نتایج جستجو برای: distance relay

تعداد نتایج: 254950  

2011
Chengzong Pang Mladen Kezunovic

Relays may not perform as intended occasionally due to many complex reasons, which may result in relay misoperation. This paper provides a fast detection scheme for symmetrical fault during power swing based on travelling wave theory and wavelet transform. The implementation of the proposed method is discussed in detail, which covers implementation framework, data requirements, selection of mot...

This paper presents a novel impedance-based approach for out-of-step (OOS) protection of a synchronous generator. The most popular and commonly used approaches for detecting OOS conditions are based on the measurement of positive sequence impedance at relay location. However, FACTS devices change the measured impedance value and thus disrupt the performance of impedance-based relay function. In...

Polar codes, that have been recently introduced by Arikan, are one of the first codes that achieved the capacity for vast numerous channels and they also have low complexity in symmetric memoryless channels. Polar codes are constructed based on a phenomenon called channel polarization. This paper discusses relay channel polarization in order to achieve the capacity and show that if inputs of tw...

1996
J. M. Kennedy G. E. Alexander

This paper will investigate the effect of digital filtering on the operating time of a generic digital distance relay. Two popular filtering approaches will be considered: the Cosine Filter and the Fourier Filter. The effects of several variables, such as sampling rate, fault location, fault incidence angle, and non-fundamental frequencies, will be discussed. This paper will attempt to discuss ...

Journal: :Computers & Security 2009
Gerhard P. Hancke Keith Mayes Konstantinos Markantonakis

Contactless and contact smart card systems use the physical constraints of the communication channel to implicitly prove the proximity of a token. These systems, however, are potentially vulnerable to an attack where the attacker relays communication between the reader and a token. Relay attacks are not new but are often not considered a major threat, like eavesdropping or skimming attacks, eve...

Journal: :IEICE Transactions 2012
Celimuge Wu Satoshi Ohzahata Toshihiko Kato

Vehicular ad hoc networks have been attracting the interest of both academic and industrial communities on account of their potential role in Intelligent Transportation Systems (ITS). However, due to vehicle movement and fading in wireless communications, providing a reliable and efficient multi-hop broadcast service in vehicular ad hoc networks is still an open research topic. In this paper, w...

2006
Xiaoling Wu Yu Niu Lei Shu Jinsung Cho Young-Koo Lee Sungyoung Lee

In this paper, we propose a relay shift based approach to solve uneven sensor distribution problem due to the initial random dropping or the existence of faulty sensors. The distinguishing feature of our work is that the sensors in our model have limited mobility. After determining the optimal cluster head positions by particle swarm optimization (PSO) method, we use proposed Relay Shift Based ...

2014
Il-Soo Jeon Eun-Jun Yoon

Security and privacy of RFID systems have become very important issues along with their increasing applications. Recently, Jeon and Yoon proposed a new ultra-lightweight RFID authentication protocol(RAPLT) using merge and separation operations. Since their protocol uses very lightweight bitwise operations: XOR, merge, and separation operations, it will be suitable for the applications using low...

2018

Ad hoc networks are formed by intermediate nodes which agree to relay traffic. The link between nodes is broken when a node rejects to relay traffic. Various parameters like depreciation in the energy of a node, distance between nodes and mobility of the nodes play a vital role in determining the node's rejection to relay traffic. The objective of this paper is to propose a novel model tha...

2014
ALI KAMOUCH ZOUHAIR GUENNOUN

Spatial diversity is an inherent nature of wireless communications. This nature can be exploited to make communications more reliable by Multiple-Input-Multiple-Output (MIMO). However the use of multiple co-located antennas is constrained by the dimensions of modern devices. To overcome this drawback cooperative relaying shares antennas between different network nodes thus realizing a Virtual a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید