• Title/Summary/Keyword: Security limits

Search Result 162, Processing Time 0.034 seconds

Study on the Security-Constrained Optimal Power Flow (상정사고를 고려한 최적조류계산 연구)

  • Choi, Kil;Won, Jong-Ryul
    • Proceedings of the KIEE Conference
    • /
    • 2002.11b
    • /
    • pp.381-383
    • /
    • 2002
  • This paper proposes a MATLAB program for solving security-constrained optimal power flow using linear programming. Security-constrained optimal power flow can find an optimal generation satisfying bus voltage limits, line flow limits, reactive generation limits, even if contingency occurs. Sensitivity matrixes are obtained based on power flow solutions with and without single line contingency. This program is tested for an IEEE 14bus system with 5 generators Results shows good ability of finding optimal solution in case of a single line contingency.

  • PDF

On-Line Contingency Selection Method Considering Voltage Security (전압 안전도를 고려한 온라인 상정사고 선택법)

  • Song, Kil-Yeong;Kim, Yeong-Han;Lee, Gi-Tack
    • Proceedings of the KIEE Conference
    • /
    • 1987.11a
    • /
    • pp.122-124
    • /
    • 1987
  • This paper presents a new algorithm in formulating a performance index for contingency selection method considering voltage security. Security limits defined-in terms of real power line flows and voltage magnitudes are considered in normalized subspaces where in critical contingencies are identified by a filtering algorithm using the infinite norm. Two types of limits, warning limit and emergency limit, are introduced for voltage and line flow. Usually performance indices have been constructed for real power line flows and voltages with each different criterion. This paper, however, presents a method that constructs them with the same criterion in use of the norm properties, so that we can assess security considering both of them. Rapid contingency simulation is performed using one iteration of fast decoupled load flows with LMML(Inverse Matrix Modification Lemma).

  • PDF

The effects of SCOPF solution to Transient Stability on Voltage Limited Power System (전압안정도로 제약된 계통에서 최적조류계산해가 과도안정도에 미치는 영향)

  • Lee, Geun-Joon;Kim, Bal-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2001.05a
    • /
    • pp.245-247
    • /
    • 2001
  • This paper presents a series of simulation results of transient stability on SCOPF operated power system whose transmission capabilities are limited by voltage stability. Three steps of voltage security guidelines, 5[%], 7[%], 10[%] are introduced to increase power transfer from generation centers to load center and observed the effects of voltage guidelines to transient stability for three kinds of load level(peak, medium, off-peak). As a result, dynamic characteristics weren't affected by the voltage security limits in model system, but became worse for the off-peak level than peak case, and sustain oscillations are observed for the all load level. This gives us some intitutions for the development and applications of security limits to use SCOPF program in open electric market.

  • PDF

The Optimal Power Flow Algorithm Considering Load Power Factor Limits (부하역률 제약조건을 고려한 최적 급전 알고리즘)

  • 김광욱;조종만;김진오
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.53 no.9
    • /
    • pp.494-499
    • /
    • 2004
  • This paper presents to compute the power economic dispatch, an optimal power flow (OPF) computation algorithm, considering the load power factor limits constraint in developed. Efficient reactive power planning enhances economic operation as well as system security. Accordingly, an adequate level of power factor limits for the load busesshould be evaluated for economic operation. In this paper, the ranges of acceptable load power factors are portrayed as bandwidths of load power factor expressed as a function of load level. The load power factor limits are included and described into the OPF's objective function. The method Proposed is applied to IEEE 26 bus system.

The optimal power flow algorithm considering load power factor limits (부하역률 제약을 고려한 최적 급전 알고리즘)

  • Kim, Kwang-Wook;Cho, Jong-Man;Kim, Jin-O
    • Proceedings of the KIEE Conference
    • /
    • 2003.07a
    • /
    • pp.98-100
    • /
    • 2003
  • This paper presents the method for computing the power economic dispatch with an optimal power flow (OPF) computation algorithm, considering the power factor limits constraint. Efficient reactive power planning enhances economic operation as well as system security. Accordingly, an adequate level of power factor limits for the load buses should be evaluated for economic operation. The power factor limits are included and described into the OPF's objective function. The proposed method is applied to IEEE 26 buses system.

  • PDF

A Study on BIM based Process Risk Management Model (BIM 기반의 프로젝트 단계별 리스크관리 모델에 관한 연구)

  • Jeon, Seung-Ho;Choi, Myung-Seok;Lee, Joo-Ho
    • Journal of Korean Society of societal Security
    • /
    • v.3 no.1
    • /
    • pp.61-66
    • /
    • 2010
  • Recently a construction industry introduces information technology that brings about many advantages in the early planning phase, design phase and construction phase. Nevertheless a BIM has a many benefits, it has limits which are not only usually using 3D modeling but also limit of making full use of practical affairs because of a lack of connecting varietals of progress of work. To solve these uppermost limits, this research is presenting unified systems to use in risk management which are efficient management of space and non-space information, space analysis.

  • PDF

Legal Interpretation on Management Power of Article 7 Section 1 of Security Business Act (경비업법 제7조 제1항 "관리권 범위"에 대한 법적 해석)

  • Lee, Jong-Hwan;Lee, Min-Hyung
    • Korean Security Journal
    • /
    • no.26
    • /
    • pp.59-87
    • /
    • 2011
  • Security Business Act of Korea is leaning toward the aspect of regulation, while it provides few provisions about vesting the authority, which causes problems such as legal loopholes to be raised in regard to the rules about authorizing the private security personnel to perform security affairs properly and defining the limit of power. So, it should be done to interpret the law in order to draw the legal basis of empowering as well as to set limits of the authority of security main agent, and Article 7, Section 1, of Security Business Act is the very provision that involves the legal basis. In the scope of 'Management Power', the statutory authority in the first clause of Article 7 of Security Business Act, the security personnel can use force for self-defense, defense of others and property, and prevention of crimes. In addition, the powers of interrogation, access control, and eviction notice are involved in its scope. The private security personnel as the occupation assistant can take precautions and if the infringement on the benefit and protection of the law is imminent or done, he or she can use force within the limits of the passive resistance and the means of defiance on the basis of 'Management Power'. The private security personnel, however, can exercise the force only if the necessary conditions of legal defense, emergency evacuation, and legitimate act of criminal law are fulfilled.

  • PDF

The Impact of TANF on Income and Poverty : analyses by sub-component (미국 TANF정책이 소득 및 빈곤에 미친 영향: 하부조항별 분석)

  • Yoo, Ji-Young
    • Korean Journal of Social Welfare
    • /
    • v.59 no.4
    • /
    • pp.111-136
    • /
    • 2007
  • The National Basic Livelihood Security(NBLS) System implemented from October 2000 has expanded cash assistance to cover the poor who are able to work in our country. Although the cash assistance for them has positive aspects of providing basic livelihood security for all people, but many scholars have also pointed out its negative aspects such as a decrease in labor supply among the poor. In order to provide policy implications for the cash assistance program of our country as well as the US, this paper examines the impact of Temporary Assistance for Needy Families(TANF) on poverty among single mothers and their families using data from March Current Population Survey of $1991{\sim}2002$. TANF imposes strong work requirements and time limits to recipients as conditions for cash assistance, which are major sub-components of TANF. Therefore, this paper analyzes TANF by looking at work requirements and time limits separately, not by looking at TANF as a single policy. The research findings show that work requirements significantly decreased income and increased poverty among single mothers. Although time limits show income increasing effects and poverty decreasing effects, it seems further studies on time limits are needed at this point. The research findings of this paper provide important lessons for welfare to work cash assistance of our country as well as the US.

  • PDF

Development of a Bi-Directional Security Light Control System based on Low-Bandwidth Wireless Sensor Network (저대역 센서 네트워크 기반의 양방향 보안등 관제 시스템 개발)

  • Lee, Ho-Gun;Lee, Sang-Ho;Lee, Suk-Gyu;Choi, Jeong-Won
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.24 no.10
    • /
    • pp.58-66
    • /
    • 2010
  • This paper shows an implementation and management result of wireless networks based security light control system, which performs a great role in protection of pedestrians and prevention of crime. Conventional security light units have severe limits in confirmation and inspection of security light unit failure, like wilful damage by someone or failure by influence of other equipment or failure by spontaneous heat-increase, and so on. In addition, local government offices are responsible for maintenance of security light units and as a matter of fact, most of civil complaints are about security light units. It is an obvious that the existing security light maintenance system reaches the limit and the security light maintenance problem is a difficulty of local government. Therefore, efficient security light control system is needed, which enables central control and intelligent maintenance. Moreover, the system has to be easy to control and has to be stable. In this study, wireless sensor network based security light control system is implemented, which is independent of programming language and platform, and which is simple to control and extend the system. The proven protocols, HTTP and SOAP, are utilized in order to improve the system reliability. This paper shows the excellence of our proposed system by implementing and operating it in real environment.

The Implementation of Probabilistic Security Analysis in Composite Power System Reliability (복합전력계통 신뢰도평가의 확률론적 안전도 도입)

  • Cha, Jun-Min;Kwon, Sae-Hyuk;Kim, Hyung-Chul
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.55 no.5
    • /
    • pp.185-190
    • /
    • 2006
  • The security analysis relates to the ability of the electric systems to survive sudden disturbances such as electric short circuits or unanticipated loss of system elements. It is composed of both steady state and dynamic security analyses, which are not two separate issues but should be considered together. In steady state security analysis including voltage security analysis, the analysis checks that the system is operated within security limits by OPF (optimal power flow) after the transition of a new operating point. On the other hand, dynamic security analysis deals that the transition will lead to an acceptable operating condition. Transient stability, which is the ability of power systems to maintain synchronism when subjected to a large disturbance, is a principal component in dynamic security analysis. Usually any loss of synchronism will cause additional outages. They make the present steady state analysis of the post-contingency condition inadequate for unstable cases. This is the reason of the need for dynamics of systems. Probabilistic criterion can be used to recognize the probabilistic nature of system components and shows the possibility of system security. A comprehensive conceptual framework for probabilistic static and dynamic assessment is presented in this paper. The simulation results of the Western System Coordinating Council (WSCC) system compare an analytical method with Monte-Carlo simulation (MCS). Also, a case study of the extended IEEE Reliability Test System (RTS) shows the efficiency of this approach.