Integrated Security Analysis

نویسندگان

  • Kevin Tomsovic
  • Anjan Bose
چکیده

This is a project report from the Power Systems Engineering Research Center (PSERC). PSERC is a multi-university Center conducting research on challenges facing a restructuring electric power industry and educating the next generation of power engineers. More information about PSERC can be found at the Center's website: Notice Concerning Copyright Material PSERC members are given permission to copy without fee all or part of this publication if appropriate attribution is given to this document as the source material. This report is available for downloading from the PSERC website. In today's power marketplace, the ability to accurately and quickly determine system security limits has become increasingly important. Over the past several decades, research has resulted in significant advances in analytical techniques needed for quantifying system security limits. At the same time, the phenomenal growth in computational speeds of modern computers has brought on-line security analysis closer to practical use. Despite these great strides, system operators continue making limited use of new system analysis tools. Operators tend to follow relatively fixed sets of procedures and pre-calculated system limits. One of the factors hindering operator adoption of new sophisticated security techniques is their limited understanding of the underlying analysis methods on which the new tools are based. Another barrier to adoption is the natural preference to use older, well-understood and tested tools given the critical responsibilities operators have for maintaining security. There is a need for a comprehensive security analysis framework that operators can use. This project explored the issues associated with developing such a framework and implemented an approach that integrates techniques that make extensive use of off-line studies. In doing so, the project has contributed to the understanding of integrated security analysis in a number of ways. • A comprehensive framework was developed for on-line estimation of security margins, calculated based on current operating practices. • The framework includes families of estimators, each specialized for specific system limits and the appropriate security criteria (i.e., static, dynamic or voltage). The estimators can be combined to provide an overall assessment of system operating conditions. • A system of estimators was implemented and tested on a modified New England 39 bus system. • Based on the insights from the New England system, a more sophisticated set of estimators were implemented and tested on a 6500 bus model of the Western Area system. The focus of this study was the California-Oregon intertie transfer limits. • …

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Stochastic Security Constrained Transmission and Battery Expansion Planning In Integrated Gas-Electricity Systems Considering High Penetration of Renewable Resources..

In this study, a new model is proposed to solve the problem of transmission and battery expansion planning considering integrated electricity and gas systems. The presented model is a bi-level stochastic planning model, where transmission and battery expansion planning modeling is done on one level, and gas network modeling is done on the other level. Here, the impact of the high penetration of...

متن کامل

Risk Analysis and Economic Load Dispatch Evaluation of Network with High Wind Power Penetration

This study based on investigation for integration wind power into conventional power system with its impact on fossil fuel generators and their generation management. Wind power as environmental friendly energy source can reduce the operational cost of the system due to considering no cost for energizing the generator in comparing with fossil fuel generators. However due to unpredictable nature...

متن کامل

Security-Constrained Unit Commitment Considering Large-Scale Compressed Air Energy Storage (CAES) Integrated With Wind Power Generation

Environmental concerns and depletion of nonrenewable resources has made great interest towards renewable energy resources. Cleanness and high potential are factors that caused fast growth of wind energy. However, the stochastic nature of wind energy makes the presence of energy storage systems (ESS) in wind integrated power systems, inevitable. Due to capability of being used in large-scale sys...

متن کامل

National Resilience As A Determinant Of National Security Of Ukraine

The purpose of this study is theoretical and methodological substantiation, deepening of conceptual provisions and development of scientific and practical recommendations for the formation of an integrated sector of national security and defense based on the principles of national resilience. The relevance of this study is due to the need to build national resilience to address the main problem...

متن کامل

Using Semiconductor Failure Analysis Tools for Security Analysis

Failure analysis tools like scanning electron microscopes and focused ion beam systems are commonly used in the manufacturing of modern integrated circuits. In addition to the conventional uses of these systems, they provide an adversary many ways to extract protected information from an integrated circuit and to defeat many security mechanisms that can be implemented. Since these systems are a...

متن کامل

Formal integrated network security analysis tool: formal query-based network security configuration analysis

105 Formal integrated network security analysis tool: formal query-based network security configuration analysis Soumya Maity1, P. Bera2, Soumya K. Ghosh1, Ehab Al-Shaer3 School of Information Technology, Indian Institute of Technology, Kharagpur 721302, India School of Electrical Sciences, Indian Institute of Technology, Bhubaneswar 751013, India Department of Software and Information Systems,...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003