{"title":"Application of personal computers to real-time security analysis","authors":"B. Hoveida, M. A. Radtke, M. Hermes","doi":"10.1109/PICA.1991.160635","DOIUrl":null,"url":null,"abstract":"An innovative approach used at Wisconsin Public Service (WPS) to implement an online security analysis system using personal computers (PCs) in a distributed local area network (LAN) environment is presented. This implementation is the first known advanced use of PCs in the computationally intensive real-time security analysis applications. Descriptions of the distributed LAN-based architecture, the interfaces to the existing SCADA system, the hardware and software configuration of the security analysis applications, as well as performance benchmarks for various applications are provided. It is shown that with applying the techniques used by WPS, in a distributed architecture, it is possible to solve large power system problems in a timely manner using PCs.<<ETX>>","PeriodicalId":287152,"journal":{"name":"[Proceedings] Conference Papers 1991 Power Industry Computer Application Conference","volume":"62 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1991-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"[Proceedings] Conference Papers 1991 Power Industry Computer Application Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PICA.1991.160635","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
An innovative approach used at Wisconsin Public Service (WPS) to implement an online security analysis system using personal computers (PCs) in a distributed local area network (LAN) environment is presented. This implementation is the first known advanced use of PCs in the computationally intensive real-time security analysis applications. Descriptions of the distributed LAN-based architecture, the interfaces to the existing SCADA system, the hardware and software configuration of the security analysis applications, as well as performance benchmarks for various applications are provided. It is shown that with applying the techniques used by WPS, in a distributed architecture, it is possible to solve large power system problems in a timely manner using PCs.<>