Vous êtes sur la page 1sur 9

Online steady state security analysis of power system requires evaluation of the effects of a large

number of contingencies in order to assess the security of the system. Contingencies analysis is an
important component of the security function which is considered to be an integral part of the modern
energy management system at energy control center. Because of a large number of contingencies
approximate noiterative techniques are most often used.
It is well known that contingencies that cause line flow problem may not necessarily cause bus voltage
problems and vice versa. Hence , two separate ranking lists are required, one for line flow problems, and
the other for bus voltage problems.
Sufficient fast and accurate methods for overload contingencies ranking are available. The methods
based on voltage deviations are also equally important because major power distribution can be caused
by voltage collapses. Some of the recent methods developed for voltage problems are as.
Brandwajn and Lauby have extended their efficient bounding technique based on the MW flow violation
detection method to the bus voltage limit violation problem.
Chen and bose have developed a method known as the direct ranking algorithm for contingency
selection taking into consideration voltage security aspects. The performance index is calculate directly
without estimating the post contingency voltage at individual buses. Two basic functions of such
approach are
1. It is not possible to filter critical contingencies causing limit violations; i.e. it is difficult to avoid a
making effect.
2. The effect of reactive limit violation and consequent bus status change cannot be taken into
account.

The security of a power system can be defined as its ability to withstand a set of severe but credible
contingencies and to survive transition to an acceptable new steady state condition. In practice this is
accessed by detection of operating limit violation and contingency analysis.
Depending on the time scale, security monitoring is carried out on the basis of three models: the steady
state, post transient and transient stability models.
Figure shows an overall flow diagram of the operation of the security assessment system. At every
sampling time, real-time SCADA measurements are retrieved and then proposed by the state estimator
to construct a real-time power network model in which the best estimates of the current state of the
system can be evaluated. The measured values of various elements are checked against the preset
operating limits and any violation will produce an alarm.
The contingency list used is based on the operational experience of the utility involved and is stored in
the online database. To reduce a total assessment time, screening tools are commonly employed to
select any a small subset of the full contingency list for evaluation.
Any possible overloads and instability problems will become an alarm and the contingencies will be
presented to the operator in an order ranked according to their severity.

Contingency is the loss of failure of one or more components in the power system. Contingency can also
be defined as a specified set of events occurring within a short duration of time. Contingency is a system
may be none, severe or critical. None: the system element gets overloaded and collapses if the
corrective action is not performed before the system moves towards instability. The system becomes
unstable and collapse immediately. Contingency such as unexpected line outage soften contribute to
voltage collapses blackout. Hence contingency assessment is necessary to check out the severity of the
line. By contingency ranking the system operator can be cautioned about the vulnerable line present in
the system and he can present the corrective measures in case of outage of that line. Contingency
analysis is the simulation analysis that employs various contingencies associated with probable events,
to come up with the most optimal responces under the circumstances. The objective of steady state
contingency analysis is to investigate the effects of generation and transmission unit outages on MVA
line flows and bus voltage magnitudes. Contingency are ranked in an approximation order of a scalar
performance index(PI). The PI should have essentially two aspects of functions:
1.Distrinction of actual critical outages from non-critical ones.
2. prediction of the relative severity of critical outages.
Electric utilities in todays market are facing many challenges and sometimes conflicting requirements.
The task of maintaining reliability has been greatly complicated by the introduction of wholesale
electricity markets. All players now depend on the reliability of the power grid, and all are at risk of the
grid is not reliably operated. On the one hand, the planning and operation reliability crieraion is still N-1
( the system must be able to withstand any single contingency event) and on the other economic forces
put pressure for providing higher standards of reliability.
Security constrained optimization applications at the current stage ensure that voltage magnitude and
other state and control variables are under their operating limits after the first contingency.
It has been found that traditional N-1 reliability criteria for transmission and operation planning is
inadequate in new (deregulated) competitive energy markets. Now just engineering (planning and
operation) reliability criteria should be revisited in order to go beyond N-1 but also the economic
implications of such criteria must be assessed accordingly. Following are ares coming up as modern
challenge for contingency form application point of view.

