期刊文献+
共找到31篇文章
< 1 2 >
每页显示 20 50 100
NATO and EU Strategies for the Black Sea Region: The Challenge of Power Balance in New Security Environment
1
作者 Siyana Lutzkanova 《Journal of Shipping and Ocean Engineering》 2017年第5期210-215,共6页
The article gives an overview on the dynamic political processes in the Black Sea region after some major geostrategic changes posing instability concerns in the region. The aim is to summarise the policy tendencies o... The article gives an overview on the dynamic political processes in the Black Sea region after some major geostrategic changes posing instability concerns in the region. The aim is to summarise the policy tendencies of the international organisations (NATO and EU) towards Russia and to present some analytical thoughts on current Euro-Atlantic strategies. Proposed is a different way of thinking based on the "congagement" approach. 展开更多
关键词 Black sea region security balance of power NATO and EU security policies in the Black Sea.
下载PDF
Regional ecological security anddiagnosisof obstaclefactors in underdevelopedregions:acasestudy in Yunnan Province,China 被引量:12
2
作者 OUZhao-rong ZHUQing-ke SUNYong-yu 《Journal of Mountain Science》 SCIE CSCD 2017年第5期870-884,共15页
In order toclarify regional ecological security status and formation mechanism of regional ecological security barriers in underdeveloped regions of China,we took Yunnan province as a case to evaluate its regional eco... In order toclarify regional ecological security status and formation mechanism of regional ecological security barriers in underdeveloped regions of China,we took Yunnan province as a case to evaluate its regional ecological security by using entropy matter-element model,comprehensive index and GIS spatial method,and we diagnosed itsobstacle factors through obstacle degree model. We found a low overall level of regional ecological security in Yunnan. Only Kunmingfell into the good level, 68% of the regions were below the critical safe level. For the vast majority of regions in Yunnan, their regional ecological security was unstable. The indexes related to per capita resources, geological and topographyenvironment, economic, and technologywere at the unsafe or dangerous level.The indexes related to urban expansion, level of income, cultivated land quality were at the level of critical safety. The indexes concerning urban management capacity, airqualityand waterenvironment were at the good or ideallevel. Yunnan's regional ecological security was not good due to natural obstructive environment itself, simultaneously lower backward economic and social level restricted the ability of ecological security response to manage ragile ecological environment. The results of the composite index wereroughly consistent with those of the entropy weight matterelement model. The mean values of the classification index,from high to low, were: the state index>the response index>the pressure index. The state index and the response index had a significant mutual promotion to each other.The regions with good composite index, state index and response index mainly distributed in the central regions of Yunnan Province. Spatial autocorrelation of regional ecological security level in Yunnan was not obvious. Water resources, economic and social development were main obstacle factors of the regional ecological security.When distinguishing with obstacle type, Kunming belonged to natural ecological environment barrier type, while other regions belonged to economic and social barrier type. 展开更多
关键词 regional ecological security Pressure state-response model Entropy matter-element model Comprehensive index method Spatial heterogeneity Obstacle factors
下载PDF
Theory and Method of Power System Integrated Security Region Irrelevant to Operation States:An Introduction 被引量:14
3
作者 Yixin Yu Yanli Liu +1 位作者 Chao Qin Tiankai Yang 《Engineering》 SCIE EI 2020年第7期754-777,共24页
How to comprehensively consider the power flow constraints and various stability constraints in a series of power system optimization problems without affecting the calculation speed is always a problem.The computatio... How to comprehensively consider the power flow constraints and various stability constraints in a series of power system optimization problems without affecting the calculation speed is always a problem.The computational burden of probabilistic security assessment is even more unimaginable.In order to solve such problems,a security region(SR)methodology is proposed,which is a brand-new methodology developed on the basis of the classical point-wise method.Tianjin University has been studying the SR methodology since the 1980s,and has achieved a series of original