Academic literature on the topic 'Power system vulnerability'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Power system vulnerability.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Power system vulnerability"

1

Wang, Bo, Da Hai You, and Xiang Gen Yin. "Research on Vulnerability Assessment System of Complicated Power System." Advanced Materials Research 204-210 (February 2011): 622–26. http://dx.doi.org/10.4028/www.scientific.net/amr.204-210.622.

Full text
Abstract:
The factors which lead to large-area power outages are more than ever, when the complexity of the expansion power system is increasing. Therefore, it is important to assess the vulnerability of the complicated power system. This paper first proposes an objective, practical and adaptive vulnerability assessment system of complicated power system by use of Analytic Hierarchy Process, which based on multi-factors analysis of large-area outages. This system can find out the vulnerability point of the power system,and take advantages of the government, who can over-all plan, correspond and organize the social resource to reduce the vulnerability of power system and prevent large-area power outages, and the power enterprises who can maintaining the stability of power system by technology. Finally, the paper gives an assessment example of provincial power system.
APA, Harvard, Vancouver, ISO, and other styles
2

Teng, Jen-Hao, Ivan Curtis Martinez, and Chia-Yen Chen. "Utilising energy storage systems to mitigate power system vulnerability." IET Generation, Transmission & Distribution 7, no. 7 (July 1, 2013): 790–98. http://dx.doi.org/10.1049/iet-gtd.2012.0694.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Doorman, G. L., K. Uhlen, G. H. Kjolle, and E. S. Huse. "Vulnerability Analysis of the Nordic Power System." IEEE Transactions on Power Systems 21, no. 1 (February 2006): 402–10. http://dx.doi.org/10.1109/tpwrs.2005.857849.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Luo, Fucai, Jingyi Xie, Jingdong Guo, Wenliang Liu, Jindong He, and Hang Zhang. "Vulnerability Detection System for Power Information Based on Network Traffic Identification Technology." Journal of Physics: Conference Series 2401, no. 1 (December 1, 2022): 012042. http://dx.doi.org/10.1088/1742-6596/2401/1/012042.

Full text
Abstract:
Abstract A power information vulnerability detection system has the problem of a low network survival rate. Therefore, a power information vulnerability detection system based on network traffic identification technology is designed. In the hardware part, the memory is configured as a synchronous interface and 4 DRAMs, and the level input and output power of the chip are kept in a state compatible with LVTTL levels; in the software part, the power information network indicators are obtained, the importance of network elements is reflected through a mesoscope, the failure characteristics of components are extracted using network traffic identification technology, a critical area is delineated, and the port protocols and association libraries of the passages are matched to optimize the system vulnerability detection function. Through analysis of the simulation results, it can be obtained that the network survival rate of the power information vulnerability detection system in this paper is 17.657% and 17.931% higher than that obtained by the other two power information vulnerability detection systems, respectively, indicating that the designed power information vulnerability detection system is more effective when fully integrated with network traffic identification techniques.
APA, Harvard, Vancouver, ISO, and other styles
5

Sun, Meng, Qi Wang, Jue He, Huailin Huang, Yu Huang, Xiaojie Shen, Yaohui Xiao, and Suchun Fan. "Research on automatic scanning method of network vulnerabilities in power system." Journal of Physics: Conference Series 2290, no. 1 (June 1, 2022): 012036. http://dx.doi.org/10.1088/1742-6596/2290/1/012036.

Full text
Abstract:
Abstract Power system network is an important guarantee for the smooth operation of power enterprises. Considering the current automatic network vulnerability scanning method of power system, the detection rate of network vulnerability scanning is low due to its poor scheduling ability. Therefore, this paper designs a new automatic scanning method for network vulnerabilities in power system. According to the infrastructure of power system network vulnerability scanner, the power system web page interaction behavior recognition model is constructed to complete the power system web page interaction behavior recognition. On this basis, the power system network scanning scheduling algorithm is designed. Combined with genetic algorithm, the variation process of power system network vulnerabilities is determined, the power system network security situation is determined, the power system network scanning scheduling and vulnerability mining are realized, and the design of power system network leakage automatic scanning method is completed. The experimental link is constructed to verify this method. The verification shows that this method can effectively improve the detection rate of network vulnerability scanning and the efficiency of vulnerability scanning to a certain extent.
APA, Harvard, Vancouver, ISO, and other styles
6

Padhee, Malhar, Reetam Sen Biswas, Anamitra Pal, Kaustav Basu, and Arunabha Sen. "Identifying Unique Power System Signatures for Determining Vulnerability of Critical Power System Assets." ACM SIGMETRICS Performance Evaluation Review 47, no. 4 (April 30, 2020): 8–11. http://dx.doi.org/10.1145/3397776.3397779.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Samanta, Shouvik Kumar, and Chandan Kumar Chanda. "Smart power grid vulnerability analysis in composite system through power grid modelling." International Journal of Applied Power Engineering (IJAPE) 10, no. 1 (March 1, 2021): 11. http://dx.doi.org/10.11591/ijape.v10.i1.pp11-20.

Full text
Abstract:
<p>Though the number of traditional literature reviews most of the researchers in this area have concluded that modern intelligent electric network a referred standard new model which is considering for proposed power flow model analysis of Smart power grid vulnerability through composite network. By the theorem of Max-Flow and complex power network theorems that are represented the advance vulnerability indices for pick out endangered lines of the smart grid network. In other hand, the power flow model and existing models simulation are examined on the IEEE 39-bus test model. The results of the simulation introduced that the proposed concept of grid model, estimation and the index application are more adequate in smart grid weakness power and efficiency analysis. In this paper briefly summarize the methods and probabilities of a vulnerability index which was explained in specific in references. Therefore, it is imperative to further implement new models and new tools so as to reach the novel state and moderate the huge or massive potential shutoff.</p>
APA, Harvard, Vancouver, ISO, and other styles
8

Haidar, Ahmed M. A., Azah Mohamed ., and Aini Hussain . "New Method for Vulnerability Assessment of Power System." Journal of Applied Sciences 7, no. 6 (March 1, 2007): 841–47. http://dx.doi.org/10.3923/jas.2007.841.847.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lopez-Lezama, Jesus M., Juan J. Cortina, and Nicolas Munoz Galeano. "Assessment of power system vulnerability using metaheuristic techniques." Contemporary Engineering Sciences 11, no. 24 (2018): 1165–84. http://dx.doi.org/10.12988/ces.2018.8399.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kubacki, Krzysztof, Dariusz Siemieniako, and Linda Brennan. "Building positive resilience through vulnerability analysis." Journal of Social Marketing 10, no. 4 (June 27, 2020): 471–88. http://dx.doi.org/10.1108/jsocm-09-2019-0142.

