Skip to main content Skip to navigation
Wednesday, September 3 @10 am
Grid Enhancing Technologies in Transmission Operations and Planning: Opportunities & Challenges presented by Dr. Swaroop Guggilam, EPRI
Presentation
WSU Pullman - Electrical and Mechanical Engineering Building

Energy System Innovation Center & Advanced Grid Institute present “Grid Enhancing Technologies in Transmission Operations and Planning: Opportunities & Challenges” to be delivered by Dr. Swaroop Guggilam, Electric Power Research Institute (EPRI)

Summary In recent years, grid enhancing technologies (GETs) have garnered significant attention as utilities and system operators…

Wednesday, September 10 @10 am
ESIC-AGI FA25 Power Seminar Series: Correlating Lightning Data with Traveling Waves on Power Lines Aids Patrol Crews in Locating Faults
Presentation
WSU Pullman - Electrical and Mechanical Engineering Building

We can use the following for the summary: Utilities across the world are using traveling-wave based devices to locate faults with an accuracy of one to two tower spans. This presentation briefly discusses capabilities of line protective relays that include TW-based functions such as fault locating, line monitoring, and a line current differential scheme. This presentation includes a tutorial on Vaisala’s National Lightning Detection Network and shows how the correlation of data from the lightning detection network and the relays helps the patrol crew to locate the disturbance. PPL Electric Utilities Corporation uses this correlation to confirm the root cause of the disturbance and to verify the performance of the lightning mitigation devices in the network.

Tuesday, September 30 @1:10 pm
CySER Virtual Seminar – Cyber-physical system recovery from sensor attacks
Workshop / Seminar
Online - Online

Title: Cyber-physical system recovery from sensor attacks

Speaker: Dr. Mengyu Liu

Abstract: Cyber-Physical Systems (CPS) increasingly rely on sensor data to enable real-time decision making and safe control. However, their dependence on sensor inputs makes them vulnerable to malicious attacks that can compromise data integrity, leading to unsafe or unstable behavior. The…