Fuzzy logic based MW contingency ranking against masking problem

The main objective of an electric power system planning and operation is to maintain the system security while respecting certain constraints imposed on the system. As a framework of security, it is important to investigate the influence of potential failure states on the system performance in advance. Contingency ranking quantifies the severity of each outage with a scalar performance index, by which all possible contingencies can be ranked. Low order performance indices are preferred for the sake of computational efficiency. However, they cannot succeed in accurate ordering because of masking effect. This paper presents a fuzzy logic based MW contingency ranking algorithm for line outage contingency analysis, which minimizes the masking effect. Following the presentation of theoretical basis, the proposed algorithm is applied to several test systems. The concordance of the resulting rankings and the actual rankings are tested with several statistical quantities.

[1]  A. Ozdemir,et al.  Contingency selection based on real power transmission losses , 1999, PowerTech Budapest 99. Abstract Records. (Cat. No.99EX376).

[2]  Feng Xia,et al.  Performance evaluation of static security analysis methods , 1994 .

[3]  F.D. Galiana,et al.  Bound Estimates of the Severity of Line Outages in Power System Contingency Analysis and Ranking , 1984, IEEE Transactions on Power Apparatus and Systems.

[4]  O. Alsac,et al.  Optimal Load Flow with Steady-State Security , 1974 .

[5]  R. Fischl,et al.  Analysis of Automatic Contingency Selection Algorithms , 1984, IEEE Transactions on Power Apparatus and Systems.

[6]  G. Ejebe,et al.  Automatic Contingency Selection , 1979, IEEE Transactions on Power Apparatus and Systems.

[7]  K.F. Schafer,et al.  Adaptive procedure for masking effect compensation in contingency selection algorithms , 1989, Conference Papers Power Industry Computer Application Conference.

[8]  V. Brandwajn,et al.  Pre-screening of single contingencies causing network topology changes , 1991, IEEE Power Engineering Review.

[9]  Tarlochan S. Sidhu,et al.  Contingency screening for steady-state security analysis by using FFT and artificial neural networks , 2000 .