P. Miksa, S. Mijailović, Z. Vujasinovic, J. Kabouris, C. Vournas
{"title":"评估第二UCTE区域的转移能力","authors":"P. Miksa, S. Mijailović, Z. Vujasinovic, J. Kabouris, C. Vournas","doi":"10.1109/MELCON.2004.1348093","DOIUrl":null,"url":null,"abstract":"This paper describes some aspects concerning the assessment of the secure transfer capability in the second synchronous UCTE zone. It presents the methodologies used to assess static security and reports on the results of studies carried out by EKC, HTSO and NTUA in order to calculate the transfer capabilities in the area and to detect any weak corridors under extreme network conditions. Possible ways of administrating the power transfers in the area are discussed as well.","PeriodicalId":164818,"journal":{"name":"Proceedings of the 12th IEEE Mediterranean Electrotechnical Conference (IEEE Cat. No.04CH37521)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Evaluation of transfer capabilities in the 2nd UCTE zone\",\"authors\":\"P. Miksa, S. Mijailović, Z. Vujasinovic, J. Kabouris, C. Vournas\",\"doi\":\"10.1109/MELCON.2004.1348093\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper describes some aspects concerning the assessment of the secure transfer capability in the second synchronous UCTE zone. It presents the methodologies used to assess static security and reports on the results of studies carried out by EKC, HTSO and NTUA in order to calculate the transfer capabilities in the area and to detect any weak corridors under extreme network conditions. Possible ways of administrating the power transfers in the area are discussed as well.\",\"PeriodicalId\":164818,\"journal\":{\"name\":\"Proceedings of the 12th IEEE Mediterranean Electrotechnical Conference (IEEE Cat. No.04CH37521)\",\"volume\":\"56 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2004-05-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 12th IEEE Mediterranean Electrotechnical Conference (IEEE Cat. No.04CH37521)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MELCON.2004.1348093\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 12th IEEE Mediterranean Electrotechnical Conference (IEEE Cat. No.04CH37521)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MELCON.2004.1348093","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Evaluation of transfer capabilities in the 2nd UCTE zone
This paper describes some aspects concerning the assessment of the secure transfer capability in the second synchronous UCTE zone. It presents the methodologies used to assess static security and reports on the results of studies carried out by EKC, HTSO and NTUA in order to calculate the transfer capabilities in the area and to detect any weak corridors under extreme network conditions. Possible ways of administrating the power transfers in the area are discussed as well.