A concept of Robust Power System Security and its application under renewable energy sources penetration

Penetration of large amount of renewable energy sources (RES) may introduce considerable uncertainties in power systems making difficult the planning and operation tasks. This paper proposes a new concept named “Robust Power System Security (RS)” in order to investigate power system security in the presence of uncertainties. RS region is defined as an area of power system operation in which the system is secure regardless of uncertainties in parameters such as RES outputs. When the size of the uncertainties is specified, RS region is identified. It is observed that the region tends to shrink and disappear as the uncertainty increases. Emerging problems concerned with security issues in future power systems are investigated. Simulations under large RES penetration are carried out using a three generators test system. Possible applications of the proposed concept toward real-time operation problems are discussed for keeping up the security.

[1]  H. Kodama,et al.  On-Line Contingency Selection Algorithm for Voltage Security Analysis , 1985, IEEE Transactions on Power Apparatus and Systems.

[2]  James D. McCalley,et al.  Online risk-based security assessment , 2002 .

[3]  Chen-Ching Liu A New Method for the Construction of Maximal Steady-State Security Regions of Power Systems , 1986, IEEE Transactions on Power Systems.

[4]  F.D. Galiana,et al.  Power System Security Corridors Concept and Computation , 1981, IEEE Transactions on Power Apparatus and Systems.

[5]  G. Irisarri,et al.  An Automatic Contingency Selection Method for On-Line Security Analysis , 1981, IEEE Transactions on Power Apparatus and Systems.

[6]  Essam A. Al-Ammar,et al.  Application of operating security regions in power systems , 2010, IEEE PES T&D 2010.

[7]  V. Vittal,et al.  Online Risk-Based Security Assessment , 2002, IEEE Power Engineering Review.

[8]  Hongbo Sun,et al.  Flexible steady-state security region of power system with uncertain load demand and soft security limits , 2000, 2000 Power Engineering Society Summer Meeting (Cat. No.00CH37134).

[9]  Goran Andersson,et al.  N-1 security in optimal power flow control applied to limited areas , 2009 .

[10]  H.H. Happ,et al.  Large Scale Security Dispatching: an Exact Model , 1983, IEEE Transactions on Power Apparatus and Systems.

[11]  A. Monticelli,et al.  Security-Constrained Optimal Power Flow with Post-Contingency Corrective Rescheduling , 1987, IEEE Transactions on Power Systems.

[12]  Shengwei Mei,et al.  Power System Dynamic Security Region and Its Approximations , 2006, IEEE Transactions on Circuits and Systems I: Regular Papers.

[13]  Sydulu Maheswarapu,et al.  Security Constraint Optimal Power Flow (SCOPF) – A Comprehensive Survey , 2010 .

[14]  B. Stott,et al.  Power System Security Control Calculations Using Linear Programming, Part I , 1978, IEEE Transactions on Power Apparatus and Systems.

[15]  H. Sasaki,et al.  Multiobjective optimal generation dispatch based on probability security criteria , 1988 .

[16]  O. Alsac,et al.  Security analysis and optimization , 1987, Proceedings of the IEEE.

[17]  Essam A. Al-Ammar,et al.  Framework for Identification of Power System Operating Security Regions , 2009, 2009 Third International Conference on Network and System Security.

[18]  Naoto Yorino,et al.  Issues for power system operation for future renewable energy penetration: Robust power system security , 2011 .

[19]  B Stott,et al.  Linear Programming for Power-System Network Security Applications , 1979, IEEE Transactions on Power Apparatus and Systems.

[20]  Atif Soubhi Debs,et al.  Security assessment of power systems , 1975 .

[21]  T. E. Dy Liacco,et al.  Power/energy: System security: The computer's role: Several security-related functions can be aided by the digital computer, and linked together by a software scheme , 1978 .