A security level classification method for power systems under N-1 contingency

Security assessment is crucial for the reliable and secure operation of power systems. This paper proposes a security level classification (SLC) method to analyze the security level of power systems both qualitatively and quantitatively. In this SLC method, security levels are graded according to a comprehensive safety index (CSI), which is defined by integrating the system margin index (SMI) and load entropy. The SMI depends on the operating load and the total supply capacity (TSC) under N-1 contingency, and the load entropy reflects the heterogeneity of load distribution calculated from entropy theory. In order to calculate the TSC under N-1 contingency considering both of the computational accuracy and speed, the TSC is converted into an extended conic quadratic programming (ECQP) model. In addition, the load boundary vector (LBV) model is established to obtain the capacity limit of each load bus, and thus detect potential risks of power systems. Finally, two modified practical power systems and the IEEE 118-bus test system are studied to validate the feasibility of the proposed SLC method.

[1]  Wang Sai-yi United Urban Power Grid Planning for Network Structure and Partition Scheme Based on Bi-level Multi-objective Optimization With Genetic Algorithm , 2009 .

[2]  Fei Xue,et al.  Extended topological approach for the assessment of structural vulnerability in transmission networks , 2010 .

[3]  K. S. Swarup,et al.  Pattern analysis and classification for security evaluation in power networks , 2013 .

[4]  A.M. Stankovic,et al.  Model uncertainty in security assessment of power systems , 2005, IEEE Transactions on Power Systems.

[5]  Chengshan Wang,et al.  Total supply capability and its extended indices for distribution systems: definition, model calculation and applications , 2011 .

[6]  K. S. Swarup,et al.  Power system static security assessment and evaluation using external system equivalents , 2008 .

[7]  William H. Sanders,et al.  SOCCA: A Security-Oriented Cyber-Physical Contingency Analysis in Power Infrastructures , 2014, IEEE Transactions on Smart Grid.

[8]  Hao Liang,et al.  CCPA: Coordinated Cyber-Physical Attacks and Countermeasures in Smart Grid , 2017, IEEE Transactions on Smart Grid.

[9]  L. Soder,et al.  Importance Sampling of Injected Powers for Electric Power System Security Analysis , 2012, IEEE Transactions on Power Systems.

[10]  Jovica V. Milanovic,et al.  Risk-Based Small-Disturbance Security Assessment of Power Systems , 2015, IEEE Transactions on Power Delivery.

[11]  Jun Xiao,et al.  Loadability formulation and calculation for interconnected distribution systems considering N-1 security , 2016 .

[12]  Kit Po Wong,et al.  A Reliable Intelligent System for Real-Time Dynamic Security Assessment of Power Systems , 2012, IEEE Transactions on Power Systems.

[13]  Guzmán Díaz Maximum loadability of droop regulated microgrids - formulation and analysis , 2013 .

[14]  Mohammad Shahidehpour,et al.  A Simplified Co-Simulation Model for Investigating Impacts of Cyber-Contingency on Power System Operations , 2018, IEEE Transactions on Smart Grid.

[15]  Xinghuo Yu,et al.  A Maximum-Flow-Based Complex Network Approach for Power System Vulnerability Analysis , 2013, IEEE Transactions on Industrial Informatics.

[16]  Wenyuan Li,et al.  Power System Operation Risk Assessment Using Credibility Theory , 2008, IEEE Transactions on Power Systems.

[17]  Andrew Ginter,et al.  Cyber-Based Contingency Analysis , 2016, IEEE Transactions on Power Systems.

[18]  Almoataz Y. Abdelaziz,et al.  Probabilistic Neural Network Classifier for Static Voltage Security Assessment of Power Systems , 2011 .

[19]  C.A. Castro,et al.  Fast computation of voltage stability security margins using nonlinear programming techniques , 2006, IEEE Transactions on Power Systems.

[20]  Liu Zong-bing Online Evaluation of Utmost Power Supply Ability of Urban Power System and Its Application , 2008 .

[21]  Haozhong Cheng,et al.  Probabilistic Evaluation of Available Load Supply Capability for Distribution System , 2013, IEEE Transactions on Power Systems.

[22]  Costas D. Vournas,et al.  Maximizing Power-System Loadability in the Presence of Multiple Binding Complementarity Constraints , 2007, IEEE Transactions on Circuits and Systems I: Regular Papers.

[23]  Zechun Hu,et al.  Efficient Computation of Maximum Loading Point by Load Flow Method With Optimal Multiplier , 2008, IEEE Transactions on Power Systems.

[24]  Ruisheng Diao,et al.  Design of a Real-Time Security Assessment Tool for Situational Awareness Enhancement in Modern Power Systems , 2010, IEEE Transactions on Power Systems.

[25]  Li Yinhong,et al.  Identification of Critical Lines and Nodes in Power Grid Based on Maximum Flow Transmission Contribution Degree , 2012 .

[26]  Tao Huang,et al.  A framework for analyzing cascading failure in large interconnected power systems: A post-contingency evolution simulator , 2016 .

[27]  R. Sunitha,et al.  Online Static Security Assessment Module Using Artificial Neural Networks , 2013, IEEE Transactions on Power Systems.

[28]  W. R. Lachs Area-Wide System Protection Scheme Against Extreme Contingencies , 2005, Proceedings of the IEEE.

[29]  K. Shanti Swarup,et al.  Classification and Assessment of Power System Security Using Multiclass SVM , 2011, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[30]  R. Jabr,et al.  A Conic Quadratic Format for the Load Flow Equations of Meshed Networks , 2007, IEEE Transactions on Power Systems.

[31]  Tao Huang,et al.  Techno-economic impacts of automatic undervoltage load shedding under emergency , 2016 .