The article gives an overview on the dynamic political processes in the Black Sea region after some major geostrategic changes posing instability concerns in the region. The aim is to summarise the policy tendencies o...The article gives an overview on the dynamic political processes in the Black Sea region after some major geostrategic changes posing instability concerns in the region. The aim is to summarise the policy tendencies of the international organisations (NATO and EU) towards Russia and to present some analytical thoughts on current Euro-Atlantic strategies. Proposed is a different way of thinking based on the "congagement" approach.展开更多
In order toclarify regional ecological security status and formation mechanism of regional ecological security barriers in underdeveloped regions of China,we took Yunnan province as a case to evaluate its regional eco...In order toclarify regional ecological security status and formation mechanism of regional ecological security barriers in underdeveloped regions of China,we took Yunnan province as a case to evaluate its regional ecological security by using entropy matter-element model,comprehensive index and GIS spatial method,and we diagnosed itsobstacle factors through obstacle degree model. We found a low overall level of regional ecological security in Yunnan. Only Kunmingfell into the good level, 68% of the regions were below the critical safe level. For the vast majority of regions in Yunnan, their regional ecological security was unstable. The indexes related to per capita resources, geological and topographyenvironment, economic, and technologywere at the unsafe or dangerous level.The indexes related to urban expansion, level of income, cultivated land quality were at the level of critical safety. The indexes concerning urban management capacity, airqualityand waterenvironment were at the good or ideallevel. Yunnan's regional ecological security was not good due to natural obstructive environment itself, simultaneously lower backward economic and social level restricted the ability of ecological security response to manage ragile ecological environment. The results of the composite index wereroughly consistent with those of the entropy weight matterelement model. The mean values of the classification index,from high to low, were: the state index>the response index>the pressure index. The state index and the response index had a significant mutual promotion to each other.The regions with good composite index, state index and response index mainly distributed in the central regions of Yunnan Province. Spatial autocorrelation of regional ecological security level in Yunnan was not obvious. Water resources, economic and social development were main obstacle factors of the regional ecological security.When distinguishing with obstacle type, Kunming belonged to natural ecological environment barrier type, while other regions belonged to economic and social barrier type.展开更多
How to comprehensively consider the power flow constraints and various stability constraints in a series of power system optimization problems without affecting the calculation speed is always a problem.The computatio...How to comprehensively consider the power flow constraints and various stability constraints in a series of power system optimization problems without affecting the calculation speed is always a problem.The computational burden of probabilistic security assessment is even more unimaginable.In order to solve such problems,a security region(SR)methodology is proposed,which is a brand-new methodology developed on the basis of the classical point-wise method.Tianjin University has been studying the SR methodology since the 1980s,and has achieved a series of original breakthroughs that are described in this paper.The integrated SR introduced in this paper is mainly defined in the power injection space,and includes SRs to ensure steady-state security,transient stability,static voltage stability,and smalldisturbance stability.These SRs are uniquely determined for a given network topology(as well as location and clearing process for transient faults)and given system component parameters,and are irrelevant to operation states.This paper presents 11 facts and related remarks to introduce the basic concepts,composition,dynamics nature,and topological and geometric characteristics of SRs.It also provides a practical mathematical description of SR boundaries and fast calculation methods to determine them in a concise and systematic way.Thus,this article provides support for the systematic understanding,future research,and applications of SRs.The most critical finding on the topological and geometric characteristics of SRs is that,within the scope of engineering concern,the practical boundaries of SRs in the power injection space can be approximated by one or a few hyperplanes.Based on this finding,the calculation time for power system probabilistic security assessment(i.e.,risk analysis)and power system optimization with security constraints can be decreased by orders of magnitude.展开更多
The DPSIR assessment method, which implies the relationships among driving force (D), pressure (P), status (S), impact (I), and response (R), is widely applied by scholars. This paper aims to establish a com...The DPSIR assessment method, which implies the relationships among driving force (D), pressure (P), status (S), impact (I), and response (R), is widely applied by scholars. This paper aims to establish a comprehensive assessment system for regional energy security in eastern coastal China based on the above model using different indicators. Factor analysis and the SPSS statistical analysis software were used to carry out scientific and quantitative assessments. The results indicated that con- tradictions of energy supply and demand as well as environmental pollution are the critical factors that present great challenges to regional energy security in this area. The authors argued that a sustainable, stable, and safe supply energy supply is crucial in solving the aforesaid dilemma, and improving the energy use efficiency is one of the best choices. Some countermeasures and suggestions regarding regional energy supply stability and utilization security were pointed out.展开更多
The transient critical boundary of dynamic security region (DSR) can be approximated by a few hyper planes correlated with instability separation modes. A method to fast predict instability separation modes is propose...The transient critical boundary of dynamic security region (DSR) can be approximated by a few hyper planes correlated with instability separation modes. A method to fast predict instability separation modes is proposed for DSR calculation in power injection space. The method identifies coherent generation groups by the developed K-medoids algorithm, taking a similarity matrix derived from the reachability Grammian as the index. As an experimental result, reachability Grammian matrices under local injections are approximately invariant. It indicates that the generator coherency identifications are nearly consistent for different injections. Then instability separation modes can be predicted at the normal operating point, while average initial acceleration is considered as the measure of the critical generator group to amend the error. Moreover, based on these predicted instability separation modes, a critical point search strategy for DSR calculation is illustrated in the reduced injection space of the critical generators. The proposed method was evaluated using New England Test System, and the computation accuracy and speed in determining the practical DSR were improved.展开更多
