5,716 research outputs found
Power quality and electromagnetic compatibility: special report, session 2
The scope of Session 2 (S2) has been defined as follows by the Session Advisory Group and the Technical Committee: Power Quality (PQ), with the more general concept of electromagnetic compatibility (EMC) and with some related safety problems in electricity distribution systems.
Special focus is put on voltage continuity (supply reliability, problem of outages) and voltage quality (voltage level, flicker, unbalance, harmonics). This session will also look at electromagnetic compatibility (mains frequency to 150 kHz), electromagnetic interferences and electric and magnetic fields issues. Also addressed in this session are electrical safety and immunity concerns (lightning issues, step, touch and transferred voltages).
The aim of this special report is to present a synthesis of the present concerns in PQ&EMC, based on all selected papers of session 2 and related papers from other sessions, (152 papers in total). The report is divided in the following 4 blocks:
Block 1: Electric and Magnetic Fields, EMC, Earthing systems
Block 2: Harmonics
Block 3: Voltage Variation
Block 4: Power Quality Monitoring
Two Round Tables will be organised:
- Power quality and EMC in the Future Grid (CIGRE/CIRED WG C4.24, RT 13)
- Reliability Benchmarking - why we should do it? What should be done in future? (RT 15
Incremental learning for large-scale stream data and its application to cybersecurity
As many human currently depend on technologies to assist with daily tasks,
there are more and more applications which have been developed to be fit in one
small gadget such as smart phone and tablet. Thus, by carrying this small gadget
alone, most of our tasks are able to be settled efficiently and fast. Until the end
of 20th century, mobile phones are only used to call and to send short message
service (sms). However, in early 21st century, a rapid revolution of communiïżœcation technology from mobile phone into smart phone has been seen in which
the smart phone is equipped by 4G Internet line along with the telephone service
provider line. Thus, the users are able to make a phone call, send messages using
variety of application such as Whatsapp and Line, send email, serving websites,
accessing maps and handling some daily tasks via online using online banking,
online shopping and online meetings via video conferences. In previous years, if
there are cases of missing children or missing cars, the victims would rely on the
police investigation. But now, as easy as uploading a notification about the loss
on Facebook and spread the news among Facebook users, there are more people
are able to help in the search. Despite the advantages that can be obtained using
these technologies, there are a group of irresponsible people who take advanïżœtage of current technologies for their own self-interest. Among the applications
that are usually being used by almost Internet users and also are often misused
by cyber criminals are email and websites. Therefore, we take this initiative to
make enhancement in cyber security application to avoid the Internet users from
being trapped and deceived by the trick of cyber criminals by developing detecïżœtion system of malicious spam email and Distributed Denial of Services (DDoS) 377.1781.8781$0,1$+
iii
backscatter.
Imagine that a notice with a logo of Mobile Phone company is received by
an email informing that the customer had recently run up a large mobile phone
bill. A link regarding the bill is attached for him/her to find out the details.
Since, the customer thinks that the billing might be wrong, thus the link is
clicked. However, the link is directed to a webpage which displays a status that
currently the webpage is under construction. Then the customer closes the page
and thinking of to visit the website again at other time. Unfortunately, after
a single click actually a malicious file is downloaded and installed without the
customer aware of it. That malicious file most probably is a Trojan that capable
to steal confidential information from victimâs computer. On the next day, when
the same person is using the same computer to log in the online banking, all
of a sudden find out that his/her money is lost totally. This is one of a worst
case scenario of malicious spam email which is usually handled by cybersecurity
field. Another different case of cybersecurity is the Distributed Denial of Services
(DDoS) attack. Let say, Company X is selling flowers via online in which the
market is from the local and international customer. The online business of
Company X is running normally as usual, until a day before motherâs day, the
webpage of Company X is totally down and the prospective customers could not
open the webpage to make order to be sent specially for their beloved mother.
Thus, the customers would search another company that sells the same item. The
Company X server is down, most probably because of the DDoS attack where a
junk traffic is sent to that company server which makes that server could not
serve the request by the legitimate customers. This attack effect not only the
profit of the company, but also reputation damage, regular customer turnover
and productivity decline.
