Sign in
Author

Conference

Journal

Organization

Year

DOI
Look for results that meet for the following criteria:
since
equal to
before
between
and
Search in all fields of study
Limit my searches in the following fields of study
Agriculture Science
Arts & Humanities
Biology
Chemistry
Computer Science
Economics & Business
Engineering
Environmental Sciences
Geosciences
Material Science
Mathematics
Medicine
Physics
Social Science
Multidisciplinary
Keywords
(9)
Cascade Control
Decision Making
Energy Management System
Indexing Terms
Large Scale
Low Voltage
Operant Conditioning
Power System Operation
Security Assessment
Related Publications
(4)
Dynamic decisionevent trees for rapid response to unfolding events in bulk transmission systems
Risk based voltage security assessment
Software implementation of online riskbased security assessment
Transaction Security Cost Analysis By Takerisk Strategy
Subscribe
Academic
Publications
Online riskbased security assessment
Online riskbased security assessment,10.1109/TPWRS.2002.807091,IEEE Transactions on Power Systems,Ming Ni,James D. McCalley,Vijay Vittal,Tayyib Tayyi
Edit
Online riskbased security assessment
(
Citations: 106
)
BibTex

RIS

RefWorks
Download
Ming Ni
,
James D. McCalley
,
Vijay Vittal
,
Tayyib Tayyib
The work described in this paper was motivated by a perceived increase in the frequency at which
power system
operators are encountering high stress in bulk transmission systems and the corresponding need to improve security monitoring of these networks. Online riskbased
security assessment
provides rapid online quantification of a security level associated with an existing or forecasted operating condition. One major advantage of this approach over deterministic online
security assessment
is that it condenses contingency likelihood and severity into indices that reflect probabilistic risk. Use of these indices in control room
decision making
leads to increased understanding of potential network problems, including overload, cascading overload, low voltages, and voltage instability, resulting in improved securityrelated decision making. Test results on largescale transmission models retrieved from the energymanagement system of a U.S. utility company are described.
Journal:
IEEE Transactions on Power Systems  IEEE TRANS POWER SYST
, vol. 18, no. 1, pp. 258265, 2003
DOI:
10.1109/TPWRS.2002.807091
Cumulative
Annual
View Publication
The following links allow you to view full publications. These links are maintained by other sources not affiliated with Microsoft Academic Search.
(
ieeexplore.ieee.org
)
(
home.eng.iastate.edu
)
(
ieeexplore.ieee.org
)
(
ieeexplore.ieee.org
)
More »
Citation Context
(70)
...However, the riskbased or probabilistic approach can be used to enhance the securityeconomy decision making at the control room environment [
2
]...
...The riskbased staticsecurityindiceshavebeenintroducedin[
2
],[13],and[14] using linearized analytical approach...
...This enables the extension of the method proposed in [
2
], [13], and [14] to the dynamic security analysis...
...The work presented in this paper extends the static security assessment technique in [
2
] to calculate the riskbased dynamic security indices using the polynomial form of the transient stability margin given in [15]...
...The risk index is defined in [
2
] as an expectation of severity, which can be computed by adding overall possible outcomes of the product of probability of an event and its severity...
...Since the continuous severity function produces most realistic and distinguishable results for different contingencies compared to other severity models used in the literature [
2
], [4], it is selected for risk calculations...
...The linear approximation techniques developed in the riskbased static security assessment in [
2
] are extended to implement the riskbased dynamic security assessment...
...Then, probability distribution of the transient stability margin is modeled as given in (6) according to the linear approximation model given in [
2
]...
Anuradha Dissanayaka
,
et al.
RiskBased Dynamic Security Assessment
