Security assessment: decision support tools for power system operators

Slides:



Advertisements
Similar presentations
NERC TPL Standard Issues TSS Meeting #146 Seattle, WA August 15-17, 2007 Chifong Thomas.
Advertisements

Intra Hour Tagging/Oasis During System Contingencies The transmission tagging process was initially developed to solve an after the fact accounting issue.
Liberalization and deregulation of the markets power systems must be competitive, high profitable and efficient Steady increase of power demand but often.
Software Analysis Tools
Framework for comparing power system reliability criteria Evelyn Heylen Prof. Geert Deconinck Prof. Dirk Van Hertem Durham Risk and Reliability modelling.
1 INTRODUCTION 1.The Bulk Power Supply 2.Reliability criteria The 2 components Security assessment from operators view Requirements of a reliable electric.
Hypothesis Testing A hypothesis is a claim or statement about a property of a population (in our case, about the mean or a proportion of the population)
Overview of Loss of Load Expectation (LOLE) and Unforced Capacity (UCAP) Dan Huffman FirstEnergy Solutions November 20, 2007 OMS Board Workshop Resource.
December 4, 2000© 2000 Fernando L. Alvarado1 Reliability concepts and market power Fernando L. Alvarado Professor, The University of Wisconsin Invited.
INTRODUCTION The Bulk Power Supply Reliability criteria
Voltage Security Margin Assessment Professor Dr. Garng Huang PS ERC.
ECE 530 – Analysis Techniques for Large-Scale Electrical Systems Prof. Hao Zhu Dept. of Electrical and Computer Engineering University of Illinois at Urbana-Champaign.
1 If I were to give grades today… > 80A A B B B C C C D D D-1
1 Least Cost System Operation: Economic Dispatch 2 Smith College, EGR 325 March 10, 2006.
INTRODUCTION The Bulk Power Supply Reliability criteria
Determine Facility Ratings, SOLs and Transfer Capabilities Paul Johnson Chair of the Determine Facility Ratings Standard Drafting Team An Overview of the.
ERCOT SOL Methodology for the Planning and Operations Horizons Stephen Solis 2014 OTS 1.
Optimization for Operation of Power Systems with Performance Guarantee
NW Resource Adequacy Forum Steering Committee Conference Call November 4, 2010.
Peak RCCo Performance Metrics Draft –November 2013.
April 16, 2010 RPG Meeting ERCOT Five-Year Transmission Plan Update Jeff Billo.
1 Security assessment: decision support tools for power system operators James D. McCalley, Iowa State University, Ames, Iowa September.
Reliability Requirements Bill Blevins Manager of Operations Support ERCOT.
Generation Adequacy Task Force Update to WMS September 14, 2011.
Enhancing Reliability of the North American Transmission Grid Enhancing Reliability of the North American Transmission Grid Presented By Dejan J Sobajic.
Leader-Follower Framework For Control of Energy Services Ali Keyhani Professor of Electrical and Computer Engineering The Ohio State University
Security-Constrained OPF and Risk-Based OPF. 2 Assume normal condition constraints are satisfied. The word “flow” below refers only to post-contingency.
Comparison of LOLP Practices Mary Johannis PNW Resource Adequacy Technical Committee Mtg January 23, 2009.
ERCOT PUBLIC 4/21/ RTP: Cascade Analysis April 21, 2015.
Sensitivity and Importance Analysis Risk Analysis for Water Resources Planning and Management Institute for Water Resources 2008.
PS ERC 1 Reactive Power Considerations in Linear Load Flow with Applications to Available Transfer Capability Pete Sauer (With a lot of help from Santiago.
“ Building Strong “ Delivering Integrated, Sustainable, Water Resources Solutions Sensitivity and Importance Analysis Charles Yoe
CALIFORNIA ENERGY COMMISSION Workshop on the Staff Draft 2006 Summer Outlook Report December 8, 2005 Hearing Room B.
ECE 530 – Analysis Techniques for Large-Scale Electrical Systems Prof. Hao Zhu Dept. of Electrical and Computer Engineering University of Illinois at Urbana-Champaign.
IEEE AI - BASED POWER SYSTEM TRANSIENT SECURITY ASSESSMENT Dr. Hossam Talaat Dept. of Electrical Power & Machines Faculty of Engineering - Ain Shams.
©2003 PJM 1 Presentation to: Maryland Public Service Commission May 16, 2003.
1 NPCC – A-2 Dr. Mayer Sasson Transmission Planning Consolidated Edison of New York June 1, 2006 Presented to the NYSRC-RRS.
Project WECC-0100 Standards Briefing WECC-0100 SDT April 7, 2016 W ESTERN E LECTRICITY C OORDINATING C OUNCIL.
Probabilistic Transmission Planning - ERCOT
Minnesota Renewable Energy Integration and Transmission
Barrilla Junction Area Transmission Improvements Project
Erik Ela, Eamonn Lannoye, Bob Entriken, Aidan Tuohy
Phase Angle Limitations
Columbia Grid Wind Integration Study Team Dynamic Transfer Capability Studies Update 9/10/09.
making certain the uncertainties
Prepared by Viren Pandya
Risk Assessment and Probabilistic Transmission Planning Methods
Load flow solutions Chapter (3).
ISO New England System R&D Needs
ECEN 460 Power System Operation and Control
penetration of wind power
LMP calculations Congestion evaluation
Project WECC-0100 Update Load Modeling Task Force
Transmission Planning in a Modern Market Environment
Secure Control Systems - A Quantitative Risk Management Approach
Benchmarking Quasi-Steady State Cascading Outage Analysis Methodologies IEEE Working Group on Understanding, Prediction, Mitigation and Restoration of.
Load Flow Studies Eng. Edvan Moyo BEng, MEng, MBA
DEC System Voltage Planning - June 2018
ECEN 460 Power System Operation and Control
Jose GONZALEZ PASTOR Economic & Adequacy Analyst - Elia
ECEN 460 Power System Operation and Control
Project WECC-0100 Update Reliability Subcommittee
INTERCONNECTED SYSTEM GENERATING CAPACITY RELIABILITY EVALUATION
Project WECC-0100 Update Load Modeling Task Force
Software Analysis Tools
ECE 576 POWER SYSTEM DYNAMICS AND STABILITY
NERC Congestion Management
Market Pricing Initiatives Update September 9th, 2003
Load forecasting Prepared by N.CHATHRU.
EE/Econ 458 Introduction to Linear Programming
Presentation transcript:

