期刊文献+
共找到31篇文章
< 1 2 >
每页显示 20 50 100
Theory and Method of Power System Integrated Security Region Irrelevant to Operation States:An Introduction 被引量:14
1
作者 Yixin Yu Yanli Liu +1 位作者 Chao Qin Tiankai Yang 《Engineering》 SCIE EI 2020年第7期754-777,共24页
How to comprehensively consider the power flow constraints and various stability constraints in a series of power system optimization problems without affecting the calculation speed is always a problem.The computatio... How to comprehensively consider the power flow constraints and various stability constraints in a series of power system optimization problems without affecting the calculation speed is always a problem.The computational burden of probabilistic security assessment is even more unimaginable.In order to solve such problems,a security region(SR)methodology is proposed,which is a brand-new methodology developed on the basis of the classical point-wise method.Tianjin University has been studying the SR methodology since the 1980s,and has achieved a series of original breakthroughs that are described in this paper.The integrated SR introduced in this paper is mainly defined in the power injection space,and includes SRs to ensure steady-state security,transient stability,static voltage stability,and smalldisturbance stability.These SRs are uniquely determined for a given network topology(as well as location and clearing process for transient faults)and given system component parameters,and are irrelevant to operation states.This paper presents 11 facts and related remarks to introduce the basic concepts,composition,dynamics nature,and topological and geometric characteristics of SRs.It also provides a practical mathematical description of SR boundaries and fast calculation methods to determine them in a concise and systematic way.Thus,this article provides support for the systematic understanding,future research,and applications of SRs.The most critical finding on the topological and geometric characteristics of SRs is that,within the scope of engineering concern,the practical boundaries of SRs in the power injection space can be approximated by one or a few hyperplanes.Based on this finding,the calculation time for power system probabilistic security assessment(i.e.,risk analysis)and power system optimization with security constraints can be decreased by orders of magnitude. 展开更多
关键词 security region Composition Power flow security Static voltage stability small-disturbance stability Transient stability Dynamics nature Topological and geometric characteristics HYPERPLANE
下载PDF
Regional ecological security anddiagnosisof obstaclefactors in underdevelopedregions:acasestudy in Yunnan Province,China 被引量:12
2
作者 OUZhao-rong ZHUQing-ke SUNYong-yu 《Journal of Mountain Science》 SCIE CSCD 2017年第5期870-884,共15页
In order toclarify regional ecological security status and formation mechanism of regional ecological security barriers in underdeveloped regions of China,we took Yunnan province as a case to evaluate its regional eco... In order toclarify regional ecological security status and formation mechanism of regional ecological security barriers in underdeveloped regions of China,we took Yunnan province as a case to evaluate its regional ecological security by using entropy matter-element model,comprehensive index and GIS spatial method,and we diagnosed itsobstacle factors through obstacle degree model. We found a low overall level of regional ecological security in Yunnan. Only Kunmingfell into the good level, 68% of the regions were below the critical safe level. For the vast majority of regions in Yunnan, their regional ecological security was unstable. The indexes related to per capita resources, geological and topographyenvironment, economic, and technologywere at the unsafe or dangerous level.The indexes related to urban expansion, level of income, cultivated land quality were at the level of critical safety. The indexes concerning urban management capacity, airqualityand waterenvironment were at the good or ideallevel. Yunnan's regional ecological security was not good due to natural obstructive environment itself, simultaneously lower backward economic and social level restricted the ability of ecological security response to manage ragile ecological environment. The results of the composite index wereroughly consistent with those of the entropy weight matterelement model. The mean values of the classification index,from high to low, were: the state index>the response index>the pressure index. The state index and the response index had a significant mutual promotion to each other.The regions with good composite index, state index and response index mainly distributed in the central regions of Yunnan Province. Spatial autocorrelation of regional ecological security level in Yunnan was not obvious. Water resources, economic and social development were main obstacle factors of the regional ecological security.When distinguishing with obstacle type, Kunming belonged to natural ecological environment barrier type, while other regions belonged to economic and social barrier type. 展开更多
