71,077 research outputs found

    Voltage security evaluation based on perturbation method

    Get PDF
    This is the post-print version of the final paper published in International Journal of Electrical Power & Energy Systems. The published article is available from the link below. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. Copyright @ 2009 Elsevier B.V.This paper proposes a new algorithm for estimating voltage security margin. The algorithm is based on the perturbation method and has significant computational efficiency. The proposed algorithm can be used for on-line voltage security evaluation. It has been validated using IEEE-14, IEEE-30 and IEEE-57 bus systems. Results from the tests show higher efficiency and smaller error margins compared to continuation power flow (CPF) method. Voltage collapse is a serious threat to the security of stressed power systems; therefore, voltage security (VS) has become a major challenge for management of power systems. The motivation for this research is a direct consequence of the deregulation of electricity industries and markets worldwide

    A Kernel Perspective for Regularizing Deep Neural Networks

    Get PDF
    We propose a new point of view for regularizing deep neural networks by using the norm of a reproducing kernel Hilbert space (RKHS). Even though this norm cannot be computed, it admits upper and lower approximations leading to various practical strategies. Specifically, this perspective (i) provides a common umbrella for many existing regularization principles, including spectral norm and gradient penalties, or adversarial training, (ii) leads to new effective regularization penalties, and (iii) suggests hybrid strategies combining lower and upper bounds to get better approximations of the RKHS norm. We experimentally show this approach to be effective when learning on small datasets, or to obtain adversarially robust models.Comment: ICM

    Efficient Database Generation for Data-driven Security Assessment of Power Systems

    Full text link
    Power system security assessment methods require large datasets of operating points to train or test their performance. As historical data often contain limited number of abnormal situations, simulation data are necessary to accurately determine the security boundary. Generating such a database is an extremely demanding task, which becomes intractable even for small system sizes. This paper proposes a modular and highly scalable algorithm for computationally efficient database generation. Using convex relaxation techniques and complex network theory, we discard large infeasible regions and drastically reduce the search space. We explore the remaining space by a highly parallelizable algorithm and substantially decrease computation time. Our method accommodates numerous definitions of power system security. Here we focus on the combination of N-k security and small-signal stability. Demonstrating our algorithm on IEEE 14-bus and NESTA 162-bus systems, we show how it outperforms existing approaches requiring less than 10% of the time other methods require.Comment: Database publicly available at: https://github.com/johnnyDEDK/OPs_Nesta162Bus - Paper accepted for publication at IEEE Transactions on Power System

    Integrated Application of Active Controls (IAAC) technology to an advanced subsonic transport project: Current and advanced act control system definition study. Volume 2: Appendices

    Get PDF
    The current status of the Active Controls Technology (ACT) for the advanced subsonic transport project is investigated through analysis of the systems technical data. Control systems technologies under examination include computerized reliability analysis, pitch axis fly by wire actuator, flaperon actuation system design trade study, control law synthesis and analysis, flutter mode control and gust load alleviation analysis, and implementation of alternative ACT systems. Extensive analysis of the computer techniques involved in each system is included

    Slope Instability of the Earthen Levee in Boston, UK: Numerical Simulation and Sensor Data Analysis

    Full text link
    The paper presents a slope stability analysis for a heterogeneous earthen levee in Boston, UK, which is prone to occasional slope failures under tidal loads. Dynamic behavior of the levee under tidal fluctuations was simulated using a finite element model of variably saturated linear elastic perfectly plastic soil. Hydraulic conductivities of the soil strata have been calibrated according to piezometers readings, in order to obtain correct range of hydraulic loads in tidal mode. Finite element simulation was complemented with series of limit equilibrium analyses. Stability analyses have shown that slope failure occurs with the development of a circular slip surface located in the soft clay layer. Both models (FEM and LEM) confirm that the least stable hydraulic condition is the combination of the minimum river levels at low tide with the maximal saturation of soil layers. FEM results indicate that in winter time the levee is almost at its limit state, at the margin of safety (strength reduction factor values are 1.03 and 1.04 for the low-tide and high-tide phases, respectively); these results agree with real-life observations. The stability analyses have been implemented as real-time components integrated into the UrbanFlood early warning system for flood protection
    corecore