A method for evaluating robust power system security against uncertainties

Reliability of network operation is becoming an important problem due to increase in renewable energy (RE) generations. The system controllability is degenerating, while uncertainty due to RE is increasing and threatening the system security. We refer to the robustness of the system security against the uncertainty as “Robust Power System Security.” This paper proposes a new method to monitor the robust security region taking into account the conventional N-1 security criterion against uncertainties. Confidence interval (CI) of uncertain parameter is used to obtain the safe-side feasible regions of power sytem operations. We study a load dispatching problem using CI of RE prediction to evaluate the security region. Simulation results show that the proposed method is a promising approach to assess the degree of feasibility of system operation planning.

[1]  Eric Hobson,et al.  Power System Security Control Calculations Using Linear Programming, Part II , 1978, IEEE Transactions on Power Apparatus and Systems.

[2]  F.D. Galiana,et al.  Power System Security Corridors Concept and Computation , 1981, IEEE Transactions on Power Apparatus and Systems.

[3]  L. Wehenkel,et al.  Security management under uncertainty: From day-ahead planning to intraday operation , 2010, 2010 IREP Symposium Bulk Power System Dynamics and Control - VIII (IREP).

[4]  Naoto Yorino,et al.  Issues for power system operation for future renewable energy penetration: Robust power system security , 2011 .

[5]  H. Sasaki,et al.  A New Formulation for FACTS Allocation for Security Enhancement against Voltage Collapse , 2002, IEEE Power Engineering Review.

[6]  M. Shahidehpour,et al.  Security-Constrained Unit Commitment With AC/DC Transmission Systems , 2010, IEEE Transactions on Power Systems.

[7]  Naoto Yorino,et al.  Dynamic load dispatch for power system robust security against uncertainties , 2013, 2013 IREP Symposium Bulk Power System Dynamics and Control - IX Optimization, Security and Control of the Emerging Power Grid.

[8]  Essam A. Al-Ammar,et al.  Application of operating security regions in power systems , 2010, IEEE PES T&D 2010.

[9]  Sydulu Maheswarapu,et al.  Security Constraint Optimal Power Flow (SCOPF) – A Comprehensive Survey , 2010 .

[10]  V. Vittal,et al.  Online Risk-Based Security Assessment , 2002, IEEE Power Engineering Review.

[11]  Hongbo Sun,et al.  Flexible steady-state security region of power system with uncertain load demand and soft security limits , 2000, 2000 Power Engineering Society Summer Meeting (Cat. No.00CH37134).

[12]  Naoto Yorino,et al.  An application of robust power system security to power system operation for high-penetration of PV , 2012, 2012 3rd IEEE PES Innovative Smart Grid Technologies Europe (ISGT Europe).

[13]  Hiroshi Sasaki,et al.  A solution of optimal power flow with multicontingency transient stability constraints , 2003 .

[14]  G. Irisarri,et al.  An Automatic Contingency Selection Method for On-Line Security Analysis , 1981, IEEE Transactions on Power Apparatus and Systems.

[15]  O. Alsac,et al.  Security analysis and optimization , 1987, Proceedings of the IEEE.

[16]  Goran Andersson,et al.  N-1 security in optimal power flow control applied to limited areas , 2009 .

[17]  A. Conejo,et al.  Market-clearing with stochastic security-part I: formulation , 2005, IEEE Transactions on Power Systems.

[18]  B Stott,et al.  Linear Programming for Power-System Network Security Applications , 1979, IEEE Transactions on Power Apparatus and Systems.

[19]  L. Wehenkel,et al.  Contingency Ranking With Respect to Overloads in Very Large Power Systems Taking Into Account Uncertainty, Preventive, and Corrective Actions , 2013, IEEE Transactions on Power Systems.

[20]  Naoto Yorino Senior Member,et al.  A new method of evaluating robust power system security against uncertainties , 2015 .

[21]  H.H. Happ,et al.  Large Scale Security Dispatching: an Exact Model , 1983, IEEE Transactions on Power Apparatus and Systems.

[22]  Naoto Yorino,et al.  A new method of evaluating robust power system security against uncertainties , 2015 .

[23]  A. Monticelli,et al.  Security-Constrained Optimal Power Flow with Post-Contingency Corrective Rescheduling , 1987, IEEE Transactions on Power Systems.

[24]  Michael Power Stochastic power system operation , 2010 .

[25]  H. Kodama,et al.  On-Line Contingency Selection Algorithm for Voltage Security Analysis , 1985, IEEE Transactions on Power Apparatus and Systems.