关键词 regional ecological security Pressure state-response model Entropy matter-element model Comprehensive index method Spatial heterogeneity Obstacle factors
下载PDF
Evaluation of regional energy security in eastern coastal China based on the DPSIR model 被引量:2
3
作者 ZHANG Yan SHEN Lei 《Journal of Coal Science & Engineering(China)》 2012年第3期285-290,共6页
The DPSIR assessment method, which implies the relationships among driving force (D), pressure (P), status (S), impact (I), and response (R), is widely applied by scholars. This paper aims to establish a com... The DPSIR assessment method, which implies the relationships among driving force (D), pressure (P), status (S), impact (I), and response (R), is widely applied by scholars. This paper aims to establish a comprehensive assessment system for regional energy security in eastern coastal China based on the above model using different indicators. Factor analysis and the SPSS statistical analysis software were used to carry out scientific and quantitative assessments. The results indicated that con- tradictions of energy supply and demand as well as environmental pollution are the critical factors that present great challenges to regional energy security in this area. The authors argued that a sustainable, stable, and safe supply energy supply is crucial in solving the aforesaid dilemma, and improving the energy use efficiency is one of the best choices. Some countermeasures and suggestions regarding regional energy supply stability and utilization security were pointed out. 展开更多
关键词 DPSIR eastern coastal areas regional energy security assessment system
下载PDF
Security Constrained Distributed Optimal Power Flow of Interconnected Power Systems
4
作者 哈比比 余贻鑫 《Transactions of Tianjin University》 EI CAS 2008年第3期208-216,共9页
The security constrained distributed optimal power flow (DOPF) of interconnected power systems is presented. The centralized OPF problem of the multi-area power systems is decomposed into independent DOPF subproblem... The security constrained distributed optimal power flow (DOPF) of interconnected power systems is presented. The centralized OPF problem of the multi-area power systems is decomposed into independent DOPF subproblems, one for each area. The dynamic security region (DSR) to guarantee the transient stability constraints and static voltage stability region (SVSR) constraints, and line current limits are included as constraints. The solutions to the DOPF subproblems of the different areas are coordinated through a pricing mechanism until they converge to the centralized OPF solution. The nonlinear DOPF subproblem is solved by predictor-corrector interior point method (PClPM). The IEEE three-area RTS-96 system is worked out in order to demonstrate the effectiveness of the proposed method. 展开更多
关键词 distributed optimal power flow interior point method predictor-corrector method security region
下载PDF
The Central Asian Regional Security Complex Revisited:Understanding the Implications of the US Retreat From Afghanistan
5
作者 Samuel Elzinga 《International Relations and Diplomacy》 2021年第11期447-479,共33页
On February 29,2020,President Donald Trump announced the United States signed a peace agreement with the Taliban,signifying the United States‟intention of leaving Afghanistan in the near future.Though the global pande... On February 29,2020,President Donald Trump announced the United States signed a peace agreement with the Taliban,signifying the United States‟intention of leaving Afghanistan in the near future.Though the global pandemic has altered US withdrawal plans,the question still remains:What will become of the Central Asian regional security complex following America‟s exit?Buffered by the presence of the United States since 2001,the Central Asian republics now once again find themselves at a crossroads to either rely on individual defense services or to develop increased military cooperation with interested states.Recognizing Central Asia‟s history of collaboration among its regional and near-regional countries,I argue that the Central Asian Republics of Afghanistan,Kazakhstan,Kyrgyzstan,Tajikistan,Turkmenistan,and Uzbekistan will seek to develop stronger security ties with neighboring regional security complexes(RSCs),namely the South Asian,Russian,and Chinese RSCs.With decreased American influence,each of the states in these RSCs is rushing to fill the void of influence in order to capitalize on Central Asia‟s geostrategic position in Eurasia as well as secure itself from the threat of non-state actors still prevalent in the region.I further argue that the states in the Central Asian RSC additionally seek these same benefits and security,but receive them to a much lesser extent than their more powerful regional neighbors.Understanding how the American withdrawal from Afghanistan will impact Central Asian RSC relations can provide insight into how great power vacuums are filled both by great powers and regional powers alike. 展开更多
