Filters








13,856 Hits in 4.4 sec

Verification of system models for steady-state and dynamic security assessment

A. Apostolov
2004 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the  
The accuracy of the different simulations and the assessment of steady-state and dynamic security is determined to a great extent by the accuracy of the models.  ...  verification of the system models and building confidence in the assessment of possible system disturbances.  ...  The experience with centralized disturbance recording systems has shown how valuable this information is since it allows for a better understanding of the steady-state and dynamic behavior of the system  ... 
doi:10.1109/hicss.2004.1265188 dblp:conf/hicss/Apostolov04 fatcat:yngasaxwynagfm6xprxqjczjmu

Mini track: 'security and reliability'

P.W. Sauer
2004 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the  
Specific topics include: Modeling and simulation, Steady-State and Dynamic Security Assessment; Available Transfer Capability (ATC); State Estimation; Security-Constrained Optimal Power Flow; Sensor Applications  ...  Included in this is the issue of voltage stability, modeling and analysis of failure propagation, and nonlinear control.  ...  The paper by Apostolov is concerned with the verification of models used in security assessment.  ... 
doi:10.1109/hicss.2004.1265187 dblp:conf/hicss/Sauer04 fatcat:vlt6gqydrbc7tgjh3gx2ssml4a

Impact Assessment of Hypothesized Cyberattacks on Interconnected Bulk Power Systems

Chee-Wooi Ten, Koji Yamashita, Zhiyuan Yang, Athanasios V. Vasilakos, Andrew Ginter
2018 IEEE Transactions on Smart Grid  
Hypothetically, we associate the combinatorial analyses of steady state on substations/components outages and dynamics of the sequential switching orders as part of the permutation.  ...  dynamic aspects of power system stability.  ...  Bulbul for the preliminary compilation of this work.  ... 
doi:10.1109/tsg.2017.2656068 fatcat:7kpz5776tjb4pka2bk7rnw4gg4

Loadability of power systems with steady-state and dynamic security constraints

D. Gan, Z. Qu, X. Wu
2003 International Journal of Electrical Power & Energy Systems  
This paper presents a new formulation for the problem using mathematical programming theory. Both steady-state and dynamic security are taken into account in the proposed formulation.  ...  Estimating loadability of a generation and transmission system is of practical importance in power system operations and planning.  ...  Acknowledgments The authors would like to acknowledge the past support of Kentex Corporation, Redwood City, CA.  ... 
doi:10.1016/s0142-0615(02)00030-3 fatcat:jbfqhgtzw5acbh22ernp3un7ve

Analysis of Grid Code Requirements for Wind Power Dynamic Model

Mi-Young Kim, Dae-Seok Rho
2016 International Journal of Control and Automation  
Renewable generations using wind, solar and wave sources are integrated into power system for securing economic feasibility.  ...  Namely, wind turbine manufacturer should deliver its dynamic models, model validation report and test report, on the other hand, wind power plant owner should deliver its dynamic models and commissioning  ...  Reactive power control (steady state): is used to ensure efficient operation and voltage control during steady state conditions of power system.  ... 
doi:10.14257/ijca.2016.9.5.05 fatcat:f23kdwxeyrfizj5r2vqfc5cowq

Automatic cross-border transmission capacity calculation in electric power interconnections

Dragan Popovic
2009 Facta universitatis - series Electronics and Energetics  
It is based on advanced methodology for steady-state security analyses, using all its favourable properties, respecting the latest criterions, standards and practice of European Transmission System Operators  ...  The paper deals with relevant methodological and practical aspects of automatic cross-border transmission capacity assessment in electric power interconnections.  ...  of Transmission System Operators. block 5 (load-flow solution for specified exchange in step of 50 MW) and block 6 (steady-state security assessment) are stopped, when predefined security rules are violated  ... 
doi:10.2298/fuee0901049p fatcat:kjqlc7edyfg6xoampdj5p3bd4e

Preliminary results on using artificial neural networks for security assessment (of power systems)

M. Aggoune, M.A. El-Sharkawa, D.C. Park, M.J. Damborg, R.J. Marks
1991 IEEE Transactions on Power Systems  
In this paper, Artificial Neural Networks techniques (ANN's) are explored as a tool to assess the dynamic security of power systems.  ...  This paper contains the results of a study to assess the capability of ANN's to "learn" from off-line stability analysis results and give accurate stability assessments when queried with data representing  ...  Acknowledaments This work was supported by the National Science Foundation and the Washington Technology Center at the University of Washington.  ... 
doi:10.1109/59.76740 fatcat:5qbyzp3i2fa3payuwtbzefbjz4

Special issue on High Assurance Systems Engineering

Peter J. Clarke, Mohammad Zulkernine
2016 Software quality journal  
schedule which maximizes the steady-state system availability.  ...  Common Vulnerability Scoring System (CVSS) metrics have become the de facto standard for assessing the severity of security vulnerabilities.  ... 
doi:10.1007/s11219-016-9307-9 fatcat:fk5wmq3opber3h7cg4zht3yoly

Model-Based Controls Development and Implementation for a Hydroelectric Power System

