Security-based Demand Response Allocation

被引:0
|
作者
Shayesteh, E. [1 ]
Eliasi, M. [1 ]
Mahmoudi-Kohan, N. [1 ]
Moghaddam, M. Parsa [1 ]
机构
[1] Tarbiat Modares Univ, Dept Elect Engn, Tehran, Iran
关键词
Available transfer capability (ATC); demand bidding (DB); demand response (DR); power system security; spinning reserve (SR);
D O I
暂无
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
In restructured power systems, the ISO should maintain the power system in an acceptable level of security. The amount of available transfer capability and spinning reserve are two important indicators of power system security. This paper presents a strategy for the allocation of demand response programs in restructured power system. The proposed approach is based on a multi-objective model in which the objectives are defined as minimization of spinning reserve cost and maximization of available transfer capability. The IEEE 30-bus test system is used to demonstrate the effectiveness; of the proposed methodology.
引用
收藏
页码:4585 / 4591
页数:7
相关论文
共 50 条
  • [21] Design and Implement of Spring Security-Based T-RBAC
    Xie, Lei
    Han, Lei
    Li, Mei-Hong
    Dong, Xiao-Lu
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND APPLICATIONS (WCNA2017), 2017, : 183 - 188
  • [22] The security-based discourse of Strategic Partnership: Brazil - European Union
    Guedes de Oliveira, Marcos A.
    de Souza, Deywisson Ronaldo O.
    MERIDIANO 47-JOURNAL OF GLOBAL STUDIES, 2011, 12 (124) : 22 - 28
  • [23] Security-Based Approach for Transformations of Mobile Accesses to ERP Systems
    Porkert, Kurt
    Marquardt, Gunther
    INNOVATIONS IN ENTERPRISE INFORMATION SYSTEMS MANAGEMENT AND ENGINEERING, 2016, 245 : 138 - 146
  • [24] Situational prevention of domestic violence: A review of security-based programs
    Prenzler, Tim
    Fardell, Lauren
    AGGRESSION AND VIOLENT BEHAVIOR, 2017, 34 : 51 - 58
  • [25] Internet of Things: Security-based Application Level Lookup Protocol
    Xu, Degang
    Qin, Leihua
    Zhou, Jingli
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY II, PTS 1-4, 2013, 411-414 : 625 - 628
  • [26] SIMULATION FOR ASSESSING SECURITY-BASED POLICIES IN IMPORT/EXPORT OPERATIONS
    Legato, Pasquale
    Mazza, Rina Mary
    24TH EUROPEAN MODELING AND SIMULATION SYMPOSIUM (EMSS 2012), 2012, : 248 - 255
  • [27] Internet of Things Data Privacy and Security-Based on Blockchain Technology
    Raheem, Mohammed Talib
    Avci, Isa
    FORTHCOMING NETWORKS AND SUSTAINABILITY IN THE AIOT ERA, VOL 2, FONES-AIOT 2024, 2024, 1036 : 52 - 63
  • [28] Improving Penetration Testing Methodologies for Security-Based Risk Assessment
    Dawson, Joel
    McDonald, J. Todd
    2016 CYBERSECURITY SYMPOSIUM, 2016, : 51 - 58
  • [29] Security-Based Differences in Touch Behavior and Its Relational Benefits
    Carmichael, Cheryl L.
    Goldberg, Matthew H.
    Coyle, Maureen A.
    SOCIAL PSYCHOLOGICAL AND PERSONALITY SCIENCE, 2021, 12 (04) : 550 - 560
  • [30] SECURITY-BASED SERVICE BROKER POLICY FOR FOG COMPUTING ENVIRONMENT
    Arya, Deeksha
    Dave, Mayank
    2017 8TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2017,