The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents an efficient security assessment system for validating power system operation planning, which has been used in Henan provincial power grid in China. Daily operation planning is to schedule unit commitment and to dispatch generator output economically considering next day generators and transmission components' maintenance planning. The security assessment for validating the daily...
This paper proposes a level playing field for the supply of reactive power ancillary services, wherein not only synchronous generators, but other providers of reactive power are also paid for their services. An Optimal Power Flow (OPF)-based reactive power dispatch model is proposed based on the reactive power payment mechanisms existent in Ontario. Novel cost models are proposed for Static VAR Compensators...
A new optimal power flow (OPF) model accounts for electro-thermal coupling relationship is established based on electro-thermal coordination (ETC) concept in this paper This new OPF model organically combines the traditional OPF with heat balance equation (HBE) which reflects thermal dynamic process of transmission component. It considers the temperature limit of transmission component as its security...
In this paper, we propose a novel self-evolving multi-agent methodology (MAM) for power system monitoring and protection. The uniqueness of the proposed architecture is the ability of MAM to evolve in the wake of an attack of malicious intent by mutation and thus always monitoring a power system bus remotely. Also, the architecture interacting with the mutated agents uses a voting methodology thus...
Protection security assessment of power grids becomes an important task in the course of a competitive energy business and a decarbonized power generation. The analysis of past blackouts studied by the North American Electric Reliability Council (NERC) shows that protection relays are involved in about 75% of all major disturbances. One reason for that is the non adequate adaption of the protection...
In real-time operations, online DSA applications can be used not only to perform security assessment for the current operating point but also to search boundaries of security region for operations staff to prepare for the next step generation dispatch and calculate transfer limits for market operations. This paper analyses the issues that were encountered when dealing with future re-configurations...
Electricity infrastructure touches us all - the key challenge, pertinent to this panel session, is to enable secure and very high-confidence sensing, communication and control of a heterogeneous, widely dispersed, yet globally interconnected system, which is a serious technological problem in any case. It is even more complex and difficult to control it for optimal efficiency and maximum benefit to...
Voltage vulnerability has been important in power system security research. Considering the characteristic that the voltage are mainly influenced by the reactive power, the potential energy margin which can embody the impacts from the reactive load, the reactive output of generator, the reactive compensation, and so on, was proposed as the benchmark, and then, the degree index and the trend index...
Security constrained unit commitment (SCUC) is one of the most important daily tasks that independent system operators (ISOs) or regional transmission organizations (RTOs) must accomplish in daily electric power market. Identifying the feasibility of the unit commitment state with security constraints is crucial for solving SCUC problems. If the feasibility of unit commitment state can be identified...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.