Professional Documents
Culture Documents
Lectura 2. Real-Time Security Assessment of Electrical Power Systems
Lectura 2. Real-Time Security Assessment of Electrical Power Systems
Lectura 2. Real-Time Security Assessment of Electrical Power Systems
Abstract - A new fast approach to electricalpower network analysis and Data Acquisition (SC
is presented in this paper. A description of a real-time multimachine throughout the power net
power system simulator, developed at the University of Bath, wiu the control centre.
be given, which has been used rather than the more conventional
fast decoupledload flow. The operation of the algorithms that have
been developed as part of this simulator will be described,together
with an explanation of how fuzzy set theory has been used for
contingency screening and analysis, as well as the identification of
system transient and dynamicinstability. Results are presented for
these fuzzy algorithms and compared with traditional numerical
methods for the IEEE 57 bus systemand a redwedBritish National
Grid network. Finally, conclusions are drawn in the light of these
results, illustrating the benefits that can be achieved with respect
to accuracy and computational speed.
I. INTRODUCTION
r
plots mentioned above, a number of static (used for tutorials) 4
and animated displays (used to dynamically follow the current Wait for severity indices and
state of simulation) can be shown. alarms for contingency to
A graphical man-machine user interface for PowSim has be allocated in memory
also been developed using X-Windows. A set of low level
graphics routines have been written which use two display
pages to provide flicker-free dynamic pictures which allow dy-
namic real-time diagrams to be displayed whilst simultaneously
supporting the X-Windows facilities. /
<-More
A contingencies>7
Yes
nodal reactive power injections (MVAr). Fig. 3 outlines the from its normalised value and the classification triangle para-
basic procedure. meters into which it falls. It is from this that the membership
Each quantity is normalised with respect to its operating function can be Calculated.
limits and then classified into one of five fuzzy linguistic If a number of contingent quantities fall into a particular
variables, i.e. Very Small (VS), Small (S), Medium (M),Large linguistic variable, tlhe membership function of that variable is
(L)and Very Large (a). modified or enhanced by the use of fuzzy-set operations [3].
To quantify these linguistic variables, a performance index These operations include the “intersection” and “product” of
(PI) is used to describe the relative severity of each variable, i.e. the fuzzy sets, so that the peak value of the triangle increases
a higher PI indicates a greater chance of large limit violations. illustrating the dominance of that linguistic variable. For ex-
The membership functions p of these linguistic variables have ample, for a post-contingent condition, the final shape of the p
been represented by triangles and, hence, can be described by vs PI curve can be quite different to that of Fig. 4.
three parameters, its centre (C) (the most likely value of the PI
for the variable), its width (W) (the degree of uncertainty about
the PI) and its peak value (P) (the strength of the variable). By
using a sigmoidfunction as in Fig. 4to weight these membership
functions, more emphasis has been placed on the Medium to
Very Large range, since this is ultimately of greater interest than
the Very Small to Medium region.
1.0
0.8
i VL
0.6
0.4
0.2
I
I tor acceleration and kinetic energy into four fuzzy sets, i.e.
Find centre of gravity by a binary I Stable, CriticallySt(ableLow, CriticallyStableHigh and Un-
search of this total area to give I
the performance index (PI) for I ’
I
stable. Each of these categories is represented by system
I each contingent quantity I operator-defined “limits”. For example, in the case of machine
I I
I
I
rotor angle, S is classified according to its angle swing from its
I
I
initial pre-contingentposition, e.g. an angle swing of 70 to 100
I
I severity index (SI) for this contingenc degrees may be classified as CriticallyStableHigh.
I
I
This in itself could be used as the sole measurement of
I
I transient stability. H!owever, in some cases with pump-storage
I
machines, the rotor angle can swing, exceeding 110 degrees,
and still return to its original position without pole-slipping.
Fig. 3. Fuzzy-set based contingency analysis algoritbm Because of this, two additional measurements are made on rotor
acceleration and machine kinetic energy. These are classified
according to operator experience in a similar way to that for
The relative severity of each contingent quantity, as it is rotor angles.
calculated by the main PowSim simulation loop, is evaluated Once these classifications have been made, a set of “hard-
1116
wired‘ ’ fuzzy reasoning rules are used to make a decision on the order functions [SI.
group stability. These rules are of the form “If A And B Or C with ra = 2 to illus
Then D” . a Contingency with many sm
For dynamic stability assessment, both oscillatory (power equally with one with a
oscillations between two transmission regions) and aperiodic A time domain sim
(system variables ramping against one another) instability can
be detected.
The former is more common so this will be described. A
single parameter is used, that of machine rotor angle, although
generatedpower could be utilisedjust as effectively. A threshold
value is set, below which the system is deemed to be stable.
C. E E E 57 Bus System
The amplitude of the rotor angle oscillation with respect to the
thresholdlevel is again categorised in one of threeclassifications A network was
and a set of rules of the type “If A And B Then C” are used to system which was
yield a decision on the system stability. This was modified
N.RESULTS
The database was built
A single processor or serial version of the real-time sim- busbar, 57 load and 7 g
ulator PowSim running on a sole 66MHz 486 PC was used. Table 1 shows the
Simulations were carried out for both the E E E 57 bus test
network [6] and a reduced British National Grid system for = 20”) is used as the be
fuzzy and traditional approaches to security assessment.