On February 29,2020,President Donald Trump announced the United States signed a peace agreement with the Taliban,signifying the United States‟intention of leaving Afghanistan in the near future.Though the global pande...On February 29,2020,President Donald Trump announced the United States signed a peace agreement with the Taliban,signifying the United States‟intention of leaving Afghanistan in the near future.Though the global pandemic has altered US withdrawal plans,the question still remains:What will become of the Central Asian regional security complex following America‟s exit?Buffered by the presence of the United States since 2001,the Central Asian republics now once again find themselves at a crossroads to either rely on individual defense services or to develop increased military cooperation with interested states.Recognizing Central Asia‟s history of collaboration among its regional and near-regional countries,I argue that the Central Asian Republics of Afghanistan,Kazakhstan,Kyrgyzstan,Tajikistan,Turkmenistan,and Uzbekistan will seek to develop stronger security ties with neighboring regional security complexes(RSCs),namely the South Asian,Russian,and Chinese RSCs.With decreased American influence,each of the states in these RSCs is rushing to fill the void of influence in order to capitalize on Central Asia‟s geostrategic position in Eurasia as well as secure itself from the threat of non-state actors still prevalent in the region.I further argue that the states in the Central Asian RSC additionally seek these same benefits and security,but receive them to a much lesser extent than their more powerful regional neighbors.Understanding how the American withdrawal from Afghanistan will impact Central Asian RSC relations can provide insight into how great power vacuums are filled both by great powers and regional powers alike.展开更多
Sino-US relations are complex relations with multi-aspects between the two bigcountries in the world. It has three levels: the global level, the Asia-Pacificlevel and the bilateral level. The critical relationship bet...Sino-US relations are complex relations with multi-aspects between the two bigcountries in the world. It has three levels: the global level, the Asia-Pacificlevel and the bilateral level. The critical relationship between China and the US isembodied in the regional and bilateral levels that are more specific and essential.Beyond the field of economy and trade, their relationship is mainly embodied in thestrategic and security field.展开更多
Since the scale and uncertainty of the power system have been rapidly increasing,the computation efficiency of constructing the security region boundary(SRB)has become a prominent problem.Based on the topological feat...Since the scale and uncertainty of the power system have been rapidly increasing,the computation efficiency of constructing the security region boundary(SRB)has become a prominent problem.Based on the topological features of historical operation data,a sample generation method for SRB identification is proposed to generate evenly distributed samples,which cover dominant security modes.The boundary sample pair(BSP)composed of a secure sample and an unsecure sample is defined to describe the feature of SRB.The resolution,sampling,and span indices are designed to evaluate the coverage degree of existing BSPs on the SRB and generate samples closer to the SRB.Based on the feature of flat distribution of BSPs over the SRB,the principal component analysis(PCA)is adopted to calculate the tangent vectors and normal vectors of SRB.Then,the sample distribution can be expanded along the tangent vector and corrected along the normal vector to cover different security modes.Finally,a sample set is randomly gen-erated based on the IEEE standard example and another new sample set is generated by the proposed method.The results indicate that the new sample set is closer to the SRB and covers different security modes with a small calculation time cost.展开更多
Using the theory and method of the ecological footprint, and combining the changes of regional land use, resource environment, population, society and economy, this paper calculated the ecological footprint, ecologica...Using the theory and method of the ecological footprint, and combining the changes of regional land use, resource environment, population, society and economy, this paper calculated the ecological footprint, ecological carrying capacity and ecological surplus/loss in 1986-2002 on the Loess Plateau in northern Shaanxi Province. What is more, this paper has put forward the concept of ecological pressure index, set up ecological pressure index models, and ecological security grading systems, and the prediction models of different ecological footprints, ecological carrying capacity, ecological surplus and ecological safety change, and also has assessed the ecological footprint demands of 10,000 yuan GDE The results of this study are as follows: (1) the ecological carrying capacity in northern Shaanxi shows a decreasing trend, the difference of reducing range is the fastest; (2) the ecological footprint appears an increasing trend; (3) ecological pressure index rose to 0.91 from 0.44 during 1986-2002 on the Loess Plateau of northern Shaanxi with an increase of 47%; and (4) the ecological security in the study area is in a critical state, and the ecological oressure index has been increasing rapidlv.展开更多
An optimization of device-to-device(D2D) security rate algorithm based on power control is provided to enhance the physical layer security underlaying D2D communication and guarantee the data rate requirement of the c...An optimization of device-to-device(D2D) security rate algorithm based on power control is provided to enhance the physical layer security underlaying D2D communication and guarantee the data rate requirement of the cellular user(CU) at the same time.First,a scenario model is set up,in which an eavesdropper is considered to wiretap the information of D2D transmitters.Then,a secure region of D2D communication is proposed.When D2D communication users reside outside the secure region,the spectrum of CU's is not allowed to share with the D2D communication so as to avoid eavesdropper tapping useful information of D2D communication.When D2D communication users reside inside the secure region,the security rate of D2D is maximized by optimization of the transmitting power of D2D and CU.The simulation results showthat the achieved D2D security rate of the proposed algorithm increases 2.8 bps/Hz when the signal to noise ratio(SNR) is 15 d B,compared with that when the random access algorithm is used.展开更多
