Methodologies and Techniques for Network Transmission with Security and Corrective Control
Sharyu S. Kankapure, , Antara Bhattacharya, Prof. S.J.Karale
Remedial checks operation techniques can be used to raise the flexibility, to maximize the integration of new generators and to reduce the overall cost. As far as the uncertainties considered, the transmission network should be flexible and economically vigorous. The efficient levels of investment in network reinforcement can be determined by the growth in application of corrective actions to modify the network usage will require a probabilistic treatment of network. A new algorithm is proposed within the developed benders decomposition based investment model which can identify outages and filter out those outages which do not contribute to finding the optimum operating solution. A novel filtering technique is use for efficient elimination of redundant outages , presented and successfully tested. The same technique is used for selecting relevant contingencies.. In numerical examples we compare efficiency of network reinforcement propositions under both deterministic and probabilistic frameworks, while optimizing available preventive and corrective control actions, and in particular focusing on the application of generation reserve in combination with special protection schemes (SPS) for network congestion management purposes. We spotlight the deficiency of the deterministic approach with respect to its inherent inability to maximize correctly the portfolio of pre-fault post-fault actions since the impact of right actions (in the form of SPS, demand response) and occurrence of "non-credible" events require explicit consideration of the feasibility of various outages
 Rodrigo Moreno, Danny Pudjianto, , and Goran Strbac, “Transmission Network Investment With Probabilistic Security and Corrective Control” IEEE Transaction on Power System, . 27, no. 2, pp. 0885-8950, 2013.
 J. M. Morales, P. Pinson, and H. Madsen, “A transmission-costbased model to estimate the amount of market-integrable wind resources,”IEEE Transaction Power System, vol. 27, no. 2, pp. 1060–1069, May 2012.
 H. Zhang, V. Vittal, G. T. Heydt, and J. Quintero, “A mixedinteger linear programming approach for multi-stage securityconstrained transmission expansion planning,” IEEE Transaction Power System, vol. 27, no. 2, pp. 1125–1133, May 2012.
 R. Moreno, D. Pudjianto, and G. Strbac, “Integrated reliability and cost-benefit-based standards for transmission network operation,” IEEE Transaction, Power System, vol. 226, no. 1, pp. 75–87, 2012.
 A. Khodaei, M. Shahidehpour, and S. Kamalinia, “Transmission switching in expansion planning,” IEEE Transaction, Power System, vol. 25, no. 3, pp. 1722–1733, Aug. 2010.
 P. Jirutitijaroen and C. Singh, “Reliability constrained multiarea adequacy planning using stochastic programming with sample-average approximations,” IEEE Transaction, Power System, vol. 23, no. 2, pp. 504–513, May 2008.
 Capitanescu, M. Glavic, D. Ernst, and L. Wehenkel, “Contingency filtering techniques for preventive securityconstrained optimal power flow,” IEEE Transaction, Power System, vol. 22, no. 4, pp. 1690–1697, Nov. 2007.
 F. Xiao and J.D.McCalley, “Risk-based security and economy tradeoff analysis for real-time operation,” IEEE Trans. Power Syst., vol. 22, no. 4, pp. 2287–2288, Nov. 2007.
 J. Choi, T. Tran, A. A. El-Keib, R. Thomas, H. Oh, and R. Billinton, “A method for transmission system expansion planning considering probabilistic reliability criteria,” IEEE Trans. Power Syst., vol. 20, no. 3, pp. 1606–1615, Aug. 2005.
 S. Binato, M. V. F. Pereira, and S. Granville, “A new Benders decomposition approach to solve power transmission network design problems, “IEEE Trans. Power Syst., Vol.16,no.2,pp.23 problems,” IEEE Trans. Power Syst., vol. 16, no. 2, pp.235- 240,,May 2005.
[Sharyu S. Kankapure, , Antara Bhattacharya, Prof. S.J.Karale (2014), Methodologies and Techniques for Network Transmission with Security and Corrective Control, International Journal of Innovative Research in Computer Science & Technology (IJIRCST), Vol-2, Issue-2, Page No-95-97], (ISSN 2347 - 5552). www.ijircst.org
Sharyu S. Kankapure,
Department of CSE, G.H.R.I.E.T.W., Rashtrasant Tukadoji Maharaj Nagpur University, Nagpur, StateMaharashtra, India 9769671307, ( Kankapure .firstname.lastname@example.org).