Full text
Abstract:
Purpose The purpose of this paper is to propose an integrative framework for vulnerability analysis in social marketing systems by identifying, investigating and problematising the relationships among several interrelated concepts, including power, power asymmetry, vulnerability and resilience, in the context of social marketing systems. Design/methodology/approach This is a conceptual paper synthesising literature from social marketing, sociology and marketing management. Findings The main outcome of the discussion is a proposed integrative framework for vulnerability analysis. The framework identifies the main groups of stakeholders within a social marketing system and the bases for their power and consequential power asymmetries. It focusses on the types and states of vulnerability to identify the distinct characteristics of the social conditions of vulnerability for micro-level system actors. It leads to building positive resilience through efforts aiming to change the power asymmetries at the downstream, midstream and upstream levels. Originality/value The integrative framework for vulnerability analysis answers the call from Wood (2019) for the development of practical approaches to better understand resilience-building approaches in social marketing programmes. The framework provides reconciliation for diverse dimensions of vulnerability as a natural characteristic of all social marketing systems and as a universal, constant and inherent social condition.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Power system vulnerability"

1

Yu, Xingbin. "Analyses of power system vulnerability and total transfer capability." Diss., Texas A&M University, 2005. http://hdl.handle.net/1969.1/3294.

Full text
Abstract:
Modern power systems are now stepping into the post-restructuring era, in which utility industries as well as ISOs (Independent System Operators) are involved. Attention needs to be paid to the reliability study of power systems by both the utility companies and the ISOs. An uninterrupted and high quality power is required for the sustainable development of a technological society. Power system blackouts generally result from cascading outages. Protection system hidden failures remain dormant when everything is normal and are exposed as a result of other system disturbances. This dissertation provides new methods for power system vulnerability analysis including protection failures. Both adequacy and security aspects are included. The power system vulnerability analysis covers the following issues: 1) Protection system failure analysis and modeling based on protection failure features; 2) New methodology for reliability evaluation to incorporate protection system failure modes; and, 3) Application of variance reduction techniques and evaluation. A new model of current-carrying component paired with its associated protection system has been proposed. The model differentiates two protection failure modes, and it is the foundation of the proposed research. Detailed stochastic features of system contingencies and corresponding responses are considered. Both adequacy and security reliability indices are computed. Moreover, a new reliability index ISV (Integrated System Vulnerability) is introduced to represent the integrated reliability performance with consideration of protection system failures. According to these indices, we can locate the weakest point or link in a power system. The whole analysis procedure is based on a non-sequential Monte Carlo simulation method. In reliability analysis, especially with Monte Carlo simulation, computation time is a function not only of a large number of simulations, but also time-consuming system state evaluation, such as OPF (Optimal Power Flow) and stability assessment. Theoretical and practical analysis is conducted for the application of variance reduction techniques. The dissertation also proposes a comprehensive approach for a TTC (Total Transfer Capability) calculation with consideration of thermal, voltage and transient stability limits. Both steady state and dynamic security assessments are included in the process of obtaining total transfer capability. Particularly, the effect of FACTS (Flexible AC Transmission Systems) devices on TTC is examined. FACTS devices have been shown to have both positive and negative effects on system stability depending on their location. Furthermore, this dissertation proposes a probabilistic method which gives a new framework for analyzing total transfer capability with actual operational conditions.
APA, Harvard, Vancouver, ISO, and other styles
2

Liu, Xiaopeng. "Power system dynamic vulnerability under extreme transmission line contingencies." Thesis, McGill University, 2008. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=18782.

Full text
Abstract:
Power systems around the world may be under the threat of extreme conditions such as natural disasters and terrorist attacks. To find the most severe condition in the static sense, systematic methods based on optimization have been developed. However, until now, there is no systematic way to find the most severe contingency in the dynamic sense. The thesis proposes such a systematic approach. The method adopts a two-step “screening-and-ranking” procedure similar to the one employed in conventional dynamic security analysis. In the “screening” step, transmission lines are screened using two criteria. The first criterion is based on critical eigen-sensitivity with respect to single line outages. A transmission line is selected only if one of the critical eigenvalues has a large sensitivity to the outage of this line. The second criterion is based on a topology analysis searching for cut-sets in the system. A transmission line is selected if it is a member of a system cut-set with high power imbalance ratio. In the “ranking” step, time-domain analysis is performed on all the combinations of the lines screened by the first step, to determine their real dynamic impact on the system. Relays for generators, loads, and transmission lines are set-up so as to capture possible cascading events after the initial disturbance. Test results on the One Area IEEE96 system show that the set of critical lines selected by the proposed screening scheme is dependent on the system operating conditions. The screening step can reduce the contingency number significantly, which will alleviate the computation burden in the ranking step by a large margin. The most severe contingencies in term of load shedding were in most cases identified by the proposed method. The merit of the method is its simplicity, which makes it applicable to the analysis of N-2 and N-3 transmission line contingencies. Limitations of the method, such as the possibility of missing the more disruptive c
Les réseaux électriques peuvent être sous la menace de conditions extrêmes, tels que désastres naturels et attentats terroristes. Pour déterminer la condition la plus sévère en état stationnaire, des méthodes systématiques utilisant des techniques d'optimisations ont été développées. Jusqu'à présent il n'existe cependant pas de méthodes systématiques pour déterminer quel défaut est le plus sévère en régime dynamique. Cette thèse propose une telle méthode. Elle utilise une approche en deux étapes, « triage et classement », similaire à celle utilisée dans une analyse de sécurité dynamique conventionnelle. Dans l'étape de triage, les lignes de transport d'électricité sont sélectionnées selon deux critères. Le premier est basé sur la sensibilité critique des valeurs propres par rapport à la perte d'une seule ligne. Une ligne de transport est sélectionnée seulement si une des valeurs propres critiques a une sensibilité élevée à la perte de cette ligne. Le second critère est basé sur une analyse topologique et recherche des ensembles de coupure dans le système. Une ligne de transport est sélectionnée si elle appartient à un ensemble de coupure avec un déséquilibre de puissance élevé. Dans l'étape de classement, une analyse temporelle est effectuée sur toutes les combinaisons possibles des lignes de transport sélectionnées dans la première étape, afin de déterminer leurs véritables impacts dynamiques sur le réseau électrique. Les relais de protection sont représentés. Les résultats des simulations sur le système test IEEE96 démontrent que l'étape de triage peut réduire le nombre de défauts de manière significative, ce qui peut alléger considérablement le fardeau de calcul dans l'étape de classement. Les défauts les plus sévères en termes de délestage étaient identifiés dans la plupart des cas par la méthode proposée. L'intérêt de la méthode réside dans sa simplicité,$
APA, Harvard, Vancouver, ISO, and other styles
3

Holmgren, Åke J. "Quantitative vulnerability analysis of electric power networks." Doctoral thesis, KTH, Transporter och samhällsekonomi, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-3969.

