Model, Characterization, and Analysis of Steady-State Security Region in AC/DC Power System with a Large Amount of Renewable Energy

被引:3
作者
Chen, Zhong [1 ]
Chen, Hui [1 ]
Zhuang, Minhui [2 ]
Bu, Siqi [3 ]
机构
[1] Southeast Univ, Sch Elect Engn, Nanjing 210096, Jiangsu, Peoples R China
[2] Jiangsu Elect Power Co, Danyang Power Supply Co, Danyang 211106, Peoples R China
[3] Hong Kong Polytech Univ, Dept Elect Engn, Hong Kong, Hong Kong, Peoples R China
基金
中国国家自然科学基金;
关键词
steady-state security region; AC/DC constraint; effective boundary surface; operating margin; HVDC transmission; renewable energy;
D O I
10.3390/en10081181
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
A conventional steady-state power flow security check only implements point-by-point assessment, which cannot provide a security margin for system operation. The concept of a steady-state security region is proposed to effectively tackle this problem. Considering that the commissioning of the increasing number of HVDC (High Voltage Direct Current) and the fluctuation of renewable energy have significantly affected the operation and control of a conventional AC system, the definition of the steady-state security region of the AC/DC power system is proposed in this paper based on the AC/DC power flow calculation model including LCC/VSC (Line Commutated Converter/Voltage Sourced Converter)-HVDC transmission and various AC/DC constraints, and hence the application of the security region is extended. In order to ensure that the proposed security region can accurately provide global security information of the power system under the fluctuations of renewable energy, this paper presents four methods (i.e., a screening method of effective boundary surfaces, a fitting method of boundary surfaces, a safety judging method, and a calculation method of distances and corrected distance between the steady-state operating point and the effective boundary surfaces) based on the relation analysis between the steady-state security region geometry and constraints. Also, the physical meaning and probability analysis of the corrected distance are presented. Finally, a case study is demonstrated to test the feasibility of the proposed methods.
引用
收藏
页数:17
相关论文
共 26 条
  • [1] [Anonymous], 2007, THESIS
  • [2] [Anonymous], 2013, 2013 IEEE GRENOBLE C
  • [3] [Anonymous], P 2012 IEEE INT C PO
  • [4] Chen Fei, 2014, ACM COMPUTING FRONTI, DOI [10.1145/2597917.2597929, DOI 10.1145/2597917.2597929]
  • [5] N-1 security assessment approach based on the steady-state security distance
    Chen, Sijie
    Chen, Qixin
    Xia, Qing
    Zhong, Haiwang
    Kang, Chongqing
    [J]. IET GENERATION TRANSMISSION & DISTRIBUTION, 2015, 9 (15) : 2419 - 2426
  • [6] [陈思捷 Chen Sijie], 2015, [中国电机工程学报, Proceedings of the Chinese Society of Electrical Engineering], V35, P600
  • [7] Steady-state security assessment method based on distance to security region boundaries
    Chen, Sijie J.
    Chen, Qixin X.
    Xia, Qing
    Kang, Chongqing Q.
    [J]. IET GENERATION TRANSMISSION & DISTRIBUTION, 2013, 7 (03) : 288 - 297
  • [8] REAL-TIME COMPUTER CONTROL OF POWER-SYSTEMS
    DYLIACCO, TE
    [J]. PROCEEDINGS OF THE IEEE, 1974, 62 (07) : 884 - 891
  • [9] Fan JY, 2005, THESIS
  • [10] Fischl R., 1976, P IEEE PES WINT M DE