Abstract — Rising penetration of renewable energy sources in present day transmission systems requires increased attention to network security. Existing computation tools in power system operations evaluate individual scenarios for power injection and network configuration but do not fully consider nearby regions in the operating space. Such tools may lead to market transactions, preventive actions, or corrective actions that are nominally efficient but poor in general. In this paper, the interval based ISI method is reformulated to a security oriented form potentially applicable in energy management systems. The presented results include an algorithm defined within a tractable optimization framework that computes maximal power injection se...
The reliable supply of electricity plays a key role in the contemporary way of life. In order to pro...
Abstract—Modern power grid is the most complex human-made system, which is monitored by wide-area mo...
AbstractPower system security analysis plays key role in enhancing the system security and to avoid ...
Abstract: Existing tools used in many power system operations evaluate individual scenarios for powe...
This paper expresses the output power of renewable generators and load demand as interval data and d...
Power system operation aims, in principle, at maintaining reliable and secure supply of electricity ...
Today, the stable and reliable operation of power systems is becoming increasingly difficult. While...
During power system operations, the system operators are often struggling with identifying the dynam...
Tato práce se zaměřuje na vývoj intervalových metod v oblasti optimalizace energetických sítí s ohle...
Electric power system is a fundamental infrastructure of modern society. A magnicent property of ele...
The high penetration of Renewable Energy Sources into electric networks shows new perspectives for t...
© 2017 by the authors. Licensee MDPI, Basel, Switzerland. Security assessment is crucial for the rel...
Security assessment is crucial for the reliable and secure operation of power systems. This paper pr...
For economic reasons, modern power systems are commonly operated close to their secure limits so tha...
© The Institution of Engineering and Technology 2018. Large penetration of electrical energy storage...
The reliable supply of electricity plays a key role in the contemporary way of life. In order to pro...
Abstract—Modern power grid is the most complex human-made system, which is monitored by wide-area mo...
AbstractPower system security analysis plays key role in enhancing the system security and to avoid ...
Abstract: Existing tools used in many power system operations evaluate individual scenarios for powe...
This paper expresses the output power of renewable generators and load demand as interval data and d...
Power system operation aims, in principle, at maintaining reliable and secure supply of electricity ...
Today, the stable and reliable operation of power systems is becoming increasingly difficult. While...
During power system operations, the system operators are often struggling with identifying the dynam...
Tato práce se zaměřuje na vývoj intervalových metod v oblasti optimalizace energetických sítí s ohle...
Electric power system is a fundamental infrastructure of modern society. A magnicent property of ele...
The high penetration of Renewable Energy Sources into electric networks shows new perspectives for t...
© 2017 by the authors. Licensee MDPI, Basel, Switzerland. Security assessment is crucial for the rel...
Security assessment is crucial for the reliable and secure operation of power systems. This paper pr...
For economic reasons, modern power systems are commonly operated close to their secure limits so tha...
© The Institution of Engineering and Technology 2018. Large penetration of electrical energy storage...
The reliable supply of electricity plays a key role in the contemporary way of life. In order to pro...
Abstract—Modern power grid is the most complex human-made system, which is monitored by wide-area mo...
AbstractPower system security analysis plays key role in enhancing the system security and to avoid ...