposed RTL method.Theoretical analysis shows RTL can guarantee system performance. 展开更多
关键词 Adversarial training dynamic security assessment maximum classifier discrepancy missing data transfer learning
原文传递
Arctic security: evolution of Arctic security dynamics and prospect for a security regime in the Arctic
4
作者 DENG Beixi 《Advances in Polar Science》 2016年第3期163-169,共7页
The security dynamics in the Arctic since the Cold War has transitioned from militarization, to de-militarization, and to re-militarization. Under the circumstances of ongoing globalization and climate change, the Arc... The security dynamics in the Arctic since the Cold War has transitioned from militarization, to de-militarization, and to re-militarization. Under the circumstances of ongoing globalization and climate change, the Arctic states have accorded priority to the enhancement of military capacities in the region, with a view to safeguarding sovereign rights, ensuring navigation security of Arctic waterways, responding to contingencies and guaranteeing civil security. Such military capacity-building measures are otherwise interpreted as initiatives to resume arms race in the Arctic, which would be contributive to the security dilemma. Subject to the structural competition of the U.S. - Russia rivalry, there has long been an absence of a security regime in the Arctic. Nevertheless, the build-up of security regimes in the Arctic constitutes a major concern for the Arctic states, as well as for some extra-regional stakeholders. In the Arctic regional context, the ever-intensifying institutional cooperation in the domains of non- traditional and civil security lays the cornerstone for establishing confidence-building measures, and gives rise to the consensus that maintaining cooperation in the Arctic will be mutually rewarding for all. 展开更多
关键词 Arctic security dynamics Arctic security regime NATO
下载PDF
An In-Depth Study of Complex Power System Dynamic Behavior Characteristics for Chinese UHV Power Grid Security
5
作者 Ding Daoqi State Grid Information & Telecommunication Co.,Ltd.Zhao Fang 《Electricity》 2009年第2期45-51,共7页
In this paper,a series of major policy decisions used to improve the power grid reliability,reduce the risk and losses of major power outages,and realize the modernization of 21st century power grid are discussed. The... In this paper,a series of major policy decisions used to improve the power grid reliability,reduce the risk and losses of major power outages,and realize the modernization of 21st century power grid are discussed. These decisions were adopted by American government and would also be helpful for the strategic development of Chinese power grid. It is proposed that China should take precaution,carry out security research on the overall dynamic behaviour characteristics of the UHV grid using the complexity theory,and finally provide safeguard for the Chinese UHV grid. It is also pointed out that,due to the lack of matured approaches to controll a cascading failure,the primary duty of a system operator is to work as a "watchdog" for the grid operation security,eliminate the cumulative effect and reduce the risk and losses of major cascading outages with the help of EMS and WAMS. 展开更多
关键词 EMS 2003 WAMS An In-Depth Study of Complex Power System dynamic Behavior Characteristics for Chinese UHV Power Grid security
下载PDF
Security Analysis of Broadcaster Group Key Exchange Protocols
6
作者 LI Li ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1577-1580,共4页
Group key exchange protocols are basic protocols to provide privacy and integrity in secure group communication. This paper discusses the security of one type of group key exchange protocols and defines the kind of pr... Group key exchange protocols are basic protocols to provide privacy and integrity in secure group communication. This paper discusses the security of one type of group key exchange protocols and defines the kind of protocols as broadcaster group protocols. It points out two attacks on this kind of protocols. The first attack can be avoided by using fresh values in each action during one session of the group protocol. The second attack should be related with concrete application. It also proposes a dynamic key agreement protocol as an example of solutions at the last part of the paper. 展开更多
关键词 group key exchange protocol broadcaster group protocols dynamic security
下载PDF
Hybrid Security Assessment Methodology for Web Applications 被引量:1
7
作者 Roddy A.Correa Juan Ramon Bermejo Higuera +3 位作者 Javier Bermejo Higuera Juan Antonio SiciliaMontalvo Manuel Sanchez Rubio A.Alberto Magrenan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2021年第1期89-124,共36页
