A generalised approach to transient security enhancement in power markets

X. J. Lin, C. W. Yu, A. K. David, C. Y. Chung

Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

Abstract

Ensuring transient security usually requires the re-dispatch of generators to eliminate potential transient instability after a contingency, but this has commercial implications in a power market. A further complication is that different candidate contingencies may motivate different re-dispatch strategies because the advanced generator group is different in each case, or the sensitivity of the stability margin to power exchanges between generators is different. The paper develops an approach that attempts to address all of these significant issues in deregulated competitive power systems.

Original languageEnglish
Title of host publicationProceedings of the 2004 IEEE International Conference on Electric Utility Deregulation, Restructuring and Power Technologies (DRPT2004)
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages65-71
Number of pages7
ISBN (Print)0780382374, 9780780382374
DOIs
Publication statusPublished - Oct 2004
EventProceedings of the 2004 IEEE International Conference on Electric Utility Deregulation, Restructuring and Power Technologies (DRPT2004) - Hong Kong, China
Duration: 5 Apr 20048 Apr 2004

Publication series

NameProceedings of the 2004 IEEE International Conference on Electric Utility Deregulation, Restructuring and Power Technologies (DRPT2004)
Volume1

Conference

ConferenceProceedings of the 2004 IEEE International Conference on Electric Utility Deregulation, Restructuring and Power Technologies (DRPT2004)
Country/TerritoryChina
CityHong Kong
Period5/04/048/04/04

Keywords

  • Generation rescheduling
  • Global index
  • Multi-objective optimization
  • Power market
  • Transient stability

ASJC Scopus subject areas

  • General Engineering

Fingerprint

Dive into the research topics of 'A generalised approach to transient security enhancement in power markets'. Together they form a unique fingerprint.

Cite this