Summary
A comprehensive condition monitoring system requires methods to diagnose infrequent faults, including broken damper bar (BDB) faults in synchronous generators, even though they are statistically less likely. Detection of BDB faults is challenging because damper bars are only active during transient periods like start-up or in reaction to power system dynamics. This paper detects BDB faults during generator start-up using a time series data mining approach that analyzes the induced electromotive force of the rotor field winding. The radius of gyration feature is introduced to detect and locate BDB faults.
Current signature analysis (CSA) is widely used in general industry but is not commonly used in the wind industry. This paper reviews the use of generator CSA (GCSA) for fault detection and diagnosis of wind turbines (WTs). Lack of appropriate technology and research projects has limited the use of GCSA for fault detection in other WT components, but signal treatment and artificial intelligence techniques could offer new opportunities in this field.
Published By:
J Qual Maint Eng - Journal of Quality in Maintenance Engineering
2019
Cited By:
10
The text discusses the importance of detecting a specific fault in electrical machines called the broken damper bar (BDB) fault. A method using time series data mining is proposed to detect this fault during machine start-up.
Published By:
Conference of the Industrial Electronics Society - Annual Conference of the IEEE Industrial Electronics Society
2019
Cited By:
3
The study investigates the feasibility of using the RSA encryption method with five hashing functions for robust digital signatures in IoT networks. The findings show that RSA is efficient and secure when implemented with an appropriate key length.
Published By:
IJCI Int J Comput Inf - IJCI. International Journal of Computers and Information
2023
Cited By:
0
Flux-switching dc-field machines have flexible flux control and low cost. This study investigates fault signatures for a magnetless FSDC generator, focusing on short-circuit and open-circuit faults. Simulation and experimental results are analyzed for verification.
Published By:
IEEE Trans Magn - IEEE transactions on magnetics
2015
Cited By:
5
A proposed model is presented to increase message authenticity over the network. The model involves modifying the MD5 algorithm and integrating it with cipher algorithms. The model is implemented using C# programming language.
Published By:
Journal of Mathematics - Journal of mathematics
2022
Cited By:
0
The study explores the need for secure and authenticated messaging communications. It proposes a Signcryption method using RSA and the Cayley-Purser Algorithm for message integrity and authenticity. The study's test results show that encryption and decryption time depend on the number of plaintext characters.
Cited By:
0
The practical implementation of an almost practical chosen-prefix collision attack against SHA-1 has been reported, posing a significant threat to real-world security. Despite the reduced complexity, such attacks are still within the means of academic researchers. It is strongly advised to remove SHA-1 from applications such as TLS and SSH as soon as possible.
Published By:
USENIX Secur Symp - USENIX Security Symposium
2020
Cited By:
25
Hash functions are crucial for network security, computer security, and internet security. They ensure message integrity and prove the authenticity of resources. Different algorithms provide varying levels of security against attacks.
Published By:
IEEE Int Conf Intell Syst Control - International Conference on Information Security and Cryptology
2019
Cited By:
15
This study focuses on the detection of turbine blade defects in turbochargers. Turbochargers on diesel power generators experience severe mechanical constraints due to high rotation speeds, which can lead to breakdowns. The study found that the vibration signals in the turbocharger were not affected by the explosions in the diesel engine, allowing for the experimental determination of a vibration signature corresponding to turbine blade defects.
Cited By:
0
A nonrepudiation digital signature scheme based on a computer vision system for enterprise contracts is proposed. The scheme ensures confidentiality and reliability using the RSA and MD5 algorithms.
Published By:
Wirel Commun Mob Comput - Wireless Communications and Mobile Computing
2022
Cited By:
0
The study aims to simulate the wear signal and assess the impact of geometric parameters on the signal under anti-vibration bars in steam generator tubes. The presence of anti-vibration bars greatly affects the signature of defects near them.
Cited By:
1
Cryptographic techniques, such as digital signatures, help authenticate data. Traditional signatures can easily be forged, but digital signatures built from hash function algorithms and public-key cryptography are difficult to attack. This study proposes using the MD5 algorithm and the Paillier Cryptosystem for digital signatures.
Cited By:
0
Active interrogation, using radiation to probe materials and generate unique signatures, is a powerful tool for characterizing special nuclear material. It has various applications such as measuring plutonium content in spent fuel and assaying plutonium in reprocessing process streams.
Cited By:
5
A method for bearing fault diagnosis in gas-fired generators using MFCC and DSFAN is proposed. MFCC is used to extract signature features from fault signals, and DSFAN is used for efficient classification of fault features. Experimental results show excellent performance of MFCC-DSFAN for fault diagnosis.
Published By:
IEEE Access
2023
Cited By:
5
An analysis is conducted on the stator currents of a wind turbine equipped with a doubly fed induction generator (DFIG) to detect blade imbalances. The study uses mathematical equations, Park's Transformation, and spectral analysis to identify and locate the faults accurately.
Published By:
Bull Electr Eng Informatics - Bulletin of Electrical Engineering and Informatics
2024
Cited By:
0