1984
DOI: 10.1109/mper.1984.5526028
|View full text |Cite
|
Sign up to set email alerts
|

Fast Technique for Power System Security Assessment Using Sensitivity Parameters of Linear Programming

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2003
2003
2019
2019

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…Generally, most existing works for the power system security evaluation, using deterministic or probabilistic tools, are based on the N − 1 or N -k criterion with a given operating condition. Tough the deterministically based approaches such as sensitivity analysis [29], have the merits of straightforward understanding and easy implementation, the results are highly conservative since it only depends on the worst-case scenario. For other works that are in the probabilistic framework, several reliability parameters like Loss of Load Probability (LOLP), Expected Energy Not Served (EENS) are used to reveal the effect of any cascading events [30].…”
Section: Discussion and Comparison With Prior Workmentioning
confidence: 99%
“…Generally, most existing works for the power system security evaluation, using deterministic or probabilistic tools, are based on the N − 1 or N -k criterion with a given operating condition. Tough the deterministically based approaches such as sensitivity analysis [29], have the merits of straightforward understanding and easy implementation, the results are highly conservative since it only depends on the worst-case scenario. For other works that are in the probabilistic framework, several reliability parameters like Loss of Load Probability (LOLP), Expected Energy Not Served (EENS) are used to reveal the effect of any cascading events [30].…”
Section: Discussion and Comparison With Prior Workmentioning
confidence: 99%
“…In general, the appended constraints depend on both the pre-and postcontingency variables; however, an approach based on the linearization of a precontingency base-case can simplify the representation of the constraints. To incorporate contingency constraints, we will use a linear programming approach that iterates between solution of a base-case and calculation of postcontingency states [3,4]. In each iteration, a precontingency base-case OPF is first solved.…”
Section: Introductionmentioning
confidence: 99%