{"title":"嵌入式代的安全标准和贡献","authors":"R. Allan, G. Strbac, M. Kay","doi":"10.1109/DRPT.2000.855738","DOIUrl":null,"url":null,"abstract":"This paper reviews the apparent strengths and weaknesses of existing security standards in respect of the assumed contribution that embedded generation can make to the security of power systems and the loads attached to it. It first outlines the background and weaknesses of these standards together with the need for alternative approaches that can be used to measure the contribution of embedded generation to security. Feasibility studies of two such alternative approaches indicate a new way forward in creating appropriate security standards in networks containing all forms of embedded generation. The need for these are very important since the use of embedded generation (including renewables and other forms) is expected to increase dramatically in the future with a contribution of up to about 15% of total capacity being forecasted.","PeriodicalId":127287,"journal":{"name":"DRPT2000. International Conference on Electric Utility Deregulation and Restructuring and Power Technologies. Proceedings (Cat. No.00EX382)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2000-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Security standards and contribution made by embedded generation\",\"authors\":\"R. Allan, G. Strbac, M. Kay\",\"doi\":\"10.1109/DRPT.2000.855738\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper reviews the apparent strengths and weaknesses of existing security standards in respect of the assumed contribution that embedded generation can make to the security of power systems and the loads attached to it. It first outlines the background and weaknesses of these standards together with the need for alternative approaches that can be used to measure the contribution of embedded generation to security. Feasibility studies of two such alternative approaches indicate a new way forward in creating appropriate security standards in networks containing all forms of embedded generation. The need for these are very important since the use of embedded generation (including renewables and other forms) is expected to increase dramatically in the future with a contribution of up to about 15% of total capacity being forecasted.\",\"PeriodicalId\":127287,\"journal\":{\"name\":\"DRPT2000. International Conference on Electric Utility Deregulation and Restructuring and Power Technologies. Proceedings (Cat. No.00EX382)\",\"volume\":\"82 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2000-04-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"DRPT2000. International Conference on Electric Utility Deregulation and Restructuring and Power Technologies. Proceedings (Cat. No.00EX382)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/DRPT.2000.855738\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"DRPT2000. International Conference on Electric Utility Deregulation and Restructuring and Power Technologies. Proceedings (Cat. No.00EX382)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DRPT.2000.855738","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security standards and contribution made by embedded generation
This paper reviews the apparent strengths and weaknesses of existing security standards in respect of the assumed contribution that embedded generation can make to the security of power systems and the loads attached to it. It first outlines the background and weaknesses of these standards together with the need for alternative approaches that can be used to measure the contribution of embedded generation to security. Feasibility studies of two such alternative approaches indicate a new way forward in creating appropriate security standards in networks containing all forms of embedded generation. The need for these are very important since the use of embedded generation (including renewables and other forms) is expected to increase dramatically in the future with a contribution of up to about 15% of total capacity being forecasted.