Full text
Abstract:
Disturbances in the supply of electric power can have serious implications for everyday life as well as for national (homeland) security. A power outage can be initiated by natural disasters, adverse weather, technical failures, human errors, sabotage, terrorism, and acts of war. The vulnerability of a system is described as a sensitivity to threats and hazards, and is measured by P (Q(t) > q), i.e. the probability of at least one disturbance with negative societal consequences Q larger than some critical value q, during a given period of time (0,t]. The aim of the thesis is to present methods for quantitative vulnerability analysis of electric power delivery networks to enable effective strategies for prevention, mitigation, response, and recovery to be developed. Paper I provides a framework for vulnerability assessment of infrastructure systems. The paper discusses concepts and perspectives for developing a methodology for vulnerability analysis, and gives examples related to power systems. Paper II analyzes the vulnerability of power delivery systems by means of statistical analysis of Swedish disturbance data. It is demonstrated that the size of large disturbances follows a power law, and that the occurrence of disturbances can be modeled as a Poisson process. Paper III models electric power delivery systems as graphs. Statistical measures for characterizing the structure of two empirical transmission systems are calculated, and a structural vulnerability analysis is performed, i.e. a study of the connectivity of the graph when vertices and edges are disabled. Paper IV discusses the origin of power laws in complex systems in terms of their structure and the dynamics of disturbance propagation. A branching process is used to model the structure of a power distribution system, and it is shown that the disturbance size in this analytical network model follows a power law. Paper V shows how the interaction between an antagonist and the defender of a power system can be modeled as a game. A numerical example is presented, and it is studied if there exists a dominant defense strategy, and if there is an optimal allocation of resources between protection of components, and recovery.
QC 20100831
APA, Harvard, Vancouver, ISO, and other styles
4

Buriticá, Jessica Ana Maria. "Seismic vulnerability assessment of power transmission networks : a system thinking approach." Thesis, University of British Columbia, 2013. http://hdl.handle.net/2429/44169.

Full text
Abstract:
Electrical power transmission systems are essential to the economy and well-being of modern societies. The systems consist of power generating facilities, substations, and supervisory control and data acquisition, which are inter-connected through transmission lines arranged within a high dimensional network (i.e., large amount of edges and nodes). Efficiency and service quality are influenced by reliability of this network. Therefore, identification of critical components and vulnerability analysis become paramount, in particular, in regions where seismic activity is significant. In this research a novel methodology for seismic vulnerability assessment of power transmission systems is developed. The analysis is carried out from the perspective of both the system’s form (i.e., topological-electrical importance of elements) and system’s strength (i.e., probability of failure). The form combines the electrical properties of the network (e.g., electrical distance, power flow) with the systems approach via hierarchical network decomposition. On the other hand, the strength focuses on evaluating the probability of failure by means of the physical consequences of multiple earthquakes scenarios. Therefore, the vulnerability measure presents a trade–off between strength and form. Sensitivity analysis is carried out, where the influence of each perspective (i.e., form and strength) in the vulnerability measure is exhibited. Finally, different techniques for identification of critical components are compared with the proposed methodology. The results showed that the proposed approach exhibit features that provide a better understanding of seismic vulnerability of power systems than traditional approaches.
APA, Harvard, Vancouver, ISO, and other styles
5

Wardman, John Blackburn. "Vulnerability of Electric Power Systems to Volcanic Ashfall Hazards." Thesis, University of Canterbury. Geological Sciences, 2013. http://hdl.handle.net/10092/8014.

Full text
Abstract:
Volcanic eruptions are powerful natural events which impact strongly on society. As human populations grow and expand into volcanically active areas, their exposure and vulnerability to volcanic hazards is also increasing. Of all volcanic hazards, ashfall is the most likely to impact lifelines because of the large areas affected. The widespread dispersal of ash can cause large-scale disruption of vital infrastructure services, aviation, and primary production. Electric power supply is arguably the most crucial of modern infrastructure systems, especially considering the dependence of other sectors on electricity to maintain functionality. During and immediately after ashfalls, electric power systems are vulnerable to a number of impacts, but disruption from volcanic ash-induced insulator flashover (unintended, disruptive electrical discharge) is most common. This thesis investigates the vulnerability of electric power systems to volcanic ashfall by examining impacts to the different sectors of the modern power system and exploring appropriate mitigation strategies. Analogue laboratory trials using a pseudo (synthetic) ash are undertaken to verify the environmental, volcanological and electrical parameters that most affect electrical conductivity and therefore the flashover mechanism in these experiments. While dry ash is highly resistant to the flow of electric current, increasing moisture content, soluble salt load, and compaction (bulk density) will reduce this resistance and, in turn, increase the potential for flashover. Volcanic ash is an acute form of airborne pollution for areas downwind of active volcanoes. Results from laboratory experiments in this thesis suggest that insulator pollution (volcanic ash) performance (dielectric strength) is primarily dictated by (1) the conductivity of the ash, and (2) insulator material, profile (shape) and dimensioning. Composite polymer insulators tested herein effectively minimise sinusoidal leakage current and partial discharge activity and also exhibit higher pollution performance when compared to ceramic equivalents. Irrespective of insulator material, however, the likelihood of flashover increases significantly once the bottom surface of suspension insulator watersheds become contaminated in wet ash. The thesis investigates the vulnerability (hazard intensity/damage ratio) of electric power systems to volcanic ashfall hazards. Identification, analysis, and reduction of the risk of ashfall impacts to power networks is explored as a part of holistic volcanic risk assessment. The findings of the thesis contribute to the readiness, response and recovery protocols for large electric power systems in volcanic disasters; which directly affects the functional operation and economics of industrial and commercial society.
APA, Harvard, Vancouver, ISO, and other styles
6

Setréus, Johan. "Identifying critical components for system reliability in power transmission systems." Doctoral thesis, KTH, Elektroteknisk teori och konstruktion, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-40389.