The security constrained distributed optimal power flow (DOPF) of interconnected power systems is presented. The centralized OPF problem of the multi-area power systems is decomposed into independent DOPF subproblem...The security constrained distributed optimal power flow (DOPF) of interconnected power systems is presented. The centralized OPF problem of the multi-area power systems is decomposed into independent DOPF subproblems, one for each area. The dynamic security region (DSR) to guarantee the transient stability constraints and static voltage stability region (SVSR) constraints, and line current limits are included as constraints. The solutions to the DOPF subproblems of the different areas are coordinated through a pricing mechanism until they converge to the centralized OPF solution. The nonlinear DOPF subproblem is solved by predictor-corrector interior point method (PClPM). The IEEE three-area RTS-96 system is worked out in order to demonstrate the effectiveness of the proposed method.展开更多
This article asks whether a regional security community has emerged in Asia with the potential to grow mature and seeks to make a contribution to the ongoing debate on this controversial topic.It advances the argument...This article asks whether a regional security community has emerged in Asia with the potential to grow mature and seeks to make a contribution to the ongoing debate on this controversial topic.It advances the argument that states in this broad region are far from being able to develop a security community for reasons different from those provided by political realists,developmental statists,liberals,and constructivists(social,discursive,and emancipationist).The role of Association of Southeast Asia(ASEAN)and that of China provide excellent test cases for the theoretical proposition that the building of a successful regional security community requires at least two necessary conditions:liberal democracy and regional democratic leadership,which remain absent in Asia.展开更多
Determining security/stability boundaries is a common and critical means of preventing cascading failures induced by voltage-related issues,which represents one of the major challenges in bulk power systems.However,tr...Determining security/stability boundaries is a common and critical means of preventing cascading failures induced by voltage-related issues,which represents one of the major challenges in bulk power systems.However,traditional approaches suffer from conservative issues and heavy computational burdens.To address these challenges,the concept of an autonomous-synergic voltage security region(AS-VSR)and the corresponding dynamic constraint coefficient pruning(DCCP)computation method,which fully consider the volt/var characteristics of bulk power systems,are proposed in this letter.Both linearized and nonlinearized robust optimization problems are introduced to obtain accurate results.The computational accuracy,time cost,and advantages of autonomous-synergic control are observed in the simulation results.展开更多
This paper proposes a security region of transporta-tion networks,which is defined as the set of flow states(operating points)satisfying the N-1 security in transportation networks.The boundary of the set is closed,in...This paper proposes a security region of transporta-tion networks,which is defined as the set of flow states(operating points)satisfying the N-1 security in transportation networks.The boundary of the set is closed,inside all the operating points are N-1 secure;oppositely,outside all the operating points are insecure.First,N-1 security of the transportation networks is defined,which means that when a road is blocked,vehicles on other roads within the networks can also reach their destination through different paths without being trapped on the road.Then,the security region of transportation networks is modeled.The algorithm of a boundary calculation is studied and the boundary equations of security distances are proposed.Finally,the proposed security of the transportation networks is presented in different examples.This paper demonstrates the following:1)the security region can be accurately predicted by the simulation of N-1;2)the boundary distance can show the necessary degree of security;3)security can be improved by a preventive control scheme.The simulation on TransCAD is used to verify the correctness of the results.Index Terms-Boundary distance,evolution,security region,transportation network,TransCAD.展开更多
Fossil fuel depletion and environmental pollution problems promote development of renewable energy(RE)glob-ally.With increasing penetration of RE,operation security and economy of power systems(PS)are greatly impacted...Fossil fuel depletion and environmental pollution problems promote development of renewable energy(RE)glob-ally.With increasing penetration of RE,operation security and economy of power systems(PS)are greatly impacted by fluctuation and intermittence of renewable power.In this paper,information gap decision theory(IGDT)is adapted to handle uncertainty of wind power generation.Based on conventional IGDT method,linear regulation strategy(LRS)and robust linear optimization(RLO)method are integrated to reformulate the model for rigorously considering security constraints.Then a robustness assessment method based on hybrid RLO-IGDT approach is proposed for analyzing robustness and economic performance of PS.Moreover,a risk-averse linearization method is adapted to convert the proposed assessment model into a mixed integer linear programming(MILP)problem for convenient optimization without robustness loss.Finally,results of case studies validate superiority of proposed method in guaranteeing operation security rigorously and effectiveness in assessment of RSR for PS without overestimation.Index Terms-Hybrid RLO-IGDT approach,information gap decision theory(IGDT),operation security,robustness assessment,robustness security region(RSR).展开更多
In this paper,a new Distribution Management System(DMS)framework based on security region is proposed.First,the concept of Distribution System Security Region(DSSR)is introduced.DSSR is capable to describe the N-1 sec...In this paper,a new Distribution Management System(DMS)framework based on security region is proposed.First,the concept of Distribution System Security Region(DSSR)is introduced.DSSR is capable to describe the N-1 security boundary of the whole distribution network,including the secure output range of DGs.This new theoretic tool provides a chance for the implementation of real-time security analysis and active controls in DMS.Second,this paper proposes and describes five security states for distribution system.Third,an upgraded DMS enhanced with DSSR is proposed,which consists of advanced security functions such as preventive and predictive control of the trajectory of operating points.Finally,a practical case is presented to simulate the proposed DSSR-enhanced DMS,in which both the security region of network and the output range of DGs are calculated.Typical security functions are also demonstrated.In conclusion,the new DMS framework aims to help operate the system closed to its security boundary in order to improve the efficiency significantly within same security standard.This work is beneficial for future low carbon distribution systems with high penetration rate of DGs.展开更多
