Robust Power System Security Assessment Under Uncertainties Using Bi-Level Optimization

Due to rapid expansions of renewable energy (RE) generations, it becomes more important to assess the feasibility of power system operation under limited controllable resources. Especially, exact evaluation of the system reserve for preserving system security is required under erroneous RE output predictions. This paper proposes a method to evaluate the size of the feasible region of power system operation in control space for the examination of the effective system reserve margin under uncertainties. Predicted RE and demands with their confidence intervals (CIs) are specified to formulate a problem for the evaluation of the size of the worst-case feasible region, where positive size implies feasibility, while negative, infeasibility. The method computes the degree of system security, which is referred to as “Robust Power System Security” in this paper. The problem is formulated as bi-level optimization, which is linearized and transformed into the mixed integer linear programming (MILP) problem. This is a new approach in the treatment of uncertainties. We use DC power flow and linear constrained dynamic economic dispatch problem to demonstrate the effectiveness of the proposed method. The proposed approach is useful in power system planning in analyzing the feasibility of dynamic real-time operation in future circumstance.

[1]  O. Alsac,et al.  Security analysis and optimization , 1987, Proceedings of the IEEE.

[2]  Naoto Yorino,et al.  A New Method for Obtaining Critical Clearing Time for Transient Stability , 2010, IEEE Transactions on Power Systems.

[3]  François Bouffard,et al.  On the loadability sets of power systems — Part II: Minimal representations , 2017, 2017 IEEE Power & Energy Society General Meeting.

[4]  B Stott,et al.  Linear Programming for Power-System Network Security Applications , 1979, IEEE Transactions on Power Apparatus and Systems.

[5]  F.D. Galiana,et al.  A mixed-integer LP procedure for the analysis of electric grid security under disruptive threat , 2005, IEEE Transactions on Power Systems.

[6]  Shengwei Mei,et al.  Dispatchable Region of the Variable Wind Generation , 2015, IEEE Transactions on Power Systems.

[7]  Jose M. Arroyo,et al.  Bilevel programming applied to power system vulnerability analysis under multiple contingencies , 2010 .

[8]  Francois Bouffard,et al.  On the Loadability Sets of Power Systems—Part I: Characterization , 2017, IEEE Transactions on Power Systems.

[9]  Pierre Hansen,et al.  Links Between Linear Bilevel and Mixed 0–1 Programming Problems , 1995 .

[10]  Takuma Fujiwara,et al.  A direct method for obtaining critical clearing time for transient stability using critical generator conditions , 2012 .

[11]  Manfred Morari,et al.  Rolling Unit Commitment and Dispatch With Multi-Stage Recourse Policies for Heterogeneous Devices , 2016, IEEE Transactions on Power Systems.

[12]  Naoto Yorino,et al.  A new method of evaluating robust power system security against uncertainties , 2015 .

[13]  Xu Andy Sun,et al.  Adaptive Robust Optimization With Dynamic Uncertainty Sets for Multi-Period Economic Dispatch Under Significant Wind , 2015 .

[14]  Jinye Zhao,et al.  A Unified Framework for Defining and Measuring Flexibility in Power System , 2016, IEEE Transactions on Power Systems.

[15]  Stephen J. Wright,et al.  Analyzing Vulnerability of Power Systems with Continuous Optimization Formulations , 2016, IEEE Transactions on Network Science and Engineering.

[16]  Jinye Zhao,et al.  Variable Resource Dispatch Through Do-Not-Exceed Limit , 2015, IEEE Transactions on Power Systems.

[17]  James D. McCalley,et al.  A Computational Strategy to Solve Preventive Risk-Based Security-Constrained OPF , 2013, IEEE Transactions on Power Systems.

[18]  Feng Gao,et al.  Security-constrained generation scheduling with feasible energy delivery , 2009, 2009 IEEE Power & Energy Society General Meeting.

[19]  N. Yorino,et al.  An Application of Critical Trajectory Method to BCU Problem for Transient Stability Studies , 2013, IEEE Transactions on Power Systems.

