Cyclic security analysis for security constrained optimal power flow

被引:11
|
作者
Harsan, H [1 ]
Hadjsaid, N [1 ]
Pruvot, P [1 ]
机构
[1] ENSIEG,LAB ELECTROTECH GRENOBLE,LEG,F-38402 ST MARTIN DHER,FRANCE
关键词
D O I
10.1109/59.589787
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The security of power system may be enhanced by supplementing optimal power flow model with a N-1 security rule (respect of voltage and power flaw limits after any single line or generating unit outage). Including in the Optimal Power Flow model a Security Analysis a Security Constraints Optimal Power Flow model is obtained. This paper deals with the application of a new contingency screening model to speed-up the Security Constrained Optimal Power Flow (SCOPF), which makes possible the on-line applications. The SCOPF resolution process is an iterative one. A cyclic contingency selection model is designed in order to take advantage of the specific characteristics of the optimal power flow problem, such as the lower variations of the control variables between the SCOPF iterations. The cyclic security approach takes the results of a security analysis carried out at time t(k) and extracts data for use by another security analysis at time t(k)+Delta t in order to reduce the computational burden. Tests performed show that the inclusion in the OFF of the proposed cyclic security procedure efficiently produces more secure conditions against critical contingencies and considerably speeds up the security constraint optimal power flow.
引用
收藏
页码:948 / 953
页数:6
相关论文
共 50 条
  • [21] Object-Oriented Security Constrained Quadratic Optimal Power Flow
    Zhong, Chiyang
    Meliopoulos, A. P. Sakis
    AlOwaifeer, Maad
    Xie, Jiahao
    Ilunga, Gad
    2020 IEEE POWER & ENERGY SOCIETY GENERAL MEETING (PESGM), 2020,
  • [22] A Comparative Study of Preventive Security-Constrained Optimal Power Flow
    Che, Liang
    Zhang, Xiaping
    Li, Zhiyi
    2016 IEEE POWER AND ENERGY SOCIETY GENERAL MEETING (PESGM), 2016,
  • [23] Preventive Security-Constrained Optimal Power Flow with Probabilistic Guarantees
    Li, Hang
    Zhang, Zhe
    Yin, Xianggen
    Zhang, Buhan
    ENERGIES, 2020, 13 (09)
  • [24] Agent-Based Distributed Security Constrained Optimal Power Flow
    Mohammadi, Javad
    Hug, Gabriela
    Kar, Soummya
    IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (02) : 1118 - 1130
  • [25] Machine Learning-Aided Security Constrained Optimal Power Flow
    Rahman, Jubeyer
    Feng, Cong
    Zhang, Jie
    2020 IEEE POWER & ENERGY SOCIETY GENERAL MEETING (PESGM), 2020,
  • [26] Adversarially Robust Learning for Security-Constrained Optimal Power Flow
    Donti, Priya L.
    Agarwal, Aayushya
    Bedmutha, Neeraj Vijay
    Pileggi, Larry
    Kolter, J. Zico
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 34 (NEURIPS 2021), 2021, 34
  • [27] Security Constrained Optimal Power Flow via Proximal Message Passing
    Chakrabarti, Sambuddha
    Kraning, Matt
    Chu, Eric
    Baldick, Ross
    Boyd, Stephen
    2014 CLEMSON UNIVERSITY POWER SYSTEMS CONFERENCE (PSC), 2014,
  • [28] Analytical Reformulation of Security Constrained Optimal Power Flow with Probabilistic Constraints
    Roald, Line
    Oldewurtel, Frauke
    Krause, Thilo
    Andersson, Goran
    2013 IEEE GRENOBLE POWERTECH (POWERTECH), 2013,
  • [29] Security Constrained Optimal Power Flow Incorporating Preventive and Corrective Control
    Wibowo, Rony Seto
    Fathurrodli, Tri Prasetya
    Penangsang, Ontoseno
    Soeprijanto, Adi
    2014 ELECTRICAL POWER, ELECTRONICS, COMMUNICATIONS, CONTROLS AND INFORMATICS SEMINAR (EECCIS), 2014, : 29 - 34
  • [30] Security Constrained Optimal Power Flow Using Artificial Bee Colony
    Zamani, H. A.
    Ezzati, S. M.
    Vahedi, H.
    Gandomkar, M.
    INTERNATIONAL REVIEW OF ELECTRICAL ENGINEERING-IREE, 2012, 7 (02): : 3991 - 3999