2009 IEEE Bucharest PowerTech 2009
DOI: 10.1109/ptc.2009.5281894
|View full text |Cite
|
Sign up to set email alerts
|

Quantifying the risk of a blackout using PSA/Eurostag platform software

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2010
2010
2016
2016

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 4 publications
0
5
0
Order By: Relevance
“…3 shows the utility share of each HA (blue bars) for 10 families (reduced for the sake of clarity) and the demand before (red bars) and after demand coverage negotiation (green bars). In this case, at the beginning HAs (1)(2)(3)(4)(5) are power deficient while the rest (6-10) have power superfluity. In their attempt to cover their demand, HAs (1-5) start to contact their neighbours and start negotiating to secure their surplus power.…”
Section: A Basic Set Coverage Resultsmentioning
confidence: 99%
“…3 shows the utility share of each HA (blue bars) for 10 families (reduced for the sake of clarity) and the demand before (red bars) and after demand coverage negotiation (green bars). In this case, at the beginning HAs (1)(2)(3)(4)(5) are power deficient while the rest (6-10) have power superfluity. In their attempt to cover their demand, HAs (1-5) start to contact their neighbours and start negotiating to secure their surplus power.…”
Section: A Basic Set Coverage Resultsmentioning
confidence: 99%
“…Time Domain Analysis -used in order to identify the steady-state stability limit (SSSL) of the analyzed constrained area [9], [10]. Mainly the computational procedure developed by the authors consists in applying a ramp stress on the analyzed area on the duration of which a series of incidents predefined by the user are applied.…”
Section: Means For Power Systems Stability Improvementmentioning
confidence: 99%
“…As a result of the load and generation profile, specific constrained areas may be identified as being characterized by power excess or power deficit [19]; Computation of the SSSL for the analyzed constrained areas in full configuration (N elements in operation) and incomplete configuration (N-1 elements in operation) in order to cover all the possible situations of incidents (tripping of an element) [9]; Finding out the most restrictive SSSL (SSSL ini ) for the analyzed area as the minimum between all computed SSSLs;…”
Section: Proposed Approach For Sitting a Svc Devicementioning
confidence: 99%
See 2 more Smart Citations