scispace - formally typeset
Search or ask a question
Author

G. C. Ejebe

Bio: G. C. Ejebe is an academic researcher. The author has contributed to research in topics: Electric power system. The author has an hindex of 2, co-authored 2 publications receiving 581 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: A fast technique has been developed for the automatic ranking and selection of contingency cases for a power system contingency analysis study and results of this technique applied to different test systems are presented.
Abstract: A fast technique has been developed for the automatic ranking and selection of contingency cases for a power system contingency analysis study. A contingency list is built containing line and generator outages which are ranked according to their expected severity as reflected in voltage level degradation and circuit overloads. An adaptive contingency processorcan be set up by performing sequential contingency tests starting with the most severe contingencies at the top of the list and proceeding down the list, stopping when the severity goes below a threshold. Computational results of this technique applied to different test systems are presented.

466 citations

Journal ArticleDOI
TL;DR: In this article, a fast security-analysis technique for voltage security assessment in an energy-management system is described, which identifies the location of buses with potential voltage problems and thereby defines a voltage-sensitive subnetwork for contingency screening.
Abstract: The authors describe a fast security-analysis technique for voltage security assessment in an energy-management system. The proposed method identifies the location of buses with potential voltage problems and thereby defines a voltage-sensitive subnetwork for contingency screening. This allows the evaluation of a large number of contingencies. The efficiency of this method is derived from the use of a voltage subnetwork to drastically reduce the number of bus voltages to be solved; and subsequently from the use of compensation techniques and sparse-vector methods (including adaptive reduction) for screening and final solution of contingencies. Results demonstrating the effectiveness of the method on a small and a large power system are presented. >

131 citations


Cited by
More filters
Journal ArticleDOI
20 Feb 2009-Chaos
TL;DR: The tolerance of electric power grids to both accidental and malicious outages is analyzed in the framework of complex network theory, and the quantity known as efficiency is modified by introducing a new concept of distance between nodes called net-ability.
Abstract: Power grids exhibit patterns of reaction to outages similar to complex networks. Blackout sequences follow power laws, as complex systems operating near a critical point. Here, the tolerance of electric power grids to both accidental and malicious outages is analyzed in the framework of complex network theory. In particular, the quantity known as efficiency is modified by introducing a new concept of distance between nodes. As a result, a new parameter called net-ability is proposed to evaluate the performance of power grids. A comparison between efficiency and net-ability is provided by estimating the vulnerability of sample networks, in terms of both the metrics.

309 citations

Journal ArticleDOI
TL;DR: In this article, a stochastic random chemistry (RC) algorithm is proposed to identify large collections of multiple (n-k) contingencies that initiate large cascading failures in a simulated power system.
Abstract: This paper describes a stochastic “Random Chemistry” (RC) algorithm to identify large collections of multiple (n-k) contingencies that initiate large cascading failures in a simulated power system. The method requires only O(log (n)) simulations per contingency identified, which is orders of magnitude faster than random search of this combinatorial space. We applied the method to a model of cascading failure in a power network with n=2896 branches and identify 148243 unique, minimal n-k branch contingencies (2 ≤ k ≤ 5) that cause large cascades, many of which would be missed by using pre-contingency flows, linearized line outage distribution factors, or performance indices as screening factors. Within each n-k collection, the frequency with which individual branches appear follows a power-law (or nearly so) distribution, indicating that a relatively small number of components contribute disproportionately to system vulnerability. The paper discusses various ways that RC generated collections of dangerous contingencies could be used in power systems planning and operations.

279 citations

Journal ArticleDOI
TL;DR: A simple and efficient model for optimizing the location of FACTS devices used for congestion management by controlling the device parameters is presented.

262 citations

Journal ArticleDOI
TL;DR: This paper generalizes the "terrorist threat problem" first defined by Salmero/spl acute/n, Wood, and Baldick by formulating it as a bilevel programming problem, and converts it into an equivalent single-level mixed-integer linear program by replacing the inner optimization by its Karush-Kuhn-Tucker optimality conditions.
Abstract: This paper generalizes the "terrorist threat problem" first defined by Salmero/spl acute/n, Wood, and Baldick by formulating it as a bilevel programming problem. Specifically, the bilevel model allows one to define different objective functions for the terrorist and the system operator as well as permitting the imposition of constraints on the outer optimization that are functions of both the inner and outer variables. This degree of flexibility is not possible through existing max-min models. The bilevel formulation is investigated through a problem in which the goal of the destructive agent is to minimize the number of power system components that must be destroyed in order to cause a loss of load greater than or equal to a specified level. This goal is tempered by the logical assumption that, following a deliberate outage, the system operator will implement all feasible corrective actions to minimize the level of system load shed. The resulting nonlinear mixed-integer bilevel programming formulation is transformed into an equivalent single-level mixed-integer linear program by replacing the inner optimization by its Karush-Kuhn-Tucker optimality conditions and converting a number of nonlinearities to linear equivalents using some well-known integer algebra results. The equivalent formulation has been tested on two case studies, including the 24-bus IEEE Reliability Test System, through the use of commercially available software.

220 citations

Journal ArticleDOI
TL;DR: A comprehensive list of books, reports, workshops and technical papers related to voltage stability and security can be found in this article, where the authors provide a comprehensive overview of the literature.
Abstract: This paper provides a comprehensive list of books, reports, workshops and technical papers related to voltage stability and security

212 citations