Cyclic security analysis for security constrained optimal power flow

被引:11
|
作者
Harsan, H [1 ]
Hadjsaid, N [1 ]
Pruvot, P [1 ]
机构
[1] ENSIEG,LAB ELECTROTECH GRENOBLE,LEG,F-38402 ST MARTIN DHER,FRANCE
关键词
D O I
10.1109/59.589787
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The security of power system may be enhanced by supplementing optimal power flow model with a N-1 security rule (respect of voltage and power flaw limits after any single line or generating unit outage). Including in the Optimal Power Flow model a Security Analysis a Security Constraints Optimal Power Flow model is obtained. This paper deals with the application of a new contingency screening model to speed-up the Security Constrained Optimal Power Flow (SCOPF), which makes possible the on-line applications. The SCOPF resolution process is an iterative one. A cyclic contingency selection model is designed in order to take advantage of the specific characteristics of the optimal power flow problem, such as the lower variations of the control variables between the SCOPF iterations. The cyclic security approach takes the results of a security analysis carried out at time t(k) and extracts data for use by another security analysis at time t(k)+Delta t in order to reduce the computational burden. Tests performed show that the inclusion in the OFF of the proposed cyclic security procedure efficiently produces more secure conditions against critical contingencies and considerably speeds up the security constraint optimal power flow.
引用
收藏
页码:948 / 953
页数:6
相关论文
共 50 条
  • [1] A new approach to security-constrained optimal power flow analysis
    Yan, P
    Sekar, A
    2001 POWER ENGINEERING SOCIETY SUMMER MEETING, VOLS 1-3, CONFERENCE PROCEEDINGS, 2001, : 1462 - 1467
  • [2] Operational Analysis of Security Constrained Optimal Reactive Power Flow Solutions
    Macfie, P. J.
    Taylor, G. A.
    Irving, M. R.
    Hurlock, P.
    Bradley, M. E.
    Morfill, R.
    Wan, H. -B.
    2009 IEEE POWER & ENERGY SOCIETY GENERAL MEETING, VOLS 1-8, 2009, : 2342 - +
  • [3] Flexible Security-Constrained Optimal Power Flow
    Thomas, James Jamal
    Grijalva, Santiago
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2015, 30 (03) : 1195 - 1202
  • [4] Chance Constrained Framework for AC Security Constrained Optimal Power Flow
    Chacko, Keerthi
    Alizadeh, Mohammad
    Capitanescu, Florin
    Li, Pu
    2024 INTERNATIONAL CONFERENCE ON SMART ENERGY SYSTEMS AND TECHNOLOGIES, SEST 2024, 2024,
  • [5] Parallel computing for reducing time in security constrained optimal power flow analysis
    Alvarez, David
    Rodriguez, Diego
    Rivera, Sergio
    REVISTA INTERNACIONAL DE METODOS NUMERICOS PARA CALCULO Y DISENO EN INGENIERIA, 2023, 39 (01):
  • [6] Security Constrained Distributed Optimal Power Flow of Interconnected Power Systems
    哈比比
    余贻鑫
    Transactions of Tianjin University, 2008, (03) : 208 - 216
  • [7] Security constrained distributed optimal power flow of interconnected power systems
    Binkou A.
    Yu Y.
    Transactions of Tianjin University, 2008, 14 (3) : 208 - 216
  • [8] Practical Applications of Preventive Security Constrained Optimal Power Flow
    Dong, Feng
    Huang, Lengcheng
    Lam, Baldwin P.
    Xu, Xiaokang
    2012 IEEE POWER AND ENERGY SOCIETY GENERAL MEETING, 2012,
  • [9] LP based solution for Security Constrained Optimal Power Flow
    Babu, M. Ramesh
    Harini, D.
    2016 SECOND INTERNATIONAL CONFERENCE ON SCIENCE TECHNOLOGY ENGINEERING AND MANAGEMENT (ICONSTEM), 2016, : 355 - 359
  • [10] Dynamic security constrained AC optimal power flow for microgrids
    Alvarez, Washington S.
    Lopez, Juan Camilo
    Liederer, Fernando W.
    Dotta, Daniel
    Rider, Marcos J.
    ELECTRIC POWER SYSTEMS RESEARCH, 2024, 236