Main Article Content

Abstract

With power grids considered national security matters, the reliable operation of the system is of top priority to utilities.  This concern is amplified by the utility’s deregulation, which increases the system’s openness while simultaneously decreasing the applied degree of control.  Vulnerability Assessment (VA) deals with the power system’s ability to continue to provide service in case of an unforeseen catastrophic contingency.  Such contingencies may include unauthorized tripping, breaks in communication links, sabotage or intrusion by external agents, human errors, natural calamities and faults.  These contingencies could lead to a disruption of service to part or all of the system.  The service disruption is known as outage or blackout.  The paper outlines an approach by which feature extraction and boundary tracking can be implemented to achieve on line vulnerability assessment.

 

 

Keywords

Intelligent techniques Vulnerability assessment Power systems

Article Details

References

  1. ATHAY, T., PODMORE, R. and VIRMANI, S. 1979. “A Practical Method for the Direct Analysis of Transient Stability”, IEEE Transactions on Power Apparatus and Systems, PAS-98(2): 573-584.
  2. BONISSONE, P., EL-SHARKAWI, M.A., DAVID FOGEL, and Freer, S. 2001. “Evolutionary Computation and Applications,” IEEE CD-ROM # EC128, 2001
  3. BOSE, A. 1984. “Application of Direct Methods to Transient Stability Analysis of Power Systems”, IEEE Transactions on Power Apparatus and Systems, PAS-103(7): 1629-1636.
  4. CHIANG, H., F. Wu, and VARAIYA, P. 1994. “A BCU Method for Direct Analysis of Power System Transient Stability”, IEEE Transactions on Power Systems, 9(3): 1194-1208.
  5. CHIANG, H., C. CHU, and CAULEY, G. 1995. “Direct Stability Analysis of Electric Power Systems Using Energy Functions: Theory, Applications, and Perspective”, Proceedings of the IEEE, November 1995, pp.1497-1529.
  6. CHIANG, H. 1989. “A Theory-Based Controlling UEP Method for Direct Analysis of Power System Transient Stability”, Proceedings of the International Symposium on Circuits and Systems (IEEE ISCAS ’89), Portland, Oregon, May 1989, pp. 1980-1983.
  7. EL-KADY, M. 1988. “Dynamic Security Assessment Utilizing the Transient Energy Function Method”, IEEE Transactions on Power Systems, PWRS-1( 3): 284-291.
  8. EL-SHARKAWI, M.A. and DAGMAR NIEBUR EDITORS, 1996. Application of Artificial Neural Networks to Power Systems, IEEE press, 96 TP 112-0, 1996.
  9. EL-SHARKAWI, M.A. 1996. “Neural Network Application to Security Assessment,” Neural Networks Applications in power systems edited by T. S. Dillon and D. Niebur CRL Publishing Ltd, 1996.
  10. EL-SHARKAWI, M.A. and MARKS, R.J. II, Editors 1991, Applications of Neural Networks to Power Systems, (IEEE Press, Piscataway, 1991).
  11. EL-SHARKAWI, M.A., MARKS, R.J. and EBERHART, R. 2000. “Evolutionary Techniques and Fuzzy Logic in Power Systems,’ IEEE Tutorial, 2000 TP-142.
  12. FOUAD, 1987. “Direct Transient Stability Analysis Using Energy Functions: Application to Large Power Networks”, IEEE Transactions on Power Systems, PWRS-2, (1): 37-44.
  13. JENSEN, C., EL-SHARKAWI, M.A. and ROBERT, J.MARKS, 1999. “Power System Security Boundary Enhancement Using Evolutionary-Based Query Learning,” Invited paper, International Journal of Engineering Intelligent Systems, pp.215-218, December 1999.
  14. KUMAR, B.R., IPAKCHI, A., BRANDWAJN, V., EL-SHARKAWI, M.A. and CAULEY, G. 1991. "Neural Networks for Dynamic Security Assessment of Large-Scale Power Systems: Requirements Overview," First International Forum on Applications of Neural Networks to Power Systems, Seattle, July 23 - 26, 1991, pp. 65 - 71.
  15. MANSOUR, Y., VAAHEDI, E., EL-SHARKAWI, M.A. 1997. “Dynamic Security Contingency Screening and Ranking Using Neural Networks”, IEEE Transactions on Neural Networks, 8(4):
  16. MANSOUR, Y., 1995. “B.C. Hydro’s On-line Transient Stability Assessment (TSA) Model Development, Analysis, and Post-processing”, IEEE Transactions on Power Systems, 10(1): 241-253.
  17. MANSOUR, Y., EBRAHIM VAAHEDI, A.Y., CHANG, B.R., CORNS, JEYANT TAMBY and EL-SHARKAWI, M.A. 1997. “Large Scale Dynamic Security Screening and Ranking Using Neural Networks,“ IEEE Transaction on Power Systems, : 954 – 960.
  18. MANSOUR, Y., EBRAHIM VAAHEDI and EL-SHARKAWI, M.A. 1997. “Dynamic Security Contingency Screening and Ranking Using Neural Networks,“ IEEE Transaction on Neural Networks, : 942-950.
  19. MARIA, G., TANG, C., and KIM, J. 1990. “Hybrid Transient Stability Analysis”, IEEE Transactions on Power Systems, 5(2): 384-393.
  20. PARTICLE SWARM OPTIMIZATION, Russell Eberhart, Proceedings IEEE International Conference on Neural Networks (Perth, Australia), IEEE Service Center, Piscataway, NJ, IV: 1942-1948, 1995.
  21. REED, R.D. and MARKS, R.J. II. 1999. Neural Smithing: Supervised Learning in Feedforward Artificial Neural Networks, (MIT Press, Cambridge, MA, 1999).
  22. STANTON, FOUAD. 1981. “Transient Stability of a Multi-Machine Power System Part I: Investigation of System Trajectories and Part II: Critical Transient Energy”, IEEE Transactions on Power Apparatus and Systems, PAS-100(7): 3408-3424.
  23. TONG, J., CHIANG, H., and CONNEEN, T. 1993. “A Sensitivity-Based BCU Method for Fast Derivation of Stability Limits in Electric Power Systems”, IEEE Transactions on Power Systems, 8(4): 1418-1428.
  24. VAAHEDI, E. 1996. “Enhanced “Second Kick” Methods for On-line Dynamic Security Assessment”, IEEE Winter Meeting, Baltimore, MD, 1996.
  25. VAPNIK, V.N. 1998. Statistical Learning Theory, John Wiley & Sons, London.