The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Ensuring system reliability and security while operating electricity markets is the primary responsibility of independent system operators. Maintaining system security in real-time is a significant challenge due to limited time frame permitted for analyzing and responding to security issues. This paper focuses on the applications designed to address static security in the real-time operations of ERCOT...
Security constrained optimal VAR despatch using 3500 bus Great Britain transmission planning models is investigated in this paper. The investigation demonstrates the value of applying practical reactive branch flow constraints to generator transformers in order to limit the pre-fault reactive utilization. This research also demonstrates that a multi-staged optimization approach can be used to remove...
The feasibility and potential benefits of the system-wide Automatic Voltage Control (AVC) in PJM system are studied in this paper. A test AVC system with a hierarchical structure is adopted for simulation study, which is based on eight typical real-time snapshots from the solutions of state estimator in the PJM's Energy Management System (EMS). For each snapshot, the control action simulation is executed...
While it is difficult to estimate how much distributed generation (DG) capacity will be connected to distribution systems in the coming years, it is certain that increasing penetration levels require robust tools that help assess the capabilities and requirements of the networks in order to produce the best planning strategies. This work presents an overview of some of the uses to which a tailored...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.