A security technology of power relay using edge computing.
The purposes are to find the techniques suitable for the safety relay protection of intelligent substations and discuss the applicability of edge computing in relay protection. Regarding relay protection in intelligent substations, edge computing and optimized simulated annealing algorithm (OSAA) ar...
Guardado en:
Autores principales: | , , |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
Public Library of Science (PLoS)
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/d96ee18b62884a10aa8a3f5c877b658c |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:d96ee18b62884a10aa8a3f5c877b658c |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:d96ee18b62884a10aa8a3f5c877b658c2021-12-02T20:08:38ZA security technology of power relay using edge computing.1932-620310.1371/journal.pone.0253428https://doaj.org/article/d96ee18b62884a10aa8a3f5c877b658c2021-01-01T00:00:00Zhttps://doi.org/10.1371/journal.pone.0253428https://doaj.org/toc/1932-6203The purposes are to find the techniques suitable for the safety relay protection of intelligent substations and discuss the applicability of edge computing in relay protection. Regarding relay protection in intelligent substations, edge computing and optimized simulated annealing algorithm (OSAA) are combined innovatively to form an edge computing strategy. On this basis, an edge computing model is proposed based on relay fault traveling waves. Under different computing shunt tasks, OSAA can converge after about 1,100 iterations, and its computing time is relatively short. As the global optimal time delay reaches 0.5295, the corresponding computing time is 456.27s, apparently better than the linear search method. The proposed model can reduce the computing time significantly, playing an active role in the safe shunting of power relays. The simulation also finds that the voltage and current waveforms corresponding to the fault state of Phase A are consistent with the actual situations. To sum up, this model provides a reference for improving and optimizing intelligent substation relay protection.Zhongqing SangKai YangRencheng ZhangPublic Library of Science (PLoS)articleMedicineRScienceQENPLoS ONE, Vol 16, Iss 9, p e0253428 (2021) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
Medicine R Science Q |
spellingShingle |
Medicine R Science Q Zhongqing Sang Kai Yang Rencheng Zhang A security technology of power relay using edge computing. |
description |
The purposes are to find the techniques suitable for the safety relay protection of intelligent substations and discuss the applicability of edge computing in relay protection. Regarding relay protection in intelligent substations, edge computing and optimized simulated annealing algorithm (OSAA) are combined innovatively to form an edge computing strategy. On this basis, an edge computing model is proposed based on relay fault traveling waves. Under different computing shunt tasks, OSAA can converge after about 1,100 iterations, and its computing time is relatively short. As the global optimal time delay reaches 0.5295, the corresponding computing time is 456.27s, apparently better than the linear search method. The proposed model can reduce the computing time significantly, playing an active role in the safe shunting of power relays. The simulation also finds that the voltage and current waveforms corresponding to the fault state of Phase A are consistent with the actual situations. To sum up, this model provides a reference for improving and optimizing intelligent substation relay protection. |
format |
article |
author |
Zhongqing Sang Kai Yang Rencheng Zhang |
author_facet |
Zhongqing Sang Kai Yang Rencheng Zhang |
author_sort |
Zhongqing Sang |
title |
A security technology of power relay using edge computing. |
title_short |
A security technology of power relay using edge computing. |
title_full |
A security technology of power relay using edge computing. |
title_fullStr |
A security technology of power relay using edge computing. |
title_full_unstemmed |
A security technology of power relay using edge computing. |
title_sort |
security technology of power relay using edge computing. |
publisher |
Public Library of Science (PLoS) |
publishDate |
2021 |
url |
https://doaj.org/article/d96ee18b62884a10aa8a3f5c877b658c |
work_keys_str_mv |
AT zhongqingsang asecuritytechnologyofpowerrelayusingedgecomputing AT kaiyang asecuritytechnologyofpowerrelayusingedgecomputing AT renchengzhang asecuritytechnologyofpowerrelayusingedgecomputing AT zhongqingsang securitytechnologyofpowerrelayusingedgecomputing AT kaiyang securitytechnologyofpowerrelayusingedgecomputing AT renchengzhang securitytechnologyofpowerrelayusingedgecomputing |
_version_ |
1718375212018302976 |