Power system security assessment for off-line operational planning and on line operation applications requires various analysis methods aimed to highlight different phenomena (steady-state violations, angle stability, voltage stability, etc.), overall providing an exhaustive vision of the problems. However, carrying out the different analyses in an integrated way is not an easy task. Different types of results come from both conventional deterministic and more advanced risk-based probabilistic assessment tools. Moreover, operators are more and more interested in practical information like the time at their disposal before instability occurs, to deploy adequate control actions. To provide a comprehensive security assessment framework, this paper proposes a methodology and a platform, which integrates the outcomes from probabilistic and deterministic security assessment tools within a unified approach to system security.
An Innovative Platform integrating Deterministic and Probabilistic tools for Power System Security Assessment within a Unified Approach
PITTO, ANDREA;MASSUCCO, STEFANO;SILVESTRO, FEDERICO
2012-01-01
Abstract
Power system security assessment for off-line operational planning and on line operation applications requires various analysis methods aimed to highlight different phenomena (steady-state violations, angle stability, voltage stability, etc.), overall providing an exhaustive vision of the problems. However, carrying out the different analyses in an integrated way is not an easy task. Different types of results come from both conventional deterministic and more advanced risk-based probabilistic assessment tools. Moreover, operators are more and more interested in practical information like the time at their disposal before instability occurs, to deploy adequate control actions. To provide a comprehensive security assessment framework, this paper proposes a methodology and a platform, which integrates the outcomes from probabilistic and deterministic security assessment tools within a unified approach to system security.I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.