Methodology of security region and practical results

被引:0
|
作者
Yu, Yi-Xin [1 ]
机构
[1] Sch. of Elec. and Automat. Eng., Tianjin Univ., Tianjin 300072, China
关键词
Electric power systems - Optimization - Probabilistic logics - Security systems - Stability;
D O I
暂无
中图分类号
学科分类号
摘要
Some superiority of security regions is illustrated. Then we define the so called practical dynamic security region (PDSR) in power injection space which guarantees transient stability and the practical security region to guarantee static voltage stability (CVSR) in cut-set power flow space. Based on the above definitions, two important facts for practical applications are given. Finally, the paper explained why, based on the hyper-plane descriptions of the boundaries of the PDSR and CVSR, the computation burden of probabilistic security assessment of power system can be reduced dramatically and the difficulties of dealing with stability constraints in the problems of solving for optimal power flow and ATC can be overcome easily.
引用
收藏
页码:525 / 528
相关论文
共 50 条
  • [31] A Methodology for Mining Security Tactics from Security Patterns
    Ryoo, Jungwoo
    Laplante, Phil
    Kazman, Rick
    43RD HAWAII INTERNATIONAL CONFERENCE ON SYSTEMS SCIENCES VOLS 1-5 (HICSS 2010), 2010, : 875 - 879
  • [32] On the Security of a Practical Identification Scheme
    Victor Shoup
    Journal of Cryptology, 1999, 12 : 247 - 260
  • [33] A practical approach to enterprise IT security
    Liu, S.
    Sullivan, J.
    Ormaner, J.
    IT Professional, 2001, 3 (05) : 35 - 42
  • [34] Methodology for the design of security plans
    Paardekooper & Hoffman, Rotterdam, Netherlands
    Comput Secur, 7 (633-643):
  • [35] The Security Risk Assessment Methodology
    Liu, Chunlin
    Tan, Chong-Kuan
    Fang, Yea-Saen
    Lok, Tat-Seng
    INTERNATIONAL SYMPOSIUM ON SAFETY SCIENCE AND ENGINEERING IN CHINA, 2012, 2012, 43 : 600 - 609
  • [36] INFORMATION SECURITY - A PRACTICAL APPROACH
    STAPLES, E
    OFFICE ADMINISTRATION AND AUTOMATION, 1985, 46 (01): : 79 - 79
  • [37] On the security of a practical identification scheme
    Shoup, V
    ADVANCES IN CRYPTOLOGY - EUROCRYPT '96, 1996, 1070 : 344 - 353
  • [38] A methodology for the design of security plans
    deKoning, WF
    COMPUTERS & SECURITY, 1995, 14 (07) : 633 - 643
  • [39] Cryptography and the methodology of provable security
    Stern, J
    APPLIED ALGEBRA, ALGEBRAIC ALGORITHMS AND ERROR-CORRECTING CODES, PROCEEDINGS, 2003, 2643 : 1 - 5
  • [40] An evaluation methodology for the security of cryptosystems
    Laabidi, Selma
    Robisson, Bruno
    Agoyan, Michel
    PRIME: 2008 PHD RESEARCH IN MICROELECTRONICS AND ELECTRONICS, PROCEEDINGS, 2008, : 113 - 115