• Title/Summary/Keyword: control & protection analysis

Search Result 602, Processing Time 0.03 seconds

A Safety Assessment Methodology for a Digital Reactor Protection System

  • Lee Dong-Young;Choi Jong-Gyun;Lyou Joon
    • International Journal of Control, Automation, and Systems
    • /
    • v.4 no.1
    • /
    • pp.105-112
    • /
    • 2006
  • The main function of a reactor protection system is to maintain the reactor core integrity and the reactor coolant system pressure boundary. Generally, the reactor protection system adopts the 2-out-of-m redundant architecture to assure a reliable operation. This paper describes the safety assessment of a digital reactor protection system using the fault tree analysis technique. The fault tree technique can be expressed in terms of combinations of the basic event failures such as the random hardware failures, common cause failures, operator errors, and the fault tolerance mechanisms implemented in the reactor protection system. In this paper, a prediction method of the hardware failure rate is suggested for a digital reactor protection system, and applied to the reactor protection system being developed in Korea to identify design weak points from a safety point of view.

EMTDC Model Development for Control & Protection Analysis of Co-Generation System based on On-site Characteristic Tests (현장 측정에 근거한 열병합 발전 시스템의 제어, 보호 해석용 EMTDC 모델 수립)

  • Kim, Hak-Man;Shin, Myong-Chul
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.20 no.5
    • /
    • pp.85-91
    • /
    • 2006
  • Co-generation systems have been spreading rapidly over the past 10 years in Korea and most of these systems are interconnected with electric power systems. However, better control and protection models are still needed for analysis of these systems to ensure stable operation with the grid. This paper proposes improved EMTDC models for control fad protection analysis of grid-connected co-generation systems. Through on-site characteristic testing, the models were developed and the model parameters were determined. The models were applied to a field co-generation system, and analysis of control and protection was performed showing a good match to the simulation results.

Hybrid Control and Protection Scheme for Inverter Dominated Microgrids

  • Xu, Xiaotong;Wen, Huiqing;Jiang, Lin;Hu, Yihua
    • Journal of Power Electronics
    • /
    • v.17 no.3
    • /
    • pp.744-755
    • /
    • 2017
  • With the high penetration of various sustainable energy sources, the control and protection of Microgrids has become a challenging problem considering the inherent current limitation feature of inverter-based Distributed Generators (DGs) and the bidirectional power flow in Microgrids. In this paper, a hybrid control and protection scheme is proposed, which combines the traditional inverse-time overcurrent protection with the biased differential protection for different feeders with different kinds of loads. It naturally accommodates various control strategies such as P-Q control and V-f control. The parameter settings of the protection scheme are analyzed and calculated through a fast Fourier transform algorithm, and the stability of the control strategy is discussed by building a small signal model in MATLAB. Different operation modes such as the grid-connected mode, the islanding mode, and the transitions between these two modes are ensured. A Microgrid model is established in PSCAD and the analysis results show that a Microgrid system can be effectively protected against different faults such as the single phase to ground and the three phase faults in both the grid-connected and islanded operation modes.

A Study on Improvement of Personal Information Protection Control Log Quality: A Case of the Health and Welfare Division (개인정보통합관제 로그품질 분석 및 개선에 관한 연구: 보건복지 분야 사례를 중심으로)

  • Lee, Yari;Hong, Kyong Pyo;Kim, Jung Sook
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.1
    • /
    • pp.42-51
    • /
    • 2015
  • In this paper, we analyze the quality status of Health and Welfare division's standardized log and asses the characteristics of the institutions' logs analysis to establish the criteria to minimize hazards and control the quality of log's institutional details to limit extraction. As a result, extraction condition's proposed development direction to adequately assess and control health and welfare abuses privacy control target log. This improvement over the status and quality of information shared with relation to institutional work of the log quality characteristics is made possible. In addition, quality control and inspection standards were prepared in accordance with the institutional log characteristics. Future research will include performing continuous analysis and improvement activities on the quality of logs with integrated control of sharing personal information and distributing information about logs' quality to proactively target organ. Therefore, we expect that correcting proactive personal information misuse and leakage is possible to achieve.

A study on the wave control function of ecosystem control structures (생태계제어 구조물의 파랑제어 효과에 관한 연구)

  • 김현주;류청로;손원식
    • Journal of Ocean Engineering and Technology
    • /
    • v.10 no.4
    • /
    • pp.149-159
    • /
    • 1996
  • Multipurpose development of the coast and ocean can be considered as multifunction construction combining the functions of coastal protection, waterfront amenity and creation or rehabilitation of habitats. Multfunction development of coastal and ocean spaces can be accomplished by applying the ecosystem control structure of artificial habitats which will cultivate fishing ground with ecological harmony to the coastal protection system. To evaluate the applicability of ecosystem control structures as as fundamental coastal protection structure, wave control function of the structure is studied by numerical and physical analyses. Dimensional analysis and hydraulic experiment point out the importance of width and crest depth of ecosystem control structure, construction water depth and wave steepness. Wave control efficiency is estimated by the attenuation coefficient $(K_H)$ according to wave steepness $(H_0/L_0)$, relative constructed water depth $(h_i/H_0)$, relative berm width $(B/L_0)$ and relative crest depth $(h_B/H_0)$ of eosystem control structure. Empirical fomulas are suggested based on the results of model test by applying the multiple model based on this experimental results and numerical wave shoaling-dissipation-breaking model appears to be valid for the analysis of wave transformation around ecosystem control structure in the coastal waters.

