| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910366612503321 |
|
|
Autore |
Cao Yijia |
|
|
Titolo |
Cyber-Physical Energy and Power Systems : Modeling, Analysis and Application / / by Yijia Cao, Yong Li, Xuan Liu, Christian Rehtanz |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2020.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XVI, 216 p. 106 illus., 86 illus. in color.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Power electronics |
Energy systems |
Electrical engineering |
Automatic control |
Power Electronics, Electrical Machines and Networks |
Energy Systems |
Communications Engineering, Networks |
Control and Systems Theory |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references. |
|
|
|
|
|
|
Nota di contenuto |
|
Introduction -- Modeling and Analysis Techniques based on Interdependent Network -- Impacts of EPON-based Communication Networks on Differential Protection of Smart Distribution Networks -- Modeling and Simulation of Data Flow for VLAN-Based Communication in Substations -- Cyber-attack on Power System -- Intelligent Distribution Network influenced by multi-layer network interaction -- Simplified Co-Simulation Model for Investigating Impacts of Cyber-Contingency -- Co-Simulation of Distributed Control System Based on JADE. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book discusses recent advances in cyber-physical power systems (CPPS) in the modeling, analysis and applications of smart grid. It introduces a series of models, such as an analysis of interaction between the power grid and the communication network, differential protection in smart distribution systems, data flow for VLAN-based communication in substations, a co-simulation model for investigating the impacts of cyber-contingency and distributed control systems as |
|
|
|
|
|
|
|
|
|
|
well as the analytical techniques used in different parts of cyber physical energy systems. It also discusses methods of cyber-attack on power systems, particularly false data injection. The results presented are a comprehensive summary of the authors’ original research conducted over a period of 5 years. The book is of interest to university researchers, R&D engineers and graduate students in power and energy systems. |
|
|
|
|
|
| |