Dynamic Vulnerability Assessment and Intelligent Control :For Sustainable Power Systems

Publication subTitle :For Sustainable Power Systems

Author: José Luis Rueda-Torres   Francisco González-Longatt  

Publisher: John Wiley & Sons Inc‎

Publication year: 2018

E-ISBN: 9781119214977

P-ISBN(Paperback): 9781119214953

Subject: TM7 Transmission and distribution engineering, power grids and power system

Keyword: Electrical Power Grids Behavioral recognition Self-healing WAMPAC Dynamic vulnerability assessment Intelligent protection and control Optimal grid management security constrained optimal power flow risk-based reliability controlled islanding

Language: ENG

Access to resources Favorite

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Chapter

1.3 Power System Vulnerability Symptoms

1.3.1 Rotor Angle Stability

1.3.1.1 Transient Stability

1.3.1.2 Oscillatory Stability

1.3.2 Short‐Term Voltage Stability

1.3.3 Short‐Term Frequency Stability

1.3.4 Post‐Contingency Overloads

1.4 Synchronized Phasor Measurement Technology

1.4.1 Phasor Representation of Sinusoids

1.4.2 Synchronized Phasors

1.4.3 Phasor Measurement Units (PMUs)

1.4.4 Discrete Fourier Transform and Phasor Calculation

1.4.5 Wide Area Monitoring Systems

1.4.6 WAMPAC Communication Time Delay

1.5 The Fundamental Role of WAMS in Dynamic Vulnerability Assessment

1.6 Concluding Remarks

References

Chapter 2 Steady‐State Security

2.1 Power System Reliability Management: A Combination of Reliability Assessment and Reliability Control

2.1.1 Reliability Assessment

2.1.2 Reliability Control

2.1.2.1 Credible and Non‐Credible Contingencies

2.1.2.2 Operating State of the Power System

2.1.2.3 System State Space Representation

2.2 Reliability Under Various Timeframes

2.3 Reliability Criteria

2.4 Reliability and Its Cost as a Function of Uncertainty

2.4.1 Reliability Costs

2.4.2 Interruption Costs

2.4.3 Minimizing the Sum of Reliability and Interruption Costs

2.5 Conclusion

References

Chapter 3 Probabilistic Indicators for the Assessment of Reliability and Security of Future Power Systems

3.1 Introduction

3.2 Time Horizons in the Planning and Operation of Power Systems

3.2.1 Time Horizons

3.2.2 Overlapping and Interaction

3.2.3 Remedial Actions

3.3 Reliability Indicators

3.3.1 Security‐of‐Supply Related Indicators

3.3.2 Additional Indicators

3.4 Reliability Analysis

3.4.1 Input Information

3.4.2 Pre‐calculations

3.4.3 Reliability Analysis

3.4.4 Output: Reliability Indicators

3.5 Application Example: EHV Underground Cables

3.5.1 Input Parameters

3.5.2 Results of Analysis

3.6 Conclusions

References

Chapter 4 An Enhanced WAMS‐based Power System Oscillation Analysis Approach

4.1 Introduction

4.2 HHT Method

4.2.1 EMD

4.2.2 Hilbert Transform

4.2.3 Hilbert Spectrum and Hilbert Marginal Spectrum

4.2.4 HHT Issues

4.2.4.1 The Boundary End Effect

4.2.4.2 Mode Mixing and Pseudo‐IMF Component

4.2.4.3 Parameter Identification

4.3 The Enhanced HHT Method

4.3.1 Data Pre‐treatment Processing

4.3.1.1 DC Removal Processing

4.3.1.2 Digital Band‐Pass Filter Algorithm

4.3.2 Inhibiting the Boundary End Effect

4.3.2.1 The Boundary End Effect Caused by the EMD Algorithm

4.3.2.2 Inhibiting the Boundary End Effects Caused by the EMD

4.3.2.3 The Boundary End Effect Caused by the Hilbert Transform

4.3.2.4 Inhibiting the Boundary End Effect Caused by the HT

4.3.3 Parameter Identification

4.4 Enhanced HHT Method Evaluation

4.4.1 Case I

4.4.2 Case II

4.4.3 Case III

4.5 Application to Real Wide Area Measurements

Summary

References

Chapter 5 Pattern Recognition‐Based Approach for Dynamic Vulnerability Status Prediction