breakthroughs that are described in this paper.The integrated SR introduced in this paper is mainly defined in the power injection space,and includes SRs to ensure steady-state security,transient stability,static voltage stability,and smalldisturbance stability.These SRs are uniquely determined for a given network topology(as well as location and clearing process for transient faults)and given system component parameters,and are irrelevant to operation states.This paper presents 11 facts and related remarks to introduce the basic concepts,composition,dynamics nature,and topological and geometric characteristics of SRs.It also provides a practical mathematical description of SR boundaries and fast calculation methods to determine them in a concise and systematic way.Thus,this article provides support for the systematic understanding,future research,and applications of SRs.The most critical finding on the topological and geometric characteristics of SRs is that,within the scope of engineering concern,the practical boundaries of SRs in the power injection space can be approximated by one or a few hyperplanes.Based on this finding,the calculation time for power system probabilistic security assessment(i.e.,risk analysis)and power system optimization with security constraints can be decreased by orders of magnitude. 展开更多
关键词 security region Composition Power flow security Static voltage stability small-disturbance stability Transient stability Dynamics nature Topological and geometric characteristics HYPERPLANE
下载PDF
Evaluation of regional energy security in eastern coastal China based on the DPSIR model 被引量:2
4
作者 ZHANG Yan SHEN Lei 《Journal of Coal Science & Engineering(China)》 2012年第3期285-290,共6页
The DPSIR assessment method, which implies the relationships among driving force (D), pressure (P), status (S), impact (I), and response (R), is widely applied by scholars. This paper aims to establish a com... The DPSIR assessment method, which implies the relationships among driving force (D), pressure (P), status (S), impact (I), and response (R), is widely applied by scholars. This paper aims to establish a comprehensive assessment system for regional energy security in eastern coastal China based on the above model using different indicators. Factor analysis and the SPSS statistical analysis software were used to carry out scientific and quantitative assessments. The results indicated that con- tradictions of energy supply and demand as well as environmental pollution are the critical factors that present great challenges to regional energy security in this area. The authors argued that a sustainable, stable, and safe supply energy supply is crucial in solving the aforesaid dilemma, and improving the energy use efficiency is one of the best choices. Some countermeasures and suggestions regarding regional energy supply stability and utilization security were pointed out. 展开更多
关键词 DPSIR eastern coastal areas regional energy security assessment system
下载PDF
Prediction of Instability Separation Modes and Its Application in Practical Dynamic Security Region
5
作者 曾沅 余贻鑫 +3 位作者 王红梅 闵亮 张沛 LEES T 《Transactions of Tianjin University》 EI CAS 2007年第3期157-162,共6页
The transient critical boundary of dynamic security region (DSR) can be approximated by a few hyper planes correlated with instability separation modes. A method to fast predict instability separation modes is propose... The transient critical boundary of dynamic security region (DSR) can be approximated by a few hyper planes correlated with instability separation modes. A method to fast predict instability separation modes is proposed for DSR calculation in power injection space. The method identifies coherent generation groups by the developed K-medoids algorithm, taking a similarity matrix derived from the reachability Grammian as the index. As an experimental result, reachability Grammian matrices under local injections are approximately invariant. It indicates that the generator coherency identifications are nearly consistent for different injections. Then instability separation modes can be predicted at the normal operating point, while average initial acceleration is considered as the measure of the critical generator group to amend the error. Moreover, based on these predicted instability separation modes, a critical point search strategy for DSR calculation is illustrated in the reduced injection space of the critical generators. The proposed method was evaluated using New England Test System, and the computation accuracy and speed in determining the practical DSR were improved. 展开更多
关键词 instability separation mode dynamic security region K-medoids algorithm reachability Grammian
