2010 IREP Symposium Bulk Power System Dynamics and Control - VIII (IREP) 2010
DOI: 10.1109/irep.2010.5563285
|View full text |Cite
|
Sign up to set email alerts
|

Consequence driven decomposition of large-scale power system security analysis

Abstract: Abstract-This paper presents an approach for assessing, in operation planning studies, the security of a large-scale power system by decomposing it into elementary subproblems, each one corresponding to a structural weak-point of the system. We suppose that the structural weak-points are known a priori by the system operators, and are each one described by a set of constraints that are localized in some relatively small area of the system. The security analysis with respect to a given weakpoint thus reduces to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…Other applications aries in electrical engineering, in the context of security analysis of electrical power systems, and in software engineering, in the context of bug discovery. See, e.g, Fonteneau-Belmudes et al (2010), Bubeck et al (2013b) and references therein.…”
Section: Introductionmentioning
confidence: 99%
“…Other applications aries in electrical engineering, in the context of security analysis of electrical power systems, and in software engineering, in the context of bug discovery. See, e.g, Fonteneau-Belmudes et al (2010), Bubeck et al (2013b) and references therein.…”
Section: Introductionmentioning
confidence: 99%
“…One is therefore left with the problem of identifying within this short time-frame a maximum number of dangerous contingencies rather than all of them. The approach proposed in Fonteneau-Belmudes [2012] and Fonteneau-Belmudes et al [2010] addresses this problem by building first very rapidly what could be described as a probability distribution P over the set of credible contingencies that points with significant probability to contingencies which are dangerous. Afterwards, this probability distribution is used to draw the contingencies to be analyzed through simulations.…”
Section: Motivationmentioning
confidence: 99%