Visible to the public Biblio

Filters: Keyword is IEEE 39 bus system  [Clear All Filters]
2020-06-26
Bento, Murilo E. C., Ramos, Rodrigo A..  2019.  Computing the Worst Case Scenario for Electric Power System Dynamic Security Assessment. 2019 IEEE Power Energy Society General Meeting (PESGM). :1—5.
In operation centers, it is important to know the power transfer limit to guarantee the safety operation of the power system. The Voltage Stability Margin (VSM) is a widely used measure and needs to definition of a load growth direction (LGD) to be computed. However, different definitions of LGD can provide different VSMs and then the VSM may not be reliable. Besides, the measure of this power transfer limit usually is related to the Saddle-Node Bifurcation. In dynamic security assessment (DSA) is highly desirable to identify limit regions where the power system can operate safely due to Hopf (HB) and Saddle-Node (SNB) Bifurcations. This paper presents a modeling of the power system incorporating the LGD variation based on participation factors to evaluate the effects on the stability margin estimation due to HB and SNB. A direct method is used to calculate the stability margin of the power system for a given load direction. The analysis was performed in the IEEE 39 bus system.
Jaiswal, Prajwal Kumar, Das, Sayari, Panigrahi, Bijaya Ketan.  2019.  PMU Based Data Driven Approach For Online Dynamic Security Assessment in Power Systems. 2019 20th International Conference on Intelligent System Application to Power Systems (ISAP). :1—7.

This paper presents a methodology for utilizing Phasor Measurement units (PMUs) for procuring real time synchronized measurements for assessing the security of the power system dynamically. The concept of wide-area dynamic security assessment considers transient instability in the proposed methodology. Intelligent framework based approach for online dynamic security assessment has been suggested wherein the database consisting of critical features associated with the system is generated for a wide range of contingencies, which is utilized to build the data mining model. This data mining model along with the synchronized phasor measurements is expected to assist the system operator in assessing the security of the system pertaining to a particular contingency, thereby also creating possibility of incorporating control and preventive measures in order to avoid any unforeseen instability in the system. The proposed technique has been implemented on IEEE 39 bus system for accurately indicating the security of the system and is found to be quite robust in the case of noise in the measurement data obtained from the PMUs.

2015-05-01
Yihai Zhu, Jun Yan, Yufei Tang, Yan Sun, Haibo He.  2014.  The sequential attack against power grid networks. Communications (ICC), 2014 IEEE International Conference on. :616-621.

The vulnerability analysis is vital for safely running power grids. The simultaneous attack, which applies multiple failures simultaneously, does not consider the time domain in applying failures, and is limited to find unknown vulnerabilities of power grid networks. In this paper, we discover a new attack scenario, called the sequential attack, in which the failures of multiple network components (i.e., links/nodes) occur at different time. The sequence of such failures can be carefully arranged by attackers in order to maximize attack performances. This attack scenario leads to a new angle to analyze and discover vulnerabilities of grid networks. The IEEE 39 bus system is adopted as test benchmark to compare the proposed attack scenario with the existing simultaneous attack scenario. New vulnerabilities are found. For example, the sequential failure of two links, e.g., links 26 and 39 in the test benchmark, can cause 80% power loss, whereas the simultaneous failure of them causes less than 10% power loss. In addition, the sequential attack is demonstrated to be statistically stronger than the simultaneous attack. Finally, several metrics are compared and discussed in terms of whether they can be used to sharply reduce the search space for identifying strong sequential attacks.