By Topic

Security boundary visualization for systems operation

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

6 Author(s)
J. D. McCalley ; Iowa State Univ., Ames, IA, USA ; S. Wang ; Q. -L. Zhao ; G. -Z. Zhou
more authors

This paper presents a security assessment approach for operational planning studies that provides the operator with accurate boundary visualization in terms of easily monitored precontingency information. The approach is modeled after traditional security assessment procedures which result in use of a nomogram for characterizing the security boundaries; these procedures are common among many North American utilities today. Therefore, the approach builds on what is already familiar in the industry, but it takes advantage of computer automation and neural networks for generating and understanding large databases. The appeal of the approach is threefold: it provides increased accuracy in boundary representation, it reduces the labor traditionally required in generating security boundaries, and the resulting boundaries, encoded in fast, flexible C subroutines, can be integrated into energy management system software to provide the operator with compact, understandable boundary illustration in real time. These improvements are of particular interest in securely operating transmission systems close to their limits so as to fully utilize existing facilities

Published in:

IEEE Transactions on Power Systems  (Volume:12 ,  Issue: 2 )