Toward the concept of integrated security: optimal dispatch under static and dynamic security constraints

Abstract No analytical method is yet known which can solve the optimal power flow problem, off-line or on-line, when it is constrained by both static and dynamic security. The concepts introduced in this paper can, however, contribute substantially toward obtaining on-line solutions of the problem. Key ideas behind the concept of an integrated security constrained optimal dispatch (ISCOD) are presented. Its purpose is to calculate the power outputs of generators and the voltage magnitudes of buses so that the cost of power generation is minimized and both static and dynamic security of the system are maintained. While analytical tools for steady-state security constrained dispatch are available, those for dynamic security constrained optimization are not well defined. In addition to this, on-line implementation of either function presents an entirely new gamut of problems. ISCOD combines the diagnostic and descision-making capabilities of a knowledge based system (KBS) and the massive parallelisms and learning features of an artificial neural network (ANN) along with conventional power network solution methodologies to provide real-time optimization and control. The real-time functions that are required in ISCOD are: (i) contingency selection and ranking for steady-state security, (ii) fast static security assessment, (iii) contingency selection and ranking for transient stability and subsequent dynamic stability assessment, and (iv) control measures for preventing security violations.

[1]  A. Fouad,et al.  Contingency Analysis Using the Transient Energy Margin Technique , 1982, IEEE Transactions on Power Apparatus and Systems.

[2]  O. Alsac,et al.  Security analysis and optimization , 1987, Proceedings of the IEEE.

[3]  N.J. Balu,et al.  Assessing online transient stability in energy management systems , 1991, IEEE Computer Applications in Power.

[4]  B. F. Wollenberg,et al.  Corrective Control of Power System Flows by Line and Bus-Bar Switching , 1986, IEEE Transactions on Power Systems.

[5]  M. Damborg,et al.  Towards static-security assessment of a large-scale power system using neural networks , 1992 .

[6]  Hideo Tanaka,et al.  Prospects of expert systems in power system operation , 1988 .

[7]  H. Glavitsch,et al.  Security enhancement using an optimal switching power flow , 1989, Conference Papers Power Industry Computer Application Conference.

[8]  M. A. Pai,et al.  Power system stability : analysis by the direct method of Lyapunov , 1981 .

[9]  N. D. Reppen,et al.  Power system remedial action methodology , 1988 .

[10]  Edward Wilson Kimbark,et al.  Power System Stability , 1948 .

[11]  S.-K. Chang,et al.  Optimal real-time voltage control , 1990 .

[12]  R. Podmore,et al.  A Practical Method for the Direct Analysis of Transient Stability , 1979, IEEE Transactions on Power Apparatus and Systems.

[13]  Vijay Vittal,et al.  The transient energy function method , 1988 .

[14]  S. Hao,et al.  A rule-based approach to decentralized voltage control , 1989, Conference Papers Power Industry Computer Application Conference.

[15]  V. Brandwajn,et al.  Neural networks for dynamic security assessment of large-scale power systems: requirements overview , 1991, Proceedings of the First International Forum on Applications of Neural Networks to Power Systems.

[16]  Donald F. Specht,et al.  A general regression neural network , 1991, IEEE Trans. Neural Networks.

[17]  Richard P. Lippmann,et al.  An introduction to computing with neural nets , 1987 .

[18]  T. Sakaguchi,et al.  Development of a Knowledge Based System for Power System Restoration , 1983, IEEE Power Engineering Review.

[19]  J. V. Mitsche,et al.  Direct Transient Stability Analysis Using Energy Functions Application to Large Power Networks , 1987, IEEE Transactions on Power Systems.

[20]  George F. Luger,et al.  Artificial Intelligence and the Design of Expert Systems , 1990 .

[21]  M. J. Damborg,et al.  CRAFT: On-line expert system for customer restoration and fault testing , 1990 .

[22]  Felix F. Wu,et al.  Real-time network security monitoring, assessment and optimization , 1988 .

[23]  R. Bacher,et al.  Network Topology Optimization with Security Constraints , 1986, IEEE Power Engineering Review.

[24]  Om P. Malik,et al.  An expert system for voltage and reactive power control of a power system , 1988 .

[25]  H. Glavitsch,et al.  Switching as means of control in the power system , 1985 .

[26]  T. Sakaguchi,et al.  An Intelligent Load Flow Engine for Power System Planning , 1986, IEEE Transactions on Power Systems.

[27]  G. C. Ejebe,et al.  Fast contingency screening and evaluation for voltage security analysis , 1988 .

[28]  A. A. Fouad,et al.  Knowledge-based system for direct stability analysis , 1990 .

[29]  Dejan J. Sobajic,et al.  An artificial intelligence system for power system contingency screening , 1988 .