下载PDF
The Central Asian Regional Security Complex Revisited:Understanding the Implications of the US Retreat From Afghanistan
6
作者 Samuel Elzinga 《International Relations and Diplomacy》 2021年第11期447-479,共33页
On February 29,2020,President Donald Trump announced the United States signed a peace agreement with the Taliban,signifying the United States‟intention of leaving Afghanistan in the near future.Though the global pande... On February 29,2020,President Donald Trump announced the United States signed a peace agreement with the Taliban,signifying the United States‟intention of leaving Afghanistan in the near future.Though the global pandemic has altered US withdrawal plans,the question still remains:What will become of the Central Asian regional security complex following America‟s exit?Buffered by the presence of the United States since 2001,the Central Asian republics now once again find themselves at a crossroads to either rely on individual defense services or to develop increased military cooperation with interested states.Recognizing Central Asia‟s history of collaboration among its regional and near-regional countries,I argue that the Central Asian Republics of Afghanistan,Kazakhstan,Kyrgyzstan,Tajikistan,Turkmenistan,and Uzbekistan will seek to develop stronger security ties with neighboring regional security complexes(RSCs),namely the South Asian,Russian,and Chinese RSCs.With decreased American influence,each of the states in these RSCs is rushing to fill the void of influence in order to capitalize on Central Asia‟s geostrategic position in Eurasia as well as secure itself from the threat of non-state actors still prevalent in the region.I further argue that the states in the Central Asian RSC additionally seek these same benefits and security,but receive them to a much lesser extent than their more powerful regional neighbors.Understanding how the American withdrawal from Afghanistan will impact Central Asian RSC relations can provide insight into how great power vacuums are filled both by great powers and regional powers alike. 展开更多
关键词 Central Asia regionALISM AFGHANISTAN CONSTRUCTIVISM security regional security Theory(RSCT) TERRORISM CONFLICT
下载PDF
Bilateral and Regional Strategic and Security Relationship Between China and the US after the Cold War
7
作者 楚树龙 《Contemporary International Relations》 2000年第5期1-13,共13页
Sino-US relations are complex relations with multi-aspects between the two bigcountries in the world. It has three levels: the global level, the Asia-Pacificlevel and the bilateral level. The critical relationship bet... Sino-US relations are complex relations with multi-aspects between the two bigcountries in the world. It has three levels: the global level, the Asia-Pacificlevel and the bilateral level. The critical relationship between China and the US isembodied in the regional and bilateral levels that are more specific and essential.Beyond the field of economy and trade, their relationship is mainly embodied in thestrategic and security field. 展开更多
关键词 US Bilateral and regional Strategic and security Relationship Between China and the US after the Cold War security
下载PDF
Sample Generation for Security Region Boundary Identification Based on Topological Features of Historical Operation Data
8
作者 Xiaokang Wu Wei Xu Feng Xue 《Journal of Modern Power Systems and Clean Energy》 SCIE EI CSCD 2024年第4期1087-1095,共9页
Since the scale and uncertainty of the power system have been rapidly increasing,the computation efficiency of constructing the security region boundary(SRB)has become a prominent problem.Based on the topological feat... Since the scale and uncertainty of the power system have been rapidly increasing,the computation efficiency of constructing the security region boundary(SRB)has become a prominent problem.Based on the topological features of historical operation data,a sample generation method for SRB identification is proposed to generate evenly distributed samples,which cover dominant security modes.The boundary sample pair(BSP)composed of a secure sample and an unsecure sample is defined to describe the feature of SRB.The resolution,sampling,and span indices are designed to evaluate the coverage degree of existing BSPs on the SRB and generate samples closer to the SRB.Based on the feature of flat distribution of BSPs over the SRB,the principal component analysis(PCA)is adopted to calculate the tangent vectors and normal vectors of SRB.Then,the sample distribution can be expanded along the tangent vector and corrected along the normal vector to cover different security modes.Finally,a sample set is randomly gen-erated based on the IEEE standard example and another new sample set is generated by the proposed method.The results indicate that the new sample set is closer to the SRB and covers different security modes with a small calculation time cost. 展开更多
