You are on page 1of 7

1

Vision 2020
Dynamic Security Assessment in Real Time
Environment
G. Bizjak, U. Kerin, University of Ljubljana, Slovenia
R. Krebs, E. Lerch, O. Ruhle, Siemens AG, Germany

economic objectives. Although in off-line studies a range of


Abstract-- In this paper, implementation of power system events in various system conditions is investigated, some
dynamic security assessment (DSA) into real time simulation extreme events can be overlooked. Namely, the actual
environment is described. For this purpose, a powerful conditions can strongly differ from the reference one used in
simulation system has been used and a flexible security
studies. Moreover, the well known static security assessment
assessment framework developed. The DSA system constructed is
user oriented and enables simple evaluation of power system can in some cases provide cursory results, since no regard to
security. The assessment is made in respect to some user defined the system transients is paid.
security constraints considering normal or contingency provoked In response, dynamic security assessment (DSA) is used. It
system operation. For reporting of the results different is considered as essential tool in investigation of a degree of
visualization formats are available. The DSA system is fully risk in power system’s ability to survive imminent
automatic and can process any number of study cases without
disturbances (contingencies) [1]. DSA can be made using
user interaction. It targets high flexibility in power system
research and maximum performance at minimum hardware various methods, differing in computational complexity. The
requirements. most complex are the deterministic methods using analytical
solutions (time-domain numerical integration) whereas the
Index Terms—dynamic security assessment, power system simplest approach is the direct inference from measurements
security, real time, security constraints of power system quantities. In between there are hybrid
approaches combining simulation with some direct or
I. INTRODUCTION measurement-based method [2].

D EREGULATION principles and higher economic


objectives force the operators to operate power systems
closer and closer to their physical limits. Under these
Time domain DSA is a multi task operation. It requires
definition of power system security indices used to provide a
relative measure of severity in the transient condition,
conditions, unexpected events easily cause system failures development and application of contingency screening and
possibly leading to cascading events or even blackouts. In ranking methods, application of simulation tools, and
order to withstand these conditions and to ensure reliability of advanced visualization. In addition, severe time constraints
supply, power systems are subject to continuous upgrades and have to be considered if applied online.
network modernization. As a result, they gain robustness and The security indices in DSA capture the dynamic state of
are well interconnected however are growing in size and the power system after fault clearance. Each aspect of power
complexity. The