Methodology of security region and practical results

被引:0
|
作者
Yu, Yi-Xin [1 ]
机构
[1] Sch. of Elec. and Automat. Eng., Tianjin Univ., Tianjin 300072, China
关键词
Electric power systems - Optimization - Probabilistic logics - Security systems - Stability;
D O I
暂无
中图分类号
学科分类号
摘要
Some superiority of security regions is illustrated. Then we define the so called practical dynamic security region (PDSR) in power injection space which guarantees transient stability and the practical security region to guarantee static voltage stability (CVSR) in cut-set power flow space. Based on the above definitions, two important facts for practical applications are given. Finally, the paper explained why, based on the hyper-plane descriptions of the boundaries of the PDSR and CVSR, the computation burden of probabilistic security assessment of power system can be reduced dramatically and the difficulties of dealing with stability constraints in the problems of solving for optimal power flow and ATC can be overcome easily.
引用
收藏
页码:525 / 528
相关论文
共 50 条
  • [21] Practical steady-state security region of loop-containing active distribution networks
    Sun, Daowu
    Yu, Yixin
    2023 IEEE POWER & ENERGY SOCIETY GENERAL MEETING, PESGM, 2023,
  • [22] Qualitative Methodology: A Practical Guide
    Mulholland, Val
    IN EDUCATION, 2014, 20 (01): : 102 - 104
  • [23] A PRACTICAL METHODOLOGY FOR AMBULANCE LOCATION
    UYENO, DH
    SEEBERG, C
    SIMULATION, 1984, 43 (02) : 79 - 87
  • [24] A Practical Methodology for Integration Testing
    Castro, Laura M.
    Francisco, Miguel A.
    Gulias, Victor M.
    COMPUTER AIDED SYSTEMS THEORY - EUROCAST 2009, 2009, 5717 : 881 - +
  • [25] Practical HPLC methodology and applications
    Lunte, S.M.
    Bidlingmeyer, B.A.
    Journal of the American Chemical Society, 1995, 117 (09)
  • [26] JUSTIFICATION AND METHODOLOGY IN PRACTICAL ETHICS
    KLEPPER, H
    METAPHILOSOPHY, 1995, 26 (03) : 201 - 219
  • [27] Methodology and results
    Styles, Katherine
    Rastogi, Anshul
    Hussain, Sufyan
    Abraham, Sonya
    CLINICAL MEDICINE, 2009, 9 (05) : 506 - 507
  • [29] A methodology for assessing IS security controls
    Pattinson, MR
    INFORMATION TECHNOLOGY AND ORGANIZATIONS: TRENDS, ISSUES, CHALLENGES AND SOLUTIONS, VOLS 1 AND 2, 2003, : 240 - 243
  • [30] DOJ unveils security methodology
    Franz, N
    CHEMICAL WEEK, 2002, 164 (26) : 13 - 13