Embedded Sensor and Iot Technology Based Substation Monitoring and Control System
Embedded Sensor and Iot Technology Based Substation Monitoring and Control System
Embedded Sensor and Iot Technology Based Substation Monitoring and Control System
R. Krishnaswamy
Department of Electronics and Communication,
University College of Engineering,
Ariyalur, Tamil Nadu, India.
Outline of presentation
• INTRODUCTION
• LITERATURE REVIEW
• PROPOSED SYSTEM
• RESULTS AND DISCUSSION
• CONCLUSION
• REFERENCES
INTRODUCTION
• The distance between the generators and the demand might be many miles and its
unknown how much enormous power exchange across large distances has occurred
as a result of the lack of nature of electric power [1].
• Because of the increased need for power on the client side, demanding the kind of
force being transferred to the client side has sparked concern [2].
• A substantial quantity of energy is squandered during the transfer of general
power, resulting in a reduction in the idea of force acquired at the substation [3].
• Before working on the nature of force with an alternate arrangement, it is critical to
understand what form of restriction has happened.
• In addition, if there is a flaw in the assurance, testing, and control of a power
system. It's possible that the structure will become erratic [4].
• As a result, an observation framework capable of naturally differentiating,
screening, and ordering current imperatives on electrical lines is required [5].
• Power is now having control power failures and blackouts due to a lack of
automated review and the utility's poor deception over the framework [6]. WSN
will help provide the right viewpoint by gathering data from the matrix's several
sub-frameworks.
• A sensor hub will choose whether to send data to the sink immediately or to
postpone it for a period of time.
1) Sensory data evaluation: we define three levels of requirement in
Operation PB COOP.
2) Belief that a correspondence technique will be used: Need 0-no further
action is taken, need 2-regard is thrown away because it is regarded as sincere and
an admonition should be clearly sent, and need 1-we believe that regard should be
represented in light of the possibility that it will be perceived as a flaw or an issue
that is less pressing than need 2 data [7].
LITERATURE REVIEW
• The most common method of change in the power industry involves the creation of
novel techniques for dealing with a vast number of framework data [8].
• However, there are still significant challenges to overcome. The key issues are:
1.) envisioning the current state of a framework as well as the potentially
enormous number of occurrence states;
2.) imagining not only the result of a single proposed power shift but an
extraordinary number of such exchanges [9].
• An adjustable energy estimation framework is made up of a DSP, sensor, and
communication units [10].
• This framework is employed by cutting-edge power circulation networks, which
are distinguished by a free market of providers, bi-directional energy streams owing
to the scattered age, and a keen interest in the nature of power conveyance [11].
• Several features of the system were explored, including signal management,
correspondence, and robustness. Examples of how these gadgets have been utilized
are also included in their work [12].
• Transient meter was developed and implemented as a checking framework for the
detection, order, and estimation of faults on electrical power frameworks.
• CORBA engineering is used as a correspondence interface in the Transient meter,
wavelet-based approaches for programmed signal arrangement and portrayal, and a
smart trigger circuit for aggravation detection [13].
• An estimating calculation was constructed employing the wavelet change and
wavelet organizations for the anticipated order and estimation of unsettling
consequences [14].
• The transformer looked after a few families, each with a matrix-connected solar
framework, and its power factor was abnormally low.
• This was owing to the fact that, under certain conditions, the frameworks provide a
large amount of the dynamic power required by the families, whilst the network
provided all receptive and mutilation powers [15].
PROPOSED SYSTEM
• Improve the IoT-based continuous inspection system for testing and handling
substations by upping test rates.
• Administrators can check general conditions in steady state and transient force
substation circumstances using this built-in approach.
• Through point data on logging, the web, and separate analysis, high speed and
lossless information were attempting additional emphasis.
• There will be serious repercussions if the transformer's internal components are
damaged.
• Monitoring the internal elements of the transformer is therefore critically required.
• There are many variables in a transformer, but some of the most crucial ones to
monitor are the oil level, temperature, voltage, and current.
• Ultrasonic, temperature, voltage, and current sensors are used in this place to keep
an eye on these parameters.
• A microcontroller is used to combine all of the sensors. These sensed parameters
will be shown through a created Android application.
• Through this process, the health of the transformer may be frequently checked.
• This technology makes use of the Internet of Things to enable remote monitoring of
real-time data received on transformer health. The IoT is the sole foundation of this
platform.
• Using voltage and current from the sensor, it displays a single-phase electrical
structure using a microprocessor built on a Deep Belief Network.