As the issues of security and stability of power systems are becoming increasingly significant,it is necessary to consider the constraints of the static voltage stability and transient stability,which are closely rela...As the issues of security and stability of power systems are becoming increasingly significant,it is necessary to consider the constraints of the static voltage stability and transient stability,which are closely related to the active power dispatch of power systems,in the daily power dispatch,i.e.the unit commitment.However,due to the complexity of these constraints and limitation of the existing analysis methods,there has been no unit commitment model reported so far that can deal with these security constraints.On the other hand,as lack of effective measures to evaluate the security margin of dispatch schemes,it is difficult for power system operators to integrate both the security and economy of power systems in unit commitment.To resolve the above-mentioned issues,a security region based security-constrained unit commitment model is presented in the paper,which gives consideration to both the security and economy of power systems.For the first time,the active power flow constraint,the static voltage stability constraint and the transient stability constraint are taken into account in unit commitment at the same time.The model presented in the paper takes the operating cost,the branch transmission capacity margin,the static voltage stability margin and the transient stability margin as sub-objectives.By adjusting the weighting factors of sub-objectives,it is convenient to adjust the preference on the security and economy of power systems and reach a balance.The IEEE RTS-24 test system is adopted to validate the correctness and the efficiency of the proposed model.展开更多
Transient stability assessment(TSA)based on security region is of great significance to the security of power systems.In this paper,we propose a novel methodology for the assessment of online transient stability margi...Transient stability assessment(TSA)based on security region is of great significance to the security of power systems.In this paper,we propose a novel methodology for the assessment of online transient stability margin.Combined with a geographic information system(GIS)and transformation rules,the topology information and pre-fault power flow characteristics can be extracted by 2 D computer-vision-based power flow images(CVPFIs).Then,a convolutional neural network(CNN)-based comprehensive network is constructed to map the relationship between the steady-state power flow and the generator stability indices under the anticipated contingency set.The network consists of two components:the classification network classifies the input samples into the credibly stable/unstable and uncertain categories,and the prediction network is utilized to further predict the generator stability indices of the categorized samples,which improves the network ability to distinguish between the samples with similar characteristics.The proposed methodology can be used to quickly and quantitatively evaluate the transient stability margin of a power system,and the simulation results validate the effectiveness of the method.展开更多
The region-based method has been applied in transmission systems and traditional passive distribution systems without power sources. This paper proposes the model of total quadrant security region(TQSR) for active dis...The region-based method has been applied in transmission systems and traditional passive distribution systems without power sources. This paper proposes the model of total quadrant security region(TQSR) for active distribution networks(ADN) with high penetration of distributed generation(DG). Firstly, TQSR is defined as a closed set of all the N-1 secure operation points in the state space of ADN. Then, the TQSR is modeled considering the constraints of state space,normal operation and N-1 security criterion. Then, the characteristics of TQSR are observed and analyzed on the test systems with different DG penetrations. TQSR can be located in any quadrant of the state space. For different DG penetrations,the shape and security features of TQSR are also different. Finally, the region map is discovered, which summarizes the features of different types of distribution networks.展开更多
Large-scale voltage collapse incidences, which result in power outages over large regions and extensive economic losses, are presently common occurrences worldwide. To avoid voltage collapse and operate more safely an...Large-scale voltage collapse incidences, which result in power outages over large regions and extensive economic losses, are presently common occurrences worldwide. To avoid voltage collapse and operate more safely and reliably, it is necessary to analyze the voltage security operation region(VSOR) of power systems, which has become a topic of increasing interest lately. In this paper, a novel improved particle swarm optimization and recursive least square(IPSO-RLS) hybrid algorithm is proposed to determine the VSOR of a power system. Also, stability analysis on the proposed algorithm is carried out by analyzing the errors and convergence accuracy of the obtained results. Firstly, the voltage stability and VSOR-surface of a power system are analyzed in this paper. Secondly, the two algorithms,namely IPSO and RLS algorithms, are studied individually.Based on this understanding, a novel IPSO-RLS hybrid algorithm is proposed to optimize the active and reactive power,and the voltage allowed to identify the VSOR-surface accurately. Finally, the proposed algorithm is validated by using a simulation case study on three wind farm regions of actual Hami Power Grid of China in DIg SILENT/Power Factory software.The error and accuracy of the obtained simulation results are analyzed and compared with those of the particle swarm optimization(PSO), IPSO and IPSO-RLS hybrid algorithms.展开更多
文摘The article gives an overview on the dynamic political processes in the Black Sea region after some major geostrategic changes posing instability concerns in the region. The aim is to summarise the policy tendencies of the international organisations (NATO and EU) towards Russia and to present some analytical thoughts on current Euro-Atlantic strategies. Proposed is a different way of thinking based on the "congagement" approach.