关键词 Central Asia regionalISM AFGHANISTAN CONSTRUCTIVISM security regional security Theory(RSCT) TERRORISM CONFLICT
下载PDF
Bilateral and Regional Strategic and Security Relationship Between China and the US after the Cold War
6
作者 楚树龙 《Contemporary International Relations》 2000年第5期1-13,共13页
Sino-US relations are complex relations with multi-aspects between the two bigcountries in the world. It has three levels: the global level, the Asia-Pacificlevel and the bilateral level. The critical relationship bet... Sino-US relations are complex relations with multi-aspects between the two bigcountries in the world. It has three levels: the global level, the Asia-Pacificlevel and the bilateral level. The critical relationship between China and the US isembodied in the regional and bilateral levels that are more specific and essential.Beyond the field of economy and trade, their relationship is mainly embodied in thestrategic and security field. 展开更多
关键词 US Bilateral and regional Strategic and security Relationship Between China and the US after the Cold War security
下载PDF
Robustness Assessment of Wind Power Generation Considering Rigorous Security Constraints for Power System: A Hybrid RLO-IGDT Approach
7
作者 Lianyong Zuo Shengshi Wang +6 位作者 Yong Sun Shichang Cui Jiakun Fang Xiaomeng Ai Baoju Li Chengliang Hao Jinyu Wen 《CSEE Journal of Power and Energy Systems》 SCIE EI CSCD 2024年第2期518-529,共12页
Fossil fuel depletion and environmental pollution problems promote development of renewable energy(RE)glob-ally.With increasing penetration of RE,operation security and economy of power systems(PS)are greatly impacted... Fossil fuel depletion and environmental pollution problems promote development of renewable energy(RE)glob-ally.With increasing penetration of RE,operation security and economy of power systems(PS)are greatly impacted by fluctuation and intermittence of renewable power.In this paper,information gap decision theory(IGDT)is adapted to handle uncertainty of wind power generation.Based on conventional IGDT method,linear regulation strategy(LRS)and robust linear optimization(RLO)method are integrated to reformulate the model for rigorously considering security constraints.Then a robustness assessment method based on hybrid RLO-IGDT approach is proposed for analyzing robustness and economic performance of PS.Moreover,a risk-averse linearization method is adapted to convert the proposed assessment model into a mixed integer linear programming(MILP)problem for convenient optimization without robustness loss.Finally,results of case studies validate superiority of proposed method in guaranteeing operation security rigorously and effectiveness in assessment of RSR for PS without overestimation.Index Terms-Hybrid RLO-IGDT approach,information gap decision theory(IGDT),operation security,robustness assessment,robustness security region(RSR). 展开更多
关键词 IGDT approach information gap decision theory(IGDT) operation security robustness assessment robustness security region(RSR)
原文传递
Quantitative analysis of the dynamic change and spatial differences of the ecological security: a case study of Loess Plateau in northern Shaanxi Province 被引量:5
8
作者 LI Jing REN Zhiyuan ZHOU Zixiang 《Journal of Geographical Sciences》 SCIE CSCD 2006年第2期251-256,共6页
Using the theory and method of the ecological footprint, and combining the changes of regional land use, resource environment, population, society and economy, this paper calculated the ecological footprint, ecologica... Using the theory and method of the ecological footprint, and combining the changes of regional land use, resource environment, population, society and economy, this paper calculated the ecological footprint, ecological carrying capacity and ecological surplus/loss in 1986-2002 on the Loess Plateau in northern Shaanxi Province. What is more, this paper has put forward the concept of ecological pressure index, set up ecological pressure index models, and ecological security grading systems, and the prediction models of different ecological footprints, ecological carrying capacity, ecological surplus and ecological safety change, and also has assessed the ecological footprint demands of 10,000 yuan GDE The results of this study are as follows: (1) the ecological carrying capacity in northern Shaanxi shows a decreasing trend, the difference of reducing range is the fastest; (2) the ecological footprint appears an increasing trend; (3) ecological pressure index rose to 0.91 from 0.44 during 1986-2002 on the Loess Plateau of northern Shaanxi with an increase of 47%; and (4) the ecological security in the study area is in a critical state, and the ecological oressure index has been increasing rapidlv. 展开更多
关键词 regional ecological security dynamic change spatial difference quantitative analysis the Loess Plateau in northern Shaanxi Province
下载PDF
Security Rate Optimization of D2D Communication Based on Power Control 被引量:2
9
作者 王珍 李莉 +1 位作者 龚帅 叶鹏 《Journal of Donghua University(English Edition)》 EI CAS 2017年第5期624-629,共6页
An optimization of device-to-device(D2D) security rate algorithm based on power control is provided to enhance the physical layer security underlaying D2D communication and guarantee the data rate requirement of the c... An optimization of device-to-device(D2D) security rate algorithm based on power control is provided to enhance the physical layer security underlaying D2D communication and guarantee the data rate requirement of the cellular user(CU) at the same time.First,a scenario model is set up,in which an eavesdropper is considered to wiretap the information of D2D transmitters.Then,a secure region of D2D communication is proposed.When D2D communication users reside outside the secure region,the spectrum of CU's is not allowed to share with the D2D communication so as to avoid eavesdropper tapping useful information of D2D communication.When D2D communication users reside inside the secure region,the security rate of D2D is maximized by optimization of the transmitting power of D2D and CU.The simulation results showthat the achieved D2D security rate of the proposed algorithm increases 2.8 bps/Hz when the signal to noise ratio(SNR) is 15 d B,compared with that when the random access algorithm is used. 展开更多
关键词 device-to-device(D2D) security rate secure region power control
下载PDF
Prediction of Instability Separation Modes and Its Application in Practical Dynamic Security Region
10
作者 曾沅 余贻鑫 +3 位作者 王红梅 闵亮 张沛 LEES T 《Transactions of Tianjin University》 EI CAS 2007年第3期157-162,共6页
The transient critical boundary of dynamic security region (DSR) can be approximated by a few hyper planes correlated with instability separation modes. A method to fast predict instability separation modes is propose... The transient critical boundary of dynamic security region (DSR) can be approximated by a few hyper planes correlated with instability separation modes. A method to fast predict instability separation modes is proposed for DSR calculation in power injection space. The method identifies coherent generation groups by the developed K-medoids algorithm, taking a similarity matrix derived from the reachability Grammian as the index. As an experimental result, reachability Grammian matrices under local injections are approximately invariant. It indicates that the generator coherency identifications are nearly consistent for different injections. Then instability separation modes can be predicted at the normal operating point, while average initial acceleration is considered as the measure of the critical generator group to amend the error. Moreover, based on these predicted instability separation modes, a critical point search strategy for DSR calculation is illustrated in the reduced injection space of the critical generators. The proposed method was evaluated using New England Test System, and the computation accuracy and speed in determining the practical DSR were improved. 展开更多
关键词 instability separation mode dynamic security region K-medoids algorithm reachability Grammian
下载PDF
NATO and EU Strategies for the Black Sea Region: The Challenge of Power Balance in New Security Environment
11
作者 Siyana Lutzkanova 《Journal of Shipping and Ocean Engineering》 2017年第5期210-215,共6页
The article gives an overview on the dynamic political processes in the Black Sea region after some major geostrategic changes posing instability concerns in the region. The aim is to summarise the policy tendencies o... The article gives an overview on the dynamic political processes in the Black Sea region after some major geostrategic changes posing instability concerns in the region. The aim is to summarise the policy tendencies of the international organisations (NATO and EU) towards Russia and to present some analytical thoughts on current Euro-Atlantic strategies. Proposed is a different way of thinking based on the "congagement" approach. 展开更多
关键词 Black sea region security balance of power NATO and EU security policies in the Black Sea.
