{"title":"A Power System Operator Emulator--the Security Assessment Task","authors":"R. Shultz, K. E. Mankouski, R.A. Smith","doi":"10.1109/TPAS.1985.318872","DOIUrl":null,"url":null,"abstract":"Most computer programs available to the engineer and operator are very strong computational tools. The most valuable and effective tool in the control room, however, is an experienced operator. This paper presents a method by which the deductive and inductive decisions which an operator makes in assessing system security are emulated on a computer. This emulator learns about the system every time a contingency analysis or load flow is performed, and makes a security assessment every time a state estimator is run. This type of program would make the equivalent of an experienced operator available to the actual operator at any time. This would be useful to inexperienced operators or when the system was in a rarely seen configuration.","PeriodicalId":227345,"journal":{"name":"IEEE Transactions on Power Apparatus and Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1985-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Power Apparatus and Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TPAS.1985.318872","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
Most computer programs available to the engineer and operator are very strong computational tools. The most valuable and effective tool in the control room, however, is an experienced operator. This paper presents a method by which the deductive and inductive decisions which an operator makes in assessing system security are emulated on a computer. This emulator learns about the system every time a contingency analysis or load flow is performed, and makes a security assessment every time a state estimator is run. This type of program would make the equivalent of an experienced operator available to the actual operator at any time. This would be useful to inexperienced operators or when the system was in a rarely seen configuration.