An application of robust power system security to power system operation for high-penetration of PV

This paper proposes a method of analyzing the N-1 security under the circumstances of PV penetration. The concept of Robust Power System Security (RS) proposed by the authors is used to evaluate the N-1 security quantitatively. It is shown that (1) the relationship between PV penetration and the N-1 security results in a clear trade-off, (2) installation of storage batteries is effective to enhance the N-1 security and (3) power system operators will be able to monitor the N-1 security condition directly by visualizing the security regions gained from the concept of RS. The effectiveness of the proposed method is demonstrated through simulations using a three machine system.

[1]  H.H. Happ,et al.  Large Scale Security Dispatching: an Exact Model , 1983, IEEE Transactions on Power Apparatus and Systems.

[2]  Naoto Yorino,et al.  A concept of Robust Power System Security and its application under renewable energy sources penetration , 2012, 2012 IEEE PES Innovative Smart Grid Technologies (ISGT).

[3]  Yoshihisa Uchida,et al.  Statistical Analysis of the Smoothing Effect for Photovoltaic Systems in a Large Area , 2010 .

[4]  Chen-Ching Liu A New Method for the Construction of Maximal Steady-State Security Regions of Power Systems , 1986, IEEE Transactions on Power Systems.

[5]  H. Kodama,et al.  On-Line Contingency Selection Algorithm for Voltage Security Analysis , 1985, IEEE Transactions on Power Apparatus and Systems.

[6]  H. Sasaki,et al.  Multiobjective optimal generation dispatch based on probability security criteria , 1988 .

[7]  O. Alsac,et al.  Security analysis and optimization , 1987, Proceedings of the IEEE.

[8]  Essam A. Al-Ammar,et al.  Framework for Identification of Power System Operating Security Regions , 2009, 2009 Third International Conference on Network and System Security.

[9]  Essam A. Al-Ammar,et al.  Application of operating security regions in power systems , 2010, IEEE PES T&D 2010.

[10]  T. E. Dy Liacco,et al.  Power/energy: System security: The computer's role: Several security-related functions can be aided by the digital computer, and linked together by a software scheme , 1978 .

[11]  G. Irisarri,et al.  An Automatic Contingency Selection Method for On-Line Security Analysis , 1981, IEEE Transactions on Power Apparatus and Systems.

[12]  Shengwei Mei,et al.  Power System Dynamic Security Region and Its Approximations , 2006, IEEE Transactions on Circuits and Systems I: Regular Papers.

[13]  Naoto Yorino,et al.  Issues for power system operation for future renewable energy penetration: Robust power system security , 2011 .

[14]  Sydulu Maheswarapu,et al.  Security Constraint Optimal Power Flow (SCOPF) – A Comprehensive Survey , 2010 .

[15]  B. Stott,et al.  Power System Security Control Calculations Using Linear Programming, Part I , 1978, IEEE Transactions on Power Apparatus and Systems.

[16]  Hiroshi Yamaguchi,et al.  A Method to Estimate the Output Fluctuation of Many Photovoltaic Power Generation Systems Dispersed in a Wide Area , 2007 .

[17]  James D. McCalley,et al.  Online risk-based security assessment , 2002 .

[18]  Naoto Yorino,et al.  Security Issues for Mega Penetration of Photovoltaic Power Generations in Future Electric Power Systems: —A Case Study of Stability for Power Swing Oscillation using IEEJ WEST 10 Machines Model—@@@—WEST10機系統における振動発散型安定度面の検討— , 2012 .

[19]  V. Vittal,et al.  Online Risk-Based Security Assessment , 2002, IEEE Power Engineering Review.

[20]  Hongbo Sun,et al.  Flexible steady-state security region of power system with uncertain load demand and soft security limits , 2000, 2000 Power Engineering Society Summer Meeting (Cat. No.00CH37134).

[21]  Goran Andersson,et al.  N-1 security in optimal power flow control applied to limited areas , 2009 .

[22]  A. Monticelli,et al.  Security-Constrained Optimal Power Flow with Post-Contingency Corrective Rescheduling , 1987, IEEE Transactions on Power Systems.

[23]  F.D. Galiana,et al.  Power System Security Corridors Concept and Computation , 1981, IEEE Transactions on Power Apparatus and Systems.

[24]  B Stott,et al.  Linear Programming for Power-System Network Security Applications , 1979, IEEE Transactions on Power Apparatus and Systems.

[25]  Atif Soubhi Debs,et al.  Security assessment of power systems , 1975 .