A. Procedure
B. Benchmarking
A numerical method based on the performance index, as
described by [7],
was used as the benchmark for the new fuzzy
contingency analysis approach. The general structure of‘such
an index is. advantage over the b
computation as show
N
%=I D. NGCSystem
VI.. ACKNOWLEDGEMENT
TABLE 2. RESULTS FOR NGC NETWORK (BASE CASE CONDITION)
The authors would like to thank the continual technical and
11 A la~ o r-i t h m
._ -
1 No.ofMisrankings I No.ofStab*tYCases I T i e i n I) financial support of NGC plc during the course of this research.
Top10 1 Top20 Transient I Dynamic minutes
Numerical 7 I 15 0 1 0 57.85 VII. REFERENCES
(n = 2)
72.36 Balu, N.J., Bertram, T., Bose, A., Brandwajn, V., Cauley, G., Curtice, D.,
Fouad, A.A., Fink, IL., Lauby, M.G., Wollenberg, B.F., and Wmbel, J.N.,
‘On-Line Power System Security Analysis’, in Proceedings of the IEEE,
42.81
vol. 80, no. 2,1992, pp. 260--280.
(Sigmoid)
Berry, T., Dale, L.A., Daniels, A.R. and Dunn, R.W., “Real-Time Model-
ling of Multi-Machine Power Systems”, in IEE Proc. C, vol. 140, no. 4,
July 1993, pp. 241-;!48.
TABLE 3. RESULTS EOR NGC NETWORK (STRESSED CONDITION) Zadeh, L.A., “Outlie of a New Approach to the Aklysis of Complex
Systems and Decision Processes”, in IEEE Trans. System, Man and
Cybernetics, vol. 3, no. 1, Jan 1973,pp. 28-44.
Algorithm No. of Misrankings I No. of Stability Cases Time in
Top 10 I Top20 I I
Transient Dynamic minutes
Hm,Y.Y. and Kuo, H.C., “Fuzzy-Set Based Contingency Ranking”, in
IEEE Trans. Power System, vol. 7, no. 3, Aug 1992,pp. 1189-1195.
96.23
Souflis, J.L. and Machias, A.V., “A Fuzzy Approach in the Determination
(n = 2)
of Unstable Machines”, in IEE Proc. C, vol. 137, no. 2, March 1990,
pp. 115-122.
(n = 20) Freris, L.L. and Sasson, A.M., “Investigation of the Load Flow Problem”,
Fuzzy-Set 70.88 in IEEE Proc., vol. 1115, no. 10, Oct 1968,pp. 1459-1470.
(Sigmoid) Ejebe, G.C. and Wollenberg, B.F., “Automatic Contingency Selection”,
in IEEE Trans. on Power Apparatus and System, vol. 98, no. 1, Jan/Feb
1919,pp. 97--104.
Schafer, K.F. and Verstege, J.F., “Adaptive Procedure for Masking Effect
A contingency database containing the perceived most Compensation in Contingency Selection Algorithms”, in IEEE Trans.
Power System, vol. 5 , no. 2, May 1990,pp. 539-546.
significant double circuit line outages for this study was used
with a total of 100entries. Again the misrankings are prominent
for the n = 2 numerical algorithm, with less errors for the fuzzy VIU. BIOGRAPHIES
set approach.
Christian G. Groom was born in Brighton, UK in 1970. He received his BEng
Again, as for the IEEE test study, it can be seen that there
Hons. Degree in Electronic and Electrical Engineering from the University of
were no cases of either transient or dynamic instabilitydetected
Bath, UK in 1989. During that time he also gained experience with NGC plc.
by any of the methods for the base case condition. However,
He has recently received his PhD (in 1994) from the Power and Energy Systems
three transiently unstable and one dynamically unstable contin-
Research Group, School of Electronic and ElectricalEngineering, University of
gency were present in the stressed condition.
Bath and is an Associate Member of the Institute of ElectricalEngineers as well
as being a Member of the Institute of Electrical and Electronics Engineers. At
present his research intenests are the applicationsof fuzzy-basedexpertsystems
V. CONCLUSIONS to power system securityproblems.
Ka Wing Chan was born in Hong Kong, 1965. He received his BSc Hons.
and PhD Degrees in Electronic and Electrical Engineering from the University
In this paper a fuzzy set approach has been described of Bath, UK in 1988 and 1992 respectively. He is currently a researcherin the
that addresses the area of security assessment. Although this Power and Energy Systerns Research Group, School of Electronic and Electrical
methodology has been tried in previous research, power system Engineering, University Df Bath. His general research interests are in the areas
models of the size tested in this study have not been attempted, of distributed and parallel processing, aaificial intelligence techniques, power
especiallybased on a real-time electromechanicalsimulator. system stability and security.
Algorithms have been presented that permit contingency Rod W. DUM received his BSc and PhD in Electrical Engineering from the
analysis and stability detection to be conducted without losing University of Bath in 1081 and 1984 respectively. He became a lecturer in
synchronismwith real-time. Even though a single processorver- computing and control at the University of Bath and is now a member of the
sion of the simulator (PowSim) was used to test these algorithms Power and Energy Systmu Group. His research areas include parallel and
(hence the relatively slow evaluation cycle times), subsequent real-time computing, power system modelling and control using AI methods.
research has shown encouraging results based on a distributed He has published over 30 technical papers and is involved in the IEE UK.
parallel processing architecture. Richard A. Daniels was born in Plymouth, UK in 1933. He received hls
The results that have been presented here have shown a degrees from the University of Bristol and he is currentlya senior lecturerat the
favourablespeed-up in execution time as compared to the more University of Bath. He hais wide rangingresearch interest based on the real-time
traditional numerical techniques. This is due to the relative lack modelling and controlof complex engineeringsystems with particular emphasis
of calculation, since only rule processing needs to be conducted. on power systems and road and rail transport systems.