Results 241 to 250 of about 2,070,998 (294)
Some of the next articles are maybe not open access.

Power system security

Power Engineering Journal, 2002
Incidents on the electricity transmission system have a low probability but a high impact. The author describes how all phenomena that have this characteristic are difficult to analyse. When a major problem has not happened for a long time, there is a natural tendency to wonder if the security measures are not too strict.
openaire   +2 more sources

Power systems cyclic security analysis

Electric Power Systems Research, 1996
Abstract In this paper, a general algorithm for automating cyclic security analysis is presented. It is shown that the effect of the outage on the power flows and the bus voltages of an arbitrary line can be estimated by a series of filter values which make use of data obtained from previous security analysis and filters out non-dangerous ...
H. Harsan, N. Hadjsaid, P. Pruvot
openaire   +1 more source

Security Analysis of Power Electronic-based Power Systems

IECON 2019 - 45th Annual Conference of the IEEE Industrial Electronics Society, 2019
Increasing use of power electronic-based (PE-based) units has intensified the importance of the security scope of power systems. So far, the conventional security assessment approaches are used in the modern PE-based power system. It is not sufficient for the analysis of the system security.
Bahram Shakerighadi   +4 more
openaire   +2 more sources

Security and Optimization in Power Systems

IFAC Proceedings Volumes, 1988
Abstract Security and optimization are becoming the main issues of power system control which is oriented according to states. The state concept is used here to characterize the state-of-the-art but also to discuss the frontiers and the expected development. Optimization will expand into more detailed applications of security.
openaire   +1 more source

Dynamic security enhancement in power-market systems

IEEE Power Engineering Society Summer Meeting,, 2002
Summary form only given as follows. The work presented in this paper describes a scheme for rescheduling pool generation and adjusting contract-transactions for dynamic security enhancement when necessary, using a power market auction mechanism. The procedure is based on the transient energy margin concept, which is estimated using the corrected hybrid
A. K. David, X. Lin
openaire   +1 more source

Steady-State Security Regions of Power Systems

IEEE Transactions on Circuits and Systems, 1982
A steady-state security region is a set of real and reactive power injections (load demands and power generations) for which the power flow equations and the security constraints imposed by equipment operating limits are satisfied. The problem of determining steady-state security regions is formulated as one of finding sufficient conditions for the ...
Wu, Felix F., Kumagai, Sadatoshi
openaire   +1 more source

Security for space power systems

IEEE Transactions on Power Systems, 1990
An initial system security monitor (SSM) developed for the power system of a proposed US National Aeronautics and Space Administration (NASA) permanently manned space station is presented. Four types of ranked disturbances or faults to the transmission system are successively corrected by remedial action of the SSM.
G.L. Kusic   +3 more
openaire   +1 more source

System-aware security for nuclear power systems

2011 IEEE International Conference on Technologies for Homeland Security (HST), 2011
As shown in the recently publicized Stuxnet attack in Iran, there are significant threats of embedded infections by the producers of equipment that support our nations nuclear power plants that cannot be completely addressed by advancing perimeter security solutions.
Rick A. Jones   +2 more
openaire   +1 more source

Reactive power market development considering power system security

Electrical Engineering, 2010
In the new open access environment, in pursuit of profit, power producers tend to operate closer to the security boundaries and consequently, the voltage instability, which is caused by insufficient reactive power support, threats system security and reliability.
Abdorreza Rabiee   +2 more
openaire   +1 more source

Reactive Power Dispatching for Power System Voltage Security

IEEE Transactions on Power Apparatus and Systems, 1983
An optimization-based method is presented for determining the scheduling of reactive equipment (capacitors for example) on an hourly basis for maximum steady-state power system security during normal and post-contingency conditions. The method simultaneously deals with the effects of a number of contingencies, and includes all bus voltages as ...
R. E. Palmer   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy