Options
Probabilistic Security Constrained Fuzzy Power Flow Models
Date Issued
2016-09-09
Date Available
2016-11-16T17:59:30Z
Abstract
In restructured power systems, generation and commercialization activities became market activities, while transmission and distribution activities continue as regulated monopolies. As a result, the adequacy of transmission network should be evaluated independent of generation system. After introducing the constrained fuzzy power flow (CFPF) as a suitable tool to quantify the adequacy of transmission network to satisfy 'reasonable demands for the transmission of electricity' (as stated, for instance, at European Directive 2009/72/EC), the aim is now showing how this approach can be used in conjunction with probabilistic criteria in security analysis. In classical security analysis models of power systems are considered the composite system (generation plus transmission). The state of system components is usually modeled with probabilities and loads (and generation) are modeled by crisp numbers, probability distributions or fuzzy numbers. In the case of CFPF the component’s failure of the transmission network have been investigated. In this framework, probabilistic methods are used for failures modeling of the transmission system components and possibility models are used to deal with 'reasonable demands'. The enhanced version of the CFPF model is applied to an illustrative case.
Type of Material
Conference Publication
Publisher
IEEE
Copyright (Published Version)
2016 IEEE
Language
English
Status of Item
Not peer reviewed
Journal
2016 51st International Universities Power Engineering Conference (UPEC)
Conference Details
UPEC 2016 - 51st International Universities Power Engineering Conference, Coimbra, Portugal, 6-9 September 2016
This item is made available under a Creative Commons License
File(s)
Loading...
Name
UPEC_CFPF_vfinal_(1).pdf
Size
622.99 KB
Format
Adobe PDF
Checksum (MD5)
1c37e23256a1ed13b9dd1df15a3d2602
Owning collection
Mapped collections