Power system security assessment for off-line operational planning and on line operation applications requires various analysis methods aimed to highlight different phenomena (steady-state violations, angle stability, voltage stability, etc.), overall providing an exhaustive vision of the problems. However, carrying out the different analyses in an integrated way is not an easy task. Different types of results come from both conventional deterministic and more advanced risk-based probabilistic assessment tools. Moreover, operators are more and more interested in practical information like the time at their disposal before instability occurs, to deploy adequate control actions. To provide a comprehensive security assessment framework, this paper proposes a methodology and a platform, which integrates the outcomes from probabilistic and deterministic security assessment tools within a unified approach to system security.

An Innovative Platform integrating Deterministic and Probabilistic tools for Power System Security Assessment within a Unified Approach

PITTO, ANDREA;MASSUCCO, STEFANO;SILVESTRO, FEDERICO
2012

Abstract

Power system security assessment for off-line operational planning and on line operation applications requires various analysis methods aimed to highlight different phenomena (steady-state violations, angle stability, voltage stability, etc.), overall providing an exhaustive vision of the problems. However, carrying out the different analyses in an integrated way is not an easy task. Different types of results come from both conventional deterministic and more advanced risk-based probabilistic assessment tools. Moreover, operators are more and more interested in practical information like the time at their disposal before instability occurs, to deploy adequate control actions. To provide a comprehensive security assessment framework, this paper proposes a methodology and a platform, which integrates the outcomes from probabilistic and deterministic security assessment tools within a unified approach to system security.
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: http://hdl.handle.net/11567/620368
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 1
  • ???jsp.display-item.citation.isi??? ND
social impact