Results 241 to 250 of about 2,070,998 (294)
Some of the next articles are maybe not open access.
Power Engineering Journal, 2002
Incidents on the electricity transmission system have a low probability but a high impact. The author describes how all phenomena that have this characteristic are difficult to analyse. When a major problem has not happened for a long time, there is a natural tendency to wonder if the security measures are not too strict.
openaire +2 more sources
Incidents on the electricity transmission system have a low probability but a high impact. The author describes how all phenomena that have this characteristic are difficult to analyse. When a major problem has not happened for a long time, there is a natural tendency to wonder if the security measures are not too strict.
openaire +2 more sources
Power systems cyclic security analysis
Electric Power Systems Research, 1996Abstract In this paper, a general algorithm for automating cyclic security analysis is presented. It is shown that the effect of the outage on the power flows and the bus voltages of an arbitrary line can be estimated by a series of filter values which make use of data obtained from previous security analysis and filters out non-dangerous ...
H. Harsan, N. Hadjsaid, P. Pruvot
openaire +1 more source
Security Analysis of Power Electronic-based Power Systems
IECON 2019 - 45th Annual Conference of the IEEE Industrial Electronics Society, 2019Increasing use of power electronic-based (PE-based) units has intensified the importance of the security scope of power systems. So far, the conventional security assessment approaches are used in the modern PE-based power system. It is not sufficient for the analysis of the system security.
Bahram Shakerighadi +4 more
openaire +2 more sources
Security and Optimization in Power Systems
IFAC Proceedings Volumes, 1988Abstract Security and optimization are becoming the main issues of power system control which is oriented according to states. The state concept is used here to characterize the state-of-the-art but also to discuss the frontiers and the expected development. Optimization will expand into more detailed applications of security.
openaire +1 more source
Dynamic security enhancement in power-market systems
IEEE Power Engineering Society Summer Meeting,, 2002Summary form only given as follows. The work presented in this paper describes a scheme for rescheduling pool generation and adjusting contract-transactions for dynamic security enhancement when necessary, using a power market auction mechanism. The procedure is based on the transient energy margin concept, which is estimated using the corrected hybrid
A. K. David, X. Lin
openaire +1 more source
Steady-State Security Regions of Power Systems
IEEE Transactions on Circuits and Systems, 1982A steady-state security region is a set of real and reactive power injections (load demands and power generations) for which the power flow equations and the security constraints imposed by equipment operating limits are satisfied. The problem of determining steady-state security regions is formulated as one of finding sufficient conditions for the ...
Wu, Felix F., Kumagai, Sadatoshi
openaire +1 more source
Security for space power systems
IEEE Transactions on Power Systems, 1990An initial system security monitor (SSM) developed for the power system of a proposed US National Aeronautics and Space Administration (NASA) permanently manned space station is presented. Four types of ranked disturbances or faults to the transmission system are successively corrected by remedial action of the SSM.
G.L. Kusic +3 more
openaire +1 more source
System-aware security for nuclear power systems
2011 IEEE International Conference on Technologies for Homeland Security (HST), 2011As shown in the recently publicized Stuxnet attack in Iran, there are significant threats of embedded infections by the producers of equipment that support our nations nuclear power plants that cannot be completely addressed by advancing perimeter security solutions.
Rick A. Jones +2 more
openaire +1 more source
Reactive power market development considering power system security
Electrical Engineering, 2010In the new open access environment, in pursuit of profit, power producers tend to operate closer to the security boundaries and consequently, the voltage instability, which is caused by insufficient reactive power support, threats system security and reliability.
Abdorreza Rabiee +2 more
openaire +1 more source
Reactive Power Dispatching for Power System Voltage Security
IEEE Transactions on Power Apparatus and Systems, 1983An optimization-based method is presented for determining the scheduling of reactive equipment (capacitors for example) on an hourly basis for maximum steady-state power system security during normal and post-contingency conditions. The method simultaneously deals with the effects of a number of contingencies, and includes all bus voltages as ...
R. E. Palmer +3 more
openaire +1 more source

