白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Systems and methods for real-time DC microgrid power analytics for mission-critical power systems

專利號
US10867087B2
公開日期
2020-12-15
申請人
WaveTech Global Inc.(US NJ Hoboken)
發(fā)明人
Kevin Meagher; Brian Radibratovic; Adib Nasle
IPC分類
G06F17/50; G06F30/20; H02J13/00; H04L29/08; G06F30/00; G05F1/66; H02J3/00; G06F30/367; G06F119/06
技術(shù)領(lǐng)域
system,analytics,power,in,data,electrical,real,virtual,can,be
地域: NJ NJ Hoboken

摘要

Systems and methods for performing power analytics on a microgrid. In an embodiment, predicted data is generated for the microgrid utilizing a virtual system model of the microgrid, which comprises a virtual representation of a topology of the microgrid. Real-time data is received via a portal from at least one external data source. If the difference between the real-time data and the predicted data exceeds a threshold, a calibration and synchronization operation is initiated to update the virtual system model in real-time. Power analytics may be performed on the virtual system model to generate analytical data, which can be returned via the portal.

說明書

In step 1810, it can be determined if the system is operating in a deficient state when confronted with a specific contingency. If it is, then in step 1812, a report is generated providing a summary of the operational stability of the system. The summary may include general predictions about the total security and stability of the system and/or detailed predictions about each component that makes up the system.

Alternatively, if it is determined that the system is not in a deficient state in step 1810, then step 1808 can determine if further contingencies needs to be evaluated. If so, then the process can revert to step 1806 and further contingencies can be evaluated.

The results of real-time simulations performed in accordance with FIG. 18 can be communicated in step 1812 via a report, such as a print out or display of the status. In addition, the information can be reported via a graphical user interface (thick or thin client) that illustrated the various components of the system in graphical format. In such embodiments, the report can simply comprise a graphical indication of the security or insecurity of a component, subsystem, or system, including the whole facility. The results can also be forwarded to associative memory engine 1818, where they can be stored and made available for predictions, pattern/sequence recognition and ability to imagine, e.g., via memory agents or other techniques, some of which are describe below, in step 1820.

權(quán)利要求

1
微信群二維碼
意見反饋