With the global trend towards deregulation in the power system industry, the volume and the
complexity of the contingency analysis result in the daily operation and system studies have been
increasing. Not only has deregulation resulted in much large system model sizes, but also CA is
computed more frequently in the restructured power market to monitor the states of the system under
what if situations in order to accommodate the maximum number of power transfer. The net impact to
these changes is a need for more effective and efficient visualization for CA results to help with the
comprehension of the essential security information, information which would be buried in the
enormous and complex CA data sets. The traditional display for CA results in an EMS is often a tabular
list showing the violated buses and transmission elements, along with the corresponding contingency
name, element value, limit and perhaps the percentage violation. However, when the number of
elements in the list becomes excessive it can be difficult to build a mental connection between the
violated elements and the contingencies causing the violations, or to understand the underlying
problems in the system.

In future smart grids, with distribution network having loops more frequently, current transmission
contingency analysis (TCA) which usually neglects the distribution power flow variations after a
contingency may leave out severe outages. With more distribution management system deployed on
the distribution side, a new transmission CA method based on global power flow (GPF) analysis which
integrates both the transmission and distribution power flow is proposed in this work (named as GTCA)
to address the problem.
Contingency analysis has been an integral part of power system planning and operations dynamic
contingency analysis is often performed with offline simulation studies. Due to its intense computational
effort. Due to large number of possible system variations, covering all combinations in planning studies
is very challenging. Contingency must be chosen carefully to cover a wider group of possibilities, while
ensuring system security. This work proposes a method to classify dynamic contingency into different
clusters, according to their behavioral patterns, in particular, with respect to voltage recovery patterns.
The most severe contingency from each cluster becomes the representative of other contingencies in
the corresponding cluster. Using the information of contingency clusters, a new concept called dynamic
voltage control area (DVCA) is derived. The concept of DVCA will address the importance of the location
of dynamic reactive reserves. Simulations have been completed on the IEEE-14 bus system to test the
validate the methods.
Computation of worst operation scenarios under uncertainty for static security management deals with
day-ahead static security assessment with respect to a postulated set of contingencies while taking into
account uncertainty about the next day system conditions. Capitanescu et.al. proposed a heuristic
approach to compute the worst-case under operation uncertainty for a contingency with respect to
overloads. Capitanescu formulate this problem as non-convex nonlinear bi level program that we solve
approximately by a heuristic approach which relies on the solution of successive optimal powerflow
(OPF) and security- constrained optimal power flow (SCOPF) problems of a special type. The method
aims at revealing those combinations of uncertainties and contingencies for which the best combination
of preventive and corrective action would not suffice to ensure security. Extensive numerical results on
a small, a medium, and a very large system prove the interest of the approach.
Fast and accurate contingency selection and ranking method has become a key issue to ensure the
secure operation of power system. In this work multi-layer feed forward artificial neural network
(MLEEN) and radial basis function network (RBFN) are proposed to implement the online module for
power system static security assessment. The security classification, contingency selection and ranking
are done based on the composite security index which is capable of accurately differentiating the secure
and non-secure cases. For each contingency case as well as for base case condition, the composite
security index is computed using the full load flow analysis.
The continual increase in the load has resulted in the
operation of power system under stressed conditions where
the transmission lines are operating near the security limit
levels. Recent blackouts which have been caused due to the
cascading faults have been a major concern in modern
power systems thereby bringing out the necessity to
evaluate the distribution factors such as the power transfer
distribution factors and line outage distribution factors
under single and multiple-line outages for power system
security studies. The power distribution factor, which is
based on the dc power flow method, is possibly the only
allocation technique used for allocating MW flows on the
lines for power transaction in the system. This distribution
factor is the relative change in the power flow on a
particular line due to an injection and withdrawal of power
on a pair of buses [1, 2]. Line outage distribution factors are
linear estimates of the change in flow on adjacent lines
when transmission lines are lost and are normally applied
for checking overloads on the lines following the fault [3].
This paper combines the two distribution factors by using
an algorithm to redistribute the power flow in the system
thereby controlling the line flow on highly stressed lines
during single or multiple-line outages on the power system.
This paper uses the MATLAB software to build the
application where an algorithm is being used to suppress
the overloading on a line following a single-line and multiline
fault or during a heavy load condition. This program is
being applied on the New England 10-generator 39-bus
system.
Power Transfer Distribution Factors (PTDFs)
and Line Outage Distribution Factors (LODFs)
When there is a single-fault or a multi-fault that occurs in
the system, the power is being shifted to the adjacent
transmission lines. This normally results in unfavorable
operation conditions where the transmission lines are being
overloaded ie. transferring power above its capacity limit
thereby resulting cascading faults. In order to avoid such a
situation, the overloaded lines need to be relieved from the
extra load. A security analysis study must be executed very
quickly in order for it to be of any use to the operators. This
is where the computation of the distribution factors such as
the power transfer distribution factors and line outage
distribution factors are required. These factors, which are
based on the DC power flow method, provide approximate
but quick solutions for the change in the power injections in
the system.
In order to observe the effect of the line outage, the line
outage distribution factors are being assessed. This factor is
being computed using the injection shift factors (ISFs),
which are the building blocks of the other distribution
factors [3]. To shift the extra power being transferred on the factors are being computed. The advantage of these
distribution factors is that since it is linear, quick
computation is enabled and is therefore widely used in
security studies [2]. Also, since it is linear, superposition is
possible where different transactions can be superimposed
onto each other.
These factors however vary with the change in the
topology, when an outage occurs and when there are change
in the loadings on the lines in the system [4]. This would
require a formulation of the factors so that we would be
able to compute these factors at any loading conditions. The
formulation of the PTDFs and LODFs is being described in
the next sub-section.
PTDF and LODF matrix formulation
A DC power model for the power system is being
formulated where the conditions are being assumed [5]:
1) All the voltages are considered to have a 1 p.u. agnitude.
2) Line resistance is neglected since it is small compared to
line reactance. The shunt reactance is being omitted.
3) Reactive power flow is disregarded.
For calculating the power flow on a transmission line ij l ,
(1) is being employed.
ij
ij
x
ij
P
( )
= (1)
This would require the angle value of the from and to
buses which is obtained from (2).
= B1P (2)
However, this would require the calculation of the
inverse of B for every variation in loading. To facilitate this
process, (3) which is being derived in [6] is being utilized.
1()
ik jk
ij
ij XX
x
= (3)
In order to use this formulation, the B matrix must be
composed. Since the line resistance is being neglected the Y
matrix is being transformed into the B matrix where the offdiagonal
terms Bij and diagonal terms Bii are being
formulated by (4) and (5) respectively.

