2020
DOI: 10.1002/tee.23159
|View full text |Cite
|
Sign up to set email alerts
|

Transformer inrush identification based on improved mathematical gradient with dissociative structuring element

Abstract: This paper presents an improved morphological gradient for transformer inrush identification. Dissociative structuring element is presented and used to perform gradient operation, which can decrease the computational burden. Besides, a new index is introduced to measure the feature of extracted morphological gradient and to distinguish inrush from fault current. Simulation studies are conducted using PSCAD, and the results verify the effectiveness of the proposed method. © 2020 Institute of Electrical Engineer… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…The SM2 algorithm was released by the National Password Administration on December 17, 2010, the asymmetric cryptographic algorithm based on ECC (Elliptic Curve Cryptography) has the characteristics of requiring less private key bit length for operations, lower system parameter requirements, less storage space, lower broadband requirements for data transmission, and lower overall power consumption of the algorithm. Therefore, it can be widely applied to devices with relatively small system scales and severely limited resources [11]. The SM2 algorithm mainly includes three parts of applications: Digital signature algorithm, key exchange protocol, and public key encryption algorithm.…”
Section: Methodsmentioning
confidence: 99%
“…The SM2 algorithm was released by the National Password Administration on December 17, 2010, the asymmetric cryptographic algorithm based on ECC (Elliptic Curve Cryptography) has the characteristics of requiring less private key bit length for operations, lower system parameter requirements, less storage space, lower broadband requirements for data transmission, and lower overall power consumption of the algorithm. Therefore, it can be widely applied to devices with relatively small system scales and severely limited resources [11]. The SM2 algorithm mainly includes three parts of applications: Digital signature algorithm, key exchange protocol, and public key encryption algorithm.…”
Section: Methodsmentioning
confidence: 99%
“…At the application level, it is manifested as generating an expert model library for equipment defects, power grid anomalies, and power grid faults through historical data learning. When equipment or power grid anomalies or faults occur, the model formed by the current data is compared with the conventional model library, and alarm information and analysis results are output [7].…”
Section: Comprehensive Intelligent Warning System Data Modelmentioning
confidence: 99%