基金funded by the National Science-technology Support Plan Projects of China (Grant No.2015BAD07B0105)Yunnan Education Department Fundof China (2014Y315)
文摘In order toclarify regional ecological security status and formation mechanism of regional ecological security barriers in underdeveloped regions of China,we took Yunnan province as a case to evaluate its regional ecological security by using entropy matter-element model,comprehensive index and GIS spatial method,and we diagnosed itsobstacle factors through obstacle degree model. We found a low overall level of regional ecological security in Yunnan. Only Kunmingfell into the good level, 68% of the regions were below the critical safe level. For the vast majority of regions in Yunnan, their regional ecological security was unstable. The indexes related to per capita resources, geological and topographyenvironment, economic, and technologywere at the unsafe or dangerous level.The indexes related to urban expansion, level of income, cultivated land quality were at the level of critical safety. The indexes concerning urban management capacity, airqualityand waterenvironment were at the good or ideallevel. Yunnan's regional ecological security was not good due to natural obstructive environment itself, simultaneously lower backward economic and social level restricted the ability of ecological security response to manage ragile ecological environment. The results of the composite index wereroughly consistent with those of the entropy weight matterelement model. The mean values of the classification index,from high to low, were: the state index>the response index>the pressure index. The state index and the response index had a significant mutual promotion to each other.The regions with good composite index, state index and response index mainly distributed in the central regions of Yunnan Province. Spatial autocorrelation of regional ecological security level in Yunnan was not obvious. Water resources, economic and social development were main obstacle factors of the regional ecological security.When distinguishing with obstacle type, Kunming belonged to natural ecological environment barrier type, while other regions belonged to economic and social barrier type.
文摘How to comprehensively consider the power flow constraints and various stability constraints in a series of power system optimization problems without affecting the calculation speed is always a problem.The computational burden of probabilistic security assessment is even more unimaginable.In order to solve such problems,a security region(SR)methodology is proposed,which is a brand-new methodology developed on the basis of the classical point-wise method.Tianjin University has been studying the SR methodology since the 1980s,and has achieved a series of original breakthroughs that are described in this paper.The integrated SR introduced in this paper is mainly defined in the power injection space,and includes SRs to ensure steady-state security,transient stability,static voltage stability,and smalldisturbance stability.These SRs are uniquely determined for a given network topology(as well as location and clearing process for transient faults)and given system component parameters,and are irrelevant to operation states.This paper presents 11 facts and related remarks to introduce the basic concepts,composition,dynamics nature,and topological and geometric characteristics of SRs.It also provides a practical mathematical description of SR boundaries and fast calculation methods to determine them in a concise and systematic way.Thus,this article provides support for the systematic understanding,future research,and applications of SRs.The most critical finding on the topological and geometric characteristics of SRs is that,within the scope of engineering concern,the practical boundaries of SRs in the power injection space can be approximated by one or a few hyperplanes.Based on this finding,the calculation time for power system probabilistic security assessment(i.e.,risk analysis)and power system optimization with security constraints can be decreased by orders of magnitude.
基金Supported by the State Nature Science Foundation (40771085) the National Science & Technology Support Program (2006BZC 18B01-05)
文摘The DPSIR assessment method, which implies the relationships among driving force (D), pressure (P), status (S), impact (I), and response (R), is widely applied by scholars. This paper aims to establish a comprehensive assessment system for regional energy security in eastern coastal China based on the above model using different indicators. Factor analysis and the SPSS statistical analysis software were used to carry out scientific and quantitative assessments. The results indicated that con- tradictions of energy supply and demand as well as environmental pollution are the critical factors that present great challenges to regional energy security in this area. The authors argued that a sustainable, stable, and safe supply energy supply is crucial in solving the aforesaid dilemma, and improving the energy use efficiency is one of the best choices. Some countermeasures and suggestions regarding regional energy supply stability and utilization security were pointed out.