Full text
Abstract:
Large interruptions of power supply in the transmission system have considerable impact on modern society. The goal for the transmission system operator (TSO) is to prevent and mitigate such events with optimal decisions in design, planning, operation and maintenance. Identifying critical power components for system reliability provides one important input to this decision-making. This thesis develops quantitative component reliability importance indices applicable for identifying critical components in real transmission systems. Probabilistic models with component failure statistics are combined with detailed power system models evaluated with the AC power flow technique. In the presented method each system component is assigned three importance indices based on outage events expected probability and consequence to (i) reduced system security margin, (ii) interrupted load supply and (iii) disconnected generation units. By ranking components by each of the three interests, a more complete view of the risks to system reliability can be assessed than if, as traditionally, only (ii) is modelled. The impact on security margin is studied in well established critical transfer sections (CTS) supervised by the TSO. TSOs set the CTSs limits [MW] based on deterministic security criteria, with regard to thermal, voltage level, and system stability limits, and the CTSs' condition at post-contingency state is in the method used as an indicator of the system security margin. The methodology is extended with three indices modified to quantify the component importance for common-cause events initiated by acts of sabotage. The developed methods are applied on a significant part of the Great Britain transmission system, modelling 7000 components and 107 substation layouts. The study includes several load demand scenarios, 200 million initiating outage events and non-functioning protection equipment. The resulting component ranking provides an important input to the TSO's decision-making, and could be implemented as a complement to the existing deterministic N-1 criterion. With the methods applied a TSO can perform further and more detailed assessments on a few critical components in order to enhance system reliability for equipment failures and strengthen the system vulnerability against sabotage.
QC 20110920
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Zhuoyang. "Application of Complex Network Theory in Power System Security Assessment." Thesis, The University of Sydney, 2016. http://hdl.handle.net/2123/17367.

Full text
Abstract:
The power demand increases every year around the world with the growth of population and the expansion of cities. Meanwhile, the structure of a power system becomes increasing complex. Moreover, increasing renewable energy sources (RES) has linked to the power network at different voltage levels. These new features are expected to have a negative impact on the security of the power system. In recent years, complex network (CN) theory has been studied intensively in solving practical problems of large-scale complex systems. A new direction for power system security assessment has been provided with the developments in the CN field. In this thesis, we carry out investigations on models and approaches that aim to make the security assessment from an overview system level with CN theory. Initially, we study the impact of the renewable energy (RE) penetration level on the vulnerability in the future grid (FG). Data shows that the capacity of RE has been increasing over by 10% annually all over the world. To demonstrate the impact of unpredictable fluctuating characteristics of RES on the power system stability, a CN model given renewable energy integration for the vulnerability analysis is introduced. The numerical simulations are investigated based on the simplified 14-generator model of the South Eastern Australia power system. Based on the simulation results, the impact of different penetrations of RES and demand side management on the Australian FG is discussed. Secondly, the distributed optimization performance of the communication network topology in the photovoltaic (PV) and energy storage (ES) combined system is studied with CN theory. A Distributed Alternating Direction Method of Multipliers (D-ADMM) is proposed to accelerate the convergence speed in a large dimensional communication system. It is shown that the dynamic performance of this approach is highly-sensitive to the communication network topology. We study the variation of convergence speed under different communication network topology. Based on this research, guidance on how to design a relatively more optimal communication network is given as well. Then, we focus on a new model of vulnerability analysis. The existing CN models usually neglect the detailed electrical characteristics of a power grid. In order to address the issue, an innovative model which considers power flow (PF), one of the most important characteristics in a power system, is proposed for the analysis of power grid vulnerability. Moreover, based on the CN theory and the Max-Flow theorem, a new vulnerability index is presented to identify the vulnerable lines in a power system. The comparative simulations between the power flow model and existing models are investigated on the IEEE 118-bus system. Based on the PF model, we improve a power system cascading risk assessment model. In this research the risk is defined by the consequence and probabilities of the failures in the system, which is affected by both power factors and the network structure. Furthermore, a cascading event simulation module is designed to identify the cascading chain in the system during a failure. This innovation can form a better module for the cascading risk assessment of a power system. Finally, we argue that the current cyber-physical network model have their limitations and drawbacks. The existing “point-wise” failure model is not appropriate to present the interdependency of power grid and communication network. The interactions between those two interdependent networks are much more complicated than they were described in some the prior literatures. Therefore, we propose a new interdependency model which is based on earlier research in this thesis. The simulation results confirm the effectiveness of the new model in explaining the cascading mechanism in this kind of networks.
APA, Harvard, Vancouver, ISO, and other styles
8

Al-Jaberi, Mubarak. "The vulnerability of laser warning systems against guided weapons based on low power lasers." Thesis, Cranfield University, 2006. http://hdl.handle.net/1826/1047.

Full text
Abstract:
Laser assisted weapons, such as laser guided bombs, laser guided missiles and laser beam-riding missiles pose a significant threat to military assets in the modern battlefield. Laser beam-riding missiles are particularly hard to detect because they use low power lasers. Most laser warning systems produced so far can not detect laser beam-riding missiles because of their weak emissions which have signals less than 1% of laser range finder power . They are even harder to defeat because current counter-measures are not designed to work against this threat. The aim of this project is to examine the vulnerability of laser warning systems against guided weapons, to build an evaluation tool for laser warning sensors (LWS) and seekers, and try to find suitable counter-measures for laser beam-riding missiles that use low power lasers in their guidance systems. The project comes about because of the unexpected results obtained from extensive field trials carried out on various LWRs in the United Arab Emirates desert, where severe weather conditions may be experienced. The objective was to help find a solution for these systems to do their job in protecting the tanks and armoured vehicles crews from such a threat. In order to approach the subject, a computer model has been developed to enable the assessment of all phases of a laser warning receiver and missile seeker. MATLAB & SIMULINK software have been used to build the model. During this process experimentation and field trials have been carried out to verify the reliability of the model. This project will enable both the evaluation and design of any generic laser warning receiver or missile seeker and specific systems if various parameters are known. Moreover, this model will be used as a guide to the development of reliable countermeasures for laser beam-riding missiles.
APA, Harvard, Vancouver, ISO, and other styles
9

Kim, Mingoo. "Application of computational intelligence to power system vulnerability assessment and adaptive protection using high-speed communication /." Thesis, Connect to this title online; UW restricted, 2002. http://hdl.handle.net/1773/5855.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Elizondo, David C. "A Methodology to Assess and Rank the Effects of Hidden Failures in Protection Schemes based on Regions of Vulnerability and Index of Severity." Diss., Virginia Tech, 2003. http://hdl.handle.net/10919/26902.