Security assessment: decision support tools for power system operators James D. McCalley, jdm@iastate.edu Iowa State University, Ames, Iowa September 5, 2000 © Iowa State University. All rights reserved.

Overview Security-related decisions Current approach and what’s wrong with it Security assessment using probabilistic risk Illustrations Risk-based decision-making Cumulative risk assessment Conclusions

Security-related decisions Time-frame Decision maker Decision Basis for decision On-line Operator How to constrain the Operating rules, assessment economic operation to on-line assessment, (min-hours) maintain the normal state ? and $$$$ Operational Analyst What should be the Minimum operating planning operating rules ? criteria, reliability, (hrs-months) and $$$$ Planning Analyst How to reinforce/maintain Reliability criteria (months-years) the transmission system ? for system design, and $$$$

Decision-Drivers Voltage Overload security Trans- former Overload Dynamic Trans- former Overload Line Low Unstable Transient (early-swing) instability Oscillatory (damping)

Number of operating studies for determining security limits National Grid Company, UK 1985: 3/quarter 1990: 120/week 2000: 1300/week

A Stressed System Operator’s view Imports at 2:10 pm, 8/12/99 94% 110% Bus 2 500 Bus 1 500 200 MW flow 94% 110% Bus 1 230 Bus2 230 0.95 pu volts Bus 1 115 Bus 2 115 93%

Imports 101% 103% 104% Simulation Results of a Preventive Action Bus 2 500 Bus 1 500 0 MW flow 101% 103% Bus 1 230 0.91 pu volts Bus2 230 Bus 1 115 Bus 2 115 104%

Power system “states” and actions Normal (secure) Off-economic dispatch Restorative Extreme emergency. Separation, cascading delivery point interruption, load shedding Alert, Not secure Other actions (e.g. switching) Transmission loading relief procedures Controlled load curtailment Emergency

Assessment and decision today Determine if alert (the action-trigger) Identify possible actions Select action Perform assessment a-priori Model current conditions Select contingencies Compute post-contingency performance Determine if alert (the action-trigger) Identify possible actions Select action

What is wrong with this approach? #1 Assessment is made of the past but the decision is made for the future. #2 The decision is driven by the most severe credible contingency

What is wrong with this approach? actions can come too late un-quantified future uncertainties requires large margin #1 Assessment is made of the past but the decision is made for the future.

Actions can come too late; Un-quantified uncertainties require large margin Contingency-based flow limit Line flow MW Time Select action Assess Action trigger Identify action set Based on the previous condition

What is wrong with this approach? inaccurate assessment and consequently an inconsistent action trigger selection of less effective actions #2 The decision is driven by the most severe credible contingency

Five-bus test system for illustrating concepts Loss of cct 1 overloads cct 2 Loss of cct 5 creates low voltage at bus 4. Loss of cct 6 overloads cct 7

B A C D E

What causes the inconsistency? Assumption that all contingencies in selected set are of equal probability Ignoring risk contribution from problems that are not most constraining Discrete quantification of severity

What do we do then? Model a forecasted future using probabilistic modeling of uncertainties and assess it with quantitative evaluation of contingency severity for each possible condition

Forecast the future load and transactions forecasted line flow 95% confidence limits actual line flow MW Loading Time Select action Assess Action trigger Identify action set (Based on future Conditions)

On-line risk-based assessment Forecasted operating conditions for future time t Uncertainty in outage conditions Uncertainty in operating conditions Severity function

Determine voltage instability severity for the system Determine low voltage severity for each bus Forecasted operating conditions Determine overload severity for each circuit Determine cascading severity for each circuit Possible near-future operating cdts (bus injections) Selected near-future contingency states

Uncertainty in operating conditions... Xt,f is forecasted severity measures: flows, voltages, loadability Xt,j is small deviation from forecasted value due to variation (or uncertainty) in parameters k: Then, the pdf on Xt+1 can be obtained as: C is the covariance matrix for the vector of uncertain parameters k

Severity modeling Identified by CIGRE TF 38.02.21 Task Force as most difficult problem in probabilistic security assessment. Re-dispatch curtailment Load Transmission loading relief It’s modeling should NOT depend on a pre-supposed decision as this constrains the decision space, which is the space of investigation. LOLP, EUE, Cost of re-dispatch, as indices for use in security-related decision-making, each pre-suppose a decision and are therefore inappropriate.

Severity modeling: essential features Definition: Severity is an unavoidable consequence of a specified condition. It provides a quantitative evaluation of what would happen to the power system in the specified condition. One uses it, together with probability of the condition, to decide whether to re-dispatch, call for TLR, or interrupt load.

Severity modeling Essential features Simple. Reasonable reflection of relative severity between outcomes to enable calculation of a composite index. Increase continuously as the performance indicator (e.g., flow, voltage, loading margin, cascaded lines) gets worse. Interpretable in physical and deterministic terms. Economic quantification is attractive but difficult and can give a false sense of precision.

Severity functions... 100 6 5 4 3 2 1 1 1 1 Severity Severity Severity Severity 90 100 0.92 0.95 1 2 3 4 5 … 0 100 110 Flow as % of rating Voltage in per unit Number of cascaded circuits MW loading margin OVERLOAD LOW VOLTAGE CASCADING Note: non-convergence at any level of cascading evaluates to 100. VOLTAGE INSTABILITY Because all severity functions evaluate to 1.0 at the deterministic threshold, a risk level R may be roughly thought of as the expectation Of the number of violations in the next hour.

Decomposability The above expresses system risk. Interchanging summations allows us to obtain: What incurs risk: total risk for a single component (bus or branch risk) or a set of them (regional risk) What causes risk: system, regional, or component risk for a specific contingency system, regional, or component risk for a specific problem type

Decision-making by RBOPF Traditional OPF: Minimize: generation cost Subject to: Power flow equations Generation limits Branch flow & bus voltage constraints Other security constraints A variation: Minimize: a(generation cost) + b(total system risk) Subject to: Power flow equations Generation limits Regional risk constraints

Cumulative risk assessment

Final Comments The “secure” and “alert” states only differ in terms of how insecure they are, and we need a measurable index to reflect this. Risk is a computable quantity that can be used to integrate security with economics in formal decision-making algorithms.