5.1 Introduction

5.2 Post‐contingency Dynamic Vulnerability Regions

5.3 Recognition of Post‐contingency DVRs

5.3.1 N‐1 Contingency Monte Carlo Simulation

5.3.2 Post‐contingency Pattern Recognition Method

5.3.3 Definition of Data‐Time Windows

5.3.4 Identification of Post‐contingency DVRs—Case Study

5.4 Real‐Time Vulnerability Status Prediction

5.4.1 Support Vector Classifier (SVC) Training

5.4.2 SVC Real‐Time Implementation

5.5 Concluding Remarks

References

Chapter 6 Performance Indicator‐Based Real‐Time Vulnerability Assessment

6.1 Introduction

6.2 Overview of the Proposed Vulnerability Assessment Methodology

6.3 Real‐Time Area Coherency Identification

6.3.1 Associated PMU Coherent Areas

6.4 TVFS Vulnerability Performance Indicators

6.4.1 Transient Stability Index (TSI)

6.4.2 Voltage Deviation Index (VDI)

6.4.3 Frequency Deviation Index (FDI)

6.4.4 Assessment of TVFS Security Level for the Illustrative Examples

6.4.5 Complete TVFS Real‐Time Vulnerability Assessment

6.5 Slower Phenomena Vulnerability Performance Indicators

6.5.1 Oscillatory Index (OSI)

6.5.2 Overload Index (OVI)

6.6 Concluding Remarks

References

Chapter 7 Challenges Ahead Risk‐Based AC Optimal Power Flow Under Uncertainty for Smart Sustainable Power Systems

7.1 Chapter Overview

7.2 Conventional (Deterministic) AC Optimal Power Flow (OPF)

7.2.1 Introduction

7.2.2 Abstract Mathematical Formulation of the OPF Problem

7.2.3 OPF Solution via Interior‐Point Method

7.2.3.1 Obtaining the Optimality Conditions In IPM

7.2.3.2 The Basic Primal Dual Algorithm

7.2.4 Illustrative Example

7.2.4.1 Description of the Test System

7.2.4.2 Detailed Formulation of the OPF Problem

7.2.4.3 Analysis of Various Operating Modes

7.2.4.4 Iterative OPF Methodology

7.3 Risk‐Based OPF

7.3.1 Motivation and Principle

7.3.2 Risk‐Based OPF Problem Formulation

7.3.3 Illustrative Example

7.3.3.1 Detailed Formulation of the RB‐OPF Problem

7.3.3.2 Numerical Results

7.4 OPF Under Uncertainty

7.4.1 Motivation and Potential Approaches

7.4.2 Robust Optimization Framework

7.4.3 Methodology for Solving the R‐OPF Problem

7.4.4 Illustrative Example

7.4.4.1 Detailed Formulation of the Worst Uncertainty Pattern Computation With Respect to a Contingency

7.4.4.2 Detailed Formulation of the OPF to Check Feasibility in the Presence of Corrective Actions

7.4.4.3 Detailed Formulation of the R‐OPF Relaxation

7.4.4.4 Numerical Results

7.5 Advanced Issues and Outlook

7.5.1 Conventional OPF

7.5.1.1 Overall OPF Solution Methodology

7.5.1.2 Core Optimizers: Classical Methods Versus Convex Relaxations

7.5.2 Beyond the Scope of Conventional OPF: Risk, Uncertainty, Smarter Sustainable Grid

References

Chapter 8 Modeling Preventive and Corrective Actions Using Linear Formulation

8.1 Introduction

8.2 Security Constrained OPF

8.3 Available Control Actions in AC Power Systems

8.3.1 Generator Redispatch

8.3.2 Load Shedding and Demand Side Management

8.3.3 Phase Shifting Transformer

8.3.4 Switching Actions

8.3.5 Reactive Power Management

8.3.6 Special Protection Schemes

8.4 Linear Implementation of Control Actions in a SCOPF Environment

8.4.1 Generator Redispatch

8.4.2 Load Shedding and Demand Side Management

8.4.3 Phase Shifting Transformer

8.4.4 Switching

8.5 Case Study of Preventive and Corrective Actions

8.5.1 Case Study 1: Generator Redispatch and Load Shedding (CS1)

8.5.2 Case Study 2: Generator Redispatch, Load Shedding and PST (CS2)

8.5.3 Case Study 3: Generator Redispatch, Load Shedding and Switching (CS3)

8.6 Conclusions

References

Chapter 9 Model‐based Predictive Control for Damping Electromechanical Oscillations in Power Systems

