Risk-Based Power System Security Analysis Considering Cascading Outages


Successful development of good grid demands strengthened system security and reliability, that needs effective security analysis in conducting system operation and growth designing. Classical N - one criterion has been widely used to examine every creditable contingency through detailed computations within the past. The adequacy of such approach becomes uncertain in many recent blackouts where cascading outages are usually involved. This could be attributed to the increased complexities and nonlinearities involved in operating conditions and network structures in context of sensible grid development. To address security threats, notably from cascading outages, a brand new and economical security analysis approach is proposed, which includes cascading failure simulation module (CFSM) for post-contingency analysis and risk evaluation module (REM) based on a decorrelated neural network ensembles (DNNE) algorithm. This approach overcomes the drawbacks of high computational cost in classical N-k-induced cascading contingency analysis. Case studies on 2 totally different IEEE check systems and a sensible transmission system-Polish 2383-bus system have been conducted to demonstrate the effectiveness of the proposed approach for risk evaluation of cascading contingency.

Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here

PROJECT TITLE : Attention in Reasoning Dataset, Analysis, and Modeling ABSTRACT: Although attention has become an increasingly popular component in deep neural networks for the purpose of both interpreting data and improving
PROJECT TITLE :Cost-Optimal Caching for D2D Networks With User Mobility: Modeling, Analysis, and Computational Approaches - 2018ABSTRACT:Caching well-liked files at the user equipments (UEs) provides an efficient way to alleviate
PROJECT TITLE :Design, Analysis, and Implementation of ARPKI: An Attack-Resilient Public-Key Infrastructure - 2018ABSTRACT:This Transport Layer Security (TLS) Public-Key Infrastructure (PKI) is based on a weakest-link security
PROJECT TITLE :Critical communications and public safety networks, part 2: technical issues, security, and applications [Guest Editorial]ABSTRACT:As we tend to mentioned in the Guest Editorial of Part 1 of this Feature Topic,
PROJECT TITLE :Modeling, Analysis, and Scheduling of Cluster Tools With Two Independent ArmsABSTRACT:Twin-armed cluster tools for semiconductor manufacturing sometimes have had two arms fixed in opposite directions. Recently,

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry