By Topic

Security standards and contribution made by embedded generation

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Allan, R. ; Centre for Electr. Energy, Univ. of Manchester Inst. of Sci. & Technol., UK ; Strbac, G. ; Kay, Mike

This paper reviews the apparent strengths and weaknesses of existing security standards in respect of the assumed contribution that embedded generation can make to the security of power systems and the loads attached to it. It first outlines the background and weaknesses of these standards together with the need for alternative approaches that can be used to measure the contribution of embedded generation to security. Feasibility studies of two such alternative approaches indicate a new way forward in creating appropriate security standards in networks containing all forms of embedded generation. The need for these are very important since the use of embedded generation (including renewables and other forms) is expected to increase dramatically in the future with a contribution of up to about 15% of total capacity being forecasted

Published in:

Electric Utility Deregulation and Restructuring and Power Technologies, 2000. Proceedings. DRPT 2000. International Conference on

Date of Conference: