By Topic

Application of operating security regions in power systems

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Al-Ammar, E.A. ; Center of Excellence in Inf. Assurance, Riyadh, Saudi Arabia ; El-Kady, M.A.

During power system operations, the system operators are often struggling with identifying the dynamic operating security modes of the system in a fast, accurate and reliable manner. The system security constraints are in fact boundaries that surround all possible operating modes (scenarios) of the power system. In other words, these boundaries form the feasible operating domain - in the parameter space spanned by various operating variables - within which the system can safely be operated. For a given operating scenario, the associated security level is measured by the “distance” (for example, the Euclidean norm) of the operating point from the security region boundary. This paper reports on the results of a recently completed research and development paper, which included the development of innovative computerized schemes, which are capable of identifying dynamic operating security modes during the on-line operation of electric power systems. The methodology adopted in this paper includes the development of advanced, highly efficient computerized algorithms for fast identification of dynamic operating security modes of power systems. One of the salient outcomes of this paper is the development of a novel framework for identification and representation of operating security regions in power systems as well as evaluation of security levels associated with different operating scenarios. While the concepts and principles presented are general, the work of this paper is confined to the interpretation of the security boundary in terms of system stability criteria. Of course, the framework presented is applicable quite as well to other criteria that may be considered.

Published in:

Transmission and Distribution Conference and Exposition, 2010 IEEE PES

Date of Conference:

19-22 April 2010