This study presents a methodology to evaluate and prevent security vulnerabilities issues for web applications.The analysis process is based on the use of techniques and tools that allow to perform security assessment... This study presents a methodology to evaluate and prevent security vulnerabilities issues for web applications.The analysis process is based on the use of techniques and tools that allow to perform security assessments of white box and black box,to carry out the security validation of a web application in an agile and precise way.The objective of the methodology is to take advantage of the synergies of semi-automatic static and dynamic security analysis tools and manual checks.Each one of the phases contemplated in the methodology is supported by security analysis tools of different degrees of coverage,so that the results generated in one phase are used as feed for the following phases in order to get an optimized global security analysis result.The methodology can be used as part of other more general methodologies that do not cover how to use static and dynamic analysis tools in the implementation and testing phases of a Secure Software Development Life Cycle(SSDLC).A practical application of the methodology to analyze the security of a real web application demonstrates its effectiveness by obtaining a better optimized vulnerability detection result against the true and false positive metrics.Dynamic analysis with manual checking is used to audit the results,24.6 per cent of security vulnerabilities reported by the static analysis has been checked and it allows to study which vulnerabilities can be directly exploited externally.This phase is very important because it permits that each reported vulnerability can be checked by a dynamic second tool to confirm whether a vulnerability is true or false positive and it allows to study which vulnerabilities can be directly exploited externally.Dynamic analysis finds six(6)additional critical vulnerabilities.Access control analysis finds other five(5)important vulnerabilities such as Insufficient Protected Passwords or Weak Password Policy and Excessive Authentication Attacks,two vulnerabilities that permit brute force attacks. 展开更多
关键词 Web applications security vulnerability WEAKNESS security analysis white box black box interactive application security testing static application security testing dynamic application security testing
下载PDF
Selecting decision trees for power system security assessment
8
作者 Al-Amin B.Bugaje Jochen L.Cremer +1 位作者 Mingyang Sun Goran Strbac 《Energy and AI》 2021年第4期21-30,共10页
Power systems transport an increasing amount of electricity,and in the future,involve more distributed renewables and dynamic interactions of the equipment.The system response to disturbances must be secure and predic... Power systems transport an increasing amount of electricity,and in the future,involve more distributed renewables and dynamic interactions of the equipment.The system response to disturbances must be secure and predictable to avoid power blackouts.The system response can be simulated in the time domain.However,this dynamic security assessment(DSA)is not computationally tractable in real-time.Particularly promising is to train decision trees(DTs)from machine learning as interpretable classifiers to predict whether the systemwide responses to disturbances are secure.In most research,selecting the best DT model focuses on predictive accuracy.However,it is insufficient to focus solely on predictive accuracy.Missed alarms and false alarms have drastically different costs,and as security assessment is a critical task,interpretability is crucial for operators.In this work,the multiple objectives of interpretability,varying costs,and accuracies are considered for DT model selection.We propose a rigorous workflow to select the best classifier.In addition,we present two graphical approaches for visual inspection to illustrate the selection sensitivity to probability and impacts of disturbances.We propose cost curves to inspect selection combining all three objectives for the first time.Case studies on the IEEE 68 bus system and the French system show that the proposed approach allows for better DT-selections,with an 80%increase in interpretability,5%reduction in expected operating cost,while making almost zero accuracy compromises.The proposed approach scales well with larger systems and can be used for models beyond DTs.Hence,this work provides insights into criteria for model selection in a promising application for methods from artificial intelligence(AI). 展开更多
关键词 dynamic security assessment Machine learning Decision trees ROC curve Cost curves Cost sensitivity
原文传递
Impact of Cascade Disconnection of Distributed Energy Resources on Bulk Power System Stability:Modeling and Mitigation Requirements
9
作者 Fabricio Andrade Mourinho Tatiana Mariano Lessa Assis 《Journal of Modern Power Systems and Clean Energy》 SCIE EI CSCD 2023年第2期412-420,共9页
This work presents a new approach to establishing the minimum requirements for anti-islanding protection of distributed energy resources(DERs)with focus on bulk power system stability.The proposed approach aims to avo... This work presents a new approach to establishing the minimum requirements for anti-islanding protection of distributed energy resources(DERs)with focus on bulk power system stability.The proposed approach aims to avoid cascade disconnection of DERs during major disturbances in the transmission network and to compromise as little as possible the detection of real islanding situations.The proposed approach concentrates on the rate-of-change of frequency(RoCoF)protection function and it is based on the assessment of dynamic security regions with the incorporation of a new and straightforward approach to represent the disconnection of DERs when analyzing the bulk power system stability.Initially,the impact of disconnection of DERs on the Brazilian Interconnected Power System(BIPS)stability is analyzed,highlighting the importance of modeling such disconnection in electromechanical stability studies,even considering low penetration levels of DERs.Then,the proposed approach is applied to the BIPS,evidencing its benefits when specifying the minimum requirements of anti-islanding protection,without overestimating them. 展开更多
关键词 Anti-islanding protection bulk power system STABILITY distributed energy resource(DER) dynamic security region(DSR)
原文传递
Transient stability probability of a power system incorporating a wind farm 被引量:7
10
作者 LIU Yan Li YU Yi Xin 《Science China(Technological Sciences)》 SCIE EI CAS CSCD 2016年第6期973-979,共7页
An analytical approach for probabilistic evaluation of transient stability of a power system incorporating a wind farm is presented in this study. Based on the fact that the boundary of practical dynamic security regi... An analytical approach for probabilistic evaluation of transient stability of a power system incorporating a wind farm is presented in this study. Based on the fact that the boundary of practical dynamic security region(PDSR) of a power system with double fed induction generators(DFIG) can be approximated by one or few hyper-planes in nodal power injection space, transient stability criterion for given configurations of pre-fault, fault-on and post-fault of a power system is to be expressed by certain expressions of linear combination of nodal injection vector and the transient stability probability(TSP) is further obtained with a much more simplified expression than the complex integral. Furthermore, considering uncertainties of nodal injection power including wind power and load, TSP is calculated analytically by Cornish-Fisher expansion, which can provide reliable evaluation results with high accuracy and much less computing time compared with Monte Carlo simulation. TSP and its visualization can further help operators and planners be aware of the degree of stability or instability and find critical components to monitor and reinforce. Test results on the New England 10-generators and 39-buses power system show the method's effectiveness and significance for probabilistic security assessment. 展开更多
关键词 transient stability probability double fed induction generator dynamic security region transient stability
原文传递
Route Guardian: Constructing Secure Routing Paths in Software-Defined Networking 被引量:2
11
作者 Mengmeng Wang Jianwei Liu +3 位作者 Jian Mao Haosu Cheng Jie Chen Chan Qi 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2017年第4期400-412,共13页
Software-Defined Networking(SDN) decouples the control plane and the data plane in network switches and routers, which enables the rapid innovation and optimization of routing and switching configurations. However,t... Software-Defined Networking(SDN) decouples the control plane and the data plane in network switches and routers, which enables the rapid innovation and optimization of routing and switching configurations. However,traditional routing mechanisms in SDN, based on the Dijkstra shortest path, do not take the capacity of nodes into account, which may lead to network congestion. Moreover, security resource utilization in SDN is inefficient and is not addressed by existing routing algorithms. In this paper, we propose Route Guardian, a reliable securityoriented SDN routing mechanism, which considers the capabilities of SDN switch nodes combined with a Network Security Virtualization framework. Our scheme employs the distributed network security devices effectively to ensure analysis of abnormal traffic and malicious node isolation. Furthermore, Route Guardian supports dynamic routing reconfiguration according to the latest network status. We prototyped Route Guardian and conducted theoretical analysis and performance evaluation. Our results demonstrate that this approach can effectively use the existing security devices and mechanisms in SDN. 展开更多
关键词 Software-Defined Networking(SDN) network security virtualization capacity-based routing security oriented routing dynamic routing reconfiguration
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部