Wide Area Security Region Final Report

This report develops innovative and efficient methodologies and practical procedures to determine the wide-area security region of a power system, which take into consideration all types of system constraints including thermal, voltage, voltage stability, transient and potentially oscillatory stability limits in the system. The approach expands the idea of transmission system nomograms to a multidimensional case, involving multiple system limits and parameters such as transmission path constraints, zonal generation or load, etc., considered concurrently. The security region boundary is represented using its piecewise approximation with the help of linear inequalities (so called hyperplanes) in a multi-dimensional space, consisting of system parameters that are critical for security analyses. The goal of this approximation is to find a minimum set of hyperplanes that describe the boundary with a given accuracy. Methodologies are also developed to use the security hyperplanes, pre-calculated offline, to determine system security margins in real-time system operations, to identify weak elements in the system, and to calculate key contributing factors and sensitivities to determine the best system controls in real time and to assist in developing remedial actions and transmission system enhancements offline . A prototype program that automates the simulation procedures used to build the set of securitymore » hyperplanes has also been developed. The program makes it convenient to update the set of security hyperplanes necessitated by changes in system configurations. A prototype operational tool that uses the security hyperplanes to assess security margins and to calculate optimal control directions in real time has been built to demonstrate the project success. Numerical simulations have been conducted using the full-size Western Electricity Coordinating Council (WECC) system model, and they clearly demonstrated the feasibility and the effectiveness of the developed technology. Recommendations for the future work have also been formulated.« less

[1]  Yoh-Han Pao,et al.  Learning tangent hypersurfaces for fast assessment of transient stability , 1993, [1993] Proceedings of the Second International Forum on Applications of Neural Networks to Power Systems.

[2]  R. Podmore,et al.  A Practical Method for the Direct Analysis of Transient Stability , 1979, IEEE Transactions on Power Apparatus and Systems.

[3]  Hongjie Jia,et al.  Theoretical explanation of hyper-plane boundary of dynamic security region , 2005, Canadian Conference on Electrical and Computer Engineering, 2005..

[4]  Felix F. Wu,et al.  Dynamic security regions of power systems , 1982 .

[5]  P. Kundur,et al.  Power system stability and control , 1994 .

[6]  S. T. Lee Community activity room/sup /spl trade// as a new tool for transmission operation and planning under a competitive power market , 2003, 2003 IEEE Bologna Power Tech Conference Proceedings,.

[7]  I. Hiskens,et al.  Exploring the power flow solution space boundary , 2001, PICA 2001. Innovative Computing for Power - Electric Energy Meets the Market. 22nd IEEE Power Engineering Society. International Conference on Power Industry Computer Applications (Cat. No.01CH37195).

[8]  Yixin Yu,et al.  PDSR in Phase Angle Space and SPM Based Security Monitoring of Power Systems , 2005, TENCON 2005 - 2005 IEEE Region 10 Conference.

[9]  Pravin Varaiya,et al.  Foundations of direct methods for power system transient stability analysis , 1987 .

[10]  M. G. Lauby,et al.  Evaluation of the transient energy function method for on-line dynamic security analysis , 1993 .

[11]  Louis Wehenkel,et al.  Transient stability investigations on a Brazilian network by SIME , 1997 .

[12]  V. Brandwajn,et al.  Neural networks for dynamic security assessment of large-scale power systems: requirements overview , 1991, Proceedings of the First International Forum on Applications of Neural Networks to Power Systems.

[13]  S. C. Srivastava,et al.  ANN based voltage stability margin prediction , 2001, 2001 Power Engineering Society Summer Meeting. Conference Proceedings (Cat. No.01CH37262).

[14]  K. Tomsovic,et al.  Dynamic security margin estimation using artificial neural networks , 2002, IEEE Power Engineering Society Summer Meeting,.

[15]  I. Dobson Observations on the geometry of saddle node bifurcation and voltage collapse in electrical power systems , 1992 .

[16]  D. Hill,et al.  Computation of Bifurcation Boundaries for Power Systems: a New , 2000 .

[17]  A. A. El-Keib,et al.  Application of artificial neural networks in voltage stability assessment , 1995 .

[18]  Newton G. Bretas,et al.  Direct methods for transient stability analysis in power systems: state of art and future perspectives , 2001, 2001 IEEE Porto Power Tech Proceedings (Cat. No.01EX502).

[19]  Mohamed A. El-Sharkawi,et al.  Dynamic Security Assessment of Power Systems Using Back Error Propagation Artificial Neuron Networks , 1989 .

[20]  A. Phadke,et al.  Control of voltage stability using sensitivity analysis , 1992 .

[21]  Y. Makarova,et al.  Properties of quadratic equations and their application to power system analysis , 2000 .

[22]  H. Yee,et al.  Transient stability analysis of multimachine power systems by the method of hyperplanes , 1977, IEEE Transactions on Power Apparatus and Systems.

[23]  Paul Dimo L'analyse nodale des réseaux d'energie , 1971 .

[24]  V. Vittal,et al.  Dynamic Security Assessment Utilizing the Transient Energy Function Method , 1986, IEEE Transactions on Power Systems.

[25]  Felix F. Wu,et al.  A BCU method for direct analysis of power system transient stability , 1994 .

[26]  M. Povolotskiy,et al.  Evaluate real-time system reliability using boundary-based concept for EKPC system , 2008, 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century.

[27]  Louis Wehenkel,et al.  Automatic Learning Techniques in Power Systems , 1997 .

[28]  Hossein Hakim,et al.  Application of pattern recognition in transient security assessment , 1992 .

[29]  K. Tomsovic Integrated Security Analysis , 2003 .

[30]  Sushil Chauhan,et al.  Kohonen neural network classifier for voltage collapse margin estimation , 1997 .

[31]  Hongjie Jia,et al.  Visualization of voltage stability region of bulk power system , 2002, Proceedings. International Conference on Power System Technology.

[32]  James D. McCalley,et al.  Security boundary visualization for systems operation , 1997 .

[33]  Mohamed A. El-Sharkawi,et al.  Large scale dynamic security screening and ranking using neural networks , 1997 .

[34]  Y. H. Song,et al.  Hybrid supervised and unsupervised neural network approach to voltage stability analysis , 1998 .

[35]  Hongjie Jia,et al.  A study on boundary of small disturbance stability region , 2002, Proceedings. International Conference on Power System Technology.

[36]  Yixin Yu,et al.  A practical direct method for determining dynamic security regions of electrical power systems , 2002, Proceedings. International Conference on Power System Technology.

[37]  S. Kumagai,et al.  Steady-State Security Regions of Power Systems , 1982 .

[38]  I. Dobson,et al.  New methods for computing a closest saddle node bifurcation and worst case load power margin for voltage collapse , 1993 .

[39]  M. M Salama,et al.  Estimating the voltage collapse proximity indicator using artificial neural network , 2001 .

[40]  C. K. Tang,et al.  Hybrid transient stability analysis (power systems) , 1990 .

[41]  Jianzhong Tong,et al.  A sensitivity-based BCU method for fast derivation of stability limits in electric power systems , 1993 .