Objectives: This paper presents a new methodology for analyzing the vulnerability of power systems including uncertainty in some variables. Method: The methodology optimizes a Bi-level mixed integer model. Costs associated with power generation and load shedding are minimized at the lowest level whereas at the higher level the damage in the power system, represented by the load shedding, is maximized. Fuzzy logic type 2 is used to model the uncertainty in both linguistic variables and numeric variables. The linguistic variables model the factors of the geographical environment while numeric variables model parameters of the power system. Results: The methodology was validated by using a modified IEEE RTS-96 test system. The results show t...
Vulnerability assessment of power system networks is becoming an essential requirement for minimizin...
Nowadays, with the rapid expansion of increasing utilization of renewable energy sources, power grid...
This report presents the main results from the knowledge-building project Vulnerability and security...
Objectives: This paper presents a new methodology for analyzing the vulnerability of power systems i...
Objectives: This paper presents a new methodology for analyzing the vulnerability of power systems i...
Security considerations are important issues in Bulk Power System Reliability Evaluation [BPSRE], as...
The most significant parameter in a bulk power adequacy assessment are the load point and overall sy...
Power systems are a vital infrastructure for the functioning of the society, generally regarded as o...
With the growing level of uncertainties in today's power systems, the vulnerability analysis of a po...
In restructured power systems, generation and commercialization activities became market activities,...
Purpose. The development of a model for assessing the level of permissible risk of an emergency situ...
This paper introduces a procedural method based on the fuzzy logic and set theory, which analyzes th...
Electric power systems are critical infrastructures subject to the possibility of extraordinary even...
This paper introduces a procedural method based on fuzzy logic to analyze systematic the risk of an ...
This paper reports an experience on the application of fuzzy reasoning to the fast assessment of the...
Vulnerability assessment of power system networks is becoming an essential requirement for minimizin...
Nowadays, with the rapid expansion of increasing utilization of renewable energy sources, power grid...
This report presents the main results from the knowledge-building project Vulnerability and security...
Objectives: This paper presents a new methodology for analyzing the vulnerability of power systems i...
Objectives: This paper presents a new methodology for analyzing the vulnerability of power systems i...
Security considerations are important issues in Bulk Power System Reliability Evaluation [BPSRE], as...
The most significant parameter in a bulk power adequacy assessment are the load point and overall sy...
Power systems are a vital infrastructure for the functioning of the society, generally regarded as o...
With the growing level of uncertainties in today's power systems, the vulnerability analysis of a po...
In restructured power systems, generation and commercialization activities became market activities,...
Purpose. The development of a model for assessing the level of permissible risk of an emergency situ...
This paper introduces a procedural method based on the fuzzy logic and set theory, which analyzes th...
Electric power systems are critical infrastructures subject to the possibility of extraordinary even...
This paper introduces a procedural method based on fuzzy logic to analyze systematic the risk of an ...
This paper reports an experience on the application of fuzzy reasoning to the fast assessment of the...
Vulnerability assessment of power system networks is becoming an essential requirement for minimizin...
Nowadays, with the rapid expansion of increasing utilization of renewable energy sources, power grid...
This report presents the main results from the knowledge-building project Vulnerability and security...