Professional Documents
Culture Documents
Prepared by:
Dhaval g.patel
Assistant Professor
CHARUSAT UNIVERSITY.
Introduction
Minimization cost
Maintain system Security
1. Generating unit may have to taken off-line because of
auxiliary equipment failure.
2. By maintaining spinning reserve, remainning unit can make up
the deficit without frequency drop.
Transmission line may be damaged and taken out by automatic
relaying.
The specific time at which initiating event causes component
failure is unpredictable.
Most equipment are protected by automatic devices ,so it may be
switched out, if this limit is violated.
Most power systems are operated in such a way that any single
contingency will not leave other components heavily
overloaded, so that cascading failures are avoided.
System security involves practices suitably designed to keep
the system operating when components fail.
System Monitoring
System monitoring supplies the power system operators or
dispatchers with up to date information on the conditions of
the power system on real time basis as load and generation
change.
Telemetry systems measure, monitor and transmit the data,
voltages, currents, line flows, status of circuit breakers,
frequency, generator outputs and transformer tap positions in
every substation in a transmission network.
Digital computers are installed in a control center, to gather the
telemetered data then process and place them in a data base
from which operators can display information on large display
monitors.
Computer check incoming against prestored limits and alarm
the operators in case of an overload or out of limit voltage.
Contingency Analysis
It allows the system to be operated defensively.
Many of the problems that occur on a power system can cause
serious trouble within such a quick time period that the
operator could not take action fast enough. This is often the
case with cascading failures.
Because of this aspect of systems operation, modern
operations computers are equipped with contingency analysis
programs that model possible system troubles before they
arise.
These programs are based on a model of the power system and
are used to study outage events and alarm the operators to any
potential overloads or out of limit voltages.
Continue
Normal state:- All equality and inequality constraints are
satisfied. Generation is adequate to supply the existing load
demand and no equipment is overloaded.
Alert state:- The security level is below some threshold of
adequacy. This implies that there is a danger of violating some
of the inequality constraints when subjected to disturbances.
Emergency state:- Due to severe disturbance, the system can
enter emergency state. Here inequality constraints are violated.
The system would still be intact, and emergency control action
could be initiated to restore the system to an alert state.
Extremis state:- Here, both equality and inequality constraints
are violated. The violation of equality constraints implies that
parts of the system load are lost. Emergency control action
should be directed at avoiding total collapse.
Continue
Restorative state:- This is a transitional state in which
inequality constraints are met from emergency control actions
taken but the equality constraints are yet to be satisfied.
From this state the system can transmit to either the alert or the
normal state depending on the circumstances.
Continue
If the operation of the system went on without sudden failures or
without experiencing unanticipated operating states, we would
probably have no reliability problems.
However, any piece of equipment in the system can fail, either
due to internal causes or due to external causes such as lightning
strikes, object hitting transmission towers, or human errors in
setting relays.
It is highly uneconomical to build a power system with so much
redundancy (extra transmission line, reserve generation, etc..) that
failures never cause load to be dropped on a system.
Rather, A system are designed so that the probability of dropping
load is small.
Thus, the power systems are designed to have sufficient
redundancy to withstand all major failures events, but this does
not guarantee that system will be 100 % reliable.
Continue
1.
2.
Security analysis
1.
2.
1.
2.
Continue
System monitoring provides the operator of the power system
with up to date information on the current conditions of the P.S.
Contingency analysis is much more demanding and normally
performed in three states, i.e. Contingency definition, selection
and evaluation.
Contingency definition gives the list of contingencies to be
processed whose probability of occurrence is high. This list is in
terms of network changes, i.e. branch and/or injection outages.
These contingencies are ranked in rough order of severity
employing contingency selection algorithm to shorten the list.
Contingency evaluation is then performed (using AC power
flow) on the successive individual cases in decreasing order of
severity.
The evaluation process is continue up to the point where no post
contingency violations are encountered.
Continue
The second major function, security control, allows operating
personnel to change the power system operation in the event
that a contingency analysis program predicts a serious
problem, should a certain outage occur.
Normally it is achieved through Security Constrained
Optimization(SCO) program.
Contingency Analysis
The purpose of contingency analysis is to identify
the list of contingencies that if occur would create
violations in the system operating states.
They are ranked in order of severity.
Contingency analysis
Continue
Continue
Contingency analysis
Sensitivity Factors
The problem of studying thousands of possible outages
becomes very difficult to solve if it is desired to present the
results quickly.
It is easy to solve it with Linear sensitivity factors.
These factors show the approximate change in line flows for
changes in generation on the network configuration.
There are two types :1. Generation Shift Factors
2. Line Outage Distribution Factors.
Continue..
If the generator in question was generating
lost, then
MW and it was
Continue..
Where,
, = Preoutage flows on lines and k, respectively.
= Flow on line with line k out.
