IDEAS home Printed from https://ideas.repec.org/a/gam/jeners/v10y2017i8p1088-d105961.html
   My bibliography  Save this article

Power System Event Ranking Using a New Linear Parameter-Varying Modeling with a Wide Area Measurement System-Based Approach

Author

Listed:
  • Mohammad Bagher Abolhasani Jabali

    (Electrical Engineering Department, Shahed University, Tehran 3319118651, Iran
    Iran Grid Management Company (IGMC), Teheran 1996836111, Iran)

  • Mohammad Hosein Kazemi

    (Electrical Engineering Department, Shahed University, Tehran 3319118651, Iran)

Abstract

Detecting critical power system events for Dynamic Security Assessment (DSA) is required for reliability improvement. The approach proposed in this paper investigates the effects of events on dynamic behavior during nonlinear system response while common approaches use steady-state conditions after events. This paper presents some new and enhanced indices for event ranking based on time-domain simulation and polytopic linear parameter-varying (LPV) modeling of a power system. In the proposed approach, a polytopic LPV representation is generated via linearization about some points of the nonlinear dynamic behavior of power system using wide-area measurement system (WAMS) concepts and then event ranking is done based on the frequency response of the system models on the vertices. Therefore, the nonlinear behaviors of the system in the time of fault occurrence are considered for events ranking. The proposed algorithm is applied to a power system using nonlinear simulation. The comparison of the results especially in different fault conditions shows the advantages of the proposed approach and indices.

