Methodology of security region and practical results

被引:0
|
作者
Yu, Yi-Xin [1 ]
机构
[1] Sch. of Elec. and Automat. Eng., Tianjin Univ., Tianjin 300072, China
关键词
Electric power systems - Optimization - Probabilistic logics - Security systems - Stability;
D O I
暂无
中图分类号
学科分类号
摘要
Some superiority of security regions is illustrated. Then we define the so called practical dynamic security region (PDSR) in power injection space which guarantees transient stability and the practical security region to guarantee static voltage stability (CVSR) in cut-set power flow space. Based on the above definitions, two important facts for practical applications are given. Finally, the paper explained why, based on the hyper-plane descriptions of the boundaries of the PDSR and CVSR, the computation burden of probabilistic security assessment of power system can be reduced dramatically and the difficulties of dealing with stability constraints in the problems of solving for optimal power flow and ATC can be overcome easily.
引用
收藏
页码:525 / 528
相关论文
共 50 条
  • [41] A Methodology for Testing Virtualisation Security
    Donaldson, Scott
    Coull, Natalie
    McLuskie, David
    2017 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBER SA), 2017,
  • [42] METHODOLOGY OF MAINTENANCE OF THE ECONOMIC SECURITY
    Senchagov, V. K.
    EKONOMIKA REGIONA-ECONOMY OF REGION, 2008, 3 : 28 - 39
  • [43] METHODOLOGY FOR NETWORK SECURITY DESIGN
    GRAFT, D
    PABRAI, M
    PABRAI, U
    IEEE COMMUNICATIONS MAGAZINE, 1990, 28 (11) : 52 - 58
  • [45] On the security of a practical identification scheme
    Shoup, V
    JOURNAL OF CRYPTOLOGY, 1999, 12 (04) : 247 - 260
  • [46] Practical Application of 1588 Security
    Treytl, Albert
    Hirschler, Bernd
    2008 IEEE INTERNATIONAL SYMPOSIUM ON PRECISION CLOCK SYNCHRONIZATION FOR MEASUREMENT, CONTROL AND COMMUNICATION, 2008, : 37 - 43
  • [47] Practical security systems with smartcards
    Itoi, Naomaru
    Honeyman, Peter
    Proceedings of the Workshop on Hot Topics in Operating Systems - HOTOS, 1999, : 185 - 190
  • [48] A practical experience with RFID security
    Chen, Chun-Chieh
    Chen, Inn-Tung
    Cheng, Chen-Mou
    Chih, Ming-Yang
    Shih, Jie-Ren
    MDM: 2009 10TH INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT, 2009, : 395 - +
  • [49] Practical security for disconnected nodes
    Seth, A
    Keshav, S
    2005 FIRST WORKSHOP ON SECURE NETWORK PROTOCOLS (NPSEC), 2005, : 31 - 36
  • [50] STATISTICAL INQUIRY CONCERNING ILLNESSES PERMITTING SOCIAL-SECURITY BENEFITS - METHODOLOGY, RESULTS AND COMMENTS
    ZAKIA, T
    SEMAINE DES HOPITAUX, 1973, 49 (37-3): : 263 - 267