By precalculating the line outage distribution factor a very fast
procedure can be set up to test all lines in the network for
overload for the outage of a particular line.
Continue.
This procedure will determine the overloads and voltage limit
violations accurately.
Drawback:- Its take more time to execute.
If the list of outages has several thousands entries then total
time to test for all of the outages can be too long.
So we are confronted with dilemma. A methods which
involving a and d factors can give rapid analysis but cant give
MVAR flows and voltages. Where as AC power flow gives
full accuracy but take long time.
Solution:-Select contingencies in such a way that only those
that are likely to result in an overload or voltage limit violation
will study. The other cases will go unanalyzed.
Continue..
There are two sources of error can arise during selecting the
bad cases from full outage case list.
1. Placing too many cases on the short list :- This is conservative
approach which leads to longer run times for the security
analysis procedure to execute.
2. Skipping cases :-A case that would have shown a problem is
not placed on the short list and results in possibly having that
outage take place and cause trouble without the operators
being warned.
Contingency selection(1P1Q)
To measure how much a particular outage might affect the
power system, performance index (PI) is used.
If n is a large no
no., The PI will be small if all flows are within
limit, and it will be large if one or more lines are overloaded.
If n=1, a table of PI value can be calculate quickly for each
line in the network and order them from largest value to least.
The lines corresponding to the top of the list are then the
candidates for the short list.
One procedure Simply ordered the PI table and then picked the
top Nc entries from the list and placed them on the short list.
However, when n=1, PI dose not snap from near zero to near
infinity as branch limit exceeds. Instead its rises as a quadratic
function.
A line that is just below its limit contributes to PI almost equal to
one that is just over its limit
limit.
Thus the PIS ability to distinguish or detect bad cases is limited
when n =1. Trying to develop an algorithm that can quickly
calculate PI when n = 2 or larger has proven extremely difficult.
The solution procedure is interrupted after one iteration (one P - )
calculation and one Q V calculation; thus, the name 1P1Q.
Advantages:1. Give sufficient information in the solution at the end of the first
iteration of the decoupled power flow to give a reasonable PI.
2. The voltages can also be included in the PI.
Concentric Relaxation
An idea is considered to enter the field of security analysis in
power systems is that an outage only has a limited
geographical effect.
The loss of a transmission line does not cause much effect a
thousand miles away; in fact, we might it doesn't cause much
trouble beyond 20 miles from the outage, although if the line
were a heavily loaded, high-voltage line, its loss will felt more
than 20 miles away
away..
To realize the benefit from the limited geographical effect of
an outage, power system is divided in 2 parts.
(1) affected part (2) unaffected part.
To make this division, the buses at the end of the outaged line
are marked as layer zero. The buses that are one transmission
line or transformer from layer zero are then labeled layer one.
This same process can be carried out, layer by layer, until all
the buses in the entire network are included.
Some arbitrary number of layers is chosen and all buses
included in that layer and lower-numbered layers are solved as
a power flow with the outage in place. The buses in the highernumbered layers are kept as constant voltage and phase angle
(i.e. as reference buses).
This procedure can be used in two ways
ways:: either the solution
of the layers included becomes the final solution of that case
and all overloads and voltage violations are determined from
this power flow, or the solution simply is used to form a
performance index for that outage.
Disadvantages:-It requires more layers for circuits.
Bounding
N1 = the subsystem immediately surrounding the outaged line
N2 = the external subsystem that we shall not solve in detail
N3 = the set of boundary buses that separate N1 and N2
This method is based on the assumptions about the phase angle
spread across the lines in N2, given the injections in N1 and the
maximum phase angle appearing across any two buses in N3.
calculate the Pk and Pm the injections that will make the phase
angles on buses k and m simulate the outage of line k-m.
------- (1)
And finally
------ (2)
is the largest
in N3 and
is the
Interpretation of bounding
f
pq x pq represents the point where circuit pq will go into
overload and is determined as explained previously.
REFERENCES
1. Modern Power System Analysis by D.P.Kothari &
I.J.Nagrath .
2. Power Generation, Operation and Control by
A.J.Wood & B.F.Wollenberg
1.
2.
3.
4.
5.
6.
7.
8.
9.
10. A power system has secure and economic operation implies that__________.
A. Operating cost is minimum subject to emission constraints.
B. Operating cost is minimum subject to line flow constraints.
C. Magnitude of the line flows are minimum.
D. Transmission real power losses are minimum.
11. Contingency selection is usually performed using DC power flow model because__________ .
A. Accurate results are required.
B. Masking is to be removed.
C. Limited accuracy results are required.
D. All of the above.
12. Pre-plus post-contingency corrective rescheduling is required at times for___________.
A. The network operation is required in alert state .
B. The network operation is non-corrective emergency.
C. The network corrective capability is limited.
D. None of the above.