2011
DOI: 10.1109/tpwrs.2010.2089809
|View full text |Cite
|
Sign up to set email alerts
|

Risk-Based Dynamic Security Assessment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
39
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 41 publications
(40 citation statements)
references
References 25 publications
0
39
0
Order By: Relevance
“…In [14], the approximate method is used to evaluate the transient stability by considering load uncertainties. In [15À17], the single machine infinite bus model of network is used.…”
Section: Probabilistic Transient Stability Assessment Methodsmentioning
confidence: 99%
“…In [14], the approximate method is used to evaluate the transient stability by considering load uncertainties. In [15À17], the single machine infinite bus model of network is used.…”
Section: Probabilistic Transient Stability Assessment Methodsmentioning
confidence: 99%
“…Significant works have been developed and utilized based on arcane or original techniques such as the conditional probabilities [42], health analysis [43], bisection method [44], collocation method [45], Bayes classifier [46], cascading failure analysis [47], copula theory [48], cross-entropy methods [49], and bootstrap techniques [50]. Detailed comparisons between several methods have already been published [51] and research efforts in this area continue thriving [52][53][54]. Notwithstanding, despite the significant amount of literature, it seems that probabilistic security analysis has not yet gained large acceptance in the industry environment.…”
Section: Probabilistic Small Signal and Transient Stability Analyses:mentioning
confidence: 99%
“…The assessment and presentation of the effects of nodal power injection uncertainties, including the system generators and loads power injection, on small signal stability are now widely recognized as important parts of power system probabilistic security analysis [11]. From the practical point of view, nodal power possesses random volatility all the time.…”
Section: System Uncertainties Modelingmentioning
confidence: 99%
“…On the other hand, from the viewpoint of modeling, the existing PSSSA research considers the nodal power injections as independent random variables normally [11]. In fact, different nodal power injections always exhibit correlation in a certain degree due to the impact of the consumer rest rules, geographical distribution, climate change and other factors.…”
Section: Introductionmentioning
confidence: 99%