A methodology to evaluate the uncertainties used to perform security assessment for branch overloads

被引:3
|
作者
Vasconcelos, M. H. [1 ,2 ]
Goncalves, C. [1 ,3 ]
Meirinhos, J. [1 ]
Omont, N. [4 ]
Pitto, A. [5 ]
Ceresa, G. [5 ]
机构
[1] INESC TEC, INESC Technol & Sci, Porto, Portugal
[2] Univ Porto, Fac Engn, Porto, Portugal
[3] Univ Porto, Fac Ciencias, Porto, Portugal
[4] RTE, Paris, France
[5] RSE SpA, Milan, Italy
关键词
Forecast uncertainty; Online security assessment; Performance evaluation; Probabilistic forecasting; Power system operation; PROBABILISTIC FORECASTS; POWER;
D O I
10.1016/j.ijepes.2019.04.043
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper presents a generic framework to evaluate and compare the quality of the uncertainties provided by probabilistic forecasts of power system state when used to perform security assessment for branch overloads. Besides exploiting advanced univariate and multivariate metrics that are traditionally used in weather prediction, the evaluation is complemented by assessing the benefits from exploiting probabilistic forecasts over the current practices of using deterministic forecasts of the system operating conditions. Another important feature of this framework is the provision of parameters tuning when applying flow probabilistic forecasts to perform security assessment for branch overloads. The quality and scalability of this framework is demonstrated and validated on recent historical data of the French transmission system. Although being developed to address branch overload problems, with proper adaptations, this work can be extended to other power system security problems.
引用
收藏
页码:169 / 177
页数:9
相关论文
共 50 条
  • [31] Information Security Maturity Level: A Fast Assessment Methodology
    Monteiro, Sergio
    Magalhaes, Joao Paulo
    AMBIENT INTELLIGENCE- SOFTWARE AND APPLICATIONS- 8TH INTERNATIONAL SYMPOSIUM ON AMBIENT INTELLIGENCE (ISAMI 2017), 2017, 615 : 269 - 277
  • [32] Steady security assessment using linear programming methodology
    Shukla, M
    Sekar, A
    PROCEEDINGS OF THE THIRTY-SIXTH SOUTHEASTERN SYMPOSIUM ON SYSTEM THEORY, 2004, : 141 - 144
  • [33] A Formal Methodology for Enterprise Information Security Risk Assessment
    Bhattacharjee, Jaya
    Sengupta, Anirban
    Mazumdar, Chandan
    2013 INTERNATIONAL CONFERENCE ON RISKS AND SECURITY OF INTERNET AND SYSTEMS (CRISIS), 2013,
  • [34] Security Assessment Methodology for Isolated Systems of a Certain Class
    Wiechecki, Daniel
    INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2020, 66 (03) : 499 - 505
  • [35] Healthcare Device Security Assessment through Computational Methodology
    Ahmad, Masood
    Al-Amri, Jehad F.
    Subahi, Ahmad F.
    Khatri, Sabita
    Seh, Adil Hussain
    Nadeem, Mohd
    Agrawal, Alka
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 41 (02): : 811 - 828
  • [36] Security Assessment Methodology for Industrial Control System Products
    Hristova, Ana
    Schlegel, Roman
    Obermeier, Sebastian
    2014 IEEE 4TH ANNUAL INTERNATIONAL CONFERENCE ON CYBER TECHNOLOGY IN AUTOMATION, CONTROL, AND INTELLIGENT SYSTEMS (CYBER), 2014, : 264 - 269
  • [37] Methodology of quantitative risk assessment for information system security
    Lin, MQ
    Wang, QM
    Li, JH
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 526 - 531
  • [38] Penetration Testing and Security Assessment Methodology for Biomedical Devices
    Kisielewicz, Maciej
    Kedziora, Michal
    Jozwiak, Ireneusz
    RECENT CHALLENGES IN INTELLIGENT INFORMATION AND DATABASE SYSTEMS, ACIIDS 2024, PT I, 2024, 2144 : 337 - 348
  • [39] TED: A Container based Tool to Perform Security Risk Assessment for ELF Binaries
    Mucci, Daniele
    Blumbergs, Bernhards
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2019, : 361 - 369
  • [40] Framework to perform taint analysis and security assessment of IoT devices in smart cities
    Bhardwaj A.
    Vishnoi A.
    Bharany S.
    Abdelmaboud A.
    Ibrahim A.O.
    Mamoun M.
    Nagmeldin W.
    PeerJ Computer Science, 2023, 9