Egypt to study windfarm performance

By Industrial Info Resources


High Voltage Maintenance Training Online

Our customized live online or in‑person group training can be delivered to your staff at your location.

  • Live Online
  • 12 hours Instructor-led
  • Group Training Available
Regular Price:
$599
Coupon Price:
$499
Reserve Your Seat Today
Egypt plans to produce 20 of the country's electric power generation from renewable energy resources by 2020. It plans to have eight windfarms with 702 wind turbines and a total capacity of 545 megawatts MW in the Zafarana area on the Red Sea coast, 180 kilometers southeast of Cairo.

These projects have a varied range of capacities and technologies. The Ministry of Electricity and Energy, through subsidiary New and Renewable Energy Authority NREA, has managed and implemented all wind energy projects in Egypt since 1986.

In July 2010, KFW Bank granted funds to NREA to tender for a consultant to evaluate Zafarana windfarm performance, in hopes of increasing productivity and extending the operating life of the 702 wind turbines. The bidding will be in two rounds. The first will short-list the qualified companies, and the second will select the winner to execute the study.

In September 2010, Sargent & Lundy LLC, Germanischer Lloyd SE, Fichtner GmbH & Company KG, TUV Rheinland and Intec submitted their documents to NREA for the first round of bidding. According to an unofficial statement, NREA announced the short-listed companies and confirmed that Sargent & Lundy is among them.

The bid is the first step toward involving the private sector in windfarm management, as the private sector investment will fund the building of 3,200 MW worth of windfarms through build-own-operate-based projects by 2020, under the national plan to install 7,200 MW of wind- and solar-based power generation by 2020.

Related News

New Electricity Auctions Will Drive Down Costs for Ontario's Consumers

IESO Capacity Auctions will competitively procure resources for Ontario electricity needs, boosting reliability and resource adequacy through market-based bidding, enabling demand response, energy storage, and flexible supply to meet changing load and regional grid conditions.

 

Key Points

A competitive, technology-neutral auction buys capacity at lowest cost to keep Ontario's grid reliable and flexible.

✅ Market-based procurement reduces system costs.

✅ Enables demand response, storage, and hybrid resources.

✅ Increases flexibility and regional reliability in Ontario.

 

The Independent Electricity System Operator (IESO) is introducing changes to Ontario's electricity system that will help save Ontarians about $3.4 billion over a 10-year period. The changes include holding annual capacity auctions to acquire electricity resources at lowest cost that can be called upon when and where they are needed to meet Ontario electricity needs. 

Today's announcement marks the release of a high level design for future auctions, with changes for electricity consumers expected as the first is set to be held in late 2022.

"These auctions will specify how much electricity we need, and introduce a competitive process to determine who can meet that need. It's a competition among all eligible resources, and it's the Ontario consumer, including industrial electricity ratepayers, who benefits through lower costs and a more flexible system better able to respond to changing demand and supply conditions," says IESO President and CEO Peter Gregg.

In the past decade, electricity supply was typically acquired through very prescriptive means with defined targets for specific types of resources such as wind and solar, and secured through 20-year contracts.  While these long-term commitments helped Ontario transform its generation fleet over the last decade, electricity cost allocation also played a role, but longer term contracts provide limited flexibility in dealing with unexpected changes in the power system. 

"Imagine signing a 20-year contract for your cable TV service. In five years' time, electricity rates could be lower, new competitors may have entered the market, or entirely new and innovative platforms and services like Netflix may have emerged. You miss out on opportunities for improvement by being locked-in," says Gregg.

Provincial electricity demand has traditionally fluctuated over time due to factors like economic growth, conservation and the introduction of generating resources on local distribution systems, with occasional issues such as phantom demand affecting customers' costs as well. Technological changes are adding another layer of uncertainty to future demand as electric vehicles, energy storage and low-cost solar panels become more common.

"Our planners do their best to forecast electricity demand, but the truth is there's no such thing as certainty in electricity planning. That's why flexibility is so important. We don't want Ontarians to have to pay more on the typical Ontario electricity bill for electricity resources than are needed to ensure a reliable power system that can continue to meet Ontario's needs," says IESO Vice President and COO Leonard Kula.

 

Related News

View more

Russia suspected as hackers breach systems at power plants across US

US Power Grid Cyberattacks target utilities and nuclear plants, probing SCADA, ICS, and business networks at sites like Wolf Creek; suspected Russian actors, malware, and spear-phishing trigger DHS and FBI alerts on critical infrastructure resilience.