Full text
Abstract:
Wide-area disturbances are power outages occurring over large geographical regions that dramatically affect the power system reliability, causing interruptions of the electric supply to residential, commercial, and industrial users. Historically, wide-area disturbances have greatly affected societies. Virginia Tech directed a research project related to the causes of the major disturbances in electric power systems. Research results showed that the role of the power systemâ s protection schemes in the wide-area disturbances is critical. Incorrect operations of power systemâ s protection schemes have contributed to a spread of the disturbances. This research defined hidden failures of protection schemes and showed that these kinds of failures have contributed in the degradation of 70-80 percent of the wide-area disturbances. During a wide-area disturbance analysis, it was found that hidden failures in protection schemes caused the disconnection of power system elements in an incorrect and undesirable manner contributing to the disturbance degradation. This dissertation presents a methodology to assess and rank the effects of unwanted disconnections caused by hidden failures based on Regions of Vulnerability and index of severity in the protection schemes. The developed methodology for the evaluation of the Region of Vulnerability found that the indicator that most accurately reflects the relationship of the Region of Vulnerability with the single line diagram is kilometers. For the representation of the Region of Vulnerability in the power system, we found segments in the transmission line in which the occurrence of faults do make the relay to operate, producing the unwanted disconnection caused by hidden failure. The results in the test system show that the infeed currents restrain the Region of Vulnerability from spreading along power system elements. Finally the methodology to compute the index of severity is developed. The index of severity has the objective of ranking the protection schemes, considers the dynamics of the protection schemes, and evaluates the overall disturbance consequence under the static and dynamic perspectives.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Power system vulnerability"

1

Rueda-Torres, José Luis, and Francisco Gonzalez-Longatt. Dynamic Vulnerability Assessment and Intelligent Control for Sustainable Power Systems. Chichester, UK: John Wiley & Sons, Ltd, 2018. http://dx.doi.org/10.1002/9781119214984.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wilson, Perry F. Vulnerability of wireline and cellular telecommunications networks to high power radio frequency fields. [Washington, DC]: U.S. Dept. of Commerce, National Telecommunications and Information Administration, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wilson, Perry F. Vulnerability of wireline and cellular telecommunications networks to high power radio frequency fields. [Washington, DC]: U.S. Dept. of Commerce, National Telecommunications and Information Administration, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wilson, Perry F. Vulnerability of wireline and cellular telecommunications networks to high power radio frequency fields. [Washington, D.C.]: U.S. Dept. of Commerce, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wilson, Perry F. Vulnerability of wireline and cellular telecommunications networks to high power radio frequency fields. [Washington, DC]: U.S. Dept. of Commerce, National Telecommunications and Information Administration, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

United States. Congress. Office of Technology Assessment., ed. Physical vulnerability of electric systems to natural disasters and sabotage. Washington, D.C: Congress of the U.S., Office of Technology Assessment, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Office, General Accounting. Energy management: Vulnerability of DOE's contracting to waste, fraud, abuse, and mismanagement : report to the chairman, Subcommittee on Investigations and Oversight, Committee on Science, Space, and Technology, House of Representatives. Washington, D.C: GAO, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

United States. Congress. Senate. Committee on Governmental Affairs. Vulnerability of the nation's electric systems to multi-site terrorist attack: Hearing before the Committee on Governmental Affairs, United States Senate, One Hundred First Congress, second session, June 28, 1990. Washington: U.S. G.P.O., 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bulian, Giovanni, and Yasushi Nakano. Small-scale Fisheries in Japan. Venice: Edizioni Ca' Foscari, 2018. http://dx.doi.org/10.30687/978-88-6969-226-0.

Full text
Abstract:
This collection of essays brings together a range of critical approaches, from varying disciplinary backgrounds, to provide an in-depth overview of the past and current status of small-scale fisheries in Japan. The book attempts to map out some of the major themes relating to community-based fisheries-management systems, environmental sustainability, lottery systems for allocating fishing spots, fishing livelihoods, local knowledge, social vulnerability to environmental hazards, socioeconomic factors affecting small-scale fisheries development, history of destructive fishing practices, women’s entrepreneurship in the seafood sector, traditional leadership systems, religious festivals, and power relationship between local communities and government agencies. The aim of this book is then to provide a comprehensive and multifaceted analysis of the cultural richness of this fishing sector, which still plays a key role in the broad academic debates focused on the potential small-scale fishery trajectories within the context of global scenarios.
APA, Harvard, Vancouver, ISO, and other styles
10

Bienstock, Daniel. Electrical Transmission System Cascades and Vulnerability: An Operations Research Viewpoint. SIAM-Society for Industrial and Applied Mathematics, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Power system vulnerability"