  • PDF

An Analysis Measure for Cybersecurity linked Threat against Diverse Protection Systems (다양성보호계통 사이버보안 연계 위협 분석 방안)

  • Jung, Sungmin;Kim, Taekyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.17 no.1
    • /
    • pp.35-44
    • /
    • 2021
  • With the development of information technology, the cybersecurity threat continues as digital-related technologies are applied to the instrumentation and control system of nuclear power plants. The malfunction of the instrumentation and control system can cause economic damage due to shutdown, and furthermore, it can lead to national disasters such as radioactive emissions, so countering cybersecurity threats is an important issue. In general, the study of cybersecurity in instrumentation and control systems is concentrated on safety systems, and diverse protection systems perform protection and reactor shutdown functions, leading to reactor shutdown or, in the worst case, non-stop situations. To accurately analyze cyber threats in the diverse protection system, its linked facilities should be analyzed together. Risk analysis should be conducted by analyzing the potential impact of inter-facility cyberattacks on related facilities and the impact of cybersecurity on each configuration module of the diverse protection system. In this paper, we analyze the linkage of the diverse protection system and discuss the cybersecurity linkage threat by analyzing the availability of equipment, the cyber threat impact of the linked equipment, and the configuration module's cybersecurity vulnerability.

A Study on the Design of the Bay Controller for Generator Protection and Control (발전기 보호제어를 위한 Bay Controller 설계에 관한 연구)

  • Jang, Nak-Won;Woo, Chun-Hee;Lee, Sung-Hwan
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.57 no.1
    • /
    • pp.46-55
    • /
    • 2008
  • In this paper, we designed the bay control unit that is based on the microprocessors and integrates with the new technology of electrical, electronic, and mechanical fields. Nowadays the customers have required much more integrated multi-protection relay, monitoring, control devices and power management for better and easier maintenance, performance, electrical system analysis and communication according to new trend of switchboard This bay controller supplies those requirements of customers with easy handling and operation. This bay controller provides a graphic display with rear-lit liquid crystal LCD and push buttons as kinds of HMI(Human Machine Interface). This bay controller provides the parameter setting program, control setting program, various editors and fault recording and analysis program on Windows/95/98/NT/2000/XP for HMI. In addition, this bay controller can be set manually and this manual setting function helps user to interface easily.

Power system protection IED design using an embedded processor (임베디드 프로세서를 이용한 계통 보호 IED 설계)

  • Yoon, Ki-Don;Son, Young-Ik;Kim, Kab-Il
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.711-713
    • /
    • 2004
  • In the past time, the protection relay did only a protection function. Currently, its upgraded device i.e. IED(Intelligent Electric Device) has been designed to protect, control, and monitor the whole power system automatically. Also the device is desired to successfully measure important elements of the power system. This paper considers design method of a digital protection IED with a function of measuring various elements and a communication function. The protection IED is composed of the specific function modules that are signal process module, communication module, input/output module and main control module. A signal process module use a DSP processor for analysis of input signal. Main control module use a embedded processor, Xscale, that has an ARM Core. The communication protocol uses IEC61850 protocol that becomes standard in the future. The protection IED is able to process mass information with high-performance processor. As each function module is designed individually, the reliability of the device can be enhanced.

  • PDF

A Comparison of Restoration Schemes in Multiprotocol Label Switching Networks (MPLS망의 보호 복구 기술의 비교)

  • 오승훈;김영한
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.4C
    • /
    • pp.316-325
    • /
    • 2002
  • This paper investigates the restoration schemes which are applied to the MPLS domain upon a network failure. We define the following three restoration service models by combining the various restoration schemes: "FIS-based protection service" (FIS: failure indication signal), "inversion traffic protection service" and "1+1 protection service". After a qualitative analysis of the performance in them, we have analyzed it on quantitative basis by the simulation. According to the simulation results, "1+1 protection service" guarantees the fastest and most lossless restoration service among them; however, it results in consuming considerable bandwidth and producing an amount of control traffic, which means poor network utilization. On the other hand, "FIS-based protection service" spends less bandwidth and generates less control traffic, which means better network utilization, but produces poor restoration service. "Inversion traffic protection service" provides the medium restoration service and utilization between "1+1 protection service" and "FIS-based protection service."

Design of A Downlink Power Control Scheme in Unequal Error Protection Multi-Code CDMA Mobile Medicine System

  • Lin, Chin-Feng;Lee, Hsin-Wang;Hung, Shih-Ii;Li, Ching-Yi
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.335-338
    • /
    • 2005
  • In this paper, we propose a downlink power control scheme to apply in the unequal error protection multi-code CDMA mobile medicine system. The mobile medicine system contains (i) blood pressure and body temperature measurement value, (ii) ECG medical signals measured by the electrocardiogram device, (iii) mobile patient's history, (iv) G.729 audio signal, MPEG-4 CCD sensor video signal, and JPEG2000 medical image. By the help of the multi-code CDMA spread spectrum communication system with downlink power control scheme and unequal error protection strategy, it is possible to transmit mobile medicine media and meet the quality of service. Numerical analysis and simulation results show that the system is a well transmission platform in mobile medicine.

  • PDF