 

Key Points

Intrusions on energy networks probing ICS and SCADA, seeking persistence and elevating risks to critical infrastructure.

✅ Wolf Creek nuclear plant targeted; no operational systems breached

✅ Attackers leveraged stolen credentials, malware, and spear-phishing

✅ DHS and FBI issued alerts; utilities enhance cyber resilience

 

Hackers working for a foreign government recently breached at least a dozen US power plants, including the Wolf Creek nuclear facility in Kansas, according to current and former US officials, sparking concerns the attackers were searching for vulnerabilities in the electrical grid.

The rivals could be positioning themselves to eventually disrupt the nation’s power supply, warned the officials, who noted that a general alert, prompting a renewed focus on protecting the U.S. power grid, was distributed to utilities a week ago. Adding to those concerns, hackers recently infiltrated an unidentified company that makes control systems for equipment used in the power industry, an attack that officials believe may be related.

The chief suspect is Russia, according to three people familiar with the continuing effort to eject the hackers from the computer networks. One of those networks belongs to an ageing nuclear generating facility known as Wolf Creek -- owned by Westar Energy Inc, Great Plains Energy Inc, and Kansas Electric Power Cooperative Inc -- on a lake shore near Burlington, Kansas.

The possibility of a Russia connection is particularly worrying, former and current official s say, because Russian hackers have previously taken down parts of the electrical grid in Ukraine and appear to be testing increasingly advanced tools, including cyber weapons to disrupt power grids, to disrupt power supplies.

The hacks come as international tensions have flared over US intelligence agencies’ conclusion that Russia tried to influence the 2016 presidential election, and amid U.S. government condemnation of Russian power-grid hacking in recent advisories. The US, which has several continuing investigations into Russia’s activities, is known to possess digital weapons capable of disrupting the electricity grids of rival nations.

“We don’t pay attention to such anonymous fakes,” Kremlin spokesman Dmitry Peskov said, in response to a request to comment on alleged Russian involvement.

It was unclear whether President Donald Trump was planning to address the cyber attacks at his meeting on Friday with Russian President Vladimir Putin. In an earlier speech in Warsaw, Trump called out Russia’s “destabilising activities” and urged the country to join “the community of responsible nations.”

The Department of Homeland Security and Federal Bureau of Investigation said they are aware of a potential intrusion in the energy sector. The alert issued to utilities cited activities by hackers since May.

“There is no indication of a threat to public safety, as any potential impact appears to be limited to administrative and business networks,” the government agencies said in a joint statement.

The Department of Energy also said the impact appears limited to administrative and business networks and said it was working with utilities and grid operators to enhance security and resilience.

“Regardless of whether malicious actors attempt to exploit business networks or operational systems, we take any reports of malicious cyber activity potentially targeting our nation’s energy infrastructure seriously and respond accordingly,” the department said in an emailed statement.

Representatives of the National Security Council, the Director of National Intelligence and the Nuclear Regulatory Commission declined to comment. While Bloomberg News was waiting for responses from the government, the New York Times reported that hacks were targeting nuclear power stations.

The North American Electric Reliability Corp, a nonprofit that works to ensure the reliability of the continent’s power system, said it was aware of the incident and was exchanging information with the industry through a secure portal.

“At this time, there has been no bulk power system impact in North America,” the corporation said in an emailed statement.

In addition, the operational controls at Wolf Creek were not pierced, according to government officials, even as attackers accessed utility control rooms elsewhere in the U.S., according to separate reports. “There was absolutely no operational impact to Wolf Creek,” Jenny Hageman, a spokeswoman for the nuclear plant, said in a statement to Bloomberg News.

“The reason that is true is because the operational computer systems are completely separate from the corporate network.”

Determining who is behind an attack can be tricky. Government officials look at the sophistication of the tools, among other key markers, when gauging whether a foreign government is sponsoring cyber activities.

Several private security firms, including Symantec researchers, are studying data on the attacks, but none has linked the work to a particular hacking team or country.

“We don’t tie this to any known group at this point,” said Sean McBride, a lead analyst for FireEye Inc, a global cyber security firm. “It’s not to say it’s not related, but we don’t have the evidence at this point.”

US intelligence officials have long been concerned about the security of the country’s electrical grid. The recent attack, striking almost simultaneously at multiple locations, is testing the government’s ability to coordinate an effective response among several private utilities, state and local officials, and industry regulators.

