Results 281 to 290 of about 2,065,537 (339)
Some of the next articles are maybe not open access.
Securing Power System State Estimation
2016 IEEE Trustcom/BigDataSE/ISPA, 2016In power system, state estimation is the basis of protecting and controlling the power grid. However, attackers can interfere the normal state estimating processes by strategically altering certain measurements through false data injection (FDI) attack. To address this problem, a typical solution is deploying a large amount of phasor measurement units (
Jiexin Zhang, Xiaoxue Liu, Peidong Zhu
openaire +1 more source
Realistic power system security algorithm
IEE Proceedings C Generation, Transmission and Distribution, 1988The paper presents a security algorithm which consists of the superdecoupled loadflow technique for loadflow solution, outage studies, contingency selection and line overload alleviation. A superdecoupled loadflow method with a distributed slack busbar has been applied to line and generator outage studies as well as for line overload alleviation.
A. Mohamed, G.B. Jasmon
openaire +1 more source
Reflections on security [power systems]
IEEE Power and Energy Magazine, 2003The North American Electric Reliability Council (NERC) has been responsible for the reliability of the interconnected grid, of which safety and security are essential ingredients, since 1968. NERC has undertaken several key initiatives (many of which began well before September 11) to focus attention on security matters and to encourage electric power ...
M.R. Gent, L.P. Costantini
openaire +1 more source
Decoupled Power System Security Dispatch
IEEE Transactions on Power Apparatus and Systems, 1983This paper presents a methodology for solving the Optimal Load Flow problem. The problem is formulated as a non-linear constrained optimization problem, recognizing system losses; operating limits on the generation units and line security limits. The optimization problem is solved by an iterative scheme.
G. C. Contaxis +2 more
openaire +1 more source
Power Engineering Journal, 2002
Incidents on the electricity transmission system have a low probability but a high impact. The author describes how all phenomena that have this characteristic are difficult to analyse. When a major problem has not happened for a long time, there is a natural tendency to wonder if the security measures are not too strict.
openaire +2 more sources
Incidents on the electricity transmission system have a low probability but a high impact. The author describes how all phenomena that have this characteristic are difficult to analyse. When a major problem has not happened for a long time, there is a natural tendency to wonder if the security measures are not too strict.
openaire +2 more sources
Power systems cyclic security analysis
Electric Power Systems Research, 1996Abstract In this paper, a general algorithm for automating cyclic security analysis is presented. It is shown that the effect of the outage on the power flows and the bus voltages of an arbitrary line can be estimated by a series of filter values which make use of data obtained from previous security analysis and filters out non-dangerous ...
H. Harsan, N. Hadjsaid, P. Pruvot
openaire +1 more source
Security Analysis of Power Electronic-based Power Systems
IECON 2019 - 45th Annual Conference of the IEEE Industrial Electronics Society, 2019Increasing use of power electronic-based (PE-based) units has intensified the importance of the security scope of power systems. So far, the conventional security assessment approaches are used in the modern PE-based power system. It is not sufficient for the analysis of the system security.
Bahram Shakerighadi +4 more
openaire +2 more sources
Security and Optimization in Power Systems
IFAC Proceedings Volumes, 1988Abstract Security and optimization are becoming the main issues of power system control which is oriented according to states. The state concept is used here to characterize the state-of-the-art but also to discuss the frontiers and the expected development. Optimization will expand into more detailed applications of security.
openaire +1 more source
Dynamic security enhancement in power-market systems
IEEE Power Engineering Society Summer Meeting,, 2002Summary form only given as follows. The work presented in this paper describes a scheme for rescheduling pool generation and adjusting contract-transactions for dynamic security enhancement when necessary, using a power market auction mechanism. The procedure is based on the transient energy margin concept, which is estimated using the corrected hybrid
A. K. David, X. Lin
openaire +1 more source
Steady-State Security Regions of Power Systems
IEEE Transactions on Circuits and Systems, 1982A steady-state security region is a set of real and reactive power injections (load demands and power generations) for which the power flow equations and the security constraints imposed by equipment operating limits are satisfied. The problem of determining steady-state security regions is formulated as one of finding sufficient conditions for the ...
Wu, Felix F., Kumagai, Sadatoshi
openaire +1 more source

