Web-based security cost analysis in electricity markets

被引:13
|
作者
Chen, H [1 ]
Cañizares, CA
Singh, A
机构
[1] ISO New England, Holyoke, MA 01089 USA
[2] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N21 3GL, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
client/server; electricity markets; !text type='Java']Java[!/text; power system security; transmission congestion; web;
D O I
10.1109/TPWRS.2005.846099
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Security cost analysis is important in electricity markets to address the correlation between market operation and power system operation. This paper proposes an efficient security cost analysis method and describes its implementation using a three-tier client/server architecture and up-to-date web technologies. The proposed security cost analysis is based on a system security index and its sensitivities with respect to certain system parameters. The web implementation allows easy and effective access by all market participants to make competitive decisions based on the security costs and sensitivity information obtained through the proposed security cost analysis techniques. The web implementation of the proposed method is successfully tested on a six-bus system and a 129-bus system.
引用
收藏
页码:659 / 667
页数:9
相关论文
共 50 条
  • [1] Web-based security cost analysis in electricity markets
    Chen, H
    Canizares, C
    Singh, A
    [J]. 2005 IEEE POWER ENGINEERING SOCIETY GENERAL MEETING, VOLS, 1-3, 2005, : 2676 - 2676
  • [2] Web-based transaction operational feasibility analysis in electricity markets
    Chen, H
    Cañizares, CA
    Singh, A
    [J]. 2002 IEEE POWER ENGINEERING SOCIETY SUMMER MEETING, VOLS 1-3, CONFERENCE PROCEEDINGS, 2002, : 1528 - 1533
  • [3] A Web-based Auction Platform for Electricity Retail Markets
    Colak, Burak
    Gokmen, Mehmet Ali
    Kilic, Hurevren
    [J]. 2015 IEEE 14TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA), 2015, : 1148 - 1152
  • [4] Web-based framework for electricity market
    Marmiroli, M
    Suzuki, H
    [J]. DRPT2000: INTERNATIONAL CONFERENCE ON ELECTRIC UTILITY DEREGULATION AND RESTRUCTURING AND POWER TECHNOLOGIES, PROCEEDINGS, 2000, : 471 - 475
  • [5] Software security analysis and assessment model for the web-based applications
    Wang, Y.
    Lively, W. M.
    Simmons, D. B.
    [J]. JOURNAL OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING, 2009, 9 (01) : S179 - S189
  • [6] A Security Model for Web-Based Communication
    Tehrani, Pouyan Fotouhi
    Osterweil, Eric
    Schmidt, Thomas C.
    Wählisch, Matthias
    [J]. Communications of the ACM, 2024, 67 (10) : 83 - 90
  • [7] Say Aloha to web-based security
    Anon
    [J]. Marine Log, 2002, 107 (05)
  • [8] Study on Security of Web-based Database
    Zhao, Qing
    Qin, Shihong
    [J]. PACIIA: 2008 PACIFIC-ASIA WORKSHOP ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION, VOLS 1-3, PROCEEDINGS, 2008, : 1853 - 1856
  • [9] Security models for Web-based applications
    Joshi, JBD
    Aref, WG
    Ghafoor, A
    Spafford, EH
    [J]. COMMUNICATIONS OF THE ACM, 2001, 44 (02) : 38 - 44
  • [10] Data security for Web-based CAD
    Hauck, S
    Knol, S
    [J]. 1998 DESIGN AUTOMATION CONFERENCE, PROCEEDINGS, 1998, : 788 - 793