Specialised teams from Homeland Security and the FBI have been scrambled to help extricate the hackers from the power stations, in some cases without informing local and state officials. Meanwhile, the US National Security Agency is working to confirm the identity of the hackers, who are said to be using computer servers in Germany, Italy, Malaysia and Turkey to cover their tracks.

Many of the power plants are conventional, but the targeting of a nuclear facility adds to the pressure. While the core of a nuclear generator is heavily protected, a sudden shutdown of the turbine can trigger safety systems. These safety devices are designed to disperse excess heat while the nuclear reaction is halted, but the safety systems themselves may be vulnerable to attack.

Homeland Security and the FBI sent out a general warning about the cyber attack to utilities and related parties on June 28, though it contained few details or the number of plants affected. The government said it was most concerned about the “persistence” of the attacks on choke points of the US power supply. That language suggests hackers are trying to establish backdoors on the plants’ systems for later use, according to a former senior DHS official who asked not to be identified.

Those backdoors can be used to insert software specifically designed to penetrate a facility’s operational controls and disrupt critical systems, according to Galina Antova, co-founder of Claroty, a New York firm that specialises in securing industrial control systems.

“We’re moving to a point where a major attack like this is very, very possible,” Antova said. “Once you’re into the control systems -- and you can get into the control systems by hacking into the plant’s regular computer network -- then the basic security mechanisms you’d expect are simply not there.”

The situation is a little different at nuclear facilities. Backup power supplies and other safeguards at nuclear sites are meant to ensure that “you can’t really cause a nuclear plant to melt down just by taking out the secondary systems that are connected to the grid,” Edwin Lyman, a nuclear expert with the Union of Concerned Scientists, said in a phone interview.

The operating systems at nuclear plants also tend to be legacy controls built decades ago and don’t have digital control systems that can be exploited by hackers. Wolf Creek, for example, began operations in 1985. “They’re relatively impervious to that kind of attack,” Lyman said.

The alert sent out last week inadvertently identified Wolf Creek as one of the victims of the attack. An analysis of one of the tools used by the hackers had the stolen credentials of a plant employee, a senior engineer. A US official acknowledged the error was not caught until after the alert was distributed.

According to a security researcher who has seen the report, the malware that activated the engineer’s username and password was designed to be used once the hackers were already inside the plant’s computer systems.

The tool tries to connect to non-public computers, and may have been intended to identify systems related to Wolf Creek’s generation plant, a part of the facility typically more modern than the nuclear reactor control room, according to a security expert who asked to note be identified because the alert is not public.

Even if there is no indication that the hackers gained access to those control systems, the design of the malware suggests they may have at least been looking for ways to do so, the expert said.

Stan Luke, the mayor of Burlington, the largest community near Wolf Creek, which is surrounded by corn fields and cattle pastures, said he learned about a cyber threat at the plant only recently, and then only through golfing buddies.

With a population of just 2,700, Burlington boasts a community pool with three water slides and a high school football stadium that would be the envy of any junior college. Luke said those amenities lead back to the tax dollars poured into the community by Wolf Creek, Coffey County’s largest employer with some 1,000 workers, 600 of whom live in the county.

E&E News first reported on digital attacks targeting US nuclear plants, adding it was code-named Nuclear 17. A senior US official told Bloomberg that there was a bigger breach of conventional plants, which could affect multiple regions.

Industry experts and US officials say the attack is being taken seriously, in part because of recent events in Ukraine. Antova said that the Ukrainian power grid has been disrupted at least twice, first in 2015, and then in a more automated attack last year, suggesting the hackers are testing methods.

Scott Aaronson, executive director for security and business continuity at the Edison Electric Institute, an industry trade group, said utilities, grid operators and federal officials were already dissecting the attack on Ukraine’s electric sector to apply lessons in North America before the US government issued the latest warning to “energy and critical manufacturing sectors”. The current threat is unrelated to recently publicised ransomware incidents or the CrashOverride malware, Mr Aaronson said in an emailed statement.

Neither attack in Ukraine caused long-term damage. But with each escalation, the hackers may be gauging the world’s willingness to push back.

“If you think about a typical war, some of the acts that have been taken against critical infrastructure in Ukraine and even in the US, those would be considered crossing red lines,” Antova said.

 

Related News

View more

Energy crisis: EU outlines possible gas price cap strategies

EU Gas Price Cap Strategies aim to curb inflation during an energy crisis by capping wholesale gas and electricity generation costs, balancing supply and demand, mitigating subsidies, and safeguarding supply security amid Russia-Ukraine shocks.

 

Key Points

Temporary EU measures to cap gas and power prices, curb inflation, manage demand, and protect supply security.

