메뉴 건너뛰기




Volumn 24, Issue 1, 2009, Pages 368-377

Prediction of power system security levels

Author keywords

Markov chains; Monte Carlo simulation; Prediction; Security

Indexed keywords

ELECTRIC LOAD FORECASTING; ELECTRIC POWER TRANSMISSION NETWORKS; MARKOV PROCESSES; MONTE CARLO METHODS; POWER TRANSMISSION;

EID: 60149090712     PISSN: 08858950     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPWRS.2008.2004735     Document Type: Article
Times cited : (31)

References (28)
  • 1
    • 0032592974 scopus 로고    scopus 로고
    • Contingency ranking based on severity indices in dynamic security analysis
    • Aug
    • C. Fu and A. Bose, "Contingency ranking based on severity indices in dynamic security analysis," IEEE Trans. Power Syst., vol. 14, no. 3, pp. 980-987, Aug. 1999.
    • (1999) IEEE Trans. Power Syst , vol.14 , Issue.3 , pp. 980-987
    • Fu, C.1    Bose, A.2
  • 2
    • 0034138973 scopus 로고    scopus 로고
    • Contingency screening for steady-state security analysis by using FFT and artificial neural networks
    • Feb
    • T. S. Sidhu and L. Cui, "Contingency screening for steady-state security analysis by using FFT and artificial neural networks," IEEE Trans. Power Syst., vol. 15, no. 1, pp. 421-426, Feb. 2000.
    • (2000) IEEE Trans. Power Syst , vol.15 , Issue.1 , pp. 421-426
    • Sidhu, T.S.1    Cui, L.2
  • 3
    • 0034139062 scopus 로고    scopus 로고
    • Multicontingency steady state security evaluation using fuzzy clustering techniques
    • Feb
    • M. A. Matos, N. D. Hatziargyriou, and J. A. P. Lopes, "Multicontingency steady state security evaluation using fuzzy clustering techniques," IEEE Trans. Power Syst., vol. 15, no. 1, pp. 177-184, Feb. 2000.
    • (2000) IEEE Trans. Power Syst , vol.15 , Issue.1 , pp. 177-184
    • Matos, M.A.1    Hatziargyriou, N.D.2    Lopes, J.A.P.3
  • 4
    • 0032592929 scopus 로고    scopus 로고
    • Probabilistic security analysis of bilateral transactions in a deregulated environment
    • Aug
    • J. W. M. Cheng, D. T. McGillis, and F. D. Galiana, "Probabilistic security analysis of bilateral transactions in a deregulated environment," IEEE Trans. Power Syst., vol. 14, no. 3, pp. 1153-1159, Aug. 1999.
    • (1999) IEEE Trans. Power Syst , vol.14 , Issue.3 , pp. 1153-1159
    • Cheng, J.W.M.1    McGillis, D.T.2    Galiana, F.D.3
  • 6
    • 0035506263 scopus 로고    scopus 로고
    • Annual risk assessment for overload security
    • Nov
    • Y. Dai, J. D. McCalley, N. Abi-Samra, and V. Vittal, "Annual risk assessment for overload security," IEEE Trans. Power Syst., vol. 16, no. 4, pp. 616-623, Nov. 2001.
    • (2001) IEEE Trans. Power Syst , vol.16 , Issue.4 , pp. 616-623
    • Dai, Y.1    McCalley, J.D.2    Abi-Samra, N.3    Vittal, V.4
  • 7
    • 18944382536 scopus 로고    scopus 로고
    • Identifying high risk N-k contingencies for online security assessment
    • May
    • Q. Chen and J. D. McCalley, "Identifying high risk N-k contingencies for online security assessment," IEEE Trans. Power Syst., vol. 20, no. 2, pp. 823-835, May 2005.
    • (2005) IEEE Trans. Power Syst , vol.20 , Issue.2 , pp. 823-835
    • Chen, Q.1    McCalley, J.D.2
  • 8
    • 0034138364 scopus 로고    scopus 로고
    • A second order method for contingency severity assessment with respect to voltage collapse
    • Feb
    • A. Berizzi, Y. G. Zeng, P. Marannino, A. Vaccarini, and P. A. Scarpellini, "A second order method for contingency severity assessment with respect to voltage collapse," IEEE Trans. Power Syst., vol. 15, no. 1, pp. 81-88, Feb. 2000.
    • (2000) IEEE Trans. Power Syst , vol.15 , Issue.1 , pp. 81-88
    • Berizzi, A.1    Zeng, Y.G.2    Marannino, P.3    Vaccarini, A.4    Scarpellini, P.A.5
  • 9
    • 0034242063 scopus 로고    scopus 로고
    • Justification of the voltage stability security assessment and diagnostic procedure using a bifurcation subsystem method
    • Aug
    • R. A. Schlueter, S. Z. Liu, and K. Ben-Kilani, "Justification of the voltage stability security assessment and diagnostic procedure using a bifurcation subsystem method," IEEE Trans. Power Syst., vol. 15, no. 3, pp. 1105-1112, Aug. 2000.
    • (2000) IEEE Trans. Power Syst , vol.15 , Issue.3 , pp. 1105-1112
    • Schlueter, R.A.1    Liu, S.Z.2    Ben-Kilani, K.3
  • 10
    • 0034244445 scopus 로고    scopus 로고
    • A fast voltage security assessment method using adaptive bounding
    • Aug
    • H. Lin, A. Bose, and V. Venkatasubramanian, "A fast voltage security assessment method using adaptive bounding," IEEE Trans. Power Syst. vol. 15, no. 3, pp. 1137-1142, Aug. 2000.