9.1 Introduction

9.2 MPC Basic Theory & Damping Controller Models

9.2.1 What is MPC?

9.2.2 Damping Controller Models

9.3 MPC for Damping Oscillations

9.3.1 Outline of Idea

9.3.2 Mathematical Formulation

9.3.3 Proposed Control Schemes

9.3.3.1 Centralized MPC

9.3.3.2 Decentralized MPC

9.3.3.3 Hierarchical MPC

9.4 Test System & Simulation Setting

9.5 Performance Analysis of MPC Schemes

9.5.1 Centralized MPC

9.5.1.1 Basic Results in Ideal Conditions

9.5.1.2 Results Considering State Estimation Errors

9.5.1.3 Consideration of Control Delays

9.5.2 Distributed MPC

9.5.3 Hierarchical MPC

9.6 Conclusions and Discussions

References

Chapter 10 Voltage Stability Enhancement by Computational Intelligence Methods

10.1 Introduction

10.2 Theoretical Background

10.2.1 Voltage Stability Assessment

10.2.2 Sensitivity Analysis

10.2.3 Optimal Power Flow

10.2.4 Artificial Neural Network

10.2.5 Ant Colony Optimisation

10.3 Test Power System

10.4 Example 1: Preventive Measure

10.4.1 Problem Statement

10.4.2 Simulation Results

10.5 Example 2: Corrective Measure

10.5.1 Problem Statement

10.5.2 Simulation Results

10.6 Conclusions

References

Chapter 11 Knowledge‐Based Primary and Optimization‐Based Secondary Control of Multi‐terminal HVDC Grids

11.1 Introduction

11.2 Conventional Control Schemes in HV‐MTDC Grids

11.3 Principles of Fuzzy‐Based Control

11.4 Implementation of the Knowledge‐Based Power‐Voltage Droop Control Strategy

11.4.1 Control Scheme for Primary and Secondary Power‐Voltage Control

11.4.2 Input/Output Variables

11.4.2.1 Membership Functions and Linguistic Terms

11.4.3 Knowledge Base and Inference Engine

11.4.4 Defuzzification and Output

11.5 Optimization‐Based Secondary Control Strategy

11.5.1 Fitness Function

11.5.2 Constraints

11.6 Simulation Results

11.6.1 Set Point Change

11.6.2 Constantly Changing Reference Set Points

11.6.3 Sudden Disconnection of Wind Farm for Undefined Period

11.6.4 Permanent Outage of VSC 3

11.7 Conclusion

References

Chapter 12 Model Based Voltage/Reactive Control in Sustainable Distribution Systems

12.1 Introduction

12.2 Background Theory

12.2.1 Voltage Control

12.2.2 Model Predictive Control

12.2.3 Model Analysis

12.2.3.1 Definition of Sensitivity

12.2.3.2 Computation of Sensitivity

12.2.4 Implementation

12.3 MPC Based Voltage/Reactive Controller – an Example

12.3.1 Control Scheme

12.3.2 Overall Objective Function of the MPC Based Controller

12.3.3 Implementation of the MPC Based Controller

12.4 Test Results

12.4.1 Test System and Measurement Deployment

12.4.2 Parameter Setup and Algorithm Selection for the Controller

12.4.3 Results and Discussion

12.4.3.1 Loss Minimization Performance of the Controller

12.4.3.2 Voltage Correction Performance of the Controller

12.5 Conclusions

References

Chapter 13 Multi‐Agent based Approach for Intelligent Control of Reactive Power Injection in Transmission Systems

13.1 Introduction

13.2 System Model and Problem Formulation

13.2.1 Power System Model

13.2.2 Optimal Reactive Control Problem Formulation

13.2.3 Multi‐Agent Sensitivity Model

13.2.3.1 Calculation of the First Layer

13.2.3.2 Calculation of the Second Layer

13.3 Multi‐Agent Based Approach

13.3.1 Augmented Lagrange Formulation

13.3.2 Implementation Algorithm

13.4 Case Studies and Simulation Results

13.4.1 Case Studies

13.4.2 Simulation Results

13.4.2.1 Performance Comparison Between Multi‐Agent Based and Single‐Agent Based System

13.4.2.2 Impacts of General Parameters on the Proposed Control Scheme's Performance

13.4.2.3 Impacts of Multi‐Agent Parameters on the Proposed Control Scheme's Performance

13.5 Conclusions

References

Chapter 14 Operation of Distribution Systems Within Secure Limits Using Real‐Time Model Predictive Control