✅ Flexible temporary price limits to secure gas supplies

✅ Framework cap on gas for electricity generation with demand checks

✅ Risk: subsidies, higher demand, and market distortions

 

The European Commission has outlined possible strategies to cap gas prices as the bloc faces a looming energy crisis this winter. 

Member states are divided over the emergency measures designed to pull down soaring inflation amid Russia's war in Ukraine. 

One proposal is a temporary "flexible" limit on gas prices to ensure that Europe can continue to secure enough gas, EU energy commissioner Kadri Simson said on Tuesday. 

Another option could be an EU-wide "framework" for a price cap on gas used to generate electricity, which would be combined with measures to ensure gas demand does not rise as a result, she said.

EU leaders are meeting on Friday to debate gas price cap strategies amid warnings that Europe's energy nightmare could worsen this winter.

Last week, France, Italy, Poland and 12 other EU countries urged the Commission to propose a broader price cap targeting all wholesale gas trade. 

But Germany -- Europe's biggest gas buyer -- and the Netherlands are among those opposing electricity market reforms within the bloc.

Russia has slashed gas deliveries to Europe since its February invasion of Ukraine, with Moscow blaming the cuts on Western sanctions imposed in response to the invasion, as the EU advances a plan to dump Russian energy across the bloc.

Since then, the EU has agreed on emergency laws to fill gas storage and windfall profit levies to raise money to help consumers with bills. 

Price cap critics
One energy analyst told Euronews that an energy price cap was an "unchartered territory" for the European Union. 

The EU's energy sector is largely liberalised and operates under the fundamental rules of supply and demand, making rolling back electricity prices complex in practice.

"My impression is that member states are looking at prices and quantities in isolation and that's difficult because of economics," said Elisabetta Cornago, a senior energy researcher at the Centre for European Reform.

"It's hard to picture such a level of market intervention This is uncharted territory."

The energy price cap would "quickly start costing billions" because it would force governments to continually subsidise the difference between the real market price and the artificially capped price, another expert said. 

"If you are successful and prices are low and you still get gas, consumers will increase their demand: low price means high demand. Especially now that winter is coming," said Bram Claeys, a senior advisor at the Regulatory Assistance Project. 

 

Related News

View more

Experiment Shows We Can Actually Generate Electricity From The Night Sky

Nighttime thermoradiative power converts outgoing infrared radiation into electricity using semiconductor photodiodes, leveraging negative illumination and sky cooling to harvest renewable energy from Earth-to-space heat flow when solar panels rest, regardless of weather.

 

Key Points

Nighttime thermoradiative power converts Earth's outgoing infrared heat into electricity using semiconductor diodes.

✅ Uses negative illumination to tap Earth-to-space heat flow

✅ Infrared semiconductor photodiodes generate small nighttime current

✅ Theoretical output ~4 W/m^2; lab demo reached 64 nW/m^2

 

There's a stark contrast between the freezing temperatures of space and the relatively balmy atmosphere of Earth, and that contrast could help generate electricity, scientists say – and alongside concepts such as space-based solar power, utilizing the same optoelectronic physics used in solar panels. The obvious difference this would have compared with solar energy is that it would work during the night time, a potential source of renewable power that could keep on going round the clock and regardless of weather conditions.

Solar panels are basically large-scale photodiodes - devices made out of a semiconducting material that converts the photons (light particles) coming from the Sun into electricity by exciting electrons in a material such as silicon, while concepts like space solar beaming could complement them during adverse weather.

In this experiment, the photodiodes work 'backwards': as photons in the form of infrared radiation - also known as heat radiation - leave the system, a small amount of energy is produced, similar to how raindrop electricity harvesting taps ambient fluxes in other experiments.

This way, the experimental system takes advantage of what researchers call the "negative illumination effect" – that is, the flow of outgoing radiation as heat escapes from Earth back into space. The setup explained in the new study uses an infrared semiconductor facing into the sky to convert this flow into electrical current.

"The vastness of the Universe is a thermodynamic resource," says one of the researchers, Shanhui Fan from Stanford University in California.

"In terms of optoelectronic physics, there is really this very beautiful symmetry between harvesting incoming radiation and harvesting outgoing radiation."

It's an interesting follow-up to a research project Fan participated in last year: a solar panel that can capture sunlight while also allowing excess heat in the form of infrared radiation to escape into space.

