Academic
Publications
Online risk-based security assessment

Online risk-based security assessment,10.1109/TPWRS.2002.807091,IEEE Transactions on Power Systems,Ming Ni,James D. McCalley,Vijay Vittal,Tayyib Tayyi

Online risk-based security assessment   (Citations: 106)
BibTex | RIS | RefWorks Download
The work described in this paper was motivated by a perceived increase in the frequency at which power system operators are encountering high stress in bulk transmission systems and the corresponding need to improve security monitoring of these networks. Online risk-based security assessment provides rapid online quantification of a security level associated with an existing or forecasted operating condition. One major advantage of this approach over deterministic online security assessment is that it condenses contingency likelihood and severity into indices that reflect probabilistic risk. Use of these indices in control room decision making leads to increased understanding of potential network problems, including overload, cascading overload, low voltages, and voltage instability, resulting in improved security-related decision making. Test results on large-scale transmission models retrieved from the energy-management system of a U.S. utility company are described.
Journal: IEEE Transactions on Power Systems - IEEE TRANS POWER SYST , vol. 18, no. 1, pp. 258-265, 2003
Cumulative Annual
View Publication
The following links allow you to view full publications. These links are maintained by other sources not affiliated with Microsoft Academic Search.
    • ...However, the risk-based or probabilistic approach can be used to enhance the security-economy decision making at the control room environment [2]...
    • ...The risk-based staticsecurityindiceshavebeenintroducedin[2],[13],and[14] using linearized analytical approach...
    • ...This enables the extension of the method proposed in [2], [13], and [14] to the dynamic security analysis...
    • ...The work presented in this paper extends the static security assessment technique in [2] to calculate the risk-based dynamic security indices using the polynomial form of the transient stability margin given in [15]...
    • ...The risk index is defined in [2] as an expectation of severity, which can be computed by adding overall possible outcomes of the product of probability of an event and its severity...
    • ...Since the continuous severity function produces most realistic and distinguishable results for different contingencies compared to other severity models used in the literature [2], [4], it is selected for risk calculations...
    • ...The linear approximation techniques developed in the risk-based static security assessment in [2] are extended to implement the risk-based dynamic security assessment...
    • ...Then, probability distribution of the transient stability margin is modeled as given in (6) according to the linear approximation model given in [2]...

    Anuradha Dissanayakaet al. Risk-Based Dynamic Security Assessment

    • ...The probabilistic load flow (PLF) deals with the stochastic loads, generation and network configurations in power system, and it can be applied in both real-time operation [2], [3] and long term transmission expansion planning [4], [5]...

    Can Wanet al. Cumulant-based probabilistic load flow calculation in a market environ...

    • ...The risk assessment of voltage instability considering uncertainty factors has been addressed [2-10]...

    Juan Yuet al. Evaluating risk indices of weak lines and buses causing static voltage...

    • ...Even the classical overload factor (OF), termed static overload severity function in [19], which is the actual quantity of prime interest in relation to congestion management is a steep nonlinear function of the generation to be redispatched...

    K. Pandiarajanet al. Overload alleviation in electric power system using fuzzy logic

    • ...To speed up the risk assessment procedure, contingency screening is implemented in [11] and [12], but this method can be very time consuming for a large-sized power system...
    • ...The probability of a transmission line outage that can cause a security violation is referred to as the event likelihood, and it is assumed to have the characteristics of a Poisson process [11]-[13]...
    • ...In voltage collapse, the extent of violation is usually represented by percentage of loading margin which can be determined using the forecasted load and loadability obtained from continuation power flow [11]...
    • ...A good severity function should reflect the consequence of contingency and loading condition, simple, reflect relative severity between different problems and measure the extent of violation [11]...

    Marayati Marsadeket al. Risk-based voltage collapse assessment using generalized regression ne...

Sort by: