Home About us Contact | |||
Security Assessment (security + assessment)
Selected AbstractsOn-line dynamic security assessment to mitigate the risk of blackout in the Italian power systemEUROPEAN TRANSACTIONS ON ELECTRICAL POWER, Issue 8 2008Diego Cirio Abstract This paper provides a comprehensive survey of the major initiatives and research projects recently carried out by the Italian system operator, Cesi Ricerca, and Universities on power system monitoring, defense, and security assessment. The technological and methodological features of an advanced wide area measurement system (WAMS) are described and the main aspects of an adaptive system for event-based automatic load shedding are presented. Then preventive and corrective security assessment, with particular emphasis to dynamic security assessment,DSA, is introduced. Results from an EU project, where the Italian power system served as a test site for on-line experimentation, are reported. Considering the need for very fast assessment by stability indices, a complementary approach to the above "conventional" DSA, currently under way, is described in further detail. The methodology relies on a correlation model relating significant power system measurements with local loadability margins. Results of some tests on the Italian power system are presented and discussed. Copyright © 2008 John Wiley & Sons, Ltd. [source] An efficient methodology for security assessment of power systems based on distributed optimal power flowEUROPEAN TRANSACTIONS ON ELECTRICAL POWER, Issue 3 2003D. Hur This paper presents an algorithm for the parallel solution of the security constrained optimal power flow (SCOPF) problem in a decentralized framework, consisting of regions, using a price-based mechanism that models each region as an economic unit. We first solve the distributed optimal power flow (OPF) problem to determine the maximum secure simultaneous transfer capability of each tie-line between adjacent regions by taking only the security constraints imposed on the tie-lines into account. In this paper, the line outage distribution factors (LODF) calculated at the current state are used to formulate the appended constraints. Once the secure transfer capability of each tie-line is determined, the intra-regional SCOPF is performed using the conventional linear programming (LP) approach. A description on the inclusion of security constraints with distributed OPF algorithm will be given, followed by the case study for Korea Electric Power System. [source] An advanced methodology for steady-state security assessment of power systemsEUROPEAN TRANSACTIONS ON ELECTRICAL POWER, Issue 4 2001D. P. Popovic The basic objective of this paper is to present the relevant aspects of an advanced methodology for steady-state security assessment of power systems. This methodology consists of the following relevant parts: procedure for forming the unified external network equivalents, with adaptive buffer system selection, procedure for fast contingency selection and simple method for the fast and sufficiently accurate assessment of dynamic variation of power system frequency during the time of its primary control. For the potentially critical contingency, the continuation of iterative procedure is performed. Full contingency analysis is based on specially developed method, which enables successive solution of the load-flow problem for a set of characteristic post-dynamic quasi-stationary states. The characteristics of the developed methodology are tested on the example of the existing electric power interconnection in the Balkans. [source] Learning to recognize vulnerable patterns due to undesirable Zone-3 relay operationsIEEJ TRANSACTIONS ON ELECTRICAL AND ELECTRONIC ENGINEERING, Issue 3 2009Koji Yamashita Member Abstract Undesirable zone 3 relay operations caused by unexpected loading conditions can contribute to the cascaded events, leading to catastrophic outages. Identifying the basic patterns of zone 3 relay operations in advance is an effective way to help prevent cascaded events. The postcontingency impedances seen by zone 3 relays can be calculated on line in a steady state security assessment framework. However, their accuracy is inadequate compared with the postcontingency apparent impedance obtained from off-line time domain dynamic simulations. This paper proposes a fuzzy inference system (FIS) to correct discrepancies between the postcontingency apparent impedances obtained from the results of steady state security assessment and the corresponding values obtained by time-domain simulations. The postcontingency apparent impedances obtained from the results of steady state security assessment can be corrected on line using correction terms provided by the FIS. The dynamic model of a 200-bus system is used to validate the performance of the proposed FIS. Copyright © 2009 Institute of Electrical Engineers of Japan. Published by John Wiley & Sons, Inc. [source] |