2021
DOI: 10.1109/tpwrd.2020.3045276
|View full text |Cite
|
Sign up to set email alerts
|

A Real-Time Out-of-Step Protection Strategy Based on Instantaneous Active Power Deviation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 19 publications
(11 citation statements)
references
References 20 publications
0
11
0
Order By: Relevance
“…Apart from the methods listed in the comparative table, some recent work on OOS protection based on local measurements include [23], [24] and [25]. These methods, however, can only be applied on generator terminals, since they require direct input from generator measurements.…”
Section: Proposed Approachmentioning
confidence: 99%
“…Apart from the methods listed in the comparative table, some recent work on OOS protection based on local measurements include [23], [24] and [25]. These methods, however, can only be applied on generator terminals, since they require direct input from generator measurements.…”
Section: Proposed Approachmentioning
confidence: 99%
“…y is the modal variable. The damping term has been canceled in (10) by subtracting the equation corresponding to the reference generator from all other equations.…”
Section: Linear Transformationmentioning
confidence: 99%
“…. The auxiliary variable allows (10) to be written in the form of ( 3) and can always be canceled to recover 2nd-order-like oscillator equations. The first difference compared to the traditional NF method is that the 2nd-order system model is expanded by the Taylor series before putting it to first-order.…”
Section: Linear Transformationmentioning
confidence: 99%
See 1 more Smart Citation
“…Fourth, finally the data information will be transmitted to the main power distribution station, and then provide effective basis for the practice service. [10][11][12] In order to ensure the overall system security, reliability and comprehensive control, it is necessary to build a trusted mechanism in the source side. Therefore, as a whole system, node trust has the basic requirement of credibility, network trust is the basis of guaranteeing node communication, and the application of trust can provide effective services and support for each node and network.…”
Section:  mentioning
confidence: 99%