• Title/Summary/Keyword: Security Market Line

Search Result 48, Processing Time 0.028 seconds

The On-Line Application Algorithm of SCOPE Using Time-varying Sensitivities (시변민감도를 이용한 안전도제약 최적조류계산의 On-Line 적용 알고리즘)

  • 김발호;신영균
    • Journal of Energy Engineering
    • /
    • v.13 no.1
    • /
    • pp.60-67
    • /
    • 2004
  • The recent movement to deregulated and competitive electricity market reacquires new concepts against existing central dispatch in the system operation and pinning. As power systems tend to be operated more closely to their ultimate ratings, the role of SCOPF (Security Constrained Optimal Power flow) is changed and the importance for real-time security inhancement will be more increased i]1 the new and com partitive electricity market. This paper deals with the application of the SCOPF which makes possible the On-Line application. The security margin of power system truly is changed according to the conditions or configuration of power systems, therefore, the sensitivity factor reiated to the security is recalculated and the application should be updated in accordance with the state of power system. The goal of this paper is to obtain proper security through the effluent usage of the sensitivity and to apply this a1gorithm to system operation. The proposed mechanism has been tested on a sample system and the results show more secure conditions against critical contingencies.

An Approach for Optimal Dispatch Scheduling Incorporating Transmission Security Constraints (송전계통 안전도 제약조건을 반영한 급전계획 알고리즘 개발에 관한 연구)

  • Chung, Koo-Hyung;Kim, Bal-Ho
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.54 no.12
    • /
    • pp.597-602
    • /
    • 2005
  • The introduction of competition in electricity market emphasizes the importance of sufficient transmission capacities to guarantee various electricity transactions. Therefore, when dispatch scheduling, transmission security constraints should be considered for the economic and stable electric power system operation. In this paper, we propose an optimal dispatch scheduling algorithm incorporating transmission security constraints. For solving these constraints, the dispatch scheduling problem is decomposed into a master problem to calculate a general optimal power flow (OPF) without transmission security constraints and several subproblems to inspect the feasibility of OPF solution under various transmission line contingencies. If a dispatch schedule given by the master problem violates transmission security constraints, then an additional constraint is imposed to the master problem. Through these iteration processes between the master problem and subproblems, an optimal dispatch schedule reflecting the post-contingency rescheduling is derived. Moreover, since interruptible loads can positively participate as generators in the competitive electricity market, we consider these interruptible loads active control variables. Numerical example demonstrates efficiency of the proposed algorithm.

A Study on the Spatial Factors in Traditional Retail Market Remodeling (재래시장 리모델링 사업에서의 공간 구성요소에 관한 연구)

  • Oh, Bong-Seok;Kim, Nam-Hyo
    • Proceedings of the Korean Institute of Interior Design Conference
    • /
    • 2004.05a
    • /
    • pp.112-115
    • /
    • 2004
  • The government is in progress the traditional retail market redevelopment and remodeling due to atrophy of the traditional retail market in accordant to opening of the circulation market and changing of the consuming patterns. However, it seemed that primitive project was limited to the environment improvement scope. As the shopping environment which is comfortable to the consumers is provided and the design which considers a traditional retail market specific quality is applied from business plan early. It will be useful for the management normalization of traditional retail market actually. The spatial factors were analyzed as follows. 1. The circulation of consumer should be secured to make boundary line of the pass way. 2. The display booth should be standardized for the security of sight. 3. The signage panel should be consolidated in according to the plan. 4. The street vendor's handcart and tent should be arranged for circulations and the vision line.

  • PDF

A Novel Method for Clustering Critical Generator by using Stability Indices and Energy Margin (안정도 지수와 에너지 마진을 이용한 불안정 발전기의 clustering 법)

  • Chang Dong-Hwan;Jung Yun-Jae;Chun Yeonghan;Nam Hae-Kon
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.54 no.9
    • /
    • pp.441-448
    • /
    • 2005
  • On-line dynamic security assessment is becoming more and more important for the stable operation of power systems as load level increases. The necessity is getting apparent under Electricity Market environments, as operation of power system is exposed to more various operating conditions. For on-line dynamic security assessment, fast transient stability analysis tool is required for contingency selection. The TEF(Transient Energy Function) method is a good candidate for this purpose. The clustering of critical generators is crucial for the precise and fast calculation of energy margin. In this paper, we propose a new method for fast decision of mode of instability by using stability indices. Case study shows very promising results.

An Implementation of On-Line SCOPF Algorithm (On-Line SCOPF 알고리즘의 적용에 관한 연구)

  • Shin, Young-Kyun;Kim, Bal-Ho H.
    • Proceedings of the KIEE Conference
    • /
    • 2000.11a
    • /
    • pp.10-12
    • /
    • 2000
  • As power systems tend to be operated more closely to their ultimate ratings. the role of SCOPF is changed and the importance for real-time security inhancement will be more increased in the new and competitive electricity market. This paper deals with the application of the SCOPF which make possible the On-Line application. The security margin of power system truly is changed according to the conditions or configuration of power system, therefore, the sensitivity factor related to the security is recalculated and the application should be updated in accordance with the state of power system. The proposed mechnism has been tested on modified Woolenberg 18-bus system and the results show more secure conditions against critical contingencies.