B = 1 (4)

=
N
j ij
x
ii
B
1
1 (5)
To the inverse of the B matrix, at the nth bus, which is the
slack bus, a zero entry is being inserted for the n th row and
column (X matrix). The PTDF matrix is being formulated
by (6).
PTDF B A X br = (6)
where Bbr is a nline by nline dimensional diagonal matrix
where the line reactance values are the diagonal entries and
A, is the nline by nbus dimensional the branch incidence
matrix where 1 and -1 stand for the for bus and to bus
respectively. (6) is the matrix formulation of (3) which is
being utilized in the application developed.
In order to compute the line flow on each transmission
line, the PTDF matrix is being multiplied by the power
injection matrix as seen in (7).
f = PTDF P (7)
l inj

where Pinj is the vector of the power injected minus the


power consumed at the corresponding bus.
The convenience of this formulation is that we just need
to change the power injection and withdrawal values in the
power injection matrix which would enable the user to
compute the PTDFs for any variation in the loading of the
system. For a column j in the PTDF matrix, which
corresponds to bus j, displays the distribution of the power
on each line for a 1p.u, increase in a power injection on bus
j and a corresponding withdrawal from the slack bus.
i j i slack j slack PDTF PTDF PTDF = (8)
As seen in (8), to compute the PTDFs for an injection in
bus i and a corresponding withdrawal in bus j (a bus other
than the slack bus), we just need to subtract the j th column
from the ith column.
The computation of the LODFs is simply done by
deleting the line from the B matrix, inverting the matrix and
calculating the PTDF matrix. The procedure for the
computation of the distribution factors and adjustment of
line flows, ie. the generation shifts, are being shown in Fig. 1.
PTDF computation and generation shift algorithm.
2.2 Adjustment of Line Flow
For the case when the transmission lines surpass the
security limits, the power flow on these lines needs to be
curtailed. In order to do this, for normal conditions when
there is an increase in the loading of the system, the
formulated PTDF matrix is being used. For the single or
multi-line case, the LODF matrix is being utilized. When
there is a violation in the security limits of the transmission
line, generation needs to be shifted in order to reduce the
line flow on these lines. This is resolved by manipulating
the PTDF and LODF matrix entries. The set of generators,
for a shift in power from generator i to j, the maximum
PTDF value is being selected which means minimum
generation shift is required to bring back the line flow
under secure values. If the flow on the overloaded line is
negative, then the a positive maximum PTDF value is being
selected and vice versa.

Vous aimerez peut-être aussi