2009
DOI: 10.1049/iet-gtd:20080112
|View full text |Cite
|
Sign up to set email alerts
|

N−1 security in optimal power flow control applied to limited areas

Abstract: Blackouts in recent years have demonstrated that a reliable and secure power system is a key component of an efficient economy. Therefore control devices such as flexible AC transmission system devices (FACTS) are placed in the system and utilised to improve the security of the system. A method to determine appropriate settings for these devices is optimal power flow control. As the area of influence of a FACTS device is usually limited, it is sufficient to include only a reduced area in the optimisation probl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(12 citation statements)
references
References 9 publications
(15 reference statements)
0
10
0
Order By: Relevance
“…Hence, a measure for the consequence is given by (9) where is the set of operational constraints in the system and the set of operational constraints associated with grid elements which have failed in contingency .…”
Section: Risk-based Security Formulationmentioning
confidence: 99%
See 1 more Smart Citation
“…Hence, a measure for the consequence is given by (9) where is the set of operational constraints in the system and the set of operational constraints associated with grid elements which have failed in contingency .…”
Section: Risk-based Security Formulationmentioning
confidence: 99%
“…In [6], [7], a solution algorithm for preventive and corrective SCOPF is presented using contingency filtering techniques and in [8], [9] methods for the efficient solution of N-1 security power flow based on current injections are described. In [10], an LP-based approach is proposed for corrective FACTS control and in [11]- [13] corrective topology switching is employed.…”
Section: Introductionmentioning
confidence: 99%
“…In case of disruptions caused by any component failure, weather conditions or unforeseen events, the system must also tolerate the adversities with no outage of any additional components, so at any time sufficient contingency should be provided [8].…”
Section: Introductionmentioning
confidence: 99%
“…Another effective method to determine system security is to apply a current injection method where a line outage is simulated by the introduction of current injections at system buses [8]. Security analyses that try to capture cascading events causing blackouts are often made with probabilistic methods, where significant computation time reduction is achieved in comparison with deterministic approaches.…”
Section: Introductionmentioning
confidence: 99%
“…The concept of the N-1 security has been proposed in [1][2][3][4][5][6][7], and is widely used globally in various power systems at present. On the other hand, various probabilistic approaches have been proposed for keeping up power system security taking into account possible events as well as operation conditions with their occurrence probabilities [8][9][10][11][12][13][14][15][16][17][18][19][20].…”
Section: Introductionmentioning
confidence: 99%