1

Rajeswaran, N., M. Lakshmi Swarupa, Rekharani Maddula, Hassan Haes Alhelou, and Vajjala Kesava Vamsi Krishna. "A Study on Cyber-Physical System Architecture for Smart Grids and Its Cyber Vulnerability." In Power Systems Cybersecurity, 413–27. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-20360-2_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wang, Yueyuan, Bin Cao, and Xiuqi Zhang. "Vulnerability Analysis of Power System Considering Probabilistic Risk Assessment." In Lecture Notes in Electrical Engineering, 575–85. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-0553-9_60.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Liu, Qing, Hassan Bevrani, and Yasunori Mitani. "An Enhanced WAMS-based Power System Oscillation Analysis Approach." In Dynamic Vulnerability Assessment and Intelligent Control for Sustainable Power Systems, 63–94. Chichester, UK: John Wiley & Sons, Ltd, 2018. http://dx.doi.org/10.1002/9781119214984.ch4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Arroyo, José M., and Francisco J. Fernández. "A Genetic Algorithm for Power System Vulnerability Analysis under Multiple Contingencies." In Metaheuristics for Bi-level Optimization, 41–68. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-37838-6_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Qian, Kexiang, Minghui Jin, Daojuan Zhang, Fei Xiao, and Peng Zhang. "Research on Evaluation Method of Network Vulnerability in Power Monitoring System." In Advances in Intelligent Information Hiding and Multimedia Signal Processing, 113–23. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-1053-1_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Valverde, Gustavo, Petros Aristidou, and Thierry Van Cutsem. "Enhancement of Transmission System Voltage Stability through Local Control of Distribution Networks." In Dynamic Vulnerability Assessment and Intelligent Control for Sustainable Power Systems, 311–36. Chichester, UK: John Wiley & Sons, Ltd, 2018. http://dx.doi.org/10.1002/9781119214984.ch15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ye, Hongbo, Kexiang Qian, Minghui Jin, Xiao Han, and Fei Xiao. "Risk Assessment Method of Power Monitoring System Vulnerability Based on Attack Graph." In Lecture Notes in Electrical Engineering, 102–13. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-8430-2_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Verdugo, Pablo X., Jaime C. Cepeda, Aharon B. De La Torre, and Diego E. Echeverría. "Implementation of a Real Phasor Based Vulnerability Assessment and Control Scheme: The Ecuadorian WAMPAC System." In Dynamic Vulnerability Assessment and Intelligent Control for Sustainable Power Systems, 389–411. Chichester, UK: John Wiley & Sons, Ltd, 2018. http://dx.doi.org/10.1002/9781119214984.ch18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kim, SungCheol, IeckChae Euom, ChangHyun Ha, JooHyoung Lee, and BongNam Noh. "A Study on the Vulnerability Assessment for Digital I&C System in Nuclear Power Plant." In Information Security Applications, 68–80. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-17982-3_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Legwegoh, Alexander, and Liam Riley. "Hunger in an Agricultural City: Exploring Vulnerability in Dschang, Cameroon." In Transforming Urban Food Systems in Secondary Cities in Africa, 295–311. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-93072-1_14.

Full text
Abstract:
AbstractCameroon is rapidly becoming an urban society and much of the urban population growth is taking place in secondary cities. Dschang is one of these growing secondary cities. A former administrative centre and market hub for an agriculturally productive area, Dschang has expanded and diversified since the establishment of a national university in the 1990s. A household food security survey in 2017 found that two-thirds of households were severely food insecure, even amid high rates of participation in food production and livestock rearing and a robust informal food marketing system. This chapter documents the findings of the survey and outlines three important factors driving household food insecurity in Dschang: the limited power of the local government; the consequences of the political conflict in neighbouring Anglophone regions of Cameroon, and Dschang’s role as a supplier to the regional food system.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Power system vulnerability"

1

Lesieutre, Bernard C., and Sandip Roy. "Power system vulnerability metrics." In 2015 North American Power Symposium (NAPS). IEEE, 2015. http://dx.doi.org/10.1109/naps.2015.7335190.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Haidar, Ahmed M. A., Azah Mohamed, and Aini Hussain. "Vulnerability Assessment of Power System Using Various Vulnerability Indices." In 2006 4th Student Conference on Research and Development. IEEE, 2006. http://dx.doi.org/10.1109/scored.2006.4339343.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sanz, Fredy A., Juan M. Ramirez, and Rosa E. Correa. "Statistical estimation of power system vulnerability." In 2013 North American Power Symposium (NAPS). IEEE, 2013. http://dx.doi.org/10.1109/naps.2013.6666913.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jen-Hao Teng, Chia-Yen Chen, I. C. Martinez, and Chi-Fa Chen. "Power system vulnerability assessment considering Energy Storage Systems." In 2013 IEEE 10th International Conference on Power Electronics and Drive Systems (PEDS 2013). IEEE, 2013. http://dx.doi.org/10.1109/peds.2013.6527146.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hasnain, Fahim Al, Atique Mahmud, and A. H. Chowdhury. "Vulnerability analysis of Bangladesh power system network." In 2016 9th International Conference on Electrical and Computer Engineering (ICECE). IEEE, 2016. http://dx.doi.org/10.1109/icece.2016.7853939.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Doorman, G., K. Uhlen, G. Kjolle, and E. S. Huse. "Vulnerability analysis of the Nordic power system." In 2006 IEEE Power Engineering Society General Meeting. IEEE, 2006. http://dx.doi.org/10.1109/pes.2006.1708873.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chen Weihua, Jiang Quanyuan, and Cao Yijia. "Risk based vulnerability assessment for HVDC transmission system." In 2005 International Power Engineering Conference. IEEE, 2005. http://dx.doi.org/10.1109/ipec.2005.207004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lesieutre, Bernard C., Ali Pinar, and Sandip Roy. "Power System Extreme Event Detection: The Vulnerability Frontier." In 2008 41st Annual Hawaii International Conference on System Sciences. IEEE, 2008. http://dx.doi.org/10.1109/hicss.2008.350.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hillberg, E., R. Hirvonen, L. Haarla, and J. Lamponen. "Revealing Stability Limitations in Power System Vulnerability Analysis." In 8th Mediterranean Conference on Power Generation, Transmission, Distribution and Energy Conversion (MEDPOWER 2012). Institution of Engineering and Technology, 2012. http://dx.doi.org/10.1049/cp.2012.2027.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gjorgiev, Blazhe, and Giovanni Sansavini. "Cascading Failure Analysis for Power System Vulnerability Assessment." In Proceedings of the 31st European Safety and Reliability Conference. Singapore: Research Publishing Services, 2021. http://dx.doi.org/10.3850/978-981-18-2016-8_367-cd.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Power system vulnerability"

1

KUNSMAN, DAVID M., DAVID G. ROBINSON, SATISH J. RANADE, SALVADOR B. RODRIGUEZ, RUDOLPH G. JUNGST, ANGEL URBINA, and THOMAS L. PAEZ. Development of the Capabilities to Analyze the Vulnerability of Bulk Power Systems. Office of Scientific and Technical Information (OSTI), October 2001. http://dx.doi.org/10.2172/787793.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Backstrom, Robert, and David Dini. Firefighter Safety and Photovoltaic Systems Summary. UL Firefighter Safety Research Institute, November 2011. http://dx.doi.org/10.54206/102376/kylj9621.

