Calculation Scheme of Transformer Saturated Inductances based on Field Test Data
نویسندگان
چکیده
منابع مشابه
Protection Scheme of Power Transformer Based on Time–Frequency Analysis and KSIR-SSVM
The aim of this paper is to extend a hybrid protection plan for Power Transformer (PT) based on MRA-KSIR-SSVM. This paper offers a new scheme for protection of power transformers to distinguish internal faults from inrush currents. Some significant characteristics of differential currents in the real PT operating circumstances are extracted. In this paper, Multi Resolution Analysis (MRA) is use...
متن کاملPower-frequency magnetic field calculation around an indoor transformer substation
The authors propose a full three-dimensional (3D) calculation model based on a multipole technique able to predict the magnetic field pollution outside of indoor medium voltage/low voltage (MV/LV) transformer substations. The authors demonstrate that the proposed model may be advantageously used in all problems related to the characterization of the electromagnetic environment around a MV/LV tr...
متن کاملfabrication of new ion sensitive field effect transistors (isfet) based on modification of junction-fet for analysis of hydronium, potassium and hydrazinium ions
a novel and ultra low cost isfet electrode and measurement system was designed for isfet application and detection of hydronium, hydrazinium and potassium ions. also, a measuring setup containing appropriate circuits, suitable analyzer (advantech board), de noise reduction elements, cooling system and pc was used for controlling the isfet electrode and various characteristic measurements. the t...
protection scheme of power transformer based on time–frequency analysis and ksir-ssvm
the aim of this paper is to extend a hybrid protection plan for power transformer (pt) based on mra-ksir-ssvm. this paper offers a new scheme for protection of power transformers to distinguish internal faults from inrush currents. some significant characteristics of differential currents in the real pt operating circumstances are extracted. in this paper, multi resolution analysis (mra) is use...
متن کاملstudy of hash functions based on chaotic maps
توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...
ذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEJ Transactions on Power and Energy
سال: 2007
ISSN: 0385-4213,1348-8147
DOI: 10.1541/ieejpes.127.121