Preview

NEURAL NETWORK

Powerful Essays
Open Document
Open Document
2214 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
NEURAL NETWORK
REAL TIME POWER SYSTEM SECURITY ASSESSMENT USING ARTIFICIAL NEURAL NETWORKS

REAL TIME POWER SYSTEM SECURITY ASSESSMENT USING ARTIFICIAL NEURAL NETWORKS

Abstract

Contingency analysis of a power system is a major activity in power system planning and operation. In general an outage of one transmission line or transformer may lead to over loads in other branches and/or sudden system voltage rise or drop. The traditional approach of security analysis known as exhaustive security analysis involving the simulation of all conceivable contingencies by full AC load flows, becomes prohibitively costly in terms of time and computing resources A new approach using Artificial Neural Network s has been proposed in this paper for real-time network security assessment. Security assessment has two functions the first is violation detection in the actual system operating state. The second, much more demanding, function of security assessment is contingency analysis. In this paper, for the determination of voltage contingency ranking, a method has been suggested, which eliminates misranking and masking effects and security assessment has been determined using Radial Basis Function (RBF) neural network for the real time control of power system. The proposed paradigms are tested on IEEE 14 – bus and 30 – bus systems.

Introduction:

Security refers to the ability of the system to withstand the impact of disturbance (contingency). The system is said to be secure if no security limit is seriously violated in the event of contingency. The process of investigating whether the system secure or insecure in a set of proposed contingencies is called Security Analysis.

The three basic elements if real-time security analysis is Security monitoring, Security assessment. The problem of predicting the static security status of a large power system is a computationally demanding task [2] and it requires large amount of memory. These considerations seriously undermine the



References: 1) A.J.Wood and B.F. Woolenberg, power generation, operation and control. 2) K.F.Schafer and J.F . verstege, adaptive procedure for masking effect compensation in contingency selection algorithms, IEEE trans. On power systems, vol – pwrs-5,no.2,pp,539-546, may 1990

You May Also Find These Documents Helpful

  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Network: The network should be designed with security in mind. Its structure must support the company’s policies, relevant laws and regulations, without impairing the organization’s ability to conduct business. The network should be logically and physically separated into distinct and manageable security zones. Traffic between the security zones must be inspected and filtered, to ensure that only authorized network use is permitted, and all access is recorded for future auditing. Multiple devices and methods should be used to ensure security across all parts of the network. In preparing this recommendation, network security design principles have been drawn from the Cisco SAFE Reference Guide [33] and the Council on CyberSecurity’s Critical Security Controls for Effective Cyber Defense Version 5.1 [34].…

    • 598 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Isc363 Phase 3

    • 1899 Words
    • 8 Pages

    As we progress forward, a few specific requirements such as software and data, information and hardware must be obtained in order to identify the type of system needed. The collected information is vital when determining the type of classifications and what is needed to insure the items or information is being secured. When it comes to threat identification, are level of threats is categorize…

    • 1899 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    In the given scenario of being the system support tech at the Premier Collegiate School, performing a risk analysis of the school infrastructure is highly important when wanting to secure the network. The school has two servers, one for administration and the other for students which seems kind of odd. And has a wireless access for the students with their own laptops. There is also one computer lab that is dedicated for the students to perform their computer science studies.…

    • 377 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Aircraft Solution’s Commercial Division, connects to the rest of the world via the Internet causing hardware vulnerabilities due to the absence of security and safety that should be implemented, leaving great concern for major security threats. The Commercial Division is only able to access important…

    • 745 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Aircraft Solution

    • 1151 Words
    • 5 Pages

    The following report is a security assessment on Aircraft Solutions
and the primary objective in this assessment is to identify the existence of vulnerabilities present 
within the global context of Aircraft Solutions’ operations. An evaluation of the associated 
threats will be deduced, accompanied by the exposed weaknesses. This will be followed by an
analysis of the degree of risk present. Finally, there will be a focus on the consideration of the
 consequences resulting from revealing of potential threats.

 Assessment 
Hardware and policy will be the main focus of this investigation. It will be narrowed down more 
to hardware issues.…

    • 1151 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    References: Anderson, R. (2008). Security engineering: A guide to building dependable distributed systems. New York: Wiley.…

    • 1135 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    3. CRS Report for Congress, (2004). Order Code RL32561, Risk Management and Critical Infrastructure Protection retrieved from http://www.au.af.mil/au/awc/awcgate/crs/rl32561.pdf…

    • 951 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Electric grids, power plants, hospitals, etc., rely largely on computers and the internet to store and access data. If the security to these facilities are breached, skewed data and power outages are a real possibility. Therefore, it could lead to serious economic problems, and possibly, even death. With all that said, cyberwarfare is not something to be taken lightly, in fact, the dangers are extremely significant. Additionally, since technology is so prominent, it is a convenient method of…

    • 445 Words
    • 2 Pages
    Good Essays
  • Good Essays

    As computer systems have become more and more sophisticated over the time, it has become less and less credible to ensure security by inspection and intuition alone. However, standard methods of analyzing different aspects of the area have been developed to identify and apply key principles of the area, but the area of Security Analysis is constantly developing as new secure designs are invented and so are the new ways of breaking them. In many cases, systems are so complex that it is impossible find a secure solution. In situations like such, instead improvement measures, one should focus towards counter-measures.…

    • 484 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Lets start by defining what vulnerability is. In computer security, vulnerability is a weakness which allows an attacker to reduce a system 's information assurance. Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw. (http://en.wikipedia.org/wiki/Vulnerability(computing).…

    • 534 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Disaster Recovery Plan

    • 1491 Words
    • 6 Pages

    Security and control within an organization is a continuing concern. It is preferable, from an economic and business strategy perspective, to concentrate on activities that have the effect of reducing the possibility of disaster occurrence, rather than concentrating primarily on minimizing impact of an actual disaster. This phase addresses measures to reduce the probability of occurrence. Security assessment of the…

    • 1491 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Power Grid

    • 1857 Words
    • 5 Pages

    But with all the good that comes from information technology there is also bad. The internet has also become a gateway for hackers to wreak havoc. In a nutshell, cyber-crime has become a headache in the 21st century because one individual can remotely attack any online system from any corner of the world crippling many economic developments. Even before the federal government can come up with effective ways of protecting its citizen from cyber-crime vulnerability, a new problem which can bring about devastating effects of equal measure has emerged. One such problem is the vulnerability of the nation’s power grid. The government had turned all of its attention to measures of countering cyber terrorism to an extent that it forgot that physical attacks on sources of power, which run these systems, could also bring equally devastating effects (Besanger et al 2013).…

    • 1857 Words
    • 5 Pages
    Better Essays
  • Best Essays

    White Paper

    • 1119 Words
    • 5 Pages

    The research provides an overview of the threats and vulnerabilities to information security and introduces the important terms and conditions. Further more, the research sum up the definitions and controls of the trusted computer system evaluation criteria and discuss the policy of information security while focusing on information control and dissemination.…

    • 1119 Words
    • 5 Pages
    Best Essays
  • Powerful Essays

    SAMPLE Security Policy

    • 3395 Words
    • 13 Pages

    References: Hausman, K., Weiss, M., & Barrett, D. (2011). Comptia security sy0-301. (3rd ed.). Pearson Education, Inc.…

    • 3395 Words
    • 13 Pages
    Powerful Essays