...The probabilistic load flow (PLF) deals with the stochastic loads, generation and network configurations in power system, and it can be applied in both realtime operation [
2
], [3] and long term transmission expansion planning [4], [5]...
Can Wan
,
et al.
Cumulantbased probabilistic load flow calculation in a market environ...
...The risk assessment of voltage instability considering uncertainty factors has been addressed [
210
]...
Juan Yu
,
et al.
Evaluating risk indices of weak lines and buses causing static voltage...
...Even the classical overload factor (OF), termed static overload severity function in [
19
], which is the actual quantity of prime interest in relation to congestion management is a steep nonlinear function of the generation to be redispatched...
K. Pandiarajan
,
et al.
Overload alleviation in electric power system using fuzzy logic
...To speed up the risk assessment procedure, contingency screening is implemented in [
11
] and [12], but this method can be very time consuming for a largesized power system...
...The probability of a transmission line outage that can cause a security violation is referred to as the event likelihood, and it is assumed to have the characteristics of a Poisson process [
11
][13]...
...In voltage collapse, the extent of violation is usually represented by percentage of loading margin which can be determined using the forecasted load and loadability obtained from continuation power flow [
11
]...
...A good severity function should reflect the consequence of contingency and loading condition, simple, reflect relative severity between different problems and measure the extent of violation [
11
]...
Marayati Marsadek
,
et al.
Riskbased voltage collapse assessment using generalized regression ne...
References
(11)
A riskbased security index for determining operating limits in stabilitylimited electric power systems
(
Citations: 34
)
James D. McCalley
,
A. A. Fouad
,
V. Vittal
,
A. A. IrizarryRivera
,
B. L. Agrawal
,
R. G. Farmer
Journal:
IEEE Transactions on Power Systems  IEEE TRANS POWER SYST
, vol. 12, no. 3, pp. 12101219, 1997
First and second order methods for voltage collapse assessment and security enhancement
(
Citations: 30
)
A. Berizzi
,
P. Finazzi
,
D. Dosi
,
P. Marannino
,
S. Corsi
Journal:
IEEE Transactions on Power Systems  IEEE TRANS POWER SYST
, vol. 13, no. 2, pp. 543551, 1998
The continuation power flow: a tool for steady state voltage stability analysis
(
Citations: 429
)
Venkataramana Ajjarapu
,
Colin Christy
Journal:
IEEE Transactions on Power Systems  IEEE TRANS POWER SYST
, vol. 7, no. 1, pp. 416423, 1992
Point of collapse and continuation methods for large AC/DC systems
(
Citations: 253
)
C. A. Canizares
,
F. L. Alvarado
Journal:
IEEE Transactions on Power Systems  IEEE TRANS POWER SYST
, vol. 8, no. 1, pp. 18, 1993
Computation of closest bifurcations in power systems
(
Citations: 94
)
Fernando Alvarado
,
Ian Dobson
,
Yi Hu
Journal:
IEEE Transactions on Power Systems  IEEE TRANS POWER SYST
, vol. 9, no. 2, pp. 918928, 1994
Sort by:
Citations
(106)
RiskBased Dynamic Security Assessment
Anuradha Dissanayaka
,
Udaya D. Annakkage
,
Bathiya Jayasekara
,
Bagen Bagen
Journal:
IEEE Transactions on Power Systems  IEEE TRANS POWER SYST
, vol. 26, no. 3, pp. 13021308, 2011
Cumulantbased probabilistic load flow calculation in a market environment
Can Wan
,
Zhao Yang Dong
,
Fengji Luo
,
Kit Po Wong
,
Miao Lu
,
Pei Zhang
Conference:
International Conference on Electric Utility Deregulation and Restructuring and Power Technologies  DRPT
, 2011
Evaluating risk indices of weak lines and buses causing static voltage instability
Juan Yu
,
Wenyuan Li
,
Wei Yan
,
Xia Zhao
,
Zhouyang Ren
Conference:
Power Engineering Society, IEEE General Meeting  PES
, pp. 17, 2011
Simultaneous acquisition of phosphocreatine and inorganic phosphate images for Pi:PCr ratio mapping using a RARE sequence with chemically selective interleaving
Robert L. Greenman
,
Xiaoen Wang
,
Howard A. Smithline
Journal:
Magnetic Resonance Imaging  MAGN RESON IMAGING
, vol. 29, no. 8, pp. 11381144, 2011
Overload alleviation in electric power system using fuzzy logic
K. Pandiarajan
,
C. K. Babulal
Conference:
International Conference on Computer, Communication and Electrical Technology  ICCCET
, 2011