Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Methodology and computer package for generation rescheduling

Methodology and computer package for generation rescheduling

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IEE Proceedings - Generation, Transmission and Distribution — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Generation rescheduling is a cost-effective way to enhance steady-state and dynamic security. The paper presents an improved formulation for generation rescheduling and develops an iterative solution procedure. The proposed method can be used to assist operators to eliminate potential steady-state insecurity, dynamic insecurity, or their combination. Steady-state security is established by the well known (n – 1) criterion which deals with thermal limits of transmission lines. Dynamic security is defined in such a fashion that transient stability of the system is maintained under any of the contingencies which may occur at each end of every transmission line of a power system. An attractive feature of the proposed method is that it is reliable, realistic and easy to understand since dynamic security is checked in the method by an integration procedure. Simulation results of a 36-machine 200-node practical power system are demonstrated.

References

    1. 1)
      • Gan, D., Qu, Z.: `Integrated preventive control for steady-state and dynamic security bysensitivity factors', Proceedings of IFAC symposium on Control of power plantandpower systems, 3–5 Dec. 1995, Cancun, Mexico.
    2. 2)
      • Gan, D., Hayashi, Y., Nara, K., Wang, X.: `A novel automatic contingency selectionprocedure for dynamic security assessment', Proceedings of IASTED international conference on Powersystems and engineering, 12–16 Sept. 1994, Wakayama, Japan.
    3. 3)
      • W.F. Tinney , V. Brandwajn , S.M. Chan . Sparse vector methods. IEEE Trans. Power Appar. Syst. , 2 , 295 - 301
    4. 4)
      • O. Alsac , B. Stott , W.F. Tinney . Sparse-oriented compensation methods formodified network solutions. IEEE Trans. Power Appar. Syst. , 5 , 1050 - 1060
    5. 5)
      • A.J. Wood , B.F. Wollenberg . (1996) Power generation, operation and control.
    6. 6)
      • D. Xia , G.T. Heydt . On-line transient stability evaluation by system decomposition aggregationand high order derivatives. IEEE Trans. Power Appar. Syst. , 7 , 2038 - 2046
    7. 7)
      • A.A. Fouad , J. Tong . Stability constrained optimal rescheduling of generation. IEEE Trans. Power Syst. , 1 , 105 - 112
    8. 8)
      • V. Vittal , E. Zhou , C. Hwang , A.A. Fouad . Derivation of stability limits usinganalytical sensitivity of the transient energy margin. IEEE Trans. Power Syst. , 4 , 1363 - 1372
    9. 9)
      • W.C. Merritt , C.H. Saylor , R.C. Burchett , H.H. Happ . Security constrained optimization: a case study. IEEE Trans. Power Syst. , 3 , 970 - 977
    10. 10)
      • Y. Dong , H.R. Pota . First swing stability by solving simultaneous differential andalgebraic equations without system reduction. Int. J. Electr. Power Energy Syst. , 2
    11. 11)
      • V. Miranda , J.N. Fidalgo , J.A.P. Lopes , L.B. Almeida . Real time preventive actions fortransient stability enhancement with a hybrid neural-optimization approach. IEEE Trans. Power Syst. , 2 , 1029 - 1035
    12. 12)
      • N.J. Balu , T. Bertram , A. Bose , V. Brandwajn , G. Cauley , D. Curtice , A. Fouad , L. Fink , M.G. Lauby , B.F. Wollenberg , J.N. Wrubel . On-line power systems security analysis. Proc. IEEE , 2 , 262 - 280
    13. 13)
      • K. Demaree , T. Athay , K.W. Cheung , Y. Mansour , E. Vaahedi , A.Y. Chang , B.R. Corns , B.W. Garrett . An on-line dynamic security analysis system implementation. IEEE Trans. Power Syst. , 4 , 1716 - 1722
    14. 14)
      • Y. Mansour , E. Vaahedi , A.Y. Chang , B.R. Corns , B.W. Garrett , K. Demaree , T. Athay , K. Cheung . B.C. Hydro's On-line transient stability assessment (TSA) modeldevelopment, analysis, and post-processing. IEEE Trans. Power Syst. , 1 , 241 - 253
    15. 15)
      • A.A. Fouad , V. Vittal . (1990) Power system transient stability analysis usingtransient energy function method.
    16. 16)
      • J. Sterling , M.A. Pai , P.W. Sauer . A method of secure and optimal operation of apower system for dynamic contingencies. Electr. Mach. Power Syst. , 639 - 655
    17. 17)
      • X. Wang , J.R. McDonald . (1994) Modern power system planning.
    18. 18)
      • S. Yamashiro . On-line secure-economic preventive control of power systems by patternrecognition. IEEE Trans. Power Syst. , 3 , 214 - 219
    19. 19)
      • E.W. Kimbark . (1995) Power system stability.
    20. 20)
      • D.-H. Kuo , A. Bose . Generation rescheduling method to increase the dynamic securityof power systems. IEEE Trans. Power Syst. , 1 , 68 - 76
    21. 21)
      • P. Henrici . (1962) Discrete variable methods in ordinary differential equations.
    22. 22)
      • C.L. Chang , Y.Y. Hsu . Steady-state security control using a sensitivity-based approach. Electr. Power Syst. Res.
    23. 23)
      • A. Monticelli , M.V.F. Pereira , S. Granville . Security-constrained optimal power flow with post-contingency corrective rescheduling. IEEE Trans. Power Syst. , 1 , 175 - 182
    24. 24)
      • Y. Xue , M. Ribbens-Pavella . Extended equal area criterion: an analytical ultra-fastmethod for transient stability assessment and preventive control of power systems. Int. J. Power Energy Systems , 2 , 131 - 149
http://iet.metastore.ingenta.com/content/journals/10.1049/ip-gtd_19971136
Loading

Related content

content/journals/10.1049/ip-gtd_19971136
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address