关键词 Clustering analysis principal component analysis(PCA) sample generation security region boundary(SRB)
原文传递
Quantitative analysis of the dynamic change and spatial differences of the ecological security: a case study of Loess Plateau in northern Shaanxi Province 被引量:5
9
作者 LI Jing REN Zhiyuan ZHOU Zixiang 《Journal of Geographical Sciences》 SCIE CSCD 2006年第2期251-256,共6页
Using the theory and method of the ecological footprint, and combining the changes of regional land use, resource environment, population, society and economy, this paper calculated the ecological footprint, ecologica... Using the theory and method of the ecological footprint, and combining the changes of regional land use, resource environment, population, society and economy, this paper calculated the ecological footprint, ecological carrying capacity and ecological surplus/loss in 1986-2002 on the Loess Plateau in northern Shaanxi Province. What is more, this paper has put forward the concept of ecological pressure index, set up ecological pressure index models, and ecological security grading systems, and the prediction models of different ecological footprints, ecological carrying capacity, ecological surplus and ecological safety change, and also has assessed the ecological footprint demands of 10,000 yuan GDE The results of this study are as follows: (1) the ecological carrying capacity in northern Shaanxi shows a decreasing trend, the difference of reducing range is the fastest; (2) the ecological footprint appears an increasing trend; (3) ecological pressure index rose to 0.91 from 0.44 during 1986-2002 on the Loess Plateau of northern Shaanxi with an increase of 47%; and (4) the ecological security in the study area is in a critical state, and the ecological oressure index has been increasing rapidlv. 展开更多
关键词 regional ecological security dynamic change spatial difference quantitative analysis the Loess Plateau in northern Shaanxi Province
下载PDF
Security Rate Optimization of D2D Communication Based on Power Control 被引量:2
10
作者 王珍 李莉 +1 位作者 龚帅 叶鹏 《Journal of Donghua University(English Edition)》 EI CAS 2017年第5期624-629,共6页
An optimization of device-to-device(D2D) security rate algorithm based on power control is provided to enhance the physical layer security underlaying D2D communication and guarantee the data rate requirement of the c... An optimization of device-to-device(D2D) security rate algorithm based on power control is provided to enhance the physical layer security underlaying D2D communication and guarantee the data rate requirement of the cellular user(CU) at the same time.First,a scenario model is set up,in which an eavesdropper is considered to wiretap the information of D2D transmitters.Then,a secure region of D2D communication is proposed.When D2D communication users reside outside the secure region,the spectrum of CU's is not allowed to share with the D2D communication so as to avoid eavesdropper tapping useful information of D2D communication.When D2D communication users reside inside the secure region,the security rate of D2D is maximized by optimization of the transmitting power of D2D and CU.The simulation results showthat the achieved D2D security rate of the proposed algorithm increases 2.8 bps/Hz when the signal to noise ratio(SNR) is 15 d B,compared with that when the random access algorithm is used. 展开更多
关键词 device-to-device(D2D) security rate secure region power control
下载PDF
Security Constrained Distributed Optimal Power Flow of Interconnected Power Systems
11
作者 哈比比 余贻鑫 《Transactions of Tianjin University》 EI CAS 2008年第3期208-216,共9页
The security constrained distributed optimal power flow (DOPF) of interconnected power systems is presented. The centralized OPF problem of the multi-area power systems is decomposed into independent DOPF subproblem... The security constrained distributed optimal power flow (DOPF) of interconnected power systems is presented. The centralized OPF problem of the multi-area power systems is decomposed into independent DOPF subproblems, one for each area. The dynamic security region (DSR) to guarantee the transient stability constraints and static voltage stability region (SVSR) constraints, and line current limits are included as constraints. The solutions to the DOPF subproblems of the different areas are coordinated through a pricing mechanism until they converge to the centralized OPF solution. The nonlinear DOPF subproblem is solved by predictor-corrector interior point method (PClPM). The IEEE three-area RTS-96 system is worked out in order to demonstrate the effectiveness of the proposed method. 展开更多