下载PDF
Toward a Security Community in Asia? The Limits of Constructivism, Developmental Statism, Liberalism, and Realism
12
作者 Sorpong Peou 《International Relations and Diplomacy》 2022年第1期1-24,共24页
This article asks whether a regional security community has emerged in Asia with the potential to grow mature and seeks to make a contribution to the ongoing debate on this controversial topic.It advances the argument... This article asks whether a regional security community has emerged in Asia with the potential to grow mature and seeks to make a contribution to the ongoing debate on this controversial topic.It advances the argument that states in this broad region are far from being able to develop a security community for reasons different from those provided by political realists,developmental statists,liberals,and constructivists(social,discursive,and emancipationist).The role of Association of Southeast Asia(ASEAN)and that of China provide excellent test cases for the theoretical proposition that the building of a successful regional security community requires at least two necessary conditions:liberal democracy and regional democratic leadership,which remain absent in Asia. 展开更多
关键词 regional security community ASIA ASEAN China European Union North America CONSTRUCTIVISM LIBERALISM political realism liberal democracy regional democratic leadership
下载PDF
Autonomous-synergic Voltage Security Regions in Bulk Power Systems 被引量:1
13
作者 Fan Li Tao Niu +3 位作者 Lin Xue Yuxiao Li Tianen Huang Zhenjie Wu 《Journal of Modern Power Systems and Clean Energy》 SCIE EI CSCD 2023年第2期686-692,共7页
Determining security/stability boundaries is a common and critical means of preventing cascading failures induced by voltage-related issues,which represents one of the major challenges in bulk power systems.However,tr... Determining security/stability boundaries is a common and critical means of preventing cascading failures induced by voltage-related issues,which represents one of the major challenges in bulk power systems.However,traditional approaches suffer from conservative issues and heavy computational burdens.To address these challenges,the concept of an autonomous-synergic voltage security region(AS-VSR)and the corresponding dynamic constraint coefficient pruning(DCCP)computation method,which fully consider the volt/var characteristics of bulk power systems,are proposed in this letter.Both linearized and nonlinearized robust optimization problems are introduced to obtain accurate results.The computational accuracy,time cost,and advantages of autonomous-synergic control are observed in the simulation results. 展开更多
关键词 Voltage security region cascading failure dynamic constraint coefficient pruning(DCCP) bulk power system robust optimization
原文传递
Sample Generation for Security Region Boundary Identification Based on Topological Features of Historical Operation Data
14
作者 Xiaokang Wu Wei Xu Feng Xue 《Journal of Modern Power Systems and Clean Energy》 SCIE EI CSCD 2024年第4期1087-1095,共9页
Since the scale and uncertainty of the power system have been rapidly increasing,the computation efficiency of constructing the security region boundary(SRB)has become a prominent problem.Based on the topological feat... Since the scale and uncertainty of the power system have been rapidly increasing,the computation efficiency of constructing the security region boundary(SRB)has become a prominent problem.Based on the topological features of historical operation data,a sample generation method for SRB identification is proposed to generate evenly distributed samples,which cover dominant security modes.The boundary sample pair(BSP)composed of a secure sample and an unsecure sample is defined to describe the feature of SRB.The resolution,sampling,and span indices are designed to evaluate the coverage degree of existing BSPs on the SRB and generate samples closer to the SRB.Based on the feature of flat distribution of BSPs over the SRB,the principal component analysis(PCA)is adopted to calculate the tangent vectors and normal vectors of SRB.Then,the sample distribution can be expanded along the tangent vector and corrected along the normal vector to cover different security modes.Finally,a sample set is randomly gen-erated based on the IEEE standard example and another new sample set is generated by the proposed method.The results indicate that the new sample set is closer to the SRB and covers different security modes with a small calculation time cost. 展开更多
关键词 Clustering analysis principal component analysis(PCA) sample generation security region boundary(SRB)