14.1 Introduction

14.2 Basic MPC Principles

14.3 Control Problem Formulation

14.4 Voltage Correction With Minimum Control Effort

14.4.1 Inclusion of LTC Actions as Known Disturbances

14.4.2 Problem Formulation

14.5 Correction of Voltages and Congestion Management with Minimum Deviation from References

14.5.1 Mode 1

14.5.2 Mode 2

14.5.3 Mode 3

14.5.4 Problem Formulation

14.6 Test System

14.7 Simulation Results: Voltage Correction with Minimal Control Effort

14.7.1 Scenario A

14.7.2 Scenario B

14.8 Simulation Results: Voltage and/or Congestion Corrections with Minimum Deviation from Reference

14.8.1 Scenario C: Mode 1

14.8.2 Scenario D: Modes 1 and 2 Combined

14.8.3 Scenario E: Modes 1 and 3 Combined

14.9 Conclusion

References

Chapter 15 Enhancement of Transmission System Voltage Stability through Local Control of Distribution Networks

15.1 Introduction

15.2 Long‐Term Voltage Stability

15.2.1 Countermeasures

15.3 Impact of Volt‐VAR Control on Long‐Term Voltage Stability

15.3.1 Countermeasures

15.4 Test System Description

15.4.1 Test System

15.4.2 VVC Algorithm

15.4.3 Emergency Detection

15.5 Case Studies and Simulation Results

15.5.1 Results in Stable Scenarios

15.5.1.1 Case A1

15.5.1.2 Case A2

15.5.2 Results in Unstable Scenarios

15.5.2.1 Case B1

15.5.2.2 Case B2

15.5.3 Results with Emergency Support From Distribution

15.5.3.1 Case C1

15.5.3.2 Case C2

15.5.3.3 Case C3

15.6 Conclusion

References

Chapter 16 Electric Power Network Splitting Considering Frequency Dynamics and Transmission Overloading Constraints

16.1 Introduction

16.1.1 Stage One: Vulnerability Assessment

16.1.2 Stage Two: Islanding Process

16.2 Network Splitting Mechanism

16.2.1 Graph Modeling, Update, and Reduction

16.2.2 Graph Partitioning Procedure

16.2.3 Load Shedding/Generation Tripping Schemes

16.2.4 Tie‐Lines Determination

16.3 Power Imbalance Constraint Limits

16.3.1 Reduced Frequency Response Model

16.3.2 Power Imbalance Constraint Limits Determination

16.4 Overload Assessment and Control

16.5 Test Results

16.5.1 Power System Collapse

16.5.2 Application of Proposed Methodology

16.5.3 Performance of Proposed ACIS

16.6 Conclusions and Recommendations

References

Chapter 17 High‐Speed Transmission Line Protection Based on Empirical Orthogonal Functions

17.1 Introduction

17.2 Empirical Orthogonal Functions

17.2.1 Formulation

17.3 Applications of EOFs for Transmission Line Protection

17.3.1 Fault Direction

17.3.2 Fault Classification

17.3.2.1 Required EOF

17.3.2.2 Fault Type Surfaces

17.3.2.3 Defining the Fault Type

17.3.3 Fault Location

17.4 Study Case

17.4.1 Transmission Line Model and Simulation

17.4.2 The Power System and Transmission Line

17.4.3 Training Data

17.4.4 Training Data Matrix

17.4.4.1 Data Window

17.4.4.2 Sampling Frequency

17.4.5 Signal Conditioning

17.4.5.1 Superimposed Component

17.4.5.2 Centering the Variables

17.4.5.3 Scaling

17.4.6 Energy Patterns

17.4.7 EOF Analysis

17.4.7.1 Computing the EOFs

17.4.7.2 Fault Patterns Using EOF

17.4.8 Evaluation of the Protection Scheme

17.4.8.1 Fault Direction

17.4.9 Fault Classification

17.4.9.1 Classification

17.4.10 Fault Location

17.5 Conclusions

Appendix 17.A Study Cases: WECC 9‐bus, ATPDraw Models and Parameters

References

Chapter 18 Implementation of a Real Phasor Based Vulnerability Assessment and Control Scheme: The Ecuadorian WAMPAC System

18.1 Introduction

18.2 PMU Location in the Ecuadorian SNI

18.3 Steady‐State Angle Stability

18.4 Steady‐State Voltage Stability

18.5 Oscillatory Stability

18.5.1 Power System Stabilizer Tuning

18.6 Ecuadorian Special Protection Scheme (SPS)

18.6.1 SPS Operation Analysis

18.7 Concluding Remarks

References

Index

EULA

The users who browse this book also browse