Gouveia, Eduardo M.Eduardo M.GouveiaCosta, Paulo MoisésPaulo MoisésCostaSagredo, JesusJesusSagredoSoroudi, AlirezaAlirezaSoroudi2016-11-162016-11-162016 IEEE2016-09-09http://hdl.handle.net/10197/8125UPEC 2016 - 51st International Universities Power Engineering Conference, Coimbra, Portugal, 6-9 September 2016In restructured power systems, generation and commercialization activities became market activities, while transmission and distribution activities continue as regulated monopolies. As a result, the adequacy of transmission network should be evaluated independent of generation system. After introducing the constrained fuzzy power flow (CFPF) as a suitable tool to quantify the adequacy of transmission network to satisfy 'reasonable demands for the transmission of electricity' (as stated, for instance, at European Directive 2009/72/EC), the aim is now showing how this approach can be used in conjunction with probabilistic criteria in security analysis. In classical security analysis models of power systems are considered the composite system (generation plus transmission). The state of system components is usually modeled with probabilities and loads (and generation) are modeled by crisp numbers, probability distributions or fuzzy numbers. In the case of CFPF the component’s failure of the transmission network have been investigated. In this framework, probabilistic methods are used for failures modeling of the transmission system components and possibility models are used to deal with 'reasonable demands'. The enhanced version of the CFPF model is applied to an illustrative case.en© 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other worksAdequacyConstrainedFuzzy power flowRepressionReasonable demands transmissionSeverityProbabilistic Security Constrained Fuzzy Power Flow ModelsConference Publication10.1109/UPEC.2016.81140092016-11-01https://creativecommons.org/licenses/by-nc-nd/3.0/ie/