Probabilistic Security Constrained Fuzzy Power Flow Models

Detalhes bibliográficos
Autor(a) principal: Gouveia, Eduardo
Data de Publicação: 2016
Outros Autores: Costa, Paulo Moisés, Sagredo, Jesus, Soroudi, Alireza
Tipo de documento: Artigo
Idioma: eng
Título da fonte: Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)
Texto Completo: http://hdl.handle.net/10400.19/3602
Resumo: In restructured power systems, generation and commercialization activities became market activities, while transmission and distribution activities continue as regulated monopolies. As a result, the adequacy of transmission network should be evaluated independent of generation system. After introducing the constrained fuzzy power flow (CFPF) as a suitable tool to quantify the adequacy of transmission network to satisfy 'reasonable demands for the transmission of electricity' (as stated, for instance, at European Directive 2009/72/EC), the aim is now showing how this approach can be used in conjunction with probabilistic criteria in security analysis. In classical security analysis models of power systems are considered the composite system (generation plus transmission). The state of system components is usually modeled with probabilities and loads (and generation) are modeled by crisp numbers, probability distributions or fuzzy numbers. In the case of CFPF the component’s failure of the transmission network have been investigated. In this framework, probabilistic methods are used for failures modeling of the transmission system components and possibility models are used to deal with 'reasonable demands'. The enhanced version of the CFPF model is applied to an illustrative case.
id RCAP_df89036c6935ef75b8a303860215eacd
oai_identifier_str oai:repositorio.ipv.pt:10400.19/3602
network_acronym_str RCAP
network_name_str Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)
repository_id_str 7160
spelling Probabilistic Security Constrained Fuzzy Power Flow ModelsAdequacyConstrainedFuzzy power flowRepressionReasonable demands transmissionSeverityIn restructured power systems, generation and commercialization activities became market activities, while transmission and distribution activities continue as regulated monopolies. As a result, the adequacy of transmission network should be evaluated independent of generation system. After introducing the constrained fuzzy power flow (CFPF) as a suitable tool to quantify the adequacy of transmission network to satisfy 'reasonable demands for the transmission of electricity' (as stated, for instance, at European Directive 2009/72/EC), the aim is now showing how this approach can be used in conjunction with probabilistic criteria in security analysis. In classical security analysis models of power systems are considered the composite system (generation plus transmission). The state of system components is usually modeled with probabilities and loads (and generation) are modeled by crisp numbers, probability distributions or fuzzy numbers. In the case of CFPF the component’s failure of the transmission network have been investigated. In this framework, probabilistic methods are used for failures modeling of the transmission system components and possibility models are used to deal with 'reasonable demands'. The enhanced version of the CFPF model is applied to an illustrative case.Repositório Científico do Instituto Politécnico de ViseuGouveia, EduardoCosta, Paulo MoisésSagredo, JesusSoroudi, Alireza2017-01-05T09:52:27Z20162016-01-01T00:00:00Zinfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/articleapplication/pdfhttp://hdl.handle.net/10400.19/3602engmetadata only accessinfo:eu-repo/semantics/openAccessreponame:Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)instname:Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informaçãoinstacron:RCAAP2023-01-16T15:26:54Zoai:repositorio.ipv.pt:10400.19/3602Portal AgregadorONGhttps://www.rcaap.pt/oai/openaireopendoar:71602024-03-19T16:42:36.193719Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) - Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informaçãofalse
dc.title.none.fl_str_mv Probabilistic Security Constrained Fuzzy Power Flow Models
title Probabilistic Security Constrained Fuzzy Power Flow Models
spellingShingle Probabilistic Security Constrained Fuzzy Power Flow Models
Gouveia, Eduardo
Adequacy
Constrained
Fuzzy power flow
Repression
Reasonable demands transmission
Severity
title_short Probabilistic Security Constrained Fuzzy Power Flow Models
title_full Probabilistic Security Constrained Fuzzy Power Flow Models
title_fullStr Probabilistic Security Constrained Fuzzy Power Flow Models
title_full_unstemmed Probabilistic Security Constrained Fuzzy Power Flow Models
title_sort Probabilistic Security Constrained Fuzzy Power Flow Models
author Gouveia, Eduardo
author_facet Gouveia, Eduardo
Costa, Paulo Moisés
Sagredo, Jesus
Soroudi, Alireza
author_role author
author2 Costa, Paulo Moisés
Sagredo, Jesus
Soroudi, Alireza
author2_role author
author
author
dc.contributor.none.fl_str_mv Repositório Científico do Instituto Politécnico de Viseu
dc.contributor.author.fl_str_mv Gouveia, Eduardo
Costa, Paulo Moisés
Sagredo, Jesus
Soroudi, Alireza
dc.subject.por.fl_str_mv Adequacy
Constrained
Fuzzy power flow
Repression
Reasonable demands transmission
Severity
topic Adequacy
Constrained
Fuzzy power flow
Repression
Reasonable demands transmission
Severity
description In restructured power systems, generation and commercialization activities became market activities, while transmission and distribution activities continue as regulated monopolies. As a result, the adequacy of transmission network should be evaluated independent of generation system. After introducing the constrained fuzzy power flow (CFPF) as a suitable tool to quantify the adequacy of transmission network to satisfy 'reasonable demands for the transmission of electricity' (as stated, for instance, at European Directive 2009/72/EC), the aim is now showing how this approach can be used in conjunction with probabilistic criteria in security analysis. In classical security analysis models of power systems are considered the composite system (generation plus transmission). The state of system components is usually modeled with probabilities and loads (and generation) are modeled by crisp numbers, probability distributions or fuzzy numbers. In the case of CFPF the component’s failure of the transmission network have been investigated. In this framework, probabilistic methods are used for failures modeling of the transmission system components and possibility models are used to deal with 'reasonable demands'. The enhanced version of the CFPF model is applied to an illustrative case.
publishDate 2016
dc.date.none.fl_str_mv 2016
2016-01-01T00:00:00Z
2017-01-05T09:52:27Z
dc.type.status.fl_str_mv info:eu-repo/semantics/publishedVersion
dc.type.driver.fl_str_mv info:eu-repo/semantics/article
format article
status_str publishedVersion
dc.identifier.uri.fl_str_mv http://hdl.handle.net/10400.19/3602
url http://hdl.handle.net/10400.19/3602
dc.language.iso.fl_str_mv eng
language eng
dc.rights.driver.fl_str_mv metadata only access
info:eu-repo/semantics/openAccess
rights_invalid_str_mv metadata only access
eu_rights_str_mv openAccess
dc.format.none.fl_str_mv application/pdf
dc.source.none.fl_str_mv reponame:Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)
instname:Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação
instacron:RCAAP
instname_str Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação
instacron_str RCAAP
institution RCAAP
reponame_str Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)
collection Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)
repository.name.fl_str_mv Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) - Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação
repository.mail.fl_str_mv
_version_ 1799130893378387968