[30]  A. Meliopoulos,et al.  Corrective Control Computations for Large Power Systems , 1983, IEEE Transactions on Power Apparatus and Systems.

[31]  H.E. Brown,et al.  Alleviating line overload by line switching , 1988, IEEE Computer Applications in Power.

[32]  A. A. Fouad,et al.  An expert system for security trend analysis of a stability-limited power system , 1991 .

[33]  Chen-Ching Liu,et al.  An Expert System Assisting Decision-Making of Reactive Power/Voltage Control , 1986, IEEE Power Engineering Review.

[34]  S.N. Talukdar,et al.  CQR: a hybrid expert system for security assessment (of power systems) , 1989, Conference Papers Power Industry Computer Application Conference.

[35]  A. Michel,et al.  Power system transient stability using individual machine energy functions , 1983 .

[36]  S. S. Venkata,et al.  An expert system operational aid for restoration and loss reduction of distribution systems , 1988 .

[37]  Antti J. Koivo,et al.  Security Evaluation in Power Systems Using Pattern Recognition , 1974 .

[38]  V. Vittal,et al.  Dynamic Security Assessment Utilizing the Transient Energy Function Method , 1986, IEEE Transactions on Power Systems.

[39]  A. A. Fouad,et al.  Stability constrained optimal rescheduling of generation , 1993 .

[40]  V. Brandwajn,et al.  Efficient bounding method for linear contingency analysis , 1988 .

[41]  Peter W. Sauer,et al.  A methodology of secure and optimal operation of a power system for dynamic contingencies , 1991 .

[42]  Francisco D. Galiana,et al.  A survey of the optimal power flow literature , 1991 .

[43]  O. Alsaç,et al.  Analytical and computational improvements in performance-index ranking algorithms for networks , 1985 .

[44]  Badrul H. Chowdhury,et al.  An expert system as a system operator's aid in real-time solutions of the optimal power flow , 1993 .

[45]  M. Lauby,et al.  Contingency Selection Of Branch Outage Causing Voltage Problems , 1983, IEEE Transactions on Power Apparatus and Systems.

[46]  Edward H. P. Chan,et al.  APPLICATION OF NEURAL-NETWORK COMPUTING IN INTELLIGENT ALARM PROCESSING , 1989 .

[47]  R.J. Marks,et al.  Preliminary results on using artificial neural networks for security assessment (of power systems) , 1989, Conference Papers Power Industry Computer Application Conference.

[48]  Daniel S. Kirschen,et al.  MW/voltage control in a linear programming based optimal power flow , 1988 .

[49]  Susumu Yamashiro On-Line Secure-Economy Preventive Control of Power Systems by Pattern Recognition , 1986, IEEE Transactions on Power Systems.

[50]  Dejan J. Sobajic,et al.  Artificial Neural-Net Based Dynamic Security Assessment for Electric Power Systems , 1989, IEEE Power Engineering Review.

[51]  G. T. Heydt,et al.  Transient stability assessment by pattern recognition in the frequency domain , 1991 .

[52]  Anjan Bose,et al.  On-line power system security analysis , 1992, Proc. IEEE.

[53]  D. Klapper,et al.  Transient Stability Expert System , 1989, IEEE Power Engineering Review.

[54]  Hiroyuki Mori,et al.  An artificial neural-net based technique for power system dynamic stability with the Kohonen model , 1991 .

[55]  Hossein Hakimmashhadi,et al.  Fast Transient Security Assessment , 1983, IEEE Transactions on Power Apparatus and Systems.

[56]  P. Sauer,et al.  Stability Limited Load Supply and Interchange Capability , 1983, IEEE Transactions on Power Apparatus and Systems.

[57]  R. Fischl,et al.  Analysis of Automatic Contingency Selection Algorithms , 1984, IEEE Transactions on Power Apparatus and Systems.

[58]  G. Ejebe,et al.  Automatic Contingency Selection , 1979, IEEE Transactions on Power Apparatus and Systems.

[59]  B.F. Wollenberg,et al.  Artificial intelligence in power system operations , 1987, Proceedings of the IEEE.

[60]  John Zaborszky,et al.  Fast Contingency Evaluation Using Concentric Relaxation , 1980, IEEE Transactions on Power Apparatus and Systems.

[61]  L. Wehenkel,et al.  An Artificial Intelligence Framework for On-Line Transient Stability Assessment of Power Systems , 1989, IEEE Power Engineering Review.

[62]  B. Wollenberg,et al.  An Advanced Contingency Selection Algorithm , 1981, IEEE Transactions on Power Apparatus and Systems.

[63]  Bogdan M. Wilamowski,et al.  Security assessment using neural computing , 1991, Proceedings of the First International Forum on Applications of Neural Networks to Power Systems.

[64]  H. Glavitsch,et al.  Integrated security control using an optimal power flow and switching concepts , 1988 .