Unfortunately, it is difficult for a normal user like us to detect malicious spam 377$
3(53867$.1781.8781+
email or DDoS attack with naked eyes. It is because recently the spammers
and attacker had improved their strategy so that the malicious email and the
DDoS packets are hardly able to be differentiated with the normal email and
data packets. Once the Social Engineering is used by the spammers to create
relevant email content in the malicious spam email and when a new campaign
of DDoS attack is launched by the attacker, no normal users are capable to
distinguish the benign and malicious email or data packets. This is where my
Ph.D project comes in handy. My Ph.d is focusing on constructing a detection
system of malicious spam email and DDoS attack using a large number of dataset
which are obtained by a server that collect double-bounce email and darknet for
malicious spam email detection system and DDoS backscatter detection system,
respectively. As many up-to-date data are used during the learning, the detection
system would become more robust to the latest strategy of the cybercriminal.
Therefore, the scenario mentioned above can be avoided by assisting the user
with important information at the user-end such as malicious spam email filter
or at the server firewall. First of all, the method to learn large-scale stream
data must be solved before implementing it in the detection system. Therefore,
in Chapter 2, the general learning strategy of large-scale data is introduced to
be used in the cybersecurity applications which are discussed in Chapter 3 and
Chapter 4, respectively.
One of a critical criterion of the detection system is capable to learn fast because
after the learning, the updated information needs to be passed to user to avoid
the user from being deceived by the cybercriminal. To process large-scale data
sequences, it is important to choose a suitable learning algorithm that is capable
to learn in real time. Incremental learning has an ability to process large data
in chunk and update the parameters after learning each chunk. Such type of
learning keep and update only the minimum information on a classifier model. 377.1781.8781$0,1$+
Therefore, it requires relatively small memory and short learning time. On the
other hand, batch learning is not suitable because it needs to store all training
data, which consume a large memory capacity. Due to the limited memory, it is
certainly impossible to process online large-scale data sequences using the batch
learning. Therefore, the learning of large-scale stream data should be conducted
incrementally.
This dissertation contains of five chapters. In Chapter 1, the concept of inïżœcremental learning is briefly described and basic theories on Resource Allocating
Network (RAN) and conventional data selection method are discussed in this
chapter. Besides that, the overview of this dissertation is also elaborated in this
chapter. In Chapter 2, we propose a new algorithm based on incremental Radial
Basis Function Network (RBFN) to accelerate the learning in stream data. The
data sequences are represented as a large chunk size of data given continuously
within a short time. In order to learn such data, the learning should be carried
out incrementally. Since it is certainly impossible to learn all data in a short peïżœriod, selecting essential data from a given chunk can shorten the learning time. In
our method, we select data that are located in untrained or ânot well-learnedâ
region and discard data at trained or âwell-learnedâ region. These regions are
represented by margin flag. Each region is consisted of similar data which are
near to each other. To search the similar data, the well-known LSH method proïżœposed by Andoni et al. is used. The LSH method indeed has proven be able to
quickly find similar objects in a large database. Moreover, we utilize the LSH ÊŒs
properties; hash value and Hash Table to further reduced the processing time. A
flag as a criterion to decide whether to choose or not the training data is added in
the Hash Table and is updated in each chunk sequence. Whereas, the hash value
of RBF bases that is identical with the hash value of the training data is used to
select the RBF bases that is near to the training data. The performance results of 377$
3(53867$.1781.8781+
vi
the numerical simulation on nine UC Irvine (UCI) Machine Learning Repository
datasets indicate that the proposed method can reduce the learning time, while
keeping the similar accuracy rate to the conventional method. These results indiïżœcate that the proposed method can improve the RAN learning algorithm towards
the large-scale stream data processing.