Full text
Abstract:
Under the United States Department of Homeland Security (DHS) Assistance to Firefighter Grant Fire Prevention and Safety Research Program, Underwriters Laboratories examined fire service concerns of photovoltaic (PV) systems. These concerns include firefighter vulnerability to electrical and casualty hazards when mitigating a fire involving photovoltaic (PV) modules systems. The need for this project is significant acknowledging the increasing use of photovoltaic systems, growing at a rate of 30% annually. As a result of greater utilization, traditional firefighter tactics for suppression, ventilation and overhaul have been complicated, leaving firefighters vulnerable to potentially unrecognized exposure. Though the electrical and fire hazards associated with electrical generation and distribution systems is well known, PV systems present unique safety considerations. A very limited body of knowledge and insufficient data exists to understand the risks to the extent that the fire service has been unable to develop safety solutions and respond in a safe manner. This fire research project developed the empirical data that is needed to quantify the hazards associated with PV installations. This data provides the foundation to modify current or develop new firefighting practices to reduce firefighter death and injury. A functioning PV array was constructed at Underwriters Laboratories in Northbrook, IL to serve as a test fixture. The main test array consisted of 26 PV framed modules rated 230 W each (5980 W total rated power). Multiple experiments were conducted to investigate the efficacy of power isolation techniques and the potential hazard from contact of typical firefighter tools with live electrical PV components. Existing fire test fixtures located at the Delaware County Emergency Services Training Center were modified to construct full scale representations of roof mounted PV systems. PV arrays were mounted above Class A roofs supported by wood trusses. Two series of experiments were conducted. The first series represented a room of content fire, extending into the attic space, breaching the roof and resulting in structural collapse. Three PV technologies were subjected to this fire condition – rack mounted metal framed, glass on polymer modules, building integrated PV shingles, and a flexible laminate attached to a standing metal seam roof. A second series of experiments was conducted on the metal frame technology. These experiments represented two fire scenarios, a room of content fire venting from a window and the ignition of debris accumulation under the array. The results of these experiments provide a technical basis for the fire service to examine their equipment, tactics, standard operating procedures and training content. Several tactical considerations were developed utilizing the data from the experiments to provide specific examples of potential electrical shock hazard from PV installations during and after a fire event.
APA, Harvard, Vancouver, ISO, and other styles
3

Backstrom, Robert, and David Backstrom. Firefighter Safety and Photovoltaic Installations Research Project. UL Firefighter Safety Research Institute, November 2011. http://dx.doi.org/10.54206/102376/viyv4379.

Full text
Abstract:
Under the United States Department of Homeland Security (DHS) Assistance to Firefighter Grant Fire Prevention and Safety Research Program, Underwriters Laboratories examined fire service concerns of photovoltaic (PV) systems. These concerns include firefighter vulnerability to electrical and casualty hazards when mitigating a fire involving photovoltaic (PV) modules systems. The need for this project is significant acknowledging the increasing use of photovoltaic systems, growing at a rate of 30% annually. As a result of greater utilization, traditional firefighter tactics for suppression, ventilation and overhaul have been complicated, leaving firefighters vulnerable to potentially unrecognized exposure. Though the electrical and fire hazards associated with electrical generation and distribution systems is well known, PV systems present unique safety considerations. A very limited body of knowledge and insufficient data exists to understand the risks to the extent that the fire service has been unable to develop safety solutions and respond in a safe manner. This fire research project developed the empirical data that is needed to quantify the hazards associated with PV installations. This data provides the foundation to modify current or develop new firefighting practices to reduce firefighter death and injury. A functioning PV array was constructed at Underwriters Laboratories in Northbrook, IL to serve as a test fixture. The main test array consisted of 26 PV framed modules rated 230 W each (5980 W total rated power). Multiple experiments were conducted to investigate the efficacy of power isolation techniques and the potential hazard from contact of typical firefighter tools with live electrical PV components. Existing fire test fixtures located at the Delaware County Emergency Services Training Center were modified to construct full scale representations of roof mounted PV systems. PV arrays were mounted above Class A roofs supported by wood trusses. Two series of experiments were conducted. The first series represented a room of content fire, extending into the attic space, breaching the roof and resulting in structural collapse. Three PV technologies were subjected to this fire condition – rack mounted metal framed, glass on polymer modules, building integrated PV shingles, and a flexible laminate attached to a standing metal seam roof. A second series of experiments was conducted on the metal frame technology. These experiments represented two fire scenarios, a room of content fire venting from a window and the ignition of debris accumulation under the array. The results of these experiments provide a technical basis for the fire service to examine their equipment, tactics, standard operating procedures and training content. Several tactical considerations were developed utilizing the data from the experiments to provide specific examples of potential electrical shock hazard from PV installations during and after a fire event.
APA, Harvard, Vancouver, ISO, and other styles
4

Bourrier, Mathilde, Michael Deml, and Farnaz Mahdavian. Comparative report of the COVID-19 Pandemic Responses in Norway, Sweden, Germany, Switzerland and the United Kingdom. University of Stavanger, November 2022. http://dx.doi.org/10.31265/usps.254.

