2013
DOI: 10.1049/iet-gtd.2012.0288
|View full text |Cite
|
Sign up to set email alerts
|

Steady‐state security assessment method based on distance to security region boundaries

Abstract: Steady-state security region (SSR) provides a region-wise approach to assess the steady-state security of power systems. Based on the SSR model, we introduce the concept of 'steady-state security distance' (SSD) to provide exact 'quantitative analysis' on the scale of security margins for system operators. Then, mathematical models of SSD are formulated. On this basis, implementation of SSD is discussed towards various uncertainties within the power system operation. As the calculation of SSD is in essence a l… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
35
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 57 publications
(35 citation statements)
references
References 22 publications
0
35
0
Order By: Relevance
“…(It can be seen that the linear regression boundaries can replace the original boundary surfaces well from the case study below). For each effective boundary, the critical points are chosen randomly on the boundary surface based on the Equations (1)- (11), and the number of critical points is selected as 4-6 times the dimensions of the steady-state security region (the undetermined coefficients). According to the chosen critical points, the multiple linear regression is completed according to the regression Equation (20).…”
Section: Regression Of Effective Boundariesmentioning
confidence: 99%
See 1 more Smart Citation
“…(It can be seen that the linear regression boundaries can replace the original boundary surfaces well from the case study below). For each effective boundary, the critical points are chosen randomly on the boundary surface based on the Equations (1)- (11), and the number of critical points is selected as 4-6 times the dimensions of the steady-state security region (the undetermined coefficients). According to the chosen critical points, the multiple linear regression is completed according to the regression Equation (20).…”
Section: Regression Of Effective Boundariesmentioning
confidence: 99%
“…U s1k − U s2k = I s R ij (11) The subscripts i, j denote AC bus i and AC bus j, and the subscript k denotes converter k. P i , Q i , U i , and θ ij respectively denote the nodal injected active power, nodal injected reactive power, nodal voltage amplitude, and the difference of nodal phase angle. j i denotes node j which is connected to node i (including node i).…”
Section: Introductionmentioning
confidence: 99%
“…Mohammed Benidris et al consider three probabilistic transient stability indices to assess system robustness against dynamic contingencies and to account for system instability in computing reliability indices . Sijie J. Chen et al introduce the concept of “steady‐state security distance” to provide exact quantitative analysis on the scale of security margins for system operators and provide the system operators a global view on overall security margins including recognizing the critical uncertainties affecting system security and their impacts on security margins, and identifying the most fragile components within the systems . Wu, Lan et al propose a reliable method to evaluate the stationary distribution probability based on the Markov chain method .…”
Section: Introductionmentioning
confidence: 99%
“…Saric and Stankovic proposed a multidimensional ellipsoids oriented computational approach to approximate feasible sets of security region . Chen et al proposed an algorithm that simplifies the complexity of the optimization process to enhance the computational efficiency of steady‐state security distance . In Fisch et al and Sun et al, power system security region has been identified by considering N‐k contingencies, uncertainty in power system loads, and soft security limits.…”
Section: Introductionmentioning
confidence: 99%