关键词 distributed optimal power flow interior point method predictor-corrector method security region
下载PDF
Toward a Security Community in Asia? The Limits of Constructivism, Developmental Statism, Liberalism, and Realism
12
作者 Sorpong Peou 《International Relations and Diplomacy》 2022年第1期1-24,共24页
This article asks whether a regional security community has emerged in Asia with the potential to grow mature and seeks to make a contribution to the ongoing debate on this controversial topic.It advances the argument... This article asks whether a regional security community has emerged in Asia with the potential to grow mature and seeks to make a contribution to the ongoing debate on this controversial topic.It advances the argument that states in this broad region are far from being able to develop a security community for reasons different from those provided by political realists,developmental statists,liberals,and constructivists(social,discursive,and emancipationist).The role of Association of Southeast Asia(ASEAN)and that of China provide excellent test cases for the theoretical proposition that the building of a successful regional security community requires at least two necessary conditions:liberal democracy and regional democratic leadership,which remain absent in Asia. 展开更多
关键词 regional security community ASIA ASEAN China European Union North America CONSTRUCTIVISM LIBERALISM political realism liberal democracy regional democratic leadership
下载PDF
Autonomous-synergic Voltage Security Regions in Bulk Power Systems 被引量:1
13
作者 Fan Li Tao Niu +3 位作者 Lin Xue Yuxiao Li Tianen Huang Zhenjie Wu 《Journal of Modern Power Systems and Clean Energy》 SCIE EI CSCD 2023年第2期686-692,共7页
Determining security/stability boundaries is a common and critical means of preventing cascading failures induced by voltage-related issues,which represents one of the major challenges in bulk power systems.However,tr... Determining security/stability boundaries is a common and critical means of preventing cascading failures induced by voltage-related issues,which represents one of the major challenges in bulk power systems.However,traditional approaches suffer from conservative issues and heavy computational burdens.To address these challenges,the concept of an autonomous-synergic voltage security region(AS-VSR)and the corresponding dynamic constraint coefficient pruning(DCCP)computation method,which fully consider the volt/var characteristics of bulk power systems,are proposed in this letter.Both linearized and nonlinearized robust optimization problems are introduced to obtain accurate results.The computational accuracy,time cost,and advantages of autonomous-synergic control are observed in the simulation results. 展开更多
关键词 Voltage security region cascading failure dynamic constraint coefficient pruning(DCCP) bulk power system robust optimization
原文传递
Security Region: An Intelligent Approach to Transportation Networks
14
作者 Jun Xiao Menghao Long +1 位作者 Guoqiang Zu Qisi Lin 《CSEE Journal of Power and Energy Systems》 SCIE EI CSCD 2023年第4期1532-1539,共8页
This paper proposes a security region of transporta-tion networks,which is defined as the set of flow states(operating points)satisfying the N-1 security in transportation networks.The boundary of the set is closed,in... This paper proposes a security region of transporta-tion networks,which is defined as the set of flow states(operating points)satisfying the N-1 security in transportation networks.The boundary of the set is closed,inside all the operating points are N-1 secure;oppositely,outside all the operating points are insecure.First,N-1 security of the transportation networks is defined,which means that when a road is blocked,vehicles on other roads within the networks can also reach their destination through different paths without being trapped on the road.Then,the security region of transportation networks is modeled.The algorithm of a boundary calculation is studied and the boundary equations of security distances are proposed.Finally,the proposed security of the transportation networks is presented in different examples.This paper demonstrates the following:1)the security region can be accurately predicted by the simulation of N-1;2)the boundary distance can show the necessary degree of security;3)security can be improved by a preventive control scheme.The simulation on TransCAD is used to verify the correctness of the results.Index Terms-Boundary distance,evolution,security region,transportation network,TransCAD. 展开更多
关键词 Boundary distance evolution security region transportation network TransCAD.