Full text
Abstract:
The purpose of this report is to compare the risk communication strategies and public health mitigation measures implemented by Germany, Norway, Sweden, Switzerland, and the United Kingdom (UK) in 2020 in response to the COVID-19 pandemic based on publicly available documents. The report compares the country responses both in relation to one another and to the recommendations and guidance of the World Health Organization where available. The comparative report is an output of Work Package 1 from the research project PAN-FIGHT (Fighting pandemics with enhanced risk communication: Messages, compliance and vulnerability during the COVID-19 outbreak), which is financially supported by the Norwegian Research Council's extraordinary programme for corona research. PAN-FIGHT adopts a comparative approach which follows a “most different systems” variation as a logic of comparison guiding the research (Przeworski & Teune, 1970). The countries in this study include two EU member States (Sweden, Germany), one which was engaged in an exit process from the EU membership (the UK), and two non-European Union states, but both members of the European Free Trade Association (EFTA): Norway and Switzerland. Furthermore, Germany and Switzerland govern by the Continental European Federal administrative model, with a relatively weak central bureaucracy and strong subnational, decentralised institutions. Norway and Sweden adhere to the Scandinavian model—a unitary but fairly decentralised system with power bestowed to the local authorities. The United Kingdom applies the Anglo-Saxon model, characterized by New Public Management (NPM) and decentralised managerial practices (Einhorn & Logue, 2003; Kuhlmann & Wollmann, 2014; Petridou et al., 2019). In total, PAN-FIGHT is comprised of 5 Work Packages (WPs), which are research-, recommendation-, and practice-oriented. The WPs seek to respond to the following research questions and accomplish the following: WP1: What are the characteristics of governmental and public health authorities’ risk communication strategies in five European countries, both in comparison to each other and in relation to the official strategies proposed by WHO? WP2: To what extent and how does the general public’s understanding, induced by national risk communication, vary across five countries, in relation to factors such as social capital, age, gender, socio-economic status and household composition? WP3: Based on data generated in WP1 and WP2, what is the significance of being male or female in terms of individual susceptibility to risk communication and subsequent vulnerability during the COVID-19 outbreak? WP4: Based on insight and knowledge generated in WPs 1 and 2, what recommendations can we offer national and local governments and health institutions on enhancing their risk communication strategies to curb pandemic outbreaks? WP5: Enhance health risk communication strategies across five European countries based upon the knowledge and recommendations generated by WPs 1-4. Pre-pandemic preparedness characteristics All five countries had pandemic plans developed prior to 2020, which generally were specific to influenza pandemics but not to coronaviruses. All plans had been updated following the H1N1 pandemic (2009-2010). During the SARS (2003) and MERS (2012) outbreaks, both of which are coronaviruses, all five countries experienced few cases, with notably smaller impacts than the H1N1 epidemic (2009-2010). The UK had conducted several exercises (Exercise Cygnet in 2016, Exercise Cygnus in 2016, and Exercise Iris in 2018) to check their preparedness plans; the reports from these exercises concluded that there were gaps in preparedness for epidemic outbreaks. Germany also simulated an influenza pandemic exercise in 2007 called LÜKEX 07, to train cross-state and cross-department crisis management (Bundesanstalt Technisches Hilfswerk, 2007). In 2017 within the context of the G20, Germany ran a health emergency simulation exercise with WHO and World Bank representatives to prepare for potential future pandemics (Federal Ministry of Health et al., 2017). Prior to COVID-19, only the UK had expert groups, notably the Scientific Advisory Group for Emergencies (SAGE), that was tasked with providing advice during emergencies. It had been used in previous emergency events (not exclusively limited to health). In contrast, none of the other countries had a similar expert advisory group in place prior to the pandemic. COVID-19 waves in 2020 All five countries experienced two waves of infection in 2020. The first wave occurred during the first half of the year and peaked after March 2020. The second wave arrived during the final quarter. Norway consistently had the lowest number of SARS-CoV-2 infections per million. Germany’s counts were neither the lowest nor the highest. Sweden, Switzerland and the UK alternated in having the highest numbers per million throughout 2020. Implementation of measures to control the spread of infection In Germany, Switzerland and the UK, health policy is the responsibility of regional states, (Länders, cantons and nations, respectively). However, there was a strong initial centralized response in all five countries to mitigate the spread of infection. Later on, country responses varied in the degree to which they were centralized or decentralized. Risk communication In all countries, a large variety of communication channels were used (press briefings, websites, social media, interviews). Digital communication channels were used extensively. Artificial intelligence was used, for example chatbots and decision support systems. Dashboards were used to provide access to and communicate data.
APA, Harvard, Vancouver, ISO, and other styles
5

Financial Stability Report - Second Semester of 2021. Banco de la República, September 2022. http://dx.doi.org/10.32468/rept-estab-fin.sem2.eng-2021.

Full text
Abstract:
Banco de la República’s main objective is to preserve the purchasing power of the currency in coordination with the general economic policy that is intended to stabilize output and employment at long-term sustainable levels. Properly meeting the goal assigned to the Bank by the 1991 Constitution critically depends on preserving financial stability. This is understood to be a general condition in which the financial system assesses and manages the financial risks in a way that facilitates the economy’s performance and efficient allocation of resources while, at the same time, it is able to, on its own, absorb, dissipate, and mitigate the shocks that may arise as a result of adverse events. This Financial Stability Report meets the goal of giving Banco de la República’s diagnosis of the financial system’s and its debtors’ recent performance as well as of the main risks and vulnerabilities that could affect the stability of the Colombian economy. In this way, participants in financial markets and the public are being informed, and public debate on trends and risks affecting the system is being encouraged. The results presented here also serve the monetary authority as a basis for making decisions that will enhance financial stability in the general context of its objectives. In recent months, several positive aspects of the financial system have preserved a remarkable degree of continuity and stability: the liquidity and capital adequacy of financial institutions have remained well above the regulatory minimums at both the individual and consolidated levels, the coverage of past-due loans by loan-loss provisions remains high, and the financial markets for public and private debt and stocks have continued to function normally. At the same time, a surge in all the types of loan portfolios, a sharp downturn in the non-performing loan portfolio, and a rise in the profitability of credit institutions can be seen for the first time since the beginning of the pandemic. In line with the general recovery of the economy, the main vulnerability to the stability of the Colombian financial system identified in the previous edition—uncertainty about changes in the non-performing loans portfolio—has receded and remains on a downward trend. In this edition, the main source of vulnerability identified for financial stability in the short term is the system’s exposure to sudden changes in international financial conditions; the results presented in this Report indicate that the system is sufficiently resilient to such scenarios. In compliance with its constitutional objectives and in coordination with the financial system’s security network, Banco de la República will continue to closely monitor the outlook for financial stability at this juncture and will make the decisions necessary to ensure the proper functioning of the economy, facilitate the flow of sufficient credit and liquidity resources, and further the smooth functioning of the payment system. Leonardo Villar Gomez Governor Box 1 -Decomposition of the Net Interest Margin in Colombia and Chile Wilmar Cabrera Daniela Rodríguez-Novoa Box 2 - Spatial Analysis of New Home Prices in Bogota, Medellín, and Cali Using a Geostatistical Approach María Fernanda Meneses Camilo Eduardo Sánchez Box 3 - Interest Rate Model for the SYSMO Stress Test Exercise Wilmar Cabrera Diego Cuesta Santiago Gamba Camilo Gómez Box 4 - The Transition from LIBOR and other International Benchmark Rates Daniela X. Gualtero Briceño Javier E. Pirateque Niño
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography