Results 71 to 80 of about 8,871 (271)

Ground Fault Location and Severity Estimation Method for DC/DC Converters

open access: yesIET Power Electronics, Volume 19, Issue 1, January/December 2026.
A method for detection, location and severity estimation of ground faults for DC/DC converters has been designed. The method consists in analysing the voltage signal of a grounding resistor that connects the neutral point of the system—which can be the AC neutral point of the star of the main power transformer or an artificial DC midpoint—and ground ...
Aitor Blázquez‐Campanon   +5 more
wiley   +1 more source

Transformer load tap changer control using IEC 61850 GOOSE messaging [PDF]

open access: yes, 2012
The research of this thesis implements Load Tap Changer (LTC) control using the International Electrotechnical Commission (IEC) 61850 standard in a laboratory environment.
Sichwart, Nelli
core   +1 more source

Comprehensive Study of DC Microgrids Protection: Challenges, Cutting‐Edge Techniques, Machine‐Learning‐Driven Solutions

open access: yesIET Renewable Power Generation, Volume 20, Issue 1, January/December 2026.
ABSTRACT This paper provides a comprehensive examination of the evolving protection challenges within DC microgrids powered by renewable resources and energy storage systems. It begins by delineating the methodological framework of conventional protection, critically assessing schemes based on current, voltage, and impedance to expose their limitations
Mohamed Elmadawy   +7 more
wiley   +1 more source

Protection of AC and DC Microgrids: Challenges, Solutions and Future Trends [PDF]

open access: yes, 2015
In future, distributed energy resources (RESs) will be utilized at consumption points. As a consequence, power flow and fault current would be bidirectional and topologydependent; and hence the conventional protection strategies would be inefficient ...
Beheshtaein, Siavash   +3 more
core   +2 more sources

Digital Transformation of Energy Systems: Technologies, Data, Governance and Cyber Security

open access: yesIET Smart Grid, Volume 9, Issue 1, January/December 2026.
A comprehensive review of the digital transformation of modern energy systems through the integration of technologies such as the Internet of Things (IoT), artificial intelligence (AI) and digital twin frameworks. This paper investigates how digitalisation in the energy sector contributes to achieving net‐zero emissions by enhancing operational ...
Zoya Pourmirza   +4 more
wiley   +1 more source

Mobile Microgrids: Concepts, Key Technologies, Business Models, Applications and Prospects

open access: yesIET Smart Grid, Volume 9, Issue 1, January/December 2026.
Our study explores MMG concepts, key technologies, business models and applications, illustrating their impact on improving the flexible ADN operation. This study emphasises not only the practical importance of MMGs but also their pivotal role in reshaping the future landscape of energy delivery, offering valuable insights for researchers, policymakers
Tao Ding   +5 more
wiley   +1 more source

Analysis and Implementation of Message Authentication Code (MAC) Algorithms for GOOSE Message Security

open access: yesIEEE Access, 2019
There is growing awareness towards cybersecurity threats in power systems. IEC 61850 standard facilitates communication between different Intelligent Electronic devices (IEDs) and eases interoperable operation with set data and message structures.
S. M. Suhail Hussain   +2 more
doaj   +1 more source

Evaluating XMPP Communication in IEC 61499-based Distributed Energy Applications

open access: yes, 2017
The IEC 61499 reference model provides an international standard developed specifically for supporting the creation of distributed event-based automation systems.
Andrén, Filip Pröstl   +4 more
core   +1 more source

Validating secure and reliable IP/MPLS communications for current differential protection [PDF]

open access: yes, 2016
Current differential protection has stringent real-time communications requirements and it is critical that protection traffic is transmitted securely, i.e., by using appropriate data authentication and encryption methods.
Blair, S.M.   +6 more
core   +1 more source

Home - About - Disclaimer - Privacy