Suggested Citation

  • Mohammad Bagher Abolhasani Jabali & Mohammad Hosein Kazemi, 2017. "Power System Event Ranking Using a New Linear Parameter-Varying Modeling with a Wide Area Measurement System-Based Approach," Energies, MDPI, vol. 10(8), pages 1-14, July.
  • Handle: RePEc:gam:jeners:v:10:y:2017:i:8:p:1088-:d:105961
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1996-1073/10/8/1088/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1996-1073/10/8/1088/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Weiming Xiang & Jian Xiao, 2013. "Finite-time stability and stabilisation for switched linear systems," International Journal of Systems Science, Taylor & Francis Journals, vol. 44(2), pages 384-400.
    2. Patterson, S.A. & Apostolakis, G.E., 2007. "Identification of critical locations across multiple infrastructures for terrorist actions," Reliability Engineering and System Safety, Elsevier, vol. 92(9), pages 1183-1203.
    3. Shaoyun Hong & Haozhong Cheng & Pingliang Zeng, 2017. "An N - k Analytic Method of Composite Generation and Transmission with Interval Load," Energies, MDPI, vol. 10(2), pages 1-17, January.
    4. Emanuele Ciapessoni & Diego Cirio & Stefano Massucco & Andrea Morini & Andrea Pitto & Federico Silvestro, 2017. "Risk-Based Dynamic Security Assessment for Power System Operation and Operational Planning," Energies, MDPI, vol. 10(4), pages 1-16, April.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Xianggen Yin & Yikai Wang & Jian Qiao & Wen Xu & Xin Yin & Lin Jiang & Wei Xi, 2021. "Multi-Information Fusion-Based Hierarchical Power Generation-Side Protection System," Energies, MDPI, vol. 14(2), pages 1-19, January.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Fauzan Hanif Jufri & Jun-Sung Kim & Jaesung Jung, 2017. "Analysis of Determinants of the Impact and the Grid Capability to Evaluate and Improve Grid Resilience from Extreme Weather Event," Energies, MDPI, vol. 10(11), pages 1-17, November.
    2. Yuhong Wang & Lei Chen & Hong Zhou & Xu Zhou & Zongsheng Zheng & Qi Zeng & Li Jiang & Liang Lu, 2021. "Flexible Transmission Network Expansion Planning Based on DQN Algorithm," Energies, MDPI, vol. 14(7), pages 1-21, April.
    3. Johansson, Jonas & Hassel, Henrik, 2010. "An approach for modelling interdependent infrastructures in the context of vulnerability analysis," Reliability Engineering and System Safety, Elsevier, vol. 95(12), pages 1335-1344.
    4. Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
    5. Wenping Xue & Kangji Li & Guohai Liu, 2016. "DDI-based finite-time stability analysis for nonlinear switched systems with time-varying delays," International Journal of Systems Science, Taylor & Francis Journals, vol. 47(12), pages 3027-3035, September.
    6. Jenelius, Erik & Mattsson, Lars-Göran, 2012. "Road network vulnerability analysis of area-covering disruptions: A grid-based approach with case study," Transportation Research Part A: Policy and Practice, Elsevier, vol. 46(5), pages 746-760.
    7. Zio, E., 2009. "Reliability engineering: Old problems and new challenges," Reliability Engineering and System Safety, Elsevier, vol. 94(2), pages 125-141.
    8. Liu, Huan & Tatano, Hirokazu & Pflug, Georg & Hochrainer-Stigler, Stefan, 2021. "Post-disaster recovery in industrial sectors: A Markov process analysis of multiple lifeline disruptions," Reliability Engineering and System Safety, Elsevier, vol. 206(C).
    9. Mishra, Vishrut Kumar & Palleti, Venkata Reddy & Mathur, Aditya, 2019. "A modeling framework for critical infrastructure and its application in detecting cyber-attacks on a water distribution system," International Journal of Critical Infrastructure Protection, Elsevier, vol. 26(C).
    10. Bricha, Naji & Nourelfath, Mustapha, 2014. "Extra-capacity versus protection for supply networks under attack," Reliability Engineering and System Safety, Elsevier, vol. 131(C), pages 185-196.
    11. Chi Zhang & Jose Ramirez-Marquez, 2013. "Protecting critical infrastructures against intentional attacks: a two-stage game with incomplete information," IISE Transactions, Taylor & Francis Journals, vol. 45(3), pages 244-258.
    12. Wu, Baichao & Tang, Aiping & Wu, Jie, 2016. "Modeling cascading failures in interdependent infrastructures under terrorist attacks," Reliability Engineering and System Safety, Elsevier, vol. 147(C), pages 1-8.
    13. Adam Behrendt & Vineet M. Payyappalli & Jun Zhuang, 2019. "Modeling the Cost Effectiveness of Fire Protection Resource Allocation in the United States: Models and a 1980–2014 Case Study," Risk Analysis, John Wiley & Sons, vol. 39(6), pages 1358-1381, June.
    14. K Hausken & G Levitin, 2009. "Parallel systems with different types of defence resource expenditure under two sequential attacks," Journal of Risk and Reliability, , vol. 223(1), pages 71-85, March.
    15. Li, Tao & Rong, Lili & Yan, Kesheng, 2019. "Vulnerability analysis and critical area identification of public transport system: A case of high-speed rail and air transport coupling system in China," Transportation Research Part A: Policy and Practice, Elsevier, vol. 127(C), pages 55-70.
    16. Ouyang, Min & Zhao, Lijing & Hong, Liu & Pan, Zhezhe, 2014. "Comparisons of complex network based models and real train flow model to analyze Chinese railway vulnerability," Reliability Engineering and System Safety, Elsevier, vol. 123(C), pages 38-46.
    17. Li, Qing & Li, Mingchu & Gong, Zhongqiang & Tian, Yuan & Zhang, Runfa, 2022. "Locating and protecting interdependent facilities to hedge against multiple non-cooperative limited choice attackers," Reliability Engineering and System Safety, Elsevier, vol. 223(C).
    18. Chen Zheng & Jinde Cao & Manfeng Hu & Xiaozheng Fan, 2017. "Finite-time stabilisation for discrete-time T–S fuzzy model system with channel fading and two types of parametric uncertainty," International Journal of Systems Science, Taylor & Francis Journals, vol. 48(1), pages 34-42, January.
    19. Göksu, Gökhan & Başer, Ulviye, 2021. "Finite-time stability for switched linear systems by Jordan decomposition," Applied Mathematics and Computation, Elsevier, vol. 395(C).
    20. Hausken, Kjell, 2010. "Defense and attack of complex and dependent systems," Reliability Engineering and System Safety, Elsevier, vol. 95(1), pages 29-42.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jeners:v:10:y:2017:i:8:p:1088-:d:105961. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.