Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2009
DOI: 10.2202/1553-779x.2149
|View full text |Cite
|
Sign up to set email alerts
|

Bibliography on Power Systems Probabilistic Security Analysis 1968-2008

Abstract: This paper presents a bibliography on power systems probabilistic security, encompassing small signal, transient stability analysis, and a plethora of closely related subjects.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 0 publications
0
6
0
Order By: Relevance
“…SMC is implemented to sample the MTTF and MTTR and hence to generate the OHL status from 'up' and 'down' transition states over one complete simulation year (y). In the initialisation module, the standard network optimisation through an AC optimal power flow (ACOPF) is implemented at any time step Δt with line failures [26]. If corrective actions are required, the generation redispatch and load curtailments are implemented while EDR is neglected.…”
Section: β1 Initialisation Modulementioning
confidence: 99%
See 2 more Smart Citations
“…SMC is implemented to sample the MTTF and MTTR and hence to generate the OHL status from 'up' and 'down' transition states over one complete simulation year (y). In the initialisation module, the standard network optimisation through an AC optimal power flow (ACOPF) is implemented at any time step Δt with line failures [26]. If corrective actions are required, the generation redispatch and load curtailments are implemented while EDR is neglected.…”
Section: β1 Initialisation Modulementioning
confidence: 99%
“…The radiation heat loss Q r (t) is modelled by (26) for an OHL conductor emissivity, ɛ m . Equation 26is restructured to (27) that allows associating Q r (t) with ΔT c (t), while variables A, B(t) and C(t) are described in (28) Q r (t) = 0.…”
Section: β Radiation Heat Loss Q R (T) As a Function Of δT Cmentioning
confidence: 99%
See 1 more Smart Citation
“…Some of these are Schilling et al for the period 1962Schilling et al for the period -1988Schilling et al for the period in 1990, Billinton in 1972 [4], Allan et al for 1987Allan et al for -1991Allan et al for in 1994, and Billinton et al for 1996Billinton et al for -1999Billinton et al for in 2001. Schilling et al [7] made a comprehensive bibliographic study of probabilistic security analysis for the period 1968-2008 which included 521 articles in a 40-year range. In the past three decades, a variety of achievements have been accomplished on the concepts, models, algorithms, software and applications of power system reliability [8][9][10].…”
Section: Introductionmentioning
confidence: 99%
“…The literature emphasizes risk levels when assessing system performance. For example, the literature recognizes the inherently stochastic or probabilistic nature of power systems, and attempts to avoid waste originating from purely deterministic decisions [1][2][3][4][5].…”
Section: Introductionmentioning
confidence: 99%