In Chapter 3, we propose a new online system to detect malicious spam emails
and to adapt to the changes of malicious URLs in the body of spam emails by
updating the system daily. For this purpose, we develop an autonomous system
that learns from double-bounce emails collected at a mail server. To adapt to new
malicious campaigns, only new types of spam emails are learned by introducing an
active learning scheme into a classifier model. Here, we adopt Resource Allocating
Network with Locality Sensitive Hashing (RAN-LSH) as a classifier model with
data selection. In this data selection, the same or similar spam emails that
have already been learned are quickly searched for a hash table using Locally
Sensitive Hashing, and such spam emails are discarded without learning. On
the other hand, malicious spam emails are sometimes drastically changed along
with a new arrival of malicious campaign. In this case, it is not appropriate to
classify such spam emails into malicious or benign by a classifier. It should be
analyzed by using a more reliable method such as a malware analyzer. In order
to find new types of spam emails, an outlier detection mechanism is implemented
in RAN-LSH. To analyze email contents, we adopt the Bag-of-Words (BoW)
approach and generate feature vectors whose attributes are transformed based
on the normalized term frequency-inverse document frequency. To evaluate the
developed system, we use a dataset of double-bounce spam emails which are
collected from March 1, 2013 to May 10, 2013. In the experiment, we study the
effect of introducing the outlier detection in RAN-LSH. As a result, by introducing
the outlier detection, we confirm that the detection accuracy is enhanced on 377.1781.8781+
average over the testing period.
In Chapter 4, we propose a fast Distributed Denial of Service (DDoS) backscatïżœter detection system to detect DDoS backscatter from a combination of protocols
and ports other than the following two labeled packets: Transmission Control
Protocol (TCP) Port 80 (80/TCP) and User datagram Protocol (UDP) Port 53
(53/UDP). Usually, it is hard to detect DDoS backscatter from the unlabeled
packets, where an expert is needed to analyze every packet manually. Since it
is a costly approach, we propose a detection system using Resource Allocating
Network (RAN) with data selection to select essential data. Using this method,
the learning time is shorten, and thus, the DDoS backscatter can be detected
fast. This detection system consists of two modules which are pre-processing
and classifier. With the former module, the packets information are transformed
into 17 feature-vectors. With the latter module, the RAN-LSH classifier is used,
where only data located at untrained region are selected. The performance of the
proposed detection system is evaluated using 9,968 training data from 80/TCP
and 53/UDP, whereas 5,933 test data are from unlabeled packets which are colïżœlected from January 1st, 2013 until January 20th, 2014 at National Institute of
Information and Communications Technology (NICT), Japan. The results indiïżœcate that detection system can detect the DDoS backscatter from both labeled
and unlabeled packets with high recall and precision rate within a short time.
Finally, in Chapter 5, we discussed the conclusions and the future work of our
study: RAN-LSH classifier, malicious spam email detection system and DDoS
backscatter detection system
Service continuity in complex power systems: safety, operation and maintenance
The research aims to define electrical architectures based on the rationalization of the distribution structure and of power sources with the achievement of the primary objectives of service continuity, power quality, safety and safe maintenance.
The thesis consists of two parts: the first part deals with the architecture impact on a complex system analyzing the system configuration and operational safety aspects. New developments and methodologies are presented in the study of critical systems. A theory of complex systems for safety, operation and maintenance aspects is defined that enables to assist the management of the system throughout its whole life cycle and allows an implementation of programming languages.
The second part refers to specific issues of mission critical power systems, data centers and hospitals especially. Several measurements were performed in laboratory and on field to analyze sneaky critical cases for the service continuity and the integrity of these strategic power systems.The research aims to define electrical architectures based on the rationalization of the distribution structure and of power sources with the achievement of the primary objectives of service continuity, power quality, safety and safe maintenance. The thesis consists of two parts: the first part deals with the architecture impact on a complex system analyzing the system configuration and operational safety aspects. New developments and methodologies are presented in the study of critical systems. A theory of complex systems for safety, operation and maintenance aspects is defined that enables to assist the management of the system throughout its whole life cycle and allows an implementation of programming languages. The second part refers to specific issues of mission critical power systems, data centers and hospitals especially. Several measurements were performed in laboratory and on field to analyze sneaky critical cases for the service continuity and the integrity of these strategic power systems
Recommended from our members
High frequency link Uninterruptible Power Supply (UPS) system
This thesis was submitted for the degree of Master of Philosophy and awarded by Brunel University.The main aim of this thesis is to propose, design, simulate and build a new UPS system which can be used for compact applications. The idea of the proposed system is to operate the transformers within the UPS at high frequency so that the size and the weight are kept to minimum. In order to achieve this aim, the transformer within the UPS system is operated at high frequency; however it also carries two 50 Hz waveforms at 180 phase shift so that the transformer does not see this 50 Hz frequency. A cycloconverter is then used to reconstruct the 50 Hz waveform for the UPS output.