  • PDF

A New Algorithm for Unstable Mode Decision in the On-line Transient Stability Assessment (온라인 과도안정도 평가를 위한 새로운 불안정모드 선정 알고리즘)

  • Chang, Dong-Hwan;Kim, Jung-Woo;Chun, Yeong-Han
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.57 no.7
    • /
    • pp.1123-1128
    • /
    • 2008
  • The necessity of online dynamic security assessment is getting apparent under Electricity Market environments, as operation of power system is exposed to more various operating conditions. For on-line dynamic security assessment, fast transient stability analysis tool is required for contingency selection. The TEF(Transient Energy Function) method is a good candidate for this purpose. The clustering of critical generators is crucial for the precise and fast calculation of energy margin. In this paper, we propose a new method for fast decision of mode of instability by using stability indices and energy margin. The method is a new version of our previous paper.[1] Case studies are showing very promising results.

The survey on the Approach to the problem of Security-Constrained Price-Based Unit Commitment in the Deregulated Power Market (전력시장에서 안전도와 가격을 고려한 발전기 기동정지계획문제에 대한 조사연구)

  • Jang, Se-Hwan;Kim, Jin-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2006.07a
    • /
    • pp.359-360
    • /
    • 2006
  • This paper introduces a variable of methodology and models of solving Security-Constrained Price-Based Unit Commitment(SPUC) Problems in the Deregulated Power Market. The objective of SPUC is coordination between GENCOs and the ISO. GENCOs apply Price-Based Unit Commitment(PBUC) without security constraints and submit capacity bids to the ISO for maximizing their revenues. Using generation data and transmission data obtained from TRANSCOs, the ISO applies Security-Constrained Unit Commitment(SCUC), executes congestion management and contingency analysis for minimizing line flow violations and the risk supplying loads. Considering analysis data, the ISO should adjust GENCOS' bid. In this paper, we presents the result of survey and analyze on the approach of the SPUC problem.

  • PDF

Operation Status of Chinese Security Service Industry and Institutional Settlement Methods (중국 보안서비스산업의 운영실태 및 제도정착 방안)

  • Lee, Sangchul
    • Journal of the Society of Disaster Information
    • /
    • v.10 no.4
    • /
    • pp.536-547
    • /
    • 2014
  • With the changing safety services and social order systems accompanied by the economic development and changing public security environment since the Chinese economic reform, the security service industry in China is growing daily and related problems are increasing. For the Chinese security service market to be activated, the monopoly of security services by the public security agencies must be removed. In addition, the research and development, expansion, and applications of safety and crime prevention technologies regarding the safety and protection of exhibition, sales, culture, sports, commerce activities, combinations of safety technologies and crime prevention processes, the provision of relevant technical operations, and the expansion of security service areas are required. Furthermore, the administration rights, property rights, and business management rights of security companies must be separated, the security headquarters must be integrated and coordinated for optimization of various resources solely by market needs, and their rights and affiliation relations must be clear. Besides, the competitiveness of security companies in the security service market must be enhanced by unifying the business management, and optimizing and sharing their resources. The security service ordinances of China that have been implemented now must be applied realistically, methods to activate the true market economy for security services must be researched, and various ordinances related to security services must be realigned in line with the characteristics of security services. Finally, for the mutual cooperation system between public and private security services, the public security agencies must acknowledge the importance of private security services and the status of security service providers in crime prevention and social order maintenance. They must establish partnership relations with each other beyond the unilateral direction and management system for security services and drive with positive attitudes the security service industry which is still in its infancy.

A User Authentication Technique for the E-commerce (전자상거래를 위한 사용자 인증 기술)

  • Lee, Dae-Sik;Yun, Dong-Sic;Ahn, Heui-Hak
    • Convergence Security Journal
    • /
    • v.5 no.2
    • /
    • pp.29-36
    • /
    • 2005
  • The industrial structure of the Internet is changing from off-line to on-line. E-commerce on the Internet will be formed a big market by developing of network. E-commerce on the Internet is natural. And it will be increase in interest of many people. By the way, it must support to institutional and technical problem. First of all, we need user authentication technique. In this paper, we described about safe Electronic shopping mall construction and operation by three main categories. First is security solution method of E-commerce, Second is analyzing about various threats and vulnerability when is user authentication in Electronic shopping mall. Third is to propose countermeasures of that.

  • PDF

The Main Character and Evaluation of China's New Electronic Signature Legislation (중국 전자서명법의 주요내용 및 평가와 전망)

  • Han, Sang-Hyun
    • The Journal of Information Technology
    • /
    • v.9 no.3
    • /
    • pp.1-14
    • /
    • 2006
  • China has recently (28 August 2004) adopted a new act legalizing the electronic signature. This new act provides electronic signatures with the same legal status as handwritten signatures, and states that on-line certification providers will have to be created in order to ensure the security of on-line operations made using said signatures. This new act is intended to increase Chinese electronic business, and thus to raise the revenue China can expect from said business. And the law grants electronic signatures the same legal effect as handwritten signatures and seals in business transactions, and sets up the market access system for online certification providers to ensure the security of e-commerce. As Internet trade requires a reliable third party to identify the signers, the credibility of online certifying organizations is significant for the transaction security. So, considering the weakness of China's social credibility system, the law regulates that the online signatures certification providers should be approved and administered by governments.

  • PDF