Results 281 to 290 of about 2,065,537 (339)
Some of the next articles are maybe not open access.

Securing Power System State Estimation

2016 IEEE Trustcom/BigDataSE/ISPA, 2016
In power system, state estimation is the basis of protecting and controlling the power grid. However, attackers can interfere the normal state estimating processes by strategically altering certain measurements through false data injection (FDI) attack. To address this problem, a typical solution is deploying a large amount of phasor measurement units (
Jiexin Zhang, Xiaoxue Liu, Peidong Zhu
openaire   +1 more source

Realistic power system security algorithm

IEE Proceedings C Generation, Transmission and Distribution, 1988
The paper presents a security algorithm which consists of the superdecoupled loadflow technique for loadflow solution, outage studies, contingency selection and line overload alleviation. A superdecoupled loadflow method with a distributed slack busbar has been applied to line and generator outage studies as well as for line overload alleviation.
A. Mohamed, G.B. Jasmon
openaire   +1 more source

Reflections on security [power systems]

IEEE Power and Energy Magazine, 2003
The North American Electric Reliability Council (NERC) has been responsible for the reliability of the interconnected grid, of which safety and security are essential ingredients, since 1968. NERC has undertaken several key initiatives (many of which began well before September 11) to focus attention on security matters and to encourage electric power ...
M.R. Gent, L.P. Costantini
openaire   +1 more source

Decoupled Power System Security Dispatch

IEEE Transactions on Power Apparatus and Systems, 1983
This paper presents a methodology for solving the Optimal Load Flow problem. The problem is formulated as a non-linear constrained optimization problem, recognizing system losses; operating limits on the generation units and line security limits. The optimization problem is solved by an iterative scheme.
G. C. Contaxis   +2 more
openaire   +1 more source

Power system security

Power Engineering Journal, 2002
Incidents on the electricity transmission system have a low probability but a high impact. The author describes how all phenomena that have this characteristic are difficult to analyse. When a major problem has not happened for a long time, there is a natural tendency to wonder if the security measures are not too strict.
openaire   +2 more sources

Power systems cyclic security analysis

Electric Power Systems Research, 1996
Abstract In this paper, a general algorithm for automating cyclic security analysis is presented. It is shown that the effect of the outage on the power flows and the bus voltages of an arbitrary line can be estimated by a series of filter values which make use of data obtained from previous security analysis and filters out non-dangerous ...
H. Harsan, N. Hadjsaid, P. Pruvot
openaire   +1 more source

Security Analysis of Power Electronic-based Power Systems

IECON 2019 - 45th Annual Conference of the IEEE Industrial Electronics Society, 2019
Increasing use of power electronic-based (PE-based) units has intensified the importance of the security scope of power systems. So far, the conventional security assessment approaches are used in the modern PE-based power system. It is not sufficient for the analysis of the system security.
Bahram Shakerighadi   +4 more
openaire   +2 more sources

Security and Optimization in Power Systems

IFAC Proceedings Volumes, 1988
Abstract Security and optimization are becoming the main issues of power system control which is oriented according to states. The state concept is used here to characterize the state-of-the-art but also to discuss the frontiers and the expected development. Optimization will expand into more detailed applications of security.
openaire   +1 more source

Dynamic security enhancement in power-market systems

IEEE Power Engineering Society Summer Meeting,, 2002
Summary form only given as follows. The work presented in this paper describes a scheme for rescheduling pool generation and adjusting contract-transactions for dynamic security enhancement when necessary, using a power market auction mechanism. The procedure is based on the transient energy margin concept, which is estimated using the corrected hybrid
A. K. David, X. Lin
openaire   +1 more source

Steady-State Security Regions of Power Systems

IEEE Transactions on Circuits and Systems, 1982
A steady-state security region is a set of real and reactive power injections (load demands and power generations) for which the power flow equations and the security constraints imposed by equipment operating limits are satisfied. The problem of determining steady-state security regions is formulated as one of finding sufficient conditions for the ...
Wu, Felix F., Kumagai, Sadatoshi
openaire   +1 more source

Home - About - Disclaimer - Privacy