Anh Nguyen, John Batteh
2019 Proceedings Name  
The model proved capable of accurate predictions of the waterway dynamics, and the model-based calibration was successfully verified on the actual plant.  ...  This paper describes the model-based control system development for a hydroelectric power plant to ensure water level control and mitigate spillage risk.  ...  The model-based approach proved capable of predicting the waterway dynamics and for model-based calibration and verification of the control strategy.  ... 
doi:10.3384/ecp19157423 dblp:conf/modelica/NguyenB19 fatcat:4dbv55a3lzco5dbu4qhqpxogna

SAM-SoS: A Stochastic Software Architecture Modeling and Verification Approach for Complex System-of-Systems

Ahmad Mohsin, Naeem Khalid Janjua, Syed M. S. Islam, Muhammad Ali Babar
2020 IEEE Access  
VERIFICATION THROUGH TEMPORAL LOGIC CSL By means of CSL, APs are checked for state properties using steady-state and transient analysis via (13) and (14) . 1) Steady-State Properties Steady-state  ...  The formally founded stochastic SoS models enable the formal verification and validation of system properties with steady-state and transient analysis.  ...  The achievement of the SoS missions and the QAs has been verified through SMC with the application of both steady-state and transient analysis of known and unknown bounds.  ... 
doi:10.1109/access.2020.3025934 fatcat:mnc7pxj2dvco7exkwctvyhemkq

Quantum/Relativistic Computation of Security and Efficiency of Electrical Power System for a Day-Ahead [article]

Stefan Z. Stefanov
2012 arXiv   pre-print
An algorithm for Electric Power System (EPS) quantum/relativistic security and efficiency computation for a day-ahead via perturbative renormalization of the EPS, finding the computation flowcharts, verification  ...  and validation is built in this paper.  ...  Let the 'EPS-Market' system state change is with Langevin dynamics for Markovian state model.  ... 
arXiv:1111.0808v2 fatcat:4szag5prnvfyddw5kuf67tv5ie

Using Models at Runtime to Address Assurance for Self-Adaptive Systems [article]

Betty Cheng, Kerstin Eder, Martin Gogolla, Lars Grunske, Marin Litoiu, Hausi Müller, Patrizio Pelliccione, Anna Perini, Nauman Qureshi, Bernhard Rumpe, Daniel Schneider, Frank Trollmann, Norha Villegas
2015 arXiv   pre-print
This chapter explores the state of the art for usingM@RT to address the assurance of self-adaptive software systems.  ...  The fulfillment of the system requirements needs to be guaranteed even in the presence of adverse conditions and adaptations. Thus, a key challenge for self-adaptive software systems is assurance.  ...  They showed that there are no standard tools for formal modeling and verification of self-adaptive systems.  ... 
arXiv:1505.00903v1 fatcat:kjfxpuizhjaadm4ialw4nmeldq

Using Models at Runtime to Address Assurance for Self-Adaptive Systems [chapter]

Betty H. C. Cheng, Kerstin I. Eder, Martin Gogolla, Lars Grunske, Marin Litoiu, Hausi A. Müller, Patrizio Pelliccione, Anna Perini, Nauman A. Qureshi, Bernhard Rumpe, Daniel Schneider, Frank Trollmann (+1 others)
2014 Lecture Notes in Computer Science  
This chapter explores the state of the art for using M@RT to address the assurance of self-adaptive software systems.  ...  The fulfillment of the system requirements needs to be guaranteed even in the presence of adverse conditions and adaptations. Thus, a key challenge for self-adaptive software systems is assurance.  ...  They showed that there are no standard tools for formal modeling and verification of self-adaptive systems.  ... 
doi:10.1007/978-3-319-08915-7_4 fatcat:kux6b5ye2fd4pnlqyop3oog6pa

Quantitative Frequency Security Assessment for Multi-Machine Power System based on COI frequency

Athraa Iessa, Noor Izzri Abdul Wahab, Norman Mariun, Hashim Hizam
2016 Indian Journal of Science and Technology  
If the generated power is adequate for the system load and losses, then, the system will be in a steady state, otherwise frequency deviates from nominal value due to the mismatch between the generation  ...  The assessment of frequency stability level becomes an essential aspect of power system operation and also for projecting the ability of the power system to maintain nominal frequency when subjected to  ...  Quantitative Frequency Security Assessment for Multi-Machine Power System based on COI frequency Acknowledgment The authors are grateful for the support provided by the Centre of Advanced Power and Energy  ... 
doi:10.17485/ijst/2016/v9i28/97961 fatcat:5twfef7tc5fe7js5uvenx62d3q

Survey on Evidence of Retrievability Schemes of Cloud Storage Services for Resource-Strained Devices

2015 International Journal of Science and Research (IJSR)  
Public auditability is a model of outsourcing information uprightness check, which can accomplish productivity and security and survey on different resource-constrained devices for retrievability in cloud  ...  Then again, the challenge is that the computational weight is excessively enormous for the clients with resourceconstrained devices to compute the public verification tags of file blocks.  ...  However, the system imposes a priori certain on the quantity of queries and don't support absolutely dynamic information operations.  ... 
doi:10.21275/v4i12.nov152254 fatcat:kjf65rzh4valteuqgk4cuk47ry
« Previous Showing results 1 — 15 out of 13,856 results