Cyclic security analysis for security constrained optimal power flow

被引:11
|
作者
Harsan, H [1 ]
Hadjsaid, N [1 ]
Pruvot, P [1 ]
机构
[1] ENSIEG,LAB ELECTROTECH GRENOBLE,LEG,F-38402 ST MARTIN DHER,FRANCE
关键词
D O I
10.1109/59.589787
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The security of power system may be enhanced by supplementing optimal power flow model with a N-1 security rule (respect of voltage and power flaw limits after any single line or generating unit outage). Including in the Optimal Power Flow model a Security Analysis a Security Constraints Optimal Power Flow model is obtained. This paper deals with the application of a new contingency screening model to speed-up the Security Constrained Optimal Power Flow (SCOPF), which makes possible the on-line applications. The SCOPF resolution process is an iterative one. A cyclic contingency selection model is designed in order to take advantage of the specific characteristics of the optimal power flow problem, such as the lower variations of the control variables between the SCOPF iterations. The cyclic security approach takes the results of a security analysis carried out at time t(k) and extracts data for use by another security analysis at time t(k)+Delta t in order to reduce the computational burden. Tests performed show that the inclusion in the OFF of the proposed cyclic security procedure efficiently produces more secure conditions against critical contingencies and considerably speeds up the security constraint optimal power flow.
引用
收藏
页码:948 / 953
页数:6
相关论文
共 50 条
  • [31] Security Constrained Optimal Power Flow Considering Dynamic Line Rating
    Triwijaya, Santi
    Sugiantoro, Nurdin
    Prasetyo, Yuli
    Firdaus
    Wibowo, Rony Seto
    Penangsang, Ontoseno
    PROCEEDINGS OF 2018 THE 10TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND ELECTRICAL ENGINEERING (ICITEE), 2018, : 46 - 51
  • [32] Security Cost Analysis with Linear Ramp Model using Contingency Constrained Optimal Power Flow
    Lyu, Jae-Kun
    Kim, Mun-Kyeom
    Park, Jong-Keun
    JOURNAL OF ELECTRICAL ENGINEERING & TECHNOLOGY, 2009, 4 (03) : 353 - 359
  • [33] SECURITY CONSTRAINED OPTIMAL REACTIVE POWER DISPATCH
    AJJARAPU, V
    CARR, J
    RAMSHAW, RS
    ELECTRIC POWER SYSTEMS RESEARCH, 1989, 16 (03) : 209 - 216
  • [34] Adaptively constrained stochastic model predictive control applied to security constrained optimal power flow
    Oldewurtel, Frauke
    Roald, Line
    Andersson, Goeran
    Tomlin, Claire
    2015 AMERICAN CONTROL CONFERENCE (ACC), 2015, : 931 - 936
  • [35] An exact and scalable problem decomposition for security-constrained optimal power flow
    Velloso, Alexandre
    Van Hentenryck, Pascal
    Johnson, Emma S.
    ELECTRIC POWER SYSTEMS RESEARCH, 2021, 195
  • [36] Fully distributed security constrained optimal power flow with primary frequency control
    Velay, M.
    Vinyals, M.
    Besanger, Y.
    Retiere, N.
    INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2019, 110 : 536 - 547
  • [37] A Novel MOGNDO Algorithm for Security-Constrained Optimal Power Flow Problems
    Pandya, Sundaram B.
    Visumathi, James
    Mahdal, Miroslav
    Mahanta, Tapan K.
    Jangir, Pradeep
    ELECTRONICS, 2022, 11 (22)
  • [38] Neural-Network Security-Boundary Constrained Optimal Power Flow
    Gutierrez-Martinez, Victor J.
    Canizares, Claudio A.
    Fuerte-Esquivel, Claudio R.
    Pizano-Martinez, Alejandro
    Gu, Xueping
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2011, 26 (01) : 63 - 72
  • [39] Hybrid computation of corrective security-constrained optimal power flow problems
    Zhang, Rui
    Dong, Zhao Yang
    Xu, Yan
    Wong, Kit Po
    Lai, Mingyong
    IET GENERATION TRANSMISSION & DISTRIBUTION, 2014, 8 (06) : 995 - 1006
  • [40] Scalable Decomposition Methods for Preventive Security-Constrained Optimal Power Flow
    Dandurand, Brian
    Kim, Kibaek
    2018 POWER SYSTEMS COMPUTATION CONFERENCE (PSCC), 2018,