The UPS system is simulated using PSPICE software at high frequency link of 500 Hz, 1 kHz, 5 kHz and 10 kHz. The simulation results show that the transformer only passes the high frequency component while the 50 Hz frequency is âhiddenâ within the transformer. The proposed UPS system is then built using MOSFETs IRF740 as the main switches for the inverter and cycloconverter circuits. A Chipkit-uno32-development-board is used to control the MOSFET switches. Simulated and practical results show the viability of the proposed UPS system.This study is funded by Dubai Aluminium
Multi phase system for metal disc induction heating: modelling and RMS current control
This paper presents a multi phase induction system modelling for a metal disc heating and further industrial applications such as hot strip mill. An original architecture, with three concentric inductors supplied by three resonant current inverters leads to a reduced element system, without any coupling transformers, phase loop, mobile screens or mobile magnetic cores as it could be found in classical solutions. A simulation model is built, based on simplified equivalent models of electric and thermal phenomena. It takes into account data extracted from Flux2DÂź finite element software, concerning the energy transfer between the inductor currents and the piece to be heated. It is implemented in a versatile software PSim, initially dedicated to power electronic. An optimization procedure calculates the optimal supply currents in the inverters in order to obtain a desired power density profile in the work piece. The paper deals with The simulated and experimental results are compared in open-loop and closed loop. The paper ends with a current control method which sets RMS inductor currents in continuous and digital conditions
Rural Facility Electric Power Quality Enhancement
Electric power disturbances are known to be more prevalent in small, isolated power systems than in larger interconnected grids which service most of the United States. This fact has given rise to a growing concern about the relative merits of different types of power conditioning equipment and their effectiveness in protecting sensitive electronics and essential loads in rural Alaska.
A study has been conducted which compares isolation transformers, voltage regulators, power conditioners, uninterruptible power supplies and indoor computer surge suppressors in their ability to suppress the various disturbances which have been measured in several Alaskan communities. These include voltage sags and surges, impulses, blackouts, frequency variations and long-term voltage abnormalities. In addition, the devices were also subjected to fast, high-magnitude impulses such as might be expected in the event of a lightning strike to or near utility distribution equipment.
The solutions for power line problems will vary for different load applications and for different rural electrical environments. The information presented in this report should prove to be valuable in making the analysis.List of Figures - viii
List of Tables - xiv
Acknowledgements - xv
Chapter 1: Electric Disturbances in Power Systems
Introduction - 16
Categorizing Electrical Disturbances - 17
Voltage Disturbances and Transients - 19
Frequency Disturbances - 22
Sources of Transients - 22
Lightning and EMP - 23
Switching - 24
Power System Noise - 25
Common Mode and Normal Mode Noise Signals - 26
Chapter 2: Power Quality in Rural Alaska
Characterizing the Village Power System - 28
The Village Electric Load - 29
Power Quality Site Surveys - 30
Rural Power Quality in Alaska - 31
Power Conditioning Requirements for Village Loads - 37
Chapter 3: Isolation, Voltage Regulation and Power Conditioning
Introduction - 39
Slow Voltage Fluctuations - 39
Voltage Regulation and Power Conditioning - 40
Ferroresonant Transformers - 40
Electronic Tap-Changing Regulators - 44
Isolation Transformers - 47
Dedicated Lines - 51
Chapter 4: Impulse Suppression
Introduction - 52
Surge Suppressors - 52
Surge Suppressor Components - 55
Component Configuration - 58
EMI/RFI Filters - 58
Standard Tests for Evaluating Surge Suppressor Performance - 60
Scope of Impulse Testing for Rural Alaska - 60
Impulse Test Equipment - 62
Test Procedure - 62
Impulse Testing Measurements - 63
Test Results - 64
Chapter 5: Uninterruptible Power Supplies
The True UPS - 68
Standby Power Systems and a New Generation of UPS - 69
UPS Backup Time - 74
UPS Testing - 74
Chapter 6: Computers and Power Problems
Introduction - 78
The Computer Tolerance Envelope - 78
Ridethrough - 80
Component Degradation and Equipment Failure - 82
Computer Power Supplies - 82
Linear Power Supplies - 83
Switching Power Supplies - 84
PC Tolerance of Powerline Disturbances - 84
Chapter 7: Comparing Power Conditioning Alternatives
Voltage Regulation - 89
Isolation - 93
Uninterruptible Power Systems - 94
Computer Surge Suppressors - 98
Summary - 98
Appendices
Appendix A: Voltage Clamping Levels of Surge Suppressors - 101
Appendix B: Voltage Clamping Levels of Power Conditioners and Uninterruptible Power Systems - 115
Appendix C: Noise Suppression of Surge Suppressors and Power Conditioners - 129
Appendix D: Waveforms and Regulating Characteristics of Power Conditioners and Uninterruptible Power Systems - 135
Appendix E: Comparison of Voltage Clamping Levels of Surge Suppressors Power Conditioners, Isolation Transformers and Uninterruptible Power Systems to High-Magnitude Impulse Voltages - 151
References - 16
Optimised design of isolated industrial power systems and system harmonics
This work has focused on understanding the nature and impact of non-linear loads on isolated industrial power systems. The work was carried out over a period of 8 years on various industrial power systems: off-shore oil and gas facilities including an FPSO, a wellhead platform, gas production platforms, a mineral processing plant and an LNG plant. The observations regarding non-linear loads and electrical engineering work carried out on these facilities were incorporated into the report.A significant literature describing non-linear loads and system harmonics on industrial power systems was collected and reviewed. The literature was classified into five categories: industrial plants and system harmonics, non-linear loads as the source of current harmonics, practical issues with system harmonics, harmonic mitigation strategies and harmonic measurements.Off-shore oil and gas production facilities consist of a small compact power system. The power system incorporates either its own power generation or is supplied via subsea cable from a remote node. Voltage selection analysis and voltage drop calculation using commercially available power system analysis software are appropriate tools to analyse these systems. Non-linear loads comprise DC rectifiers, variable speed drives, UPS systems and thyristor controlled process heaters. All nonlinear loads produce characteristic and non-characteristic harmonics, while thyristor controlled process heaters generate inter-harmonics. Due to remote location, harmonic survey is not a common design practice. Harmonic current measurements during factory acceptance tests do not provide reliable information for accurate power system analysis.A typical mineral processing plant, located in a remote area includes its own power station. The power generation capacity of those systems is an order of magnitude higher than the power generation of a typical off-shore production facility. Those systems comprise large non-linear loads generating current and voltage interharmonics. Harmonic measurements and harmonic survey will provide a full picture of system harmonics on mineral processing plants which is the only practical way to determine system harmonics. Harmonic measurements on gearless mill drive at the factory are not possible as the GMD is assembled for the first time on site.LNG plants comprise large non-linear loads driving gas compressor, however those loads produce integer harmonics. Design by analysis process is an alternative to the current design process based on load lists. Harmonic measurements and harmonic survey provide a reliable method for determining power system harmonics in an industrial power system
A review on power electronics technologies for power quality improvement
Nowadays, new challenges arise relating to the compensation of power quality problems, where the introduction of innovative solutions based on power electronics is of paramount importance. The evolution from conventional electrical power grids to smart grids requires the use of a large number of power electronics converters, indispensable for the integration of key technologies, such as renewable energies, electric mobility and energy storage systems, which adds importance to power quality issues. Addressing these topics, this paper presents an extensive review on power electronics technologies applied to power quality improvement, highlighting, and explaining the main phenomena associated with the occurrence of power quality problems in smart grids, their cause and effects for different activity sectors, and the main power electronics topologies for each technological solution. More specifically, the paper presents a review and classification of the main power quality problems and the respective context with the standards, a review of power quality problems related to the power production from renewables, the contextualization with solid-state transformers, electric mobility and electrical railway systems, a review of power electronics solutions to compensate the main power quality problems, as well as power electronics solutions to guarantee high levels of power quality. Relevant experimental results and exemplificative developed power electronics prototypes are also presented throughout the paper.This work has been supported by FCT-Fundação para a CiĂȘncia e Tecnologia within
the R&D Units Project Scope: UIDB/00319/2020. This work has been supported by the FCT
Project DAIPESEV PTDC/EEI-EEE/30382/2017 and by the FCT Project newERA4GRIDs PTDC/EEIEEE/30283/2017
- âŠ