Voltage Feasibility Boundaries for Power System Security Assessment

Modern power systems face a grand challenge in grid management due to increased electricity demand, imminent disturbances, and uncertainties associated with renewable generation, which can compromise grid security. The security assessment is directly connected to the robustness of the operating condition and is evaluated by analyzing proximity to the power flow solution space’s boundary. Calculating location of such a boundary is a computationally challenging task, linked to the power flow equations’ non-linear nature, presence of technological constraints, and complicated network topology. In this paper we introduce a general framework to characterize points on the power flow solution space boundary in terms of auxiliary variables subject to algebraic constraints. Then we develop an adaptive continuation algorithm to trace 1-dimensional sections of boundary curves which exhibits robust performance and computational tractability. Implementation of the algorithm is described in detail, and its performance is validated on different test networks.

[1]  I. Hiskens,et al.  Exploring the Power Flow Solution Space Boundary , 2001, IEEE Power Engineering Review.

[2]  Venkataramana Ajjarapu,et al.  The continuation power flow: a tool for steady state voltage stability analysis , 1991 .

[3]  F. Galiana,et al.  Quantitative Analysis of Steady State Stability in Power Networks , 1981, IEEE Transactions on Power Apparatus and Systems.

[4]  Venkataramana Ajjarapu,et al.  Computational Techniques For Voltage Stability Assessment And Control , 2006 .

[5]  Mazhar Ali,et al.  Fast Calculation of the Transfer Capability Margins , 2019, 2019 IEEE Milan PowerTech.

[6]  Costas D. Vournas,et al.  Maximizing Power-System Loadability in the Presence of Multiple Binding Complementarity Constraints , 2007, IEEE Transactions on Circuits and Systems I: Regular Papers.

[7]  Kiyotaka Yamamura,et al.  Simple algorithms for tracing solution curves , 1992, [Proceedings] 1992 IEEE International Symposium on Circuits and Systems.

[8]  Konstantin Turitsyn,et al.  Transversality Enforced Newton Raphson Algorithm for Fast Calculation of Maximum Loadability , 2017 .

[9]  Ron Goldman,et al.  Curvature formulas for implicit curves and surfaces , 2005, Comput. Aided Geom. Des..

[10]  Daniel Tylavsky,et al.  Estimating the saddle-node bifurcation point of static power systems using the holomorphic embedding method , 2017 .

[11]  T.V. Cutsem,et al.  A method to compute reactive power margins with respect to v , 1991, IEEE Power Engineering Review.

[12]  Moritz Mittelstaedt,et al.  An Iterative Method for Determining the Most Probable Bifurcation in Large Scale Power Systems , 2017, IEEE Transactions on Power Systems.

[13]  I. Hiskens,et al.  Convexity of the set of feasible injections and revenue adequacy in FTR markets , 2005, IEEE Transactions on Power Systems.

[14]  E. Allgower,et al.  Introduction to Numerical Continuation Methods , 1987 .

[15]  Luis Hernandez-Martinez,et al.  Homotopy Path Planning for Terrestrial Robots Using Spherical Algorithm , 2018, IEEE Transactions on Automation Science and Engineering.

[16]  B. Ayuev,et al.  Fast and Reliable Method of Searching Power System Marginal States , 2016, IEEE Transactions on Power Systems.

[17]  Daniel K. Molzahn,et al.  Computing the Feasible Spaces of Optimal Power Flow Problems , 2016, IEEE Transactions on Power Systems.

[18]  K. Morison,et al.  Power system security assessment , 2004, IEEE Power and Energy Magazine.

[19]  Aranya Chakrabortty,et al.  Locating Power Flow Solution Space Boundaries: A Numerical Polynomial Homotopy Approach , 2017, ArXiv.