Prepared by Viren Pandya

Slides:



Advertisements
Similar presentations
ECE 530 – Analysis Techniques for Large-Scale Electrical Systems Prof. Hao Zhu Dept. of Electrical and Computer Engineering University of Illinois at Urbana-Champaign.
Advertisements

EE 369 POWER SYSTEM ANALYSIS
Announcements Be reading Chapter 6, also Chapter 2.4 (Network Equations). HW 5 is 2.38, 6.9, 6.18, 6.30, 6.34, 6.38; do by October 6 but does not need.
ECE 333 Renewable Energy Systems Lecture 14: Power Flow Prof. Tom Overbye Dept. of Electrical and Computer Engineering University of Illinois at Urbana-Champaign.
ECE 530 – Analysis Techniques for Large-Scale Electrical Systems Prof. Hao Zhu Dept. of Electrical and Computer Engineering University of Illinois at Urbana-Champaign.
Hashing General idea: Get a large array
ECE 333 Renewable Energy Systems Lecture 13: Per Unit, Power Flow Prof. Tom Overbye Dept. of Electrical and Computer Engineering University of Illinois.
ECE 530 – Analysis Techniques for Large-Scale Electrical Systems
Chapter 5: z-scores.
Branch Outage Simulation for Contingency Studies Dr.Aydogan OZDEMIR, Visiting Associate Professor Department of Electrical Engineering, Texas A&M University,
ECE 530 – Analysis Techniques for Large-Scale Electrical Systems
EKT 451 CHAPTER 5 DC & AC Bridge..
ECE 476 Power System Analysis Lecture 11: Ybus, Power Flow Prof. Tom Overbye Dept. of Electrical and Computer Engineering University of Illinois at Urbana-Champaign.
Lecture 13 Newton-Raphson Power Flow Professor Tom Overbye Department of Electrical and Computer Engineering ECE 476 POWER SYSTEM ANALYSIS.
ECE 476 Power System Analysis Lecture 14: Power Flow Prof. Tom Overbye Dept. of Electrical and Computer Engineering University of Illinois at Urbana-Champaign.
MATLAB SIMULINK WORKSHOP
ECE 530 – Analysis Techniques for Large-Scale Electrical Systems
Searching Topics Sequential Search Binary Search.
ECE 530 – Analysis Techniques for Large-Scale Electrical Systems Prof. Hao Zhu Dept. of Electrical and Computer Engineering University of Illinois at Urbana-Champaign.
ECE 530 – Analysis Techniques for Large-Scale Electrical Systems Prof. Hao Zhu Dept. of Electrical and Computer Engineering University of Illinois at Urbana-Champaign.
Lecture 14 Power Flow Professor Tom Overbye Department of Electrical and Computer Engineering ECE 476 POWER SYSTEM ANALYSIS.
ECE 530 – Analysis Techniques for Large-Scale Electrical Systems Prof. Hao Zhu Dept. of Electrical and Computer Engineering University of Illinois at Urbana-Champaign.
Cosc 2150: Computer Organization Chapter 9, Part 3 Floating point numbers.
Virtual University of Pakistan
Algorithm Analysis 1.
Announcements Please read Chapter 6
PERFORMANCE EVALUATIONS
Announcements Homework 7 is 6.46, 6.49, 6.52, 11.19, 11.21, 11.27; due date is October 30 Potential spring courses: ECE 431 and ECE 398RES (Renewable Electric.
WARM UP Find each equation, determine whether the indicated pair (x, y) is a solution of the equation. 2x + y = 5; (1, 3) 4x – 3y = 14; (5, 2)
ECE 476 POWER SYSTEM ANALYSIS
ECE 476 POWER SYSTEM ANALYSIS
Computer Organization and Architecture + Networks
ECEN 460 Power System Operation and Control
Introduction to Analysis of Algorithms
ECE 476 POWER SYSTEM ANALYSIS
Under load-simple calculations
PSCAD models.
ECEN 460 Power System Operation and Control
Engineering Measurements
ECE 476 Power System Analysis
ECE 476 Power System Analysis
Analysis of the Amplitude and Frequencies of the Voltage Magnification Transients in Distribution Networks due to Capacitor Switching Mohamed Saied Electrical.
ECEN 460 Power System Operation and Control
ECE 476 POWER SYSTEM ANALYSIS
Copyright © Cengage Learning. All rights reserved.
ECE 476 POWER SYSTEM ANALYSIS
ECEN 460 Power System Operation and Control
LMP calculations Congestion evaluation
ECE 333 Green Electric Energy
Direct-Current Bridge.
Unit# 9: Computer Program Development
INTERPOLATION Prof. Samuel Okolie, Prof. Yinka Adekunle & Dr
Chapter 6. Large Scale Optimization
Solution of Equations by Iteration
Unit-2 Divide and Conquer
ECEN 460 Power System Operation and Control
ECEN 460 Power System Operation and Control
Applied Combinatorics, 4th Ed. Alan Tucker
Security assessment: decision support tools for power system operators
Department of Electrical Engineering
ECEN 615 Methods of Electric Power Systems Analysis
Computer Vision Lecture 19: Object Recognition III
Power system operation and control
ECEN 460 Power System Operation and Control
Linear Algebra Lecture 16.
Load forecasting Prepared by N.CHATHRU.
1 Newton’s Method.
Chapter 6. Large Scale Optimization
N-port Network Port reference Line Impedance Port Voltage & Current.
CHAPTER 59 TRANSISTOR EQUIVALENT CIRCUITS AND MODELS
Presentation transcript:

Prepared by Viren Pandya Security Analysis Prepared by Viren Pandya Ref. Book:- Wood Power Generation, Operation, and Control - Allen J. Wood, Bruce F. Wollenberg

An Overview of Security Analysis Study the power system with approximate but very fast algorithms. Select only the important cases for detailed analysis. Use a computer system made up of multiple processors or vector processors to gain speed.

Methods of Security Analysis The first method has been in use for many years and goes under various names such as “D factor methods,” “linear sensitivity methods,” “DC power flow methods,” etc. This approach is useful if one only desires an approximate analysis of the effect of each outage. It has all the imitations attributed to the DC power flow; that is, only branch MW flows are calculated and these are only within about 5% accuracy. There is no knowledge of MVAR flows or bus voltage magnitudes.

Linear Sensitivity Factors The problem of studying thousands of possible outages becomes very difficult to solve if it is desired to present the results quickly. One of the easiest ways to provide a quick calculation of possible overloads is to use linear sensitivity factors.

Linear Sensitivity Factors Generation shift factors. Line outage distribution factors.

Linear Sensitivity Factors  

Linear Sensitivity Factors It is assumed in this definition that the change in generation ΔPi is exactly compensated by an opposite change in generation at the reference bus and that all other generators remain fixed. The factor ali then represents the sensitivity of the flow on line l to a change in generation at bus i.

Linear Sensitivity Factors Suppose one wanted to study the outage of a large generating unit and it was assumed that all the generation lost would be made up by the reference generation If the generator was generating P0 MW and it was lost, we would represent ΔPi as ΔPi = - P0 Such factors can be precalculated and tabulated

Linear Sensitivity Factors Using such precalculated generation shift factors, post contingency line flows can be easily obtained quickly as follows:

Linear Sensitivity Factors Line outage distribution factor The line outage distribution factors are used in a similar manner, only they apply to the testing for overloads when transmission circuits are lost.

Linear Sensitivity Factors By definition, the line outage distribution factor has the following meaning:

Linear Sensitivity Factors If one knows the power on line l and line k, the flow on line l with line k out can be determined using "d" factors.

Linear Sensitivity Factors By precalculating the line outage distribution factors, a very fast procedure can be set up to test all lines in the network for overload for the outage of a particular line. Furthermore, this procedure can be repeated for the outage of each line in turn, with overloads reported to the operations personnel in the form of alarm messages.

Contingency analysis (sensitivity factors) – Flowchart

AC power flow security analysis

Contingency Selection The simplest AC security analysis procedure consists of running an AC power flow analysis for each possible generator, transmission line, and transformer outage. This procedure will determine the overloads and voltage limit violations accurately but it does suffer a major drawback that concerns the time such a program takes to execute. If the list of outages has several thousand entries, total time to test for all of the outages can be too long.

Contingency Selection Fast, but inaccurate, methods involving the a and d factors can be used to give rapid analysis of the system, but they cannot give information about MVAR flows and voltages. Slower, full AC power flow methods give full accuracy but take too long.

Contingency Selection Methods 1P1Q method Concentric Relaxation Bounding

Overload PI Overload performance index (PI) If n is a large number, PI will be a small number if all flows are within limit. PI will be large if one or more lines are overloaded. How to use this PI?

How to use this PI? To calculate PI, many techniques have been tried when an outage of line takes place. If n=1, a table of PI can be prepared for each of line outages. Then ordering of PI is done in table. Top few entries of PI reflect the critical of crucial contingencies for which detailed solution.

Any drawback of this calculated PI? However when n = 1, the PI does not snap from near zero to near infinity as the branch exceeds its limit. Instead, it rises as a quadratic function!! A line that is just below its limit contributes to PI almost equal to one that is just over its limit. The result is a PI that may be large when many lines are loaded just below their limit. Thus the PI’s ability to distinguish or detect bad cases is limited when n= 1

Any drawback of this calculated PI? Hence ordering the PI values when n = 1 usually results in a list that is not at all representative of one with the truly bad cases at the top. Trying to develop an algorithm that can quickly calculate PI when n = 2 or larger has proven extremely difficult.

Way out of drawback of PI? Yes…..then how? Use decoupled power flow method. Solution procedure is interrupted after each iteration i.e. means one P-δ and Q-V. With this procedure, the PI can use as large an n value as desired, say n = 4 OR 5. End of 1st iteration itself gives sufficient information to give reasonable PI.

Expression for PI Advantage to this procedure is the fact that the voltages can also be included in the PI. Δ|Ei| is the difference between the voltage magnitude as solved at the end of the 1P1Q procedure and the base-case voltage magnitude. Δ|E|max is a value set by utility engineers indicating how much they wish to limit a bus voltage from changing on one outage case.

Cont. To complete the security analysis, the PI list is sorted so that the largest PI appears at the top. The security analysis can then start by executing full power flows with the case which is at the top of the list, then solve the case which is second, and so on down the list. This continues until either a fixed number of cases is solved, or until a predetermined number of cases are solved which do not have any alarms.

Thank you