In the new study, this "energy harvesting from the sky" process can produce a measurable amount of electricity, the researchers have shown – though for the time being it's a long way from being efficient enough to contribute to our power grids, but advances in peer-to-peer energy sharing could still make niche deployments valuable.

In the team's experiments they were able to produce 64 nanowatts per square metre (10.8 square feet) of power – only a trickle, but an amazing proof of concept nevertheless. In theory, the right materials and conditions could produce a million times more than that, and analyses of cheap abundant electricity show how rapidly such advances compound, reaching about 4 watts per square metre.

"The amount of power that we can generate with this experiment, at the moment, is far below what the theoretical limit is," says one of the team, Masashi Ono from Stanford.

When you consider today's solar panels are able to generate up to 100-200 watts per square metre, and in China solar is cheaper than grid power across every city, this is obviously a long way behind. Even in its earliest form, though, it could be helpful for keeping low-power devices and machines running at night: not every renewable energy device needs to power up a city.

Now that the researchers have proved this can work, the challenge is to improve the performance of the experimental device. If it continues to show promise, the same idea could be applied to capture energy from waste heat given off by machinery, and results in humidity-powered generation suggest ambient sources are plentiful.

"Such a demonstration of direct power generation of a diode facing the sky has not been previously reported," explain the researchers in their published paper.

"Our results point to a pathway for energy harvesting during the night time directly using the coldness of outer space."

The research has been published in Applied Physics Letters.

 

Related News

View more

Operating record for Bruce Power as Covid-19 support Council announced

Bruce Power Life-Extension Programme advances Ontario nuclear capacity through CANDU Major Component Replacement, reliable operation milestones, supply chain retooling for COVID-19 recovery, PPE production, ventilator projects, and medical isotope supply security.

 

Key Points

A program to refurbish CANDU reactors, extend asset life, and mobilize Ontario nuclear supply chain and isotopes.

✅ Extends CANDU units via Major Component Replacement

✅ Supports COVID-19 recovery with PPE and ventilator projects

✅ Boosts Ontario energy reliability and medical isotopes

 

Canada’s Bruce Power said on 1 May that unit 1 at the Bruce nuclear power plant had set a record of 624 consecutive days of reliable operation – the longest since it was returned to service in 2012.

It exceeded Bruce 8’s run of 623 consecutive days between May 2016 and February 2018. Bruce 1, a Candu reactor, was put into service in 1977. It was shut down and mothballed by the former Ontario Hydro in 1997, and was refurbished and returned to service in 2012 by Bruce Power.

Bruce units 3 and 4 were restarted in 2003 and 2004. They are part of Bruce Power’s Life-Extension Programme, and future planning such as Bruce C project exploration continues across the fleet, with units 3 and 4 to undergo Major Component Replacement (MCR) Projects from 2023-28, adding about 30 years of life to the reactors.

The refurbishment of Bruce 6 has begun and will be followed by MCR Unit 3 which is scheduled to begin in 2023. Nuclear power accounts for more than 60% of Ontario’s supply, with Bruce Power providing more than 30%   of the province’s electricity.

Set up of Covid recovery council
On 30 April, Bruce Power announced the establishment of the Bruce Power Retooling and Economic Recovery Council to leverage the province’s nuclear supply chain to support Ontario’s fight against Covid-19 and to help aid economic recovery.

Bruce Power’s life extension programme is Canada’s second largest infrastructure project and largest private sector infrastructure programme. It is creating 22,000 direct and indirect jobs, delivering economic benefits that are expected to contribute $4 billion to Ontario’s GDP and $8-$11 billion to Canada’s gross domestic product (GDP), Bruce Power said.

“With 90% of the investment in manufactured goods and services coming from 480 companies in Ontario and other provinces, including recent manufacturing contracts with key suppliers, we can harness these capabilities in the fight against Covid-19, and help drive our economic recovery,” the company said.

“An innovative and dynamic nuclear supply chain is more important than ever in meeting this new challenge while successfully implementing our mission of providing clean, reliable, flexible, low-cost nuclear energy and a global supply of medical isotopes,” said Bruce Power president and CEO Mike Rencheck. “We are mobilising a great team with our extended supply chain, which spans the province, to assist in the fight against Covid-19 and to help drive our economic recovery in the future.”

Greg Rickford, the Minister of Energy, Mines, Northern Development, and Minister of Indigenous Affairs, said the launch of the council is consistent with Ontario’s focus to fight Covid-19 as a top priority and a look ahead to economic recovery, and initiatives like Pickering life extensions supporting long-term system reliability.