原文传递
Robustness Assessment of Wind Power Generation Considering Rigorous Security Constraints for Power System: A Hybrid RLO-IGDT Approach
15
作者 Lianyong Zuo Shengshi Wang +6 位作者 Yong Sun Shichang Cui Jiakun Fang Xiaomeng Ai Baoju Li Chengliang Hao Jinyu Wen 《CSEE Journal of Power and Energy Systems》 SCIE EI CSCD 2024年第2期518-529,共12页
Fossil fuel depletion and environmental pollution problems promote development of renewable energy(RE)glob-ally.With increasing penetration of RE,operation security and economy of power systems(PS)are greatly impacted... Fossil fuel depletion and environmental pollution problems promote development of renewable energy(RE)glob-ally.With increasing penetration of RE,operation security and economy of power systems(PS)are greatly impacted by fluctuation and intermittence of renewable power.In this paper,information gap decision theory(IGDT)is adapted to handle uncertainty of wind power generation.Based on conventional IGDT method,linear regulation strategy(LRS)and robust linear optimization(RLO)method are integrated to reformulate the model for rigorously considering security constraints.Then a robustness assessment method based on hybrid RLO-IGDT approach is proposed for analyzing robustness and economic performance of PS.Moreover,a risk-averse linearization method is adapted to convert the proposed assessment model into a mixed integer linear programming(MILP)problem for convenient optimization without robustness loss.Finally,results of case studies validate superiority of proposed method in guaranteeing operation security rigorously and effectiveness in assessment of RSR for PS without overestimation.Index Terms-Hybrid RLO-IGDT approach,information gap decision theory(IGDT),operation security,robustness assessment,robustness security region(RSR). 展开更多
关键词 IGDT approach information gap decision theory(IGDT) operation security robustness assessment robustness security region(RSR)
原文传递
Distribution management system framework based on security region for future low carbon distribution systems 被引量:11
16
作者 Jun XIAO Qibo HE Guoqiang ZU 《Journal of Modern Power Systems and Clean Energy》 SCIE EI 2015年第4期544-555,共12页
In this paper,a new Distribution Management System(DMS)framework based on security region is proposed.First,the concept of Distribution System Security Region(DSSR)is introduced.DSSR is capable to describe the N-1 sec... In this paper,a new Distribution Management System(DMS)framework based on security region is proposed.First,the concept of Distribution System Security Region(DSSR)is introduced.DSSR is capable to describe the N-1 security boundary of the whole distribution network,including the secure output range of DGs.This new theoretic tool provides a chance for the implementation of real-time security analysis and active controls in DMS.Second,this paper proposes and describes five security states for distribution system.Third,an upgraded DMS enhanced with DSSR is proposed,which consists of advanced security functions such as preventive and predictive control of the trajectory of operating points.Finally,a practical case is presented to simulate the proposed DSSR-enhanced DMS,in which both the security region of network and the output range of DGs are calculated.Typical security functions are also demonstrated.In conclusion,the new DMS framework aims to help operate the system closed to its security boundary in order to improve the efficiency significantly within same security standard.This work is beneficial for future low carbon distribution systems with high penetration rate of DGs. 展开更多
关键词 DMS security region N-1 security Distributed generation Preventive control Low carbon
原文传递
Security region based security-constrained unit commitment 被引量:5
17
作者 YU YiXin QIN Chao 《Science China(Technological Sciences)》 SCIE EI CAS 2013年第11期2732-2744,共13页
As the issues of security and stability of power systems are becoming increasingly significant,it is necessary to consider the constraints of the static voltage stability and transient stability,which are closely rela... As the issues of security and stability of power systems are becoming increasingly significant,it is necessary to consider the constraints of the static voltage stability and transient stability,which are closely related to the active power dispatch of power systems,in the daily power dispatch,i.e.the unit commitment.However,due to the complexity of these constraints and limitation of the existing analysis methods,there has been no unit commitment model reported so far that can deal with these security constraints.On the other hand,as lack of effective measures to evaluate the security margin of dispatch schemes,it is difficult for power system operators to integrate both the security and economy of power systems in unit commitment.To resolve the above-mentioned issues,a security region based security-constrained unit commitment model is presented in the paper,which gives consideration to both the security and economy of power systems.For the first time,the active power flow constraint,the static voltage stability constraint and the transient stability constraint are taken into account in unit commitment at the same time.The model presented in the paper takes the operating cost,the branch transmission capacity margin,the static voltage stability margin and the transient stability margin as sub-objectives.By adjusting the weighting factors of sub-objectives,it is convenient to adjust the preference on the security and economy of power systems and reach a balance.The IEEE RTS-24 test system is adopted to validate the correctness and the efficiency of the proposed model. 展开更多
