Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon free N − 1 security assessment approach based on the steady-state security distance

The traditional N − 1 security assessment approaches give a limited perspective on the degree of power system security. This study proposes a novel security assessment approach using the index of post-contingency steady-state security distance (PCSSD). Two PCSSD models are established for contingencies causing or not causing system overloads, respectively. If the system is secure following a contingency, the PCSSD provides the shortest distance of the operating point (OP) to the post-contingency steady-state security region (PCSSR) boundaries, to indicate the OP's remaining security margin. If an overload condition arises after a contingency, the PCSSD provides the shortest distance of the OP to the PCSSR, to show the difficulty in eliminating power grid violations. With the index of the PCSSD, one can continuously quantify post-contingency OPs whether they are secure or insecure and rank all possible contingencies according to their severity. The PCSSD model is a large-scale non-linear optimisation model which has to be calculated numerous times. A novel algorithm is proposed to improve the computational efficiency. It identifies the active boundaries of the PCSSR, and then approximates most of the PCSSDs by the corresponding ante-contingency ones, reducing the number of optimisation problems to be solved. Case studies are performed to demonstrate the effectiveness of the proposed approach.

References

    1. 1)
    2. 2)
    3. 3)
    4. 4)
      • 11. Faustino Agreira, C.I., Machado Ferreira, C.M., Dias Pinto, J.A., et al: ‘Contingency screening and ranking algorithm using two different sets of security performance indices’. Proc. 2003 IEEE Bologna Power Technology Conf., Bologna, Italy, 2003.
    5. 5)
    6. 6)
    7. 7)
    8. 8)
    9. 9)
    10. 10)
      • 19. Yu, Y.X.: ‘Security region of bulk power system’. Proc. Int. Conf. Power System Technology, Kunming, China, 2002, vol. 1, pp. 1317.
    11. 11)
      • 21. Dobson, I., Lu, L.: ‘Using an iterative method to compute a closest saddle node bifurcation in the load power parameter space of an electric power system’. Bulk Power System Voltage Phenomena, Voltage Stability and Security NSF Workshop, 1991.
    12. 12)
    13. 13)
    14. 14)
    15. 15)
    16. 16)
    17. 17)
    18. 18)
    19. 19)
    20. 20)
    21. 21)
    22. 22)
    23. 23)
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-gtd.2015.0552
Loading

Related content

content/journals/10.1049/iet-gtd.2015.0552
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address