Essays about: "differential protection"

Showing result 1 - 5 of 22 essays containing the words differential protection.

  1. 1. Line Distance Protection in Power Grids with Variable Renewable Energy Sources : An Investigation on Time Domain Distance Protection via Parameter Estimation

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ludvig Ringaby; [2023]
    Keywords : Distance protection; Power system protection; Time domain distance protection; Differential Equation Algorithm; Variable renewable energy; IBR; Distansskydd; Skyddssystem i elkraftsystem; Tidsdomän distansskydd; Differentialekvationsalgoritm; Variabel förnybar energi;

    Abstract : Variable renewable energy sources typically connect to the power grid through power electronic interfaces. Increased use of such sources can cause issues for conventional distance protection. READ MORE

  2. 2. Wide-Angle Radome Design for Low-Cost Additive Manufacturing

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Martin Fajerberg; Mattias Nylander; [2022]
    Keywords : Radar; Radome; A-Sandwich; B-Sandwich; Multilayer; Polarization; Angle of Incidence; Finite Element Method; Differential Evolution Optimization; Transmission Line Theory; Honeycomb; Additive Manufacturing; Electromagnetic Theory; Technology and Engineering;

    Abstract : The radome, a portmanteau of the words radar and dome, is a protective dielectric cover to protect a radar from its surrounding environment. The surrounding environment can be rain, wind, sand, dust and whatever else that might harm the radar. READ MORE

  3. 3. Privacy-aware data generation : Using generative adversarial networks and differential privacy

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Felix Hübinette; [2022]
    Keywords : GANS; DP; generative adversarial networks; differential privacy; data generation; privacy; security;

    Abstract : Today we are surrounded by IOT devices that constantly generate different kinds of data about its environment and its users. Much of this data could be useful for different research purposes and development, but a lot of this collected data is privacy-sensitive for the individual person. READ MORE

  4. 4. Transmission line protection performance in presence of power electronic-interfaced devices : Impact and needed countermeasures in the Swedish transmission system

    University essay from Uppsala universitet/Elektricitetslära

    Author : Hanna Olofsson; [2021]
    Keywords : ;

    Abstract : The penetration level of power electronic-interfaced devices (PEID:s) in power systems isincreasing, including wind- and solar power, HVDC and FACTS devices. Fault current injectedby PEID:s is lower in magnitude, may lack or contain a reduced negative sequence componentand can have a wide range of phase angles, as opposed to fault current supplied bysynchronous generators (SG:s). READ MORE

  5. 5. Designing a Physical Unclonable Function for Cryptographic Hardware

    University essay from Linköpings universitet/Institutionen för teknik och naturvetenskap; Linköpings universitet/Tekniska fakulteten

    Author : Ludwig Bergfalck; Johannes Engström; [2021]
    Keywords : Hardware-based keyseed; Tamper protection; Physical Unclonable Function PUF ; Sensing mesh enclosure; Differential capacitance measurements;

    Abstract : Hardware Security Modules (HSMs) are embedded systems that provide a physically secure data storage and handling environment. This master thesis evaluates an HSM method incorporating cryptographic key generation, key management, and tamper protection. READ MORE