Abstract:
This paper proposes a practical time-phased model to analyze the vulnerability of power systems over a time horizon, in which the scheduled maintenance of network facilit...Show MoreMetadata
Abstract:
This paper proposes a practical time-phased model to analyze the vulnerability of power systems over a time horizon, in which the scheduled maintenance of network facilities is considered. This model is deemed as an efficient tool that could be used by system operators to assess whether how their systems become vulnerable giving a set of scheduled facility outages. The final model is presented as a single level Mixed-Integer Linear Programming (MILP) problem solvable with commercially available software. Results attained based on the well-known IEEE 24-Bus Reliability Test System (RTS) appreciate the applicability of the model and highlight the necessity of considering the scheduled facility outages in assessing the vulnerability of a power system.
Published in: 2016 Smart Grids Conference (SGC)
Date of Conference: 20-21 December 2016
Date Added to IEEE Xplore: 23 March 2017
ISBN Information:
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Power System ,
- Vulnerability Assessment ,
- Routine Maintenance ,
- Maintenance Of Facilities ,
- Mixed Integer Linear Programming ,
- Vulnerability Of Systems ,
- Mixed Integer Linear Programming Problem ,
- Limited Resources ,
- Objective Function ,
- Operational Problems ,
- Number Of Attacks ,
- Pattern Of Cases ,
- Load Shedding ,
- Bilevel Optimization ,
- Level Of Disruption ,
- Attack Patterns ,
- Group Attacks
- Author Keywords
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Power System ,
- Vulnerability Assessment ,
- Routine Maintenance ,
- Maintenance Of Facilities ,
- Mixed Integer Linear Programming ,
- Vulnerability Of Systems ,
- Mixed Integer Linear Programming Problem ,
- Limited Resources ,
- Objective Function ,
- Operational Problems ,
- Number Of Attacks ,
- Pattern Of Cases ,
- Load Shedding ,
- Bilevel Optimization ,
- Level Of Disruption ,
- Attack Patterns ,
- Group Attacks
- Author Keywords