2007
DOI: 10.1049/iet-gtd:20060368
|View full text |Cite
|
Sign up to set email alerts
|

Comparison of risk-based and deterministic security assessments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
89
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 114 publications
(89 citation statements)
references
References 7 publications
0
89
0
Order By: Relevance
“…In accordance with the conventional deterministic reliability criteria, electricity systems are expected to withstand the occurrence of any one of a defined set of credible outages (e.g., a loss of one or two circuits in accordance with N − 1/N − 2 criterion) without causing overloads or inadequate voltages on any remaining circuits/busbars, and without violating system stability limits. Post-fault network overloads, following credible contingencies, are avoided by preventive operational measures or by a combination of preventive and corrective control (Kundur and Taylor, 2007;Kirschen and Jayaweera, 2007;Glatvitsch and Alvarado, 1998).…”
Section: Motivationmentioning
confidence: 99%
“…In accordance with the conventional deterministic reliability criteria, electricity systems are expected to withstand the occurrence of any one of a defined set of credible outages (e.g., a loss of one or two circuits in accordance with N − 1/N − 2 criterion) without causing overloads or inadequate voltages on any remaining circuits/busbars, and without violating system stability limits. Post-fault network overloads, following credible contingencies, are avoided by preventive operational measures or by a combination of preventive and corrective control (Kundur and Taylor, 2007;Kirschen and Jayaweera, 2007;Glatvitsch and Alvarado, 1998).…”
Section: Motivationmentioning
confidence: 99%
“…Second, we explain the differences in cost by comparing the risk level for the different formulations. Considering the solutions of the optimization problems obtained in the first part of this case study, we compute R spec (i,k) according to (1). For the SCOPF and the RB-SCOPF solution, we consider the case with P w = P f w .…”
Section: A Investigations 1) Generation Cost and Risk Level For Diffmentioning
confidence: 99%
“…These parameters incorporate the effect of cascading events and best reflects the impact on the customers in the system. However, computing the risk requires extensive calculations (i.e., Monte-Carlo simulations), and these types of risk measures are typically used to analyze the risk for a given operating condition [1], [2], as opposed to inclusion in an optimization problem. On the other hand, risk can be modeled in terms of violation of technical limits, e.g., dependent on the power flow of a line or on the voltage magnitude.…”
Section: Introductionmentioning
confidence: 99%
“…Traditionally, the deterministic N-1 security criterion has been used to assess power system security. However, several incidents over the last decade have indicated that this assessment might no longer be sufficient as a guarantee against blackouts [2]. In [2], it is argued that additional information is needed to operate the system securely while maintaining a reasonably low cost, and that this additional information could be provided in terms of a so-called risk index.…”
Section: Introductionmentioning
confidence: 99%
“…However, several incidents over the last decade have indicated that this assessment might no longer be sufficient as a guarantee against blackouts [2]. In [2], it is argued that additional information is needed to operate the system securely while maintaining a reasonably low cost, and that this additional information could be provided in terms of a so-called risk index. Here, we propose a novel probabilistic approach to include information on uncertainties originating from RES in-feed into day-ahead operational planning.…”
Section: Introductionmentioning
confidence: 99%