关键词 unit commitment security region static voltage stability transient stability multi-objective optimization
原文传递
A Data-driven Method for Transient Stability Margin Prediction Based on Security Region 被引量:8
18
作者 Jun An Jiachen Yu +2 位作者 Zonghan Li Yibo Zhou Gang Mu 《Journal of Modern Power Systems and Clean Energy》 SCIE EI CSCD 2020年第6期1060-1069,共10页
Transient stability assessment(TSA)based on security region is of great significance to the security of power systems.In this paper,we propose a novel methodology for the assessment of online transient stability margi... Transient stability assessment(TSA)based on security region is of great significance to the security of power systems.In this paper,we propose a novel methodology for the assessment of online transient stability margin.Combined with a geographic information system(GIS)and transformation rules,the topology information and pre-fault power flow characteristics can be extracted by 2 D computer-vision-based power flow images(CVPFIs).Then,a convolutional neural network(CNN)-based comprehensive network is constructed to map the relationship between the steady-state power flow and the generator stability indices under the anticipated contingency set.The network consists of two components:the classification network classifies the input samples into the credibly stable/unstable and uncertain categories,and the prediction network is utilized to further predict the generator stability indices of the categorized samples,which improves the network ability to distinguish between the samples with similar characteristics.The proposed methodology can be used to quickly and quantitatively evaluate the transient stability margin of a power system,and the simulation results validate the effectiveness of the method. 展开更多
关键词 security region computer-vision-based power flow image(CVPFI) transient stability margin convolutional neural network(CNN) comprehensive network
原文传递
Total Quadrant Security Region for Active Distribution Network with High Penetration of Distributed Generation 被引量:5
19
作者 Jun Xiao Guoqiang Zu +1 位作者 Huan Zhou Xinsong Zhang 《Journal of Modern Power Systems and Clean Energy》 SCIE EI CSCD 2021年第1期128-137,共10页
The region-based method has been applied in transmission systems and traditional passive distribution systems without power sources. This paper proposes the model of total quadrant security region(TQSR) for active dis... The region-based method has been applied in transmission systems and traditional passive distribution systems without power sources. This paper proposes the model of total quadrant security region(TQSR) for active distribution networks(ADN) with high penetration of distributed generation(DG). Firstly, TQSR is defined as a closed set of all the N-1 secure operation points in the state space of ADN. Then, the TQSR is modeled considering the constraints of state space,normal operation and N-1 security criterion. Then, the characteristics of TQSR are observed and analyzed on the test systems with different DG penetrations. TQSR can be located in any quadrant of the state space. For different DG penetrations,the shape and security features of TQSR are also different. Finally, the region map is discovered, which summarizes the features of different types of distribution networks. 展开更多
关键词 Active distribution network(ADN) total quadrant security region(TQSR) N-1 security distributed generation(DG) region map
原文传递
Voltage Security Operation Region Calculation Based on Improved Particle Swarm Optimization and Recursive Least Square Hybrid Algorithm 被引量:5
20
作者 Saniye Maihemuti Weiqing Wang +1 位作者 Haiyun Wang Jiahui Wu 《Journal of Modern Power Systems and Clean Energy》 SCIE EI CSCD 2021年第1期138-147,共10页
Large-scale voltage collapse incidences, which result in power outages over large regions and extensive economic losses, are presently common occurrences worldwide. To avoid voltage collapse and operate more safely an... Large-scale voltage collapse incidences, which result in power outages over large regions and extensive economic losses, are presently common occurrences worldwide. To avoid voltage collapse and operate more safely and reliably, it is necessary to analyze the voltage security operation region(VSOR) of power systems, which has become a topic of increasing interest lately. In this paper, a novel improved particle swarm optimization and recursive least square(IPSO-RLS) hybrid algorithm is proposed to determine the VSOR of a power system. Also, stability analysis on the proposed algorithm is carried out by analyzing the errors and convergence accuracy of the obtained results. Firstly, the voltage stability and VSOR-surface of a power system are analyzed in this paper. Secondly, the two algorithms,namely IPSO and RLS algorithms, are studied individually.Based on this understanding, a novel IPSO-RLS hybrid algorithm is proposed to optimize the active and reactive power,and the voltage allowed to identify the VSOR-surface accurately. Finally, the proposed algorithm is validated by using a simulation case study on three wind farm regions of actual Hami Power Grid of China in DIg SILENT/Power Factory software.The error and accuracy of the obtained simulation results are analyzed and compared with those of the particle swarm optimization(PSO), IPSO and IPSO-RLS hybrid algorithms. 展开更多
关键词 Voltage stability renewable energy improved particle swarm optimization(IPSO) recursive least square(RLS) voltage security operation region(VSOR)
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部