• It then uses another PC to remotely transmit the desired data to the results screen.
Understanding the nature of the limitation requires the use of the Internet of Things
(IoT) to improve the force's nature through substation monitoring and control
optional adjustment.
• The Arduino Uno functions as a microcontroller in the integrated SVCMS system
to compute the voltage and current sensor results.
• The reproduction process in the power sector needs the employment of novel
approaches to show a significant number of device data for a framework for
detecting, organizing, and measuring problems in electrical power systems.
• The transient meter, wavelet-based signal organization and representation
techniques, and a smart trigger circuit for detecting unwelcome impacts are all part
of the package. Figure 1 shows the design of the system.
Power supply
9V
ZMPT101B
Voltage
ESP 8266
sensor
Wi-Fi
ACS712
Current sensor
Cloud
server
TABLE 1: DATA
[1] S.R. Zeebaree, “ DES encryption and decryption algorithm implementation based
on FPGA,” Indonesian Journal of Electrical Engineering and Computer Science,
vol. 18, no. 2, pp. 774-781, 2020.
[2] M. Khairallah, A. Chattopadhyay, and T. Peyrin, “Looting the LUTs: FPGA
optimization of AES and AES-like ciphers for authenticated encryption,”
International Conference on Cryptology, pp. 282-301,2017.
[3] H. Zodpe, and A. Sapkal, “ An efficient AES implementation using FPGA with
enhanced security features,” Journal of King Saud University-Engineering
Sciences, vol. 32, no. 2, pp. 115-122, 2020.
[4] R. Shashidhar, A.M. Mahalingaswamy, P. Kumar, and M. Roopa, Design of High
Speed AES System for Efficient Data Encryption and Decryption System using
FPGA,” International Conference on Electrical, Electronics, Communication,
Computer, and Optimization Techniques, pp. 1279-1282, 2018.
[5] A.H. Elsafty, M.F. Tolba, L.A. Said, A.H. Madian, and A.G. Radwan, “Fpga speech
encryption realization based on variable s-box and memristor chaotic circuit,”
International conference on microelectronics, pp. 152-155, 2018.
[6] A.H. Elsafty, M.F. Tolba, L.A. Said, A.H. Madian, and A.G. Radwan, “Fpga speech
encryption realization based on variable s-box and memristor chaotic circuit,”
International conference on microelectronics, pp. 152-155, 2018.
[7] H. Kouzehzar, M.N. Moghadam, and P. Torkzadeh, “ A high data rate pipelined
architecture of AES encryption/decryption in storage area networks,” Iranian
Conference on Electrical Engineering, pp. 23-28, 2018.
[8] T.M. Kumar, K.S. Reddy, S. Rinaldi, B.D. Parameshachari, and K. Arunachalam,
“A Low Area High Speed FPGA Implementation of AES Architecture for
Cryptography Application,” Electronics, vol. 10, no. 16, pp.1-22, 2021.
[9] A. Zaky, E. Elmitwalli, M. Hemeda, V Ismail, and K. Salah, “ Ultra Low-Power
Encryption/Decryption Core for Lightweight IoT Applications,” International
Computer Engineering Conference, pp. 39-43,2019.
[10] Y. Yao, Z. Wang, X. Chen, X. Tong, and Q. Luo, “ A dynamic reconfigurable
design of multiple cryptographic algorithms based on FPGA,”International
Conference on Smart Internet of Things, pp. 105-11, 2018.
[11] S. Madhavapandian, and P. MaruthuPandi, “FPGA implementation of highly
scalable AES algorithm using modified mix column with gate replacement
technique for security application in TCP/IP. Microprocessors and Microsystems,
vol. 73,no. 102972,pp.1-12, 2020.
[12] J.H. Kim, B. Grady, R. Lian, J. Brothers, and J.H. Anderson, “FPGA-based CNN
inference accelerator synthesized from multi-threaded C software,” International
System-on-Chip Conference, pp. 268-273, 2017.
[13] V. Vijayaragavan, “Reduction Of Resource Usage In Fpga By Implementing Back
Propagation Algorithm,” International Journal of MC Square Scientific
Research,vol. 9, no. 1, pp. 205-214.
[14] R.P.V. Kappelle, “Addiction: How We Get Stuck and Unstuck in Compulsive
Patterns and Behavior,” Wipf and Stock Publishers.2019.
[15] D.T. Milton, S. Dhingra, and C.E. Stroud, “Embedded Processor Based Built-In
Self-Test and Diagnosis of Logic and Memory Resources in FPGAs,” European
Space Agency, pp. 87-93, 2010.