1,410 research outputs found

    Risk-based dynamic security assessment for power system operation & operational planning

    Get PDF
    open6noAssessment of dynamic stability in a modern power system (PS) is becoming a stringent requirement both in operational planning and in on-line operation, due to the increasingly complex dynamics of a PS. Further, growing uncertainties in forecast state and in the response to disturbances suggests the adoption of risk-based approaches in Dynamic Security Assessment (DSA). The present paper describes a probabilistic risk-based DSA, which provides instability risk indicators by combining an innovative probabilistic hazard/vulnerability analysis with the assessment of contingency impacts via time domain simulation. The tool implementing the method can be applied to both current and forecast PS states, the latter characterized in terms of renewable and load forecast uncertainties, providing valuable results for operation and operational planning contexts. Some results from a real PS model are discussed.openCiapessoni, Emanuele; Cirio, Diego; Massucco, Stefano*; Morini, Andrea; Pitto, Andrea; Silvestro, FedericoCiapessoni, Emanuele; Cirio, Diego; Massucco, Stefano; Morini, Andrea; Pitto, Andrea; Silvestro, Federic

    A Risk-Based Methodology and Tool Combining Threat Analysis and Power System Security Assessment

    Get PDF
    A thorough investigation of power system security requires the analysis of the vulnerabilities to natural and man-related threats which potentially trigger multiple contingencies. In particular, extreme weather events are becoming more and more frequent due to climate changes and often cause large load disruptions on the system, thus the support for security enhancement gets tricky. Exploiting data coming from forecasting systems in a security assessment environment can help assess the risk of operating power systems subject to the disturbances provoked by the weather event itself. In this context, the paper proposes a security assessment methodology, based on an updated definition of risk suitable for power system risk evaluations. Big data analytics can be useful to get an accurate model for weather-related threats. The relevant software (SW) platform integrates the security assessment methodology with prediction systems which provide short term forecasts of the threats affecting the system. The application results on a real wet snow threat scenario in the Italian High Voltage grid demonstrate the effectiveness of the proposed approach with respect to conventional security approaches, by complementing the conventional "N - 1" security criterion and exploiting big data to link the security assessment phase to the analysis of incumbent threat

    Risk Assessment Techniques for Civil Aviation Security

    Get PDF
    Following the 9/11 terrorists attacks a strong economical effort was made to improve and adapt aviation security, both in infrastructures as in airplanes. National and international guidelines were promptly developed with the objective of creating a security management system able to supervise the identification of risks and the definition and optimisation of control measures. Risk assessment techniques are thus crucial in the above process, since an incorrect risk identification and quantification can strongly affect both the security level as the investments needed to reach it. The paper proposes a set of methodologies to qualitatively and quantitatively assess the risk in the security of civil aviation and the risk assessment process based on the threats, criticality and vulnerabilities concepts, highlighting their correlation in determining the level of risk. RAMS techniques are applied to the airport security system in order to analyse the protection equipment for critical facilities located in air-side, allowing also the estimation of the importance of the security improving measures vs. their effectiveness

    Electricity infrastructure enhancement for the security of supply against coordinated malicious attacks

    Get PDF
    © 2016 IEEE. The impact of coordinated malicious attacks may be dramatically severe and may yield a wide area blackout. A preventive measure is enhancing the infrastructure through investment. Due to limited budget, a decision making is required to select the best possible options, considering cost/benefit ratio. We designed a time-step simulation framework representing the evolution of post-contingency failures and load/system restoration. System unserved energy is translated into economic losses. Different enhancement options can be compared in terms of benefit (reduction in the cost of unserved energy) and of cost (investments needed) to eventually rank them. The simulation framework also provides a way to derive an optimal lost load recovering strategy to accelerate system restoration. In this paper the simulation framework is applied to a real network (Austrian transmission grid) to evaluate the technical and economic impacts of a coordinated malicious attack

    CCTV Surveillance System, Attacks and Design Goals

    Get PDF
    Closed Circuit Tele-Vision surveillance systems are frequently the subject of debate. Some parties seek to promote their benefits such as their use in criminal investigations and providing a feeling of safety to the public. They have also been on the receiving end of bad press when some consider intrusiveness has outweighed the benefits. The correct design and use of such systems is paramount to ensure a CCTV surveillance system meets the needs of the user, provides a tangible benefit and provides safety and security for the wider law-abiding public. In focusing on the normative aspects of CCTV, the paper raises questions concerning the efficiency of understanding contemporary forms of ‘social ordering practices’ primarily in terms of technical rationalities while neglecting other, more material and ideological processes involved in the construction of social order. In this paper, a 360-degree view presented on the assessment of the diverse CCTV video surveillance systems (VSS) of recent past and present in accordance with technology. Further, an attempt been made to compare different VSS with their operational strengths and their attacks. Finally, the paper concludes with a number of future research directions in the design and implementation of VSS

    The most frequent N-k line outages occur in motifs that can improve contingency selection

    Full text link
    Multiple line outages that occur together show a variety of spatial patterns in the power transmission network. Some of these spatial patterns form network contingency motifs, which we define as the patterns of multiple outages that occur much more frequently than multiple outages chosen randomly from the network. We show that choosing N-k contingencies from these commonly occurring contingency motifs accounts for most of the probability of multiple initiating line outages. This result is demonstrated using historical outage data for two transmission systems. It enables N-k contingency lists that are much more efficient in accounting for the likely multiple initiating outages than exhaustive listing or random selection. The N-k contingency lists constructed from motifs can improve risk estimation in cascading outage simulations and help to confirm utility contingency selection

    The political economy of electricity system resource adequacy and renewable energy integration: A comparative study of Britain, Italy and California

    Get PDF
    The need to integrate growing shares of variable renewable resources, like solar and wind, into the power system has initiated a new wave of resource adequacy policy reforms. Securing adequate resources on the system, particularly flexible and peak capacity, is indeed crucial for ensuring long-term grid reliability amid increased supply variability. While extensively explored from a techno-economic perspective, the political economy drivers and implications of these changes are frequently overlooked. Yet, power system evolution is not merely shaped by logics of techno-economic optimisation, it is also inherently political, rooted in specific liberalisation histories, political and institutional settings. This paper contributes to the literature by conducting a comparative political economy analysis of recent resource adequacy reforms in Britain, Italy, and California. It explores how differences in the technical and political economy contexts of these jurisdictions affected their strategies for securing resource adequacy capacity and investment between 2013 and 2021. Conclusions draw on the analysis of over 134 policy documents and 53 in-depth interviews with power system stakeholders. All jurisdictions introduced significant changes in resource adequacy policy, including explicit out-of-market mechanisms to remunerate resource adequacy capacity. The energy transition is thus reconfiguring state-market relations in the power sector, even in traditionally liberal countries. However, variation exists in the scope of reform, mechanism designs, policy trade-offs, and technological outcomes. This stems from context-specific political priorities, state-market relations, national and multi-level governance arrangements, market structures and stakeholder interests. This has important implications for power sector governance, as discussed in this paper
    • …
    corecore