The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Security constrained scheduling has been widely implemented in various power system operations and electricity markets. The practice of securing post-contingency flows preventively to long-term ratings has resulted in transmission network under-utilization. This paper presents a security constrained scheduling process that has been implemented in the National Grid Electricity Balancing System. The...
Cyber-Physical Security Testbeds serve as valuable experimental platforms to implement and evaluate realistic, complex cyber attack-defense experiments. Testbeds, unlike traditional simulation platforms, capture communication, control and physical system characteristics and their interdependencies adequately in a unified environment. In this paper, we show how the PowerCyber CPS testbed at Iowa State...
In this paper we propose a robust method to determine, allocate and price the contingency reserves required to fully comply with N-1 security criteria in real-time operations. Unlike the traditional fixed reserve requirement, the method identifies adequate reserves in terms of type, quantity and location, needed to respond to expected generation outages. The provision of energy and responsive reserves...
This paper develops and presents an adaptive market-based load shedding scheme that provides options for adaptive selection of loads in real-time. Therefore an ancillary market-based system where consumers as well as system operator have options to contribute to system security can be evolved. All existing load shedding schemes are based on system operator's assessment and emphasize system security...
A method that exploits Thevenin equivalent representation for obtaining post-contingency steady-state nodal voltages is integrated with a method of detecting post-contingency aperiodic small-signal instability. The task of integrating stability assessment with contingency assessment is challenged by the cases of unstable post-contingency conditions. For unstable postcontingency conditions there exists...
The high penetration of distributed generation (DG) sources in distribution networks (DN) can induce overvoltage issues. In this paper, an optimal and fair real power capping method (RPCM) for voltage regulation in DN with high photovoltaic (PV) penetration is proposed. Based on the forecasting of solar radiance and load profiles, the method optimally dispatches the generation of PVs to prevent overvoltage...
One of the main factors impacting the system reliability nowadays is the growing interdependence between electricity and gas networks due to the increase in the installation of gas units. Security-constrained unit commitment (SCUC) models are utilized to economically schedule generating units without compromising the system reliability. This paper proposes a novel SCUC formulation that includes dynamic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.