Probabilistic Security Constrained Fuzzy Power Flow Models
|Title:||Probabilistic Security Constrained Fuzzy Power Flow Models||Authors:||Gouveia, Eduardo M.
Costa, Paulo Moisés
|Permanent link:||http://hdl.handle.net/10197/8125||Date:||9-Sep-2016||Abstract:||In restructured power systems, generation and commercialization activities became market activities, while transmission and distribution activities continue as regulated monopolies. As a result, the adequacy of transmission network should be evaluated independent of generation system. After introducing the constrained fuzzy power flow (CFPF) as a suitable tool to quantify the adequacy of transmission network to satisfy 'reasonable demands for the transmission of electricity' (as stated, for instance, at European Directive 2009/72/EC), the aim is now showing how this approach can be used in conjunction with probabilistic criteria in security analysis. In classical security analysis models of power systems are considered the composite system (generation plus transmission). The state of system components is usually modeled with probabilities and loads (and generation) are modeled by crisp numbers, probability distributions or fuzzy numbers. In the case of CFPF the component’s failure of the transmission network have been investigated. In this framework, probabilistic methods are used for failures modeling of the transmission system components and possibility models are used to deal with 'reasonable demands'. The enhanced version of the CFPF model is applied to an illustrative case.||Type of material:||Conference Publication||Publisher:||IEEE||Copyright (published version):||2016 IEEE||Keywords:||Adequacy;Constrained;Fuzzy power flow;Repression;Reasonable demands transmission;Severity||DOI:||10.1109/UPEC.2016.8114009||Language:||en||Status of Item:||Not peer reviewed||Is part of:||2016 51st International Universities Power Engineering Conference (UPEC)||Conference Details:||UPEC 2016 - 51st International Universities Power Engineering Conference, Coimbra, Portugal, 6-9 September 2016|
|Appears in Collections:||Electrical and Electronic Engineering Research Collection|
Energy Institute Research Collection
Show full item record
This item is available under the Attribution-NonCommercial-NoDerivs 3.0 Ireland. No item may be reproduced for commercial purposes. For other possible restrictions on use please refer to the publisher's URL where this is made available, or to notes contained in the item itself. Other terms may apply.