The creation of the Council was announced during a live event on Bruce Power's Facebook page, in which Rencheck was joined by Associate Minister of Energy Bill Walker and Rocco Rossi, the president and CEO of the Ontario Chamber of Commerce.

Walker reiterated the Government of Ontario’s commitment to nuclear power over the long term and to the life extension programme, including the Pickering B refurbishment as part of this strategy.

The Council, which will be formed for the duration of the pandemic and will include of all of Bruce Power’s Ontario-based suppliers, will focus on the continued retooling of the supply chain to meet front-line Covid-19 needs to contribute to the province’s economy recovery in the short, medium and long term.

New uses for nuclear medical applications will be explored, including isotopes for the sterilisation of medical equipment and long-term supply security.

The supply chain will be leveraged to support the health care sector through the rapid production of medical Personal Protection Equipment for front line-workers and large-scale PPE donations to communities as well as participation in pilot projects to make ventilators within the Bruce Power supply chain or help identify technology to better utilise existing ventilators;

“Buy Local” tools and approaches will be emphasised to ensure small businesses are utilised fully in communities where nuclear suppliers are located.

The production of hand sanitiser and other cleaning products will be facilitated for distribution to communities.

 

Related News

View more

Mines found at Ukraine's Zaporizhzhia nuclear plant, UN watchdog says

Zaporizhzhia Nuclear Plant Mines reported by IAEA at the Russian-occupied site: anti-personnel devices in a buffer zone, restricted areas; access limits to reactor rooftops and turbine halls heighten nuclear safety and security concerns in Ukraine.

 

Key Points

IAEA reports anti-personnel mines at Russian-held Zaporizhzhia, raising nuclear safety risks in buffer zones.

✅ IAEA observes mines in buffer zone at occupied site

✅ Restricted areas; no roof or turbine hall access granted

✅ Safety systems unaffected, but staff under pressure

 

The United Nations atomic watchdog said it saw anti-personnel mines at the site of Ukraine's Zaporizhzhia nuclear power plant which is occupied by Russian forces.

Europe's largest nuclear facility fell to Russian forces shortly after the invasion of Ukraine in February last year, as Moscow later sought to build power lines to reactivate it amid ongoing control of the area. Kyiv and Moscow have since accused each other of planning an incident at the site.

On July 23 International Atomic Energy Agency (IAEA) experts "saw some mines located in a buffer zone between the site's internal and external perimeter barriers," agency chief Rafael Grossi said in a statement on Monday.

The statement did not say how many mines the team had seen.

The devices were in "restricted areas" that operating plant personnel cannot access, Mr Grossi said, adding the IAEA's initial assessment was that any detonation "should not affect the site's nuclear safety and security systems".

Laying explosives at the site was "inconsistent with the IAEA safety standards and nuclear security guidance" and, amid controversial proposals on Ukraine's nuclear plants that have circulated internationally, created additional psychological pressure on staff, he added.

Ukrainians in Nikopol are out of water and within Russia's firing line. But Zaporizhzhia nuclear power plant could pose the biggest threat, even as Ukraine has resumed electricity exports to regional grids.

Last week the IAEA said its experts had carried out inspections at the plant, without "observing" the presence of any mines, although they had not been given access to the rooftops of the reactor buildings, while a possible agreement to curb attacks on plants was being discussed.

The IAEA had still not been given access to the roofs of the reactor buildings and their turbine halls, its latest statement said, even as a proposal to control Ukraine's nuclear plants drew scrutiny.

After falling into Russian hands, Europe's biggest power plant was targeted by gunfire and has been severed from the grid several times, raising nuclear risk warnings from the IAEA and others.

The six reactor units, which before the war produced around a fifth of Ukraine's electricity, have been shut down for months, prompting interest in wind power development as a harder-to-disrupt source.

 

Related News

View more

Sign Up for Electricity Forum’s Newsletter

Stay informed with our FREE Newsletter — get the latest news, breakthrough technologies, and expert insights, delivered straight to your inbox.

Electricity Today T&D Magazine Subscribe for FREE

Stay informed with the latest T&D policies and technologies.
  • Timely insights from industry experts
  • Practical solutions T&D engineers
  • Free access to every issue

Live Online & In-person Group Training

Advantages To Instructor-Led Training – Instructor-Led Course, Customized Training, Multiple Locations, Economical, CEU Credits, Course Discounts.

Request For Quotation

Whether you would prefer Live Online or In-Person instruction, our electrical training courses can be tailored to meet your company's specific requirements and delivered to your employees in one location or at various locations.