Identification of severe multiple contingencies in electric power networks

In this paper we propose a two-stage screening and analysis process for identifying multiple contingencies that may result in very severe disturbances and blackouts. In a screening stage we form an optimization problem to find the minimum change in the network to move the power flow feasibility boundary to the present operating point and that will cause the system to separate with a user-specified power imbalance. The lines identified by the optimization program are used in a subsequent analysis stage to find combinations that may lead to a blackout. This approach is applied to a 30-bus system with encouraging results.

[1]  T. Overbye A power flow measure for unsolvable cases , 1994 .

[2]  Fan Chung,et al.  Spectral Graph Theory , 1996 .

[3]  Peter W. Sauer,et al.  Static Collapse and Topological Cuts , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.

[4]  F. Alvarado,et al.  Computation of closest bifurcations in power systems , 1994 .

[5]  Peter W. Sauer,et al.  A necessary condition for power flow Jacobian singularity based on branch complex flows , 2005, IEEE Transactions on Circuits and Systems I: Regular Papers.

[6]  Michael A. Saunders,et al.  SNOPT: An SQP Algorithm for Large-Scale Constrained Optimization , 2002, SIAM J. Optim..

[7]  I. Dobson,et al.  New methods for computing a closest saddle node bifurcation and worst case load power margin for voltage collapse , 1993 .

[8]  A. Berizzi,et al.  Comparison of voltage security constrained optimal power flow techniques , 2001, 2001 Power Engineering Society Summer Meeting. Conference Proceedings (Cat. No.01CH37262).

[9]  K.N. Miu,et al.  A network-based distributed slack bus model for DGs in unbalanced power flow studies , 2005, IEEE Transactions on Power Systems.

[10]  Jorge Nocedal,et al.  An Interior Point Algorithm for Large-Scale Nonlinear Programming , 1999, SIAM J. Optim..

[11]  Garth P McCormick,et al.  Large Scale Nonlinear Programming. , 1978 .

[12]  J.D. McCalley,et al.  Identifying high risk N-k contingencies for online security assessment , 2005, IEEE Transactions on Power Systems.

[13]  I. Hiskens,et al.  Convexity of the set of feasible injections and revenue adequacy in FTR markets , 2005, IEEE Transactions on Power Systems.

[14]  I. Hiskens,et al.  Exploring the Power Flow Solution Space Boundary , 2001, IEEE Power Engineering Review.

[15]  C. Cañizares Conditions for saddle-node bifurcations in AC/DC power systems , 1995 .

[16]  J. Arroyo,et al.  On the solution of the bilevel programming formulation of the terrorist threat problem , 2005, IEEE Transactions on Power Systems.

[17]  J. Salmeron,et al.  Analysis of electric grid security under terrorist threat , 2004, IEEE Transactions on Power Systems.

[18]  Lorenz T. Biegler,et al.  On the implementation of an interior-point filter line-search algorithm for large-scale nonlinear programming , 2006, Math. Program..

[19]  Alexander J. Flueck,et al.  A new continuation power flow tool for investigating the nonlinear effects of transmission branch parameter variations , 2000 .

[20]  I. Dobson Observations on the geometry of saddle node bifurcation and voltage collapse in electrical power systems , 1992 .

[21]  Ernst Scholtz,et al.  Observer-based monitors and distributed wave controllers for electromechanical disturbances in power systems , 2004 .

[22]  Jorge J. Moré,et al.  The NEOS Server , 1998 .