Beruflich Dokumente
Kultur Dokumente
Must include:
I. Introduction of contingency ranking method
II. Literature Review: Select any TWO ranking methods in the literature and discuss in details
(include the formula)
III. Case Study: Differentiate the two rankings method by performing contingency analysis on the
IEEE-14 bus system given in Appendix. Consider N-1 security and transmission line
contingencies only. You may use any software such as MATPOWER, PowerWorld or other
appropriate software etc.
IV. Discussion: Discuss you results/findings.
V. Conclusion
ATTENTION: The originality of all submitted assignments will be checked and verified by using anti
plagiarism software. Your mark will be deducted if similarity index is high
APPENDIX
Generator at bus 1, bus 2, bus 3, bus 5 and bus 8. The generation output of each generator are G1= 65MW,
G2=110MW, G3=0MW, G6=0MW and G8=0MW.
Line
Resistance Reactance Line Limit
From To
(p.u.) (p.u.) (MW)
bus bus
1 2 0 0.05917 100
1 5 0 0.22304 50
2 3 0 0.19797 50
2 4 0 0.17632 50
2 5 0 0.17388 50
3 4 0 0.17103 50
4 5 0 0.04211 50
4 7 0 0.20912 50
4 9 0 0.55618 50
5 6 0 0.25202 50
6 11 0 0.1989 50
6 12 0 0.25581 50
6 13 0 0.13027 50
7 8 0 0.17615 50
7 9 0 0.11001 50
9 10 0 0.08450 50
9 14 0 0.27038 50
10 11 0 0.19207 50
12 13 0 0.19988 50
13 14 0 0.34802 50
Load data
Example of Reference Writing (IEEE format)
REFERENCES
[1] Wikipedia, "Electricity market --- Wikipedia, The Free Encyclopedia," [online].
Available: http://en.wikipedia.org/w/index.php?title=Electricity_market&oldid,
[Accessed June 27, 2007].
[2] A. B. Kevin, "Power System Security," [Online]. Available:
http://www.citeseer.ist.psu.edu/387125.html, [Accessed January 9, 2005].
[3] A. A. Fouad, F. Aboytes, V. F. Carvalho, S. L. Corey, K. J. Dhir, and R. Vierra,
"Dynamic security assessment practices in North America," IEEE Transactions on
Power Systems, vol. 3, pp. 1310 - 1321, 1988.
[4] Z. Jian, Z. Yiwei, and C. Feng, "A comprehensive and practical approach for power
system security assessment," presented at 2002 International Conference on Power
System Technology, Kunming, China.
[5] A. V. Machias, J. L. Souflis, and E. N. Dialynas, "A fuzzy transient stability index in
power system security evaluation," IEEE Transactions on Automatic Control, vol. 34,
pp. 662-666, 1989.
[6] M. P. de Arizon and J. R. Marti, "Real time power system security and control,"
presented at IEEE WESCANEX 97: Communications, Power and Computing,
Winnipeg, Man., Canada, 1997.
[7] R. Fischl and J. C. Chow, "On the probabilistic evaluation of indices for power system
security assessment," presented at IEEE International Conference on Systems, Man
and Cybernetics, Chicago, IL, USA, 1992.
[8] NGC, "BETTA Documentation," [Online]. Available:
http://www.nationalgrid.com/uk, [Accessed February 14, 2007].
[9] P. Kundur, Power system stability and control. New York: McGraw Hill, 1994.
[10] R. Billinton and S. Aboreshaid, "Security evaluation of composite power systems,"
IEE Proceedings on Generation, Transmission and Distribution, vol. 142, pp. 511-516,
1995.
[11] L. L. Lai, Power System Restructuring and Deregulation. Chichester: John Wiley & Sons
Ltd, 2001.