原文传递
Probabilistic steady-state and dynamic security assessment of power transmission system 被引量:14
15
作者 LIU YanLi YU YiXin 《Science China(Technological Sciences)》 SCIE EI CAS 2013年第5期1198-1207,共10页
Two-level system model based probabilistic steady-state and dynamic security assessment model is introduced in this paper.Uncertainties of nodal power injection caused by wind power and load demand,steady-state and dy... Two-level system model based probabilistic steady-state and dynamic security assessment model is introduced in this paper.Uncertainties of nodal power injection caused by wind power and load demand,steady-state and dynamic security constraints and transitions between system configurations in terms of failure rate and repair rate are considered in the model.Time to insecurity is used as security index.The probability distribution of time to insecurity can be obtained by solving a linear vector differential equation.The coefficients of the differential equation are expressed in terms of configuration transition rates and security transition probabilities.The model is implemented in complex system successfully for the first time by using the following effective measures:firstly,calculating configuration transition rates effectively based on component state transition rate matrix and system configuration array;secondly,calculating the probability of random nodal power injection belonging to security region effectively according to practical parts of critical boundaries of security region represented by hyper-planes;thirdly,locating non-zero elements of coefficient matrix and then implementing sparse storage of coefficient matrix effectively;finally,calculating security region off-line for on-line use.Results of probabilistic security assessment can be used to conduct operators to analyze system security effectively and take preventive control.Test results on New England 10-generators and 39-buses power system verify the reasonableness and effectiveness of the method. 展开更多
关键词 power transmission system probabilistic security assessment time to insecurity security region uncertainties of windpower and load demand
原文传递
Distribution management system framework based on security region for future low carbon distribution systems 被引量:11
16
作者 Jun XIAO Qibo HE Guoqiang ZU 《Journal of Modern Power Systems and Clean Energy》 SCIE EI 2015年第4期544-555,共12页
In this paper,a new Distribution Management System(DMS)framework based on security region is proposed.First,the concept of Distribution System Security Region(DSSR)is introduced.DSSR is capable to describe the N-1 sec... In this paper,a new Distribution Management System(DMS)framework based on security region is proposed.First,the concept of Distribution System Security Region(DSSR)is introduced.DSSR is capable to describe the N-1 security boundary of the whole distribution network,including the secure output range of DGs.This new theoretic tool provides a chance for the implementation of real-time security analysis and active controls in DMS.Second,this paper proposes and describes five security states for distribution system.Third,an upgraded DMS enhanced with DSSR is proposed,which consists of advanced security functions such as preventive and predictive control of the trajectory of operating points.Finally,a practical case is presented to simulate the proposed DSSR-enhanced DMS,in which both the security region of network and the output range of DGs are calculated.Typical security functions are also demonstrated.In conclusion,the new DMS framework aims to help operate the system closed to its security boundary in order to improve the efficiency significantly within same security standard.This work is beneficial for future low carbon distribution systems with high penetration rate of DGs. 展开更多
关键词 DMS security region N-1 security Distributed generation Preventive control Low carbon
原文传递
Growing Regional Security Strength
17
作者 DING YING 《Beijing Review》 2007年第35期10-11,共2页
At its August summit, the ShanghaiCooperation Organization shows it’s still astandard-bearer for regional
关键词 SCO security Growing regional security Strength
原文传递
Security Region: An Intelligent Approach to Transportation Networks
18
作者 Jun Xiao Menghao Long +1 位作者 Guoqiang Zu Qisi Lin 《CSEE Journal of Power and Energy Systems》 SCIE EI CSCD 2023年第4期1532-1539,共8页