    • (2000) IEEE Trans. Power Syst , vol.15 , Issue.3 , pp. 1137-1142
    • Lin, H.1    Bose, A.2    Venkatasubramanian, V.3
  • 11
    • 0035248664 scopus 로고    scopus 로고
    • Security modeling for power system reliability evaluation
    • Feb
    • V. A. Levi, J. M. Nahman, and D. P. Nedic, "Security modeling for power system reliability evaluation," IEEE Trans. Power Syst., vol. 16, no. 1, pp. 29-37, Feb. 2001.
    • (2001) IEEE Trans. Power Syst , vol.16 , Issue.1 , pp. 29-37
    • Levi, V.A.1    Nahman, J.M.2    Nedic, D.P.3
  • 12
    • 18944368632 scopus 로고    scopus 로고
    • Web-based security cost analysis in electricity markets
    • May
    • H. Chen, C. A. Canizares, and A. Singh, "Web-based security cost analysis in electricity markets," IEEE Trans. Power Syst., vol. 20, no. 2, pp. 659-667, May 2005.
    • (2005) IEEE Trans. Power Syst , vol.20 , Issue.2 , pp. 659-667
    • Chen, H.1    Canizares, C.A.2    Singh, A.3
  • 13
    • 18944367302 scopus 로고    scopus 로고
    • Security-constrained unit commitment for simultaneous clearing of energy and ancillary services markets
    • May
    • Z. Li and M. Shahidehpour, "Security-constrained unit commitment for simultaneous clearing of energy and ancillary services markets," IEEE Trans. Power Syst., vol. 20, no. 2, pp. 1079-1089, May 2005.
    • (2005) IEEE Trans. Power Syst , vol.20 , Issue.2 , pp. 1079-1089
    • Li, Z.1    Shahidehpour, M.2
  • 15
    • 0037292303 scopus 로고    scopus 로고
    • On-line risk-based security assessment
    • Feb
    • M. Ni, J. McCalley, V. Vittal, and T. Tayyib, "On-line risk-based security assessment," IEEE Trans. Power Syst., vol. 18, no. 1, pp. 258-265, Feb. 2003.
    • (2003) IEEE Trans. Power Syst , vol.18 , Issue.1 , pp. 258-265
    • Ni, M.1    McCalley, J.2    Vittal, V.3    Tayyib, T.4
  • 18
    • 60149105456 scopus 로고    scopus 로고
    • Multi-criteria optimization: An important foundation of fuzzy system design
    • L. Reznik, V. Dimitrov, and J. Kacprzyk, Eds. Heidelberg, Germany: Physica Verlag, Fuzzy System Design
    • H. T. Nguyen and V. Kremovich, "Multi-criteria optimization: An important foundation of fuzzy system design," in Studies in Fuzzines and Soft Computing, L. Reznik, V. Dimitrov, and J. Kacprzyk, Eds. Heidelberg, Germany: Physica Verlag, 1998, Fuzzy System Design.
    • (1998) Studies in Fuzzines and Soft Computing
    • Nguyen, H.T.1    Kremovich, V.2
  • 19
    • 60149106248 scopus 로고    scopus 로고
    • ERCOT Methodologies for Determining Ancillary Service Requirements
    • ERCOT Methodologies, Tech. Rep
    • ERCOT Methodologies, ERCOT Methodologies for Determining Ancillary Service Requirements, 2001, Tech. Rep..
    • (2001)
  • 20
    • 0033221710 scopus 로고    scopus 로고
    • An on-line determination of the ready reserve power
    • Nov
    • S. Halilčević and F. Gubina, "An on-line determination of the ready reserve power," IEEE Trans. Power Syst., vol. 14, no. 4, pp. 1514-1520, Nov. 1999.
    • (1999) IEEE Trans. Power Syst , vol.14 , Issue.4 , pp. 1514-1520
    • Halilčević, S.1    Gubina, F.2
  • 22
    • 0032075499 scopus 로고    scopus 로고
    • A dynamic characterization of power system harmonics using Markov chains
    • May
    • A. M. Stanković and E. A. Marengo, "A dynamic characterization of power system harmonics using Markov chains," IEEE Trans. Power Syst. vol. 13, no. 2, pp. 442-449, May 1998.
    • (1998) IEEE Trans. Power Syst , vol.13 , Issue.2 , pp. 442-449
    • Stanković, A.M.1    Marengo, E.A.2
  • 24
    • 0024610919 scopus 로고
    • A tutorial on hidden Markov models and selected applications in speech recognition
    • Feb
    • L. Rabiner, "A tutorial on hidden Markov models and selected applications in speech recognition," Proc. IEEE, vol. 77, no. 2, pp. 257-286, Feb. 1989.
    • (1989) Proc. IEEE , vol.77 , Issue.2 , pp. 257-286
    • Rabiner, L.1
  • 25
    • 0033882275 scopus 로고    scopus 로고
    • Image classification by a two dimensional hidden Markov model
    • Feb
    • J. Li, A. Najmi, and R. M. Gray, "Image classification by a two dimensional hidden Markov model," IEEE Trans. Signal Process., vol. 48, no. 2, pp. 517-533, Feb. 2000.
    • (2000) IEEE Trans. Signal Process , vol.48 , Issue.2 , pp. 517-533
    • Li, J.1    Najmi, A.2    Gray, R.M.3
  • 28
    • 60149101826 scopus 로고    scopus 로고
    • L. Kleinrock, Queuing Systems. New York: Wiley, 1975, p. 76.
    • L. Kleinrock, Queuing Systems. New York: Wiley, 1975, p. 76.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.