scholarly journals Initialization of steady-state security analyses of electric power interconnections

2010 ◽  
Vol 23 (1) ◽  
pp. 119-138
Author(s):  
Dragan Popovic

The basic objective of this paper is to present the relevant methodological and practical aspects of two efficient procedures for initialization of steady-state security analyses of electric power interconnection. The first procedure gives the load flow solution for known initial generators scheduling and the second one gives the load-flow solution in conditions of bilateral or multilateral exchange programs realization. Those procedures are fully consistent with the specially developed procedure for steady-state security analysis, which is based on successive solutions of load-flow in characteristic post-dynamic quasi-stationary states, occurring after the considered disturbances. The efficiency of proposed procedures is demonstrated on the example of real electric power interconnection in the Balkan area. .

Energies ◽  
2020 ◽  
Vol 14 (1) ◽  
pp. 148
Author(s):  
Lili Wu ◽  
Ganesh K. Venayagamoorthy ◽  
Jinfeng Gao

Power system steady-state security relates to its robustness under a normal state as well as to withstanding foreseeable contingencies without interruption to customer service. In this study, a novel cellular computation network (CCN) and hierarchical cellular rule-based fuzzy system (HCRFS) based online situation awareness method regarding steady-state security was proposed. A CCN-based two-layer mechanism was applied for voltage and active power flow prediction. HCRFS block was applied after the CCN prediction block to generate the security level of the power system. The security status of the power system was visualized online through a geographic two-dimensional visualization mechanism for voltage magnitude and load flow. In order to test the performance of the proposed method, three types of neural networks were embedded in CCN cells successively to analyze the characteristics of the proposed methodology under white noise simulated small disturbance and single contingency. Results show that the proposed CCN and HCRFS combined situation awareness method could predict the system security of the power system with high accuracy under both small disturbance and contingencies.


2011 ◽  
Vol 21 (03) ◽  
pp. 647-662 ◽  
Author(s):  
YI-SHAN ZHANG ◽  
HSIAO-DONG CHIANG

The local bifurcation boundary and steady-state security boundary of parameter-dependent electric power system models are computed and studied. A computational procedure for numerically constructing the local bifurcation boundary and the steady-state security boundary is proposed. Then the proposed computational procedure is applied to large power systems to compute the local bifurcation boundary and steady-state security boundary. Numerical studies reveal the characteristics and the convexity properties of these boundaries. The impact of the physical limitation of the generator reactive capability on the local bifurcation boundary and the steady-state security boundary are also investigated.


2017 ◽  
Vol 2017 ◽  
pp. 1-10 ◽  
Author(s):  
Yong Chen ◽  
Hai Jin ◽  
Han Jiang ◽  
Dechao Xu ◽  
Ran Zheng ◽  
...  

Static state security analysis (SSSA) is one of the most important computations to check whether a power system is in normal and secure operating state. It is a challenge to satisfy real-time requirements with CPU-based concurrent methods due to the intensive computations. A sensitivity analysis-based method with Graphics processing unit (GPU) is proposed for power systems, which can reduce calculation time by 40% compared to the execution on a 4-core CPU. The proposed method involves load flow analysis and sensitivity analysis. In load flow analysis, a multifrontal method for sparse LU factorization is explored on GPU through dynamic frontal task scheduling between CPU and GPU. The varying matrix operations during sensitivity analysis on GPU are highly optimized in this study. The results of performance evaluations show that the proposed GPU-based SSSA with optimized matrix operations can achieve a significant reduction in computation time.


Sign in / Sign up

Export Citation Format

Share Document