2022
DOI: 10.1016/j.isatra.2022.03.017
|View full text |Cite
|
Sign up to set email alerts
|

Optimally detecting and classifying the transmission line fault in power system using hybrid technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
10
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 52 publications
(18 citation statements)
references
References 32 publications
0
10
0
Order By: Relevance
“…However, current digital twin solutions for differential protection applications in distribution networks are yet to be explored. Differential protection devices on both sides of transmission lines in distribution networks disconnect the lines in the event of electrical failure [8]. Actions such as the collection of electrical quantity information from differential protection devices and disconnection of faults can be mapped to the digital twin system as the source of its closed-loop information interaction.…”
Section: Introductionmentioning
confidence: 99%
“…However, current digital twin solutions for differential protection applications in distribution networks are yet to be explored. Differential protection devices on both sides of transmission lines in distribution networks disconnect the lines in the event of electrical failure [8]. Actions such as the collection of electrical quantity information from differential protection devices and disconnection of faults can be mapped to the digital twin system as the source of its closed-loop information interaction.…”
Section: Introductionmentioning
confidence: 99%
“…9,10 In general, the IoT applications help to transmit IPv6 packets in WSN nodes; these features lead to numerous profits to users. 11,12 If many IoT devices are linked and interconnected, then the IoT applications create marvelous IoT traffic. 13,14 Subsequently, IoT traffic is for communication among devices; the communication consistency is dangerous, particularly in a moderately unbalanced WSN when compared to the wired network.…”
Section: Introductionmentioning
confidence: 99%
“…Consecutively, the cloud utility is debugged on the internet throughout the privacy is the important problem of cloud services 6,7 . Subsequently, the security of data, prevention, and intrusion detection is the main security to be impacted in the cloud infrastructure 8‐12 . Nevertheless, cloud network utilizing the incorporated technologies and virtualization models activate with the help of standard internet protocol 13 .…”
Section: Introductionmentioning
confidence: 99%
“…6,7 Subsequently, the security of data, prevention, and intrusion detection is the main security to be impacted in the cloud infrastructure. [8][9][10][11][12] Nevertheless, cloud network utilizing the incorporated technologies and virtualization models activate with the help of standard internet protocol. 13 The CC stimulates conventional attacks, such as denial of service (DoS), distributed denial of service (DDoS), and Internet protocol (IP) spoofing.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation