Risk assessment in power system based on parallel computation

被引:1
作者
College of Electrical Engineering, Zhejiang University, Hangzhou 310027, China [1 ]
不详 [2 ]
机构
[1] College of Electrical Engineering, Zhejiang University
[2] Hubei Electric Power Company
来源
Zhejiang Daxue Xuebao (Gongxue Ban) | 2009年 / 3卷 / 589-595期
关键词
Parallel computation; PC cluster; Risk assessment; Static security analysis;
D O I
10.3785/j.issn.1008-973X.2009.03.036
中图分类号
学科分类号
摘要
The risk theory was applied to static security analysis of power system, and a power system risk model with obvious parallel processing was built. A novel parallel processing approach of risk assessment of power system was presented based on the parallel model. The approach was implemented by PC cluster. In the implementation of specific parallel computing, the PC cluster technology was used. The New England 10-machine 39-node system was used to verify power system static security risk assessment methodology based on parallel computing. System-s N-1 breaking accidents were used as the system's expected accident set. The risk of line power overload and that of bus low voltage were used as the two risk indicators to describe static security. The performance of parallel computing algorithm based on indicators and that of parallel computing algorithm based on static incidents allocation were compared.
引用
收藏
页码:589 / 595
页数:6
相关论文
共 11 条
[1]  
Li Y.-L., Zhou X.-X., Wu Z.-X., A parallel complex fault computation algorithm for large scale power system digital simulation, Proceedings of the CSEE, 23, 12, pp. 1-5, (2003)
[2]  
Ji X.-Q., Wang C.-S., A comparative study on parallel processing applied in power system, Power System Technology, 27, 4, pp. 22-26, (2003)
[3]  
Yue C.-Y., Zhou X.-X., Li R.-M., Study of parallel approaches to power system electromagnetic transient real-time simulation, Proceedings of the CSEE, 24, 12, pp. 1-7, (2004)
[4]  
Chai J.S., Zhu N., Bose A., Et al., Parallel Newton type methods for power system stability analysis using local and shared memory multi-processors, IEEE Transactions on Power Systems, 6, 4, pp. 1539-1545, (1991)
[5]  
Granelli G.P., Moatagna M., la Scala M., Et al., Relaxation Newton methods for transient stability analysis on a vector parallel computer, IEEE Transactions on Power Systems, 9, 2, pp. 637-643, (1994)
[6]  
Ni M., Mccally J.D., Vittal V., Et al., Online risk-based security assessment, IEEE Transactions on Power Systems, 18, 1, pp. 258-265, (2003)
[7]  
Wan H., Mccally J.D., Vittal V., Et al., Risk based voltage security assessment, IEEE Transactions on Power Systems, 15, 4, pp. 1247-1254, (2000)
[8]  
Chen W.-H., Jiang Q.-Y., Cao Y.-J., Voltage vulnerability assessment based on risk theory and fuzzy reasoning, Proceedings of the CSEE, 25, 24, pp. 20-25, (2005)
[9]  
Dongarra J., Sterling T., Simon H., Et al., High-performance computing: Clusters, constellations, MPPs, and future directions, IEEE Computational Science and Engineering, 7, 2, pp. 51-59, (2005)
[10]  
Sato F., Garacia A.V., Monticelli A., Parallel implementation of probabilistic short circuit analysis by the Monte Carlo approach, IEEE Power Industry Computer Applications Conference, pp. 373-379, (1993)