[20]  Naoto Yorino,et al.  An application of robust power system security to power system operation for high-penetration of PV , 2012, 2012 3rd IEEE PES Innovative Smart Grid Technologies Europe (ISGT Europe).

[21]  Hongyu Wu,et al.  Hourly Demand Response in Day-Ahead Scheduling Considering Generating Unit Ramping Cost , 2013, IEEE Transactions on Power Systems.

[22]  J. M. Arroyo,et al.  Contingency-Constrained Unit Commitment With $n - K$ Security Criterion: A Robust Optimization Approach , 2011, IEEE Transactions on Power Systems.

[23]  F.D. Galiana,et al.  Power System Security Corridors Concept and Computation , 1981, IEEE Transactions on Power Apparatus and Systems.

[24]  Kory W. Hedman,et al.  Enhancement of Do-Not-Exceed Limits With Robust Corrective Topology Control , 2016, IEEE Transactions on Power Systems.

[25]  Naoto Yorino,et al.  Dynamic load dispatch for power system robust security against uncertainties , 2013, 2013 IREP Symposium Bulk Power System Dynamics and Control - IX Optimization, Security and Control of the Emerging Power Grid.

[26]  E. Lannoye,et al.  Evaluation of Power System Flexibility , 2012, IEEE Transactions on Power Systems.

[27]  Louis Wehenkel,et al.  Computation of Worst Operation Scenarios Under Uncertainty for Static Security Management , 2013, IEEE Transactions on Power Systems.

[28]  Omid Alizadeh Mousavi,et al.  Stochastic Security Constrained Unit Commitment with variable-speed pumped-storage Hydropower Plants , 2016, 2016 Power Systems Computation Conference (PSCC).

[29]  Naoto Yorino Senior Member,et al.  A new method of evaluating robust power system security against uncertainties , 2015 .

[30]  N. Yorino,et al.  High-Speed Real-Time Dynamic Economic Load Dispatch , 2012, IEEE Transactions on Power Systems.

[31]  Xu Andy Sun,et al.  Adaptive Robust Optimization for the Security Constrained Unit Commitment Problem , 2013, IEEE Transactions on Power Systems.

[32]  J. Salmeron,et al.  Worst-Case Interdiction Analysis of Large-Scale Electric Power Grids , 2009, IEEE Transactions on Power Systems.

[33]  Hiroshi Sasaki,et al.  A solution of optimal power flow with multicontingency transient stability constraints , 2003 .

[34]  Naoto Yorino,et al.  Feasible operation region for dynamic economic dispatch and reserve monitoring , 2012 .

[35]  H. Sasaki,et al.  A New Formulation for FACTS Allocation for Security Enhancement against Voltage Collapse , 2002, IEEE Power Engineering Review.

[36]  J. Arroyo,et al.  On the solution of the bilevel programming formulation of the terrorist threat problem , 2005, IEEE Transactions on Power Systems.

[37]  Jose M. Arroyo,et al.  An Adjustable Robust Optimization Approach for Contingency-Constrained Transmission Expansion Planning , 2015, IEEE Transactions on Power Systems.

[38]  T. E. Dy Liacco,et al.  Power/energy: System security: The computer's role: Several security-related functions can be aided by the digital computer, and linked together by a software scheme , 1978 .

[39]  Naoto Yorino,et al.  Probabilistic economic load dispatch applied to a micro-EMS controller , 2016, 2016 Power Systems Computation Conference (PSCC).

[40]  L. Wehenkel,et al.  Contingency Ranking With Respect to Overloads in Very Large Power Systems Taking Into Account Uncertainty, Preventive, and Corrective Actions , 2013, IEEE Transactions on Power Systems.

[41]  Eric Hobson,et al.  Power System Security Control Calculations Using Linear Programming, Part II , 1978, IEEE Transactions on Power Apparatus and Systems.

[42]  Matthias A. Bucher,et al.  Managing Flexibility in Multi-Area Power Systems , 2014, IEEE Transactions on Power Systems.

[43]  L. Wehenkel,et al.  Cautious Operation Planning Under Uncertainties , 2012, IEEE Transactions on Power Systems.