This paper proposes a security region of transporta-tion networks,which is defined as the set of flow states(operating points)satisfying the N-1 security in transportation networks.The boundary of the set is closed,in... This paper proposes a security region of transporta-tion networks,which is defined as the set of flow states(operating points)satisfying the N-1 security in transportation networks.The boundary of the set is closed,inside all the operating points are N-1 secure;oppositely,outside all the operating points are insecure.First,N-1 security of the transportation networks is defined,which means that when a road is blocked,vehicles on other roads within the networks can also reach their destination through different paths without being trapped on the road.Then,the security region of transportation networks is modeled.The algorithm of a boundary calculation is studied and the boundary equations of security distances are proposed.Finally,the proposed security of the transportation networks is presented in different examples.This paper demonstrates the following:1)the security region can be accurately predicted by the simulation of N-1;2)the boundary distance can show the necessary degree of security;3)security can be improved by a preventive control scheme.The simulation on TransCAD is used to verify the correctness of the results.Index Terms-Boundary distance,evolution,security region,transportation network,TransCAD. 展开更多
关键词 Boundary distance evolution security region transportation network TransCAD.
原文传递
Regional Security Dilemma and Security Ownership——Some Observations on the Possibility of the U.S.Return to Asia-Pacific
19
作者 Ma Yankun 《Peace》 2013年第3期24-34,共11页
The discussions of U.S.return to Asia-Pacific unfold more around the state to state relationship,and are lack of studies based on regions.This paper intends to analyze the connections between regional security dilemma... The discussions of U.S.return to Asia-Pacific unfold more around the state to state relationship,and are lack of studies based on regions.This paper intends to analyze the connections between regional security dilemma and regional security ownership,and further examine how it is possible for the United States to return to Asia-Pacific.Although the United States during the early years of the end of the Cold War overlooked the importance of its Asia-Pacific strategy,however,the Asia-Pacific countries in short of consensus on regional security and a post-Cold War extensive security dilemma enable the United States to return to Asia-Pacific,improve and upgrade its U.S.-led regional security system.But,as far as China is concerned,the U.S.return to Asia-Pacific itself is both a challenge and an opportunity. 展开更多
关键词 Asia regional security Dilemma and security Ownership Some Observations on the Possibility of the U.S.Return to Asia-Pacific security
原文传递
Impact of Cascade Disconnection of Distributed Energy Resources on Bulk Power System Stability:Modeling and Mitigation Requirements
20
作者 Fabricio Andrade Mourinho Tatiana Mariano Lessa Assis 《Journal of Modern Power Systems and Clean Energy》 SCIE EI CSCD 2023年第2期412-420,共9页
This work presents a new approach to establishing the minimum requirements for anti-islanding protection of distributed energy resources(DERs)with focus on bulk power system stability.The proposed approach aims to avo... This work presents a new approach to establishing the minimum requirements for anti-islanding protection of distributed energy resources(DERs)with focus on bulk power system stability.The proposed approach aims to avoid cascade disconnection of DERs during major disturbances in the transmission network and to compromise as little as possible the detection of real islanding situations.The proposed approach concentrates on the rate-of-change of frequency(RoCoF)protection function and it is based on the assessment of dynamic security regions with the incorporation of a new and straightforward approach to represent the disconnection of DERs when analyzing the bulk power system stability.Initially,the impact of disconnection of DERs on the Brazilian Interconnected Power System(BIPS)stability is analyzed,highlighting the importance of modeling such disconnection in electromechanical stability studies,even considering low penetration levels of DERs.Then,the proposed approach is applied to the BIPS,evidencing its benefits when specifying the minimum requirements of anti-islanding protection,without overestimating them. 展开更多
关键词 Anti-islanding protection bulk power system STABILITY distributed energy resource(DER) dynamic security region(DSR)
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部