2017
DOI: 10.1049/iet-gtd.2016.1864
|View full text |Cite
|
Sign up to set email alerts
|

Accurate modelling of discrete AGC controllers for interconnected power systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(5 citation statements)
references
References 18 publications
0
4
0
Order By: Relevance
“…To keep abreast of technological advancement, some major challenges, such as dynamic modeling, security constraints, and adjustments to the frequency control requirements, have been explored [32]- [34]*. Studies on Generation Rate Constraint (GRC), one of the significant constraints in frequency response and modeling analysis, began in 1983 [35]*.…”
Section: B Post-event Concernsmentioning
confidence: 99%
“…To keep abreast of technological advancement, some major challenges, such as dynamic modeling, security constraints, and adjustments to the frequency control requirements, have been explored [32]- [34]*. Studies on Generation Rate Constraint (GRC), one of the significant constraints in frequency response and modeling analysis, began in 1983 [35]*.…”
Section: B Post-event Concernsmentioning
confidence: 99%
“…The power system in each area contains the classic synchronous generators (thermal, hydro, and gas), and DVPP. The classic synchronous generators (thermal, hydro, and gas) are mathematically modeled by transfer functions as given in [11,27]. In this paper, the two wind turbines type IV (PMSG-based wind turbine model) are modeled in detail to take into account the role of DVPP and all dynamic interactions.…”
Section: Simulation Benchmark and Control Strategy For Direct Partici...mentioning
confidence: 99%
“…Based on the above algorithm, the multimedia digital real-time signal transmission method is further optimized.If the standard value of multimedia digital real-time signal transmission in a secure environment is e, in order to avoid other factors interference, ensure the information security of users, and avoid the problem of transmission data leakage.Combined with probability and statistics algorithm, the transmission signal is authenticated and judged.In the process of signal transmission, the user's identity information and password, scanning information and related digital password are authenticated and retrieved [15].After the realization of identity authentication, the real-time signal transmission protocol is further optimized. Aiming at the non coordinated real-time signal transmission characteristics, fuzzy inference technology is used to provide technical support for automatic modulation recognition of signal.After acquiring the new real-time signal transmission characteristics, it is necessary to judge whether the previous priority thread of real-time signal transmission is blocked and whether the latter priority thread is occupied, and observe the likelihood of different real-time signal transmission signals.The specific calculation formula is as follows:…”
Section: The Realization Of Multimedia Digital Real-time Signal Transmentioning
confidence: 99%