Probabilistic Security Constrained Fuzzy Power Flow Models

DC FieldValueLanguage
dc.contributor.authorGouveia, Eduardo M.
dc.contributor.authorCosta, Paulo Moisés
dc.contributor.authorSagredo, Jesus
dc.contributor.authorSoroudi, Alireza
dc.date.accessioned2016-11-16T17:59:30Z
dc.date.available2016-11-16T17:59:30Z
dc.date.copyright2016 IEEE
dc.date.issued2016-09-09
dc.identifier.urihttp://hdl.handle.net/10197/8125
dc.descriptionUPEC 2016 - 51st International Universities Power Engineering Conference, Coimbra, Portugal, 6-9 September 2016en
dc.description.abstractIn restructured power systems, generation and commercialization activities became market activities, while transmission and distribution activities continue as regulated monopolies. As a result, the adequacy of transmission network should be evaluated independent of generation system. After introducing the constrained fuzzy power flow (CFPF) as a suitable tool to quantify the adequacy of transmission network to satisfy 'reasonable demands for the transmission of electricity' (as stated, for instance, at European Directive 2009/72/EC), the aim is now showing how this approach can be used in conjunction with probabilistic criteria in security analysis. In classical security analysis models of power systems are considered the composite system (generation plus transmission). The state of system components is usually modeled with probabilities and loads (and generation) are modeled by crisp numbers, probability distributions or fuzzy numbers. In the case of CFPF the component’s failure of the transmission network have been investigated. In this framework, probabilistic methods are used for failures modeling of the transmission system components and possibility models are used to deal with 'reasonable demands'. The enhanced version of the CFPF model is applied to an illustrative case.en
dc.language.isoenen
dc.publisherIEEE
dc.relation.ispartof2016 51st International Universities Power Engineering Conference (UPEC)
dc.rights© 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works
dc.subjectAdequacyen
dc.subjectConstraineden
dc.subjectFuzzy power flowen
dc.subjectRepressionen
dc.subjectReasonable demands transmissionen
dc.subjectSeverityen
dc.titleProbabilistic Security Constrained Fuzzy Power Flow Modelsen
dc.typeConference Publicationen
dc.internal.authorcontactotheralireza.soroudi@ucd.ie
dc.statusNot peer revieweden
dc.identifier.doi10.1109/UPEC.2016.8114009-
dc.neeo.contributorGouveia|Eduardo M.|aut|-
dc.neeo.contributorCosta|Paulo Moisés|aut|-
dc.neeo.contributorSagredo|Jesus|aut|-
dc.neeo.contributorSoroudi|Alireza|aut|-
dc.internal.rmsid668664332
dc.date.updated2016-11-01T15:22:55Z
dc.rights.licensehttps://creativecommons.org/licenses/by-nc-nd/3.0/ie/en
item.fulltextWith Fulltext-
item.grantfulltextopen-
Appears in Collections:Electrical and Electronic Engineering Research Collection
Energy Institute Research Collection
Files in This Item:
 File SizeFormat
DownloadUPEC_CFPF_vfinal_(1).pdf622.99 kBAdobe PDF
Show simple item record

SCOPUSTM   
Citations 50

1
Last Week
0
Last month
checked on Sep 5, 2020

Page view(s)

1,310
Last Week
4
Last month
18
checked on Sep 24, 2022

Download(s) 50

312
checked on Sep 24, 2022

Google ScholarTM

Check

Altmetric


If you are a publisher or author and have copyright concerns for any item, please email research.repository@ucd.ie and the item will be withdrawn immediately. The author or person responsible for depositing the article will be contacted within one business day.