Results 51 to 60 of about 6,331 (209)

Demonstration of adaptive overcurrent protection using IEC 61850 communications [PDF]

open access: yes, 2013
This paper contains a description of an adaptive protection scheme that has been implemented and demonstrated in a hardware in the loop simulation environment using commercially available protection hardware and IEC 61850 communications.The ...
Blair, Steven Macpherson   +4 more
core  

Review of Multi‐Energy Coupling and Resilience Control in Cyber Physical Energy Systems Under Extreme Disasters

open access: yesEnergy Internet, Volume 2, Issue 4, Page 297-312, December 2025.
ABSTRACT Extreme disasters, including both natural hazards and malicious intrusions, pose severe risks to cyber‐physical energy systems (CPES). Due to tight coupling, their impacts are amplified by physical destruction, cyber degradation, multi‐energy interdependencies and human behaviour.
Yijia Cao   +5 more
wiley   +1 more source

Protection of AC and DC Microgrids: Challenges, Solutions and Future Trends [PDF]

open access: yes, 2015
In future, distributed energy resources (RESs) will be utilized at consumption points. As a consequence, power flow and fault current would be bidirectional and topologydependent; and hence the conventional protection strategies would be inefficient ...
Beheshtaein, Siavash   +3 more
core   +2 more sources

A Visualization Verification Method for Startup Risk of Substation Equipment Based on Multidimensional Graph Models

open access: yesEngineering Reports, Volume 7, Issue 11, November 2025.
Based on a multi‐dimensional diagram model, a technique for visual verification of the risk of starting substation equipment is studied. This method can effectively and precisely verify the possible risks during the substation equipment startup and enhance the power system's operational safety.
Lifan Mao   +4 more
wiley   +1 more source

Protection Debugging of Digitized Substation Based on IEC 61850

open access: yesGong-kuang zidonghua, 2010
The paper introduced main characteristics of digitized substation based on IEC 61850 and some changs of protection debugging for substation caused by application of IEC 61850 standard, discussed methods of protection debugging of digitized substation ...
YANG Mei   +3 more
doaj  

IEC 61850 modeling of an AGC dispatching scheme for mitigation of short-term power flow variations

open access: yesEnergy Reports, 2022
High penetration of renewable energy-based generators increases variability in power systems. To prevent transmission lines from overloading due to such variations, advanced power flow management system should be developed.
Taha Selim Ustun   +3 more
doaj   +1 more source

IEC 61850 and Measurements

open access: yesElektronika ir Elektrotechnika, 2011
The technical solutions based on the standard of International Electrotechnical Commission (TC57) 61850 are changing the traditional imagination of principles for relay protection, local and remote supervision, measuring system, ancillary services etc. in substation.
openaire   +1 more source

A Modular Dynamic Probabilistic Risk Assessment Framework for Electric Grid Cybersecurity

open access: yesEngineering Reports, Volume 7, Issue 10, October 2025.
This paper presents a modular framework designed for dynamic probabilistic risk assessment of electric grid systems facing cybersecurity threats. The functionality and efficacy of the framework have been demonstrated using an IEEE 14‐bus system in a case study.
Xiaoxu Diao   +6 more
wiley   +1 more source

IEC 61850-based WLAN peer-to-peer feeder protection improvement in smart grid substation automation system [PDF]

open access: yes, 2015
The development of a computational platform of a communication network for an automation system using the precepts of IEC 61850 has become a great trend in substation automation systems (SASs) research.
Ali, Nasser Hasan   +4 more
core  

SCEN‐SCADA Security: An Enhanced Osprey Optimization‐Based Cyber Attack Detection Model in Supervisory Control and Data Acquisition System Using Serial Cascaded Ensemble Network

open access: yesOptimal Control Applications and Methods, Volume 46, Issue 5, Page 2178-2199, September/October 2025.
An efficient and accurate cyber attack detection approach with less computational overhead is still a crucial research problem in SCADA. So, a novel and secure model for cyber attack detection in the SCADA system using advanced deep learning techniques together with the heuristic algorithm is executed in this research work. The weighted optimal feature
Fatimah Yaseen Hashim Alzubaidi   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy