The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Trico Electric Cooperative Inc (Trico) is a nonprofit cooperative serving more than 38,000 rural customers in southern Arizona. Trico is challenged with managing a distribution system with a wide geographical dispersion. Trico required a system to centralize, control and manage access to all of its substation devices and related data. Trico sought to diversify available substation information and...
A methodology to solve the network expansion planning problem considering N-1 security criterion is proposed. The main idea to achieve the desired results is to separate the whole problem into two subproblems and solve them iteratively. The aim of upper level problem is to solve the mixed-integer programming model with all identified constraints. For the lower level problem, all N-1 contingencies...
Ensuring system reliability and security while operating electricity markets is the primary responsibility of independent system operators. Maintaining system security in real-time is a significant challenge due to limited time frame permitted for analyzing and responding to security issues. This paper focuses on the applications designed to address static security in the real-time operations of ERCOT...
This paper presents an efficient security assessment system for validating power system operation planning, which has been used in Henan provincial power grid in China. Daily operation planning is to schedule unit commitment and to dispatch generator output economically considering next day generators and transmission components' maintenance planning. The security assessment for validating the daily...
This paper presents the practical experience of the Brazilian System Operator with the online dynamic security assessment. More specifically, it describes the adopted models, analytical methods and functions, performance, EMS integration, user interface and implementation issues. Examples of situations in which the online security assessment was very useful are also shown.
Security constrained optimal VAR despatch using 3500 bus Great Britain transmission planning models is investigated in this paper. The investigation demonstrates the value of applying practical reactive branch flow constraints to generator transformers in order to limit the pre-fault reactive utilization. This research also demonstrates that a multi-staged optimization approach can be used to remove...
The complex system architecture required to support smart grid technology introduces an undetermined level of risk in power systems. Many current techniques to evaluate cyber specific risk fail to scale to such a large environment. While attack graphs and trees are frequently used to model system security, both approaches require the ability to predict potential attack vectors. Access graphs have...
Methods for the assessment of the dynamic network security, with regard to the installed protection system, are introduced. Currently, an accordant online system is under development together with European Universities and European Transmission System Operators. Here, the purpose is the observation of the security of the overall system, consisting of primary network and the superimposed interacting...
The electricity generation sector is currently under strong pressure to curb emissions of greenhouse gases. To achieve this, targets on the amount of energy that needs to come from “green” power sources are being imposed around the world. In response to these targets, large amounts of wind power generation are being integrated and are likely to represent soon a significant share of the overall generation...
In this paper, we propose a novel self-evolving multi-agent methodology (MAM) for power system monitoring and protection. The uniqueness of the proposed architecture is the ability of MAM to evolve in the wake of an attack of malicious intent by mutation and thus always monitoring a power system bus remotely. Also, the architecture interacting with the mutated agents uses a voting methodology thus...
The maintenance of secure system operations is a highly challenging task that becomes even more complex as electricity markets gain prominence. We use insights into the tight coupling between market and system operations under restructuring to characterize analytically the interrelationships between the secure power system operations and the performance of the electricity markets. Such a characterization...
Although a desirable attribute, not all operations models currently make use of real-time data for various reasons. To say the least, the regional scope and comprehensiveness that current data encompasses may be considered limited and incomplete. However, as computational, communication, security, and instrumentation technologies advance, smart grid technology demonstrates the potential to radically...
Hydro-Québec has a long interest in on-line dynamic security assessment (DSA) necessitated by its challenging power network dynamics (transient, fast and slow voltage collapse). We are presently using off-line calculated security indicators and an on-line monitoring system approach. Every 5 seconds our system provides dynamic security limits, the impact of each out-of-service component, simple guidelines...
Protection security assessment of power grids becomes an important task in the course of a competitive energy business and a decarbonized power generation. The analysis of past blackouts studied by the North American Electric Reliability Council (NERC) shows that protection relays are involved in about 75% of all major disturbances. One reason for that is the non adequate adaption of the protection...
In real-time operations, online DSA applications can be used not only to perform security assessment for the current operating point but also to search boundaries of security region for operations staff to prepare for the next step generation dispatch and calculate transfer limits for market operations. This paper analyses the issues that were encountered when dealing with future re-configurations...
Pricing for the use of the networks is essential in the way that it should be able to reflect the costs/benefits imposed on a network when connecting a new generator or demand and to provide forward-looking message to influence the site and size of future network customers. Studies have been extensively carried out over the years to achieve this pricing goal. Few methodologies that can directly link...
Recent regulatory requirements in the United States, and the growing complexity of transmission grids worldwide, have prompted the need for greater substation data communications security. Pacific Gas and Electric (PG&E) required a comprehensive security solution for providing and controlling access to intelligent electronic devices (IEDs) within its substations. Using a combination of commercial...
While it is difficult to estimate how much distributed generation (DG) capacity will be connected to distribution systems in the coming years, it is certain that increasing penetration levels require robust tools that help assess the capabilities and requirements of the networks in order to produce the best planning strategies. This work presents an overview of some of the uses to which a tailored...
Electricity infrastructure touches us all - the key challenge, pertinent to this panel session, is to enable secure and very high-confidence sensing, communication and control of a heterogeneous, widely dispersed, yet globally interconnected system, which is a serious technological problem in any case. It is even more complex and difficult to control it for optimal efficiency and maximum benefit to...
In this paper, a method of decision tree-based computation of security regions and boundaries for power systems is proposed. These computations are used in dynamic security enhancement via generation rescheduling against transient instabilities. This work also involves an iterative method of generation rescheduling using the security regions calculated by decision trees. The proposed methods are implemented...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.