The Data Acquisition in Smart Substation of China

نویسنده

  • Chen Fan
چکیده

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Smart Local Backup Protection for Smart Substation

Received Apr 11, 2017 Revised Apr 28, 2017 Accepted Jun 17, 2017 This paper presents a novel smart local backup protection SLBP used for the support and backup of the protective relays in a smart substation. The proposed SLBP is based on the IEC61850 standards and the concept consists of the acquisition of Generic Object Oriented Substation Event GOOSE used for tripping and interlocks exchange ...

متن کامل

From Data Mart to Information Smart : Substation Automated Analysis Implementation

The paper discusses substation IED data integration and its importance for implementation of automated analysis solutions. Recorded data collected from various substation IEDs is stored into a substation data mart that utilizes standardized file formats and a database interface. The data mart provides a foundation for multiple uses of substation data. Utilities are faced with a challenge of how...

متن کامل

Research on the Web-based On-line Monitoring Technology of the Smart Substation Primary Equipments

Smart substation primary equipment on-line monitoring technology is an important part of the realization of substation intelligentizes monitoring. In order to meet the requirements of smart substation on high-speed, efficient, steady on-line monitoring system, the sharing of online monitoring data of the power station and to improve interoperability of on-line monitoring device, the primary equ...

متن کامل

Substation Expansion Planning Based on BFOA

In recent years, significant research efforts have been devoted to the optimal planning of power systems. Substation Expansion Planning (SEP) as a sub-system of power system planning consists of finding the most economical solution with the optimal location and size of future substations and/or feeders to meet the future demand. The large number of design variables, and combination of discrete ...

متن کامل

یک سامانه مدیریت دسترسی برای کاهش تهدیدهای عملیاتی در سامانه اسکادا

One of the most dangerous insider threats in a supervisory control and data acquisition (SCADA) system is the operational threat. An operational threat occurs when an authorized operator misuses the permissions, and brings catastrophic damages by sending legitimate control commands. Providing too many permissions may backfire, when an operator wrongly or deliberately abuses the privileges. Ther...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017