基金Supported by National Natural Science Foundation of China (No.50595413)Special Fund of the National Fundamental Research of China(No.2004CB217904)+4 种基金US EPRI under Agreement EP-P29464/C9966Foundation for the Author of National Excellent Doctoral Disserta-tion (No.200439)Key Project of Ministry of Education of China(No.105047)Program for New Century Excellent Talents in University,Fok Ying Tung Education Foundation (No.104019)Innovation Fund of Tianjin Municipal (2006-09)
文摘The transient critical boundary of dynamic security region (DSR) can be approximated by a few hyper planes correlated with instability separation modes. A method to fast predict instability separation modes is proposed for DSR calculation in power injection space. The method identifies coherent generation groups by the developed K-medoids algorithm, taking a similarity matrix derived from the reachability Grammian as the index. As an experimental result, reachability Grammian matrices under local injections are approximately invariant. It indicates that the generator coherency identifications are nearly consistent for different injections. Then instability separation modes can be predicted at the normal operating point, while average initial acceleration is considered as the measure of the critical generator group to amend the error. Moreover, based on these predicted instability separation modes, a critical point search strategy for DSR calculation is illustrated in the reduced injection space of the critical generators. The proposed method was evaluated using New England Test System, and the computation accuracy and speed in determining the practical DSR were improved.
文摘On February 29,2020,President Donald Trump announced the United States signed a peace agreement with the Taliban,signifying the United States‟intention of leaving Afghanistan in the near future.Though the global pandemic has altered US withdrawal plans,the question still remains:What will become of the Central Asian regional security complex following America‟s exit?Buffered by the presence of the United States since 2001,the Central Asian republics now once again find themselves at a crossroads to either rely on individual defense services or to develop increased military cooperation with interested states.Recognizing Central Asia‟s history of collaboration among its regional and near-regional countries,I argue that the Central Asian Republics of Afghanistan,Kazakhstan,Kyrgyzstan,Tajikistan,Turkmenistan,and Uzbekistan will seek to develop stronger security ties with neighboring regional security complexes(RSCs),namely the South Asian,Russian,and Chinese RSCs.With decreased American influence,each of the states in these RSCs is rushing to fill the void of influence in order to capitalize on Central Asia‟s geostrategic position in Eurasia as well as secure itself from the threat of non-state actors still prevalent in the region.I further argue that the states in the Central Asian RSC additionally seek these same benefits and security,but receive them to a much lesser extent than their more powerful regional neighbors.Understanding how the American withdrawal from Afghanistan will impact Central Asian RSC relations can provide insight into how great power vacuums are filled both by great powers and regional powers alike.
文摘Sino-US relations are complex relations with multi-aspects between the two bigcountries in the world. It has three levels: the global level, the Asia-Pacificlevel and the bilateral level. The critical relationship between China and the US isembodied in the regional and bilateral levels that are more specific and essential.Beyond the field of economy and trade, their relationship is mainly embodied in thestrategic and security field.
文摘Since the scale and uncertainty of the power system have been rapidly increasing,the computation efficiency of constructing the security region boundary(SRB)has become a prominent problem.Based on the topological features of historical operation data,a sample generation method for SRB identification is proposed to generate evenly distributed samples,which cover dominant security modes.The boundary sample pair(BSP)composed of a secure sample and an unsecure sample is defined to describe the feature of SRB.The resolution,sampling,and span indices are designed to evaluate the coverage degree of existing BSPs on the SRB and generate samples closer to the SRB.Based on the feature of flat distribution of BSPs over the SRB,the principal component analysis(PCA)is adopted to calculate the tangent vectors and normal vectors of SRB.Then,the sample distribution can be expanded along the tangent vector and corrected along the normal vector to cover different security modes.Finally,a sample set is randomly gen-erated based on the IEEE standard example and another new sample set is generated by the proposed method.The results indicate that the new sample set is closer to the SRB and covers different security modes with a small calculation time cost.
基金National Natural Science Foundation of China, No.40371003 Ministry of Education of China, No.01158 Master Research Project of Shaanxi Normal University
文摘Using the theory and method of the ecological footprint, and combining the changes of regional land use, resource environment, population, society and economy, this paper calculated the ecological footprint, ecological carrying capacity and ecological surplus/loss in 1986-2002 on the Loess Plateau in northern Shaanxi Province. What is more, this paper has put forward the concept of ecological pressure index, set up ecological pressure index models, and ecological security grading systems, and the prediction models of different ecological footprints, ecological carrying capacity, ecological surplus and ecological safety change, and also has assessed the ecological footprint demands of 10,000 yuan GDE The results of this study are as follows: (1) the ecological carrying capacity in northern Shaanxi shows a decreasing trend, the difference of reducing range is the fastest; (2) the ecological footprint appears an increasing trend; (3) ecological pressure index rose to 0.91 from 0.44 during 1986-2002 on the Loess Plateau of northern Shaanxi with an increase of 47%; and (4) the ecological security in the study area is in a critical state, and the ecological oressure index has been increasing rapidlv.
