1991
DOI: 10.1541/ieejpes1990.111.6_611
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Preventive Control for Power System Using Transient Stability Assessment Based on the Pattern Recognition

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

1995
1995
2014
2014

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 1 publication
0
3
0
Order By: Relevance
“…Gan et al [4] used a similar discretize-thenoptimize approach and used the deviation of rotor angles as the transient stability constraint. A dynamic security preventive control also has been proposed using pattern recognition techniques [5], [6] and artificial neural networks [7], [8]. An evaluation of the maximum allowable transfer enforcing transient stability constraints was presented in [9]; specifically, a single machine equivalent (SIME) approach was used to identify the critical contingencies and shift the generation from the critical machines to the non criticial ones.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Gan et al [4] used a similar discretize-thenoptimize approach and used the deviation of rotor angles as the transient stability constraint. A dynamic security preventive control also has been proposed using pattern recognition techniques [5], [6] and artificial neural networks [7], [8]. An evaluation of the maximum allowable transfer enforcing transient stability constraints was presented in [9]; specifically, a single machine equivalent (SIME) approach was used to identify the critical contingencies and shift the generation from the critical machines to the non criticial ones.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The dynamic security-constrained optimal power flow (DSOPF) formulation combines the OPF equations with the transient stability equations as given in (1)- (6). In addition, the dynamics trajectory must satisfy security constraints at each 978-1-4799-6415-4/14/$31.00 ©2014 IEEE time step as given by (7).…”
Section: Flowmentioning
confidence: 99%
“…Constraints: Eqs. ( 5 ) to (7) 4. Numerical Calculation Examples where SI', is the midterm stability security index for contingency i; S is the set of contingencies which are stable transiently.…”
Section: Pimentioning
confidence: 99%