基金National Natural Science Foundation of China(No.61503251)Natural Science Foundation of Shanghai,China(No.16ZR1424500)
文摘An optimization of device-to-device(D2D) security rate algorithm based on power control is provided to enhance the physical layer security underlaying D2D communication and guarantee the data rate requirement of the cellular user(CU) at the same time.First,a scenario model is set up,in which an eavesdropper is considered to wiretap the information of D2D transmitters.Then,a secure region of D2D communication is proposed.When D2D communication users reside outside the secure region,the spectrum of CU's is not allowed to share with the D2D communication so as to avoid eavesdropper tapping useful information of D2D communication.When D2D communication users reside inside the secure region,the security rate of D2D is maximized by optimization of the transmitting power of D2D and CU.The simulation results showthat the achieved D2D security rate of the proposed algorithm increases 2.8 bps/Hz when the signal to noise ratio(SNR) is 15 d B,compared with that when the random access algorithm is used.
基金National Natural Science Foundation of China(No.50595413)National Key Basic Research Program ("973" Program) (No.2004CB217904)
文摘The security constrained distributed optimal power flow (DOPF) of interconnected power systems is presented. The centralized OPF problem of the multi-area power systems is decomposed into independent DOPF subproblems, one for each area. The dynamic security region (DSR) to guarantee the transient stability constraints and static voltage stability region (SVSR) constraints, and line current limits are included as constraints. The solutions to the DOPF subproblems of the different areas are coordinated through a pricing mechanism until they converge to the centralized OPF solution. The nonlinear DOPF subproblem is solved by predictor-corrector interior point method (PClPM). The IEEE three-area RTS-96 system is worked out in order to demonstrate the effectiveness of the proposed method.
文摘This article asks whether a regional security community has emerged in Asia with the potential to grow mature and seeks to make a contribution to the ongoing debate on this controversial topic.It advances the argument that states in this broad region are far from being able to develop a security community for reasons different from those provided by political realists,developmental statists,liberals,and constructivists(social,discursive,and emancipationist).The role of Association of Southeast Asia(ASEAN)and that of China provide excellent test cases for the theoretical proposition that the building of a successful regional security community requires at least two necessary conditions:liberal democracy and regional democratic leadership,which remain absent in Asia.
基金supported in part by the National Natural Science Foundation of China (No.52007017)Fundamental Research Funds for the Central Universities (No.2020CDJQY-A027)。
文摘Determining security/stability boundaries is a common and critical means of preventing cascading failures induced by voltage-related issues,which represents one of the major challenges in bulk power systems.However,traditional approaches suffer from conservative issues and heavy computational burdens.To address these challenges,the concept of an autonomous-synergic voltage security region(AS-VSR)and the corresponding dynamic constraint coefficient pruning(DCCP)computation method,which fully consider the volt/var characteristics of bulk power systems,are proposed in this letter.Both linearized and nonlinearized robust optimization problems are introduced to obtain accurate results.The computational accuracy,time cost,and advantages of autonomous-synergic control are observed in the simulation results.
基金supported by National Key Research and Development Program of China(2016YFB0900100)National Natural Science Foundation of China(51877144)China Postdoctoral Science(2020M6700668).
文摘This paper proposes a security region of transporta-tion networks,which is defined as the set of flow states(operating points)satisfying the N-1 security in transportation networks.The boundary of the set is closed,inside all the operating points are N-1 secure;oppositely,outside all the operating points are insecure.First,N-1 security of the transportation networks is defined,which means that when a road is blocked,vehicles on other roads within the networks can also reach their destination through different paths without being trapped on the road.Then,the security region of transportation networks is modeled.The algorithm of a boundary calculation is studied and the boundary equations of security distances are proposed.Finally,the proposed security of the transportation networks is presented in different examples.This paper demonstrates the following:1)the security region can be accurately predicted by the simulation of N-1;2)the boundary distance can show the necessary degree of security;3)security can be improved by a preventive control scheme.The simulation on TransCAD is used to verify the correctness of the results.Index Terms-Boundary distance,evolution,security region,transportation network,TransCAD.
基金supported by the National Key R&D Program of China(No.2022YFB2404000).
文摘Fossil fuel depletion and environmental pollution problems promote development of renewable energy(RE)glob-ally.With increasing penetration of RE,operation security and economy of power systems(PS)are greatly impacted by fluctuation and intermittence of renewable power.In this paper,information gap decision theory(IGDT)is adapted to handle uncertainty of wind power generation.Based on conventional IGDT method,linear regulation strategy(LRS)and robust linear optimization(RLO)method are integrated to reformulate the model for rigorously considering security constraints.Then a robustness assessment method based on hybrid RLO-IGDT approach is proposed for analyzing robustness and economic performance of PS.Moreover,a risk-averse linearization method is adapted to convert the proposed assessment model into a mixed integer linear programming(MILP)problem for convenient optimization without robustness loss.Finally,results of case studies validate superiority of proposed method in guaranteeing operation security rigorously and effectiveness in assessment of RSR for PS without overestimation.Index Terms-Hybrid RLO-IGDT approach,information gap decision theory(IGDT),operation security,robustness assessment,robustness security region(RSR).
基金This work was supported by the National Natural Science Foundation of China(51477112)National Natural Science Foundation of China(51277129).
文摘In this paper,a new Distribution Management System(DMS)framework based on security region is proposed.First,the concept of Distribution System Security Region(DSSR)is introduced.DSSR is capable to describe the N-1 security boundary of the whole distribution network,including the secure output range of DGs.This new theoretic tool provides a chance for the implementation of real-time security analysis and active controls in DMS.Second,this paper proposes and describes five security states for distribution system.Third,an upgraded DMS enhanced with DSSR is proposed,which consists of advanced security functions such as preventive and predictive control of the trajectory of operating points.Finally,a practical case is presented to simulate the proposed DSSR-enhanced DMS,in which both the security region of network and the output range of DGs are calculated.Typical security functions are also demonstrated.In conclusion,the new DMS framework aims to help operate the system closed to its security boundary in order to improve the efficiency significantly within same security standard.This work is beneficial for future low carbon distribution systems with high penetration rate of DGs.
文摘As the issues of security and stability of power systems are becoming increasingly significant,it is necessary to consider the constraints of the static voltage stability and transient stability,which are closely related to the active power dispatch of power systems,in the daily power dispatch,i.e.the unit commitment.However,due to the complexity of these constraints and limitation of the existing analysis methods,there has been no unit commitment model reported so far that can deal with these security constraints.On the other hand,as lack of effective measures to evaluate the security margin of dispatch schemes,it is difficult for power system operators to integrate both the security and economy of power systems in unit commitment.To resolve the above-mentioned issues,a security region based security-constrained unit commitment model is presented in the paper,which gives consideration to both the security and economy of power systems.For the first time,the active power flow constraint,the static voltage stability constraint and the transient stability constraint are taken into account in unit commitment at the same time.The model presented in the paper takes the operating cost,the branch transmission capacity margin,the static voltage stability margin and the transient stability margin as sub-objectives.By adjusting the weighting factors of sub-objectives,it is convenient to adjust the preference on the security and economy of power systems and reach a balance.The IEEE RTS-24 test system is adopted to validate the correctness and the efficiency of the proposed model.
基金supported in part by the National Natural Science Foundation of China(No.51877034)
文摘Transient stability assessment(TSA)based on security region is of great significance to the security of power systems.In this paper,we propose a novel methodology for the assessment of online transient stability margin.Combined with a geographic information system(GIS)and transformation rules,the topology information and pre-fault power flow characteristics can be extracted by 2 D computer-vision-based power flow images(CVPFIs).Then,a convolutional neural network(CNN)-based comprehensive network is constructed to map the relationship between the steady-state power flow and the generator stability indices under the anticipated contingency set.The network consists of two components:the classification network classifies the input samples into the credibly stable/unstable and uncertain categories,and the prediction network is utilized to further predict the generator stability indices of the categorized samples,which improves the network ability to distinguish between the samples with similar characteristics.The proposed methodology can be used to quickly and quantitatively evaluate the transient stability margin of a power system,and the simulation results validate the effectiveness of the method.
基金supported in part by National Key Research and Development Program of China (No. 2016YFB0900100)National Natural Science Foundation of China (No. 51877144)China Postdoctoral Science Foundation (No.2020M670668)。
文摘The region-based method has been applied in transmission systems and traditional passive distribution systems without power sources. This paper proposes the model of total quadrant security region(TQSR) for active distribution networks(ADN) with high penetration of distributed generation(DG). Firstly, TQSR is defined as a closed set of all the N-1 secure operation points in the state space of ADN. Then, the TQSR is modeled considering the constraints of state space,normal operation and N-1 security criterion. Then, the characteristics of TQSR are observed and analyzed on the test systems with different DG penetrations. TQSR can be located in any quadrant of the state space. For different DG penetrations,the shape and security features of TQSR are also different. Finally, the region map is discovered, which summarizes the features of different types of distribution networks.
基金supported by Natural Science Foundation of Xinjiang Autonomous Region (No. 2020D01C068)National Natural Science Foundation of China (No. 51667020)Natural Science Projects of Scientific Research Program of Universities in Xinjiang Autonomous Region (No. XJEDU2017I002)。
文摘Large-scale voltage collapse incidences, which result in power outages over large regions and extensive economic losses, are presently common occurrences worldwide. To avoid voltage collapse and operate more safely and reliably, it is necessary to analyze the voltage security operation region(VSOR) of power systems, which has become a topic of increasing interest lately. In this paper, a novel improved particle swarm optimization and recursive least square(IPSO-RLS) hybrid algorithm is proposed to determine the VSOR of a power system. Also, stability analysis on the proposed algorithm is carried out by analyzing the errors and convergence accuracy of the obtained results. Firstly, the voltage stability and VSOR-surface of a power system are analyzed in this paper. Secondly, the two algorithms,namely IPSO and RLS algorithms, are studied individually.Based on this understanding, a novel IPSO-RLS hybrid algorithm is proposed to optimize the active and reactive power,and the voltage allowed to identify the VSOR-surface accurately. Finally, the proposed algorithm is validated by using a simulation case study on three wind farm regions of actual Hami Power Grid of China in DIg SILENT/Power Factory software.The error and accuracy of the obtained simulation results are analyzed and compared with those of the particle swarm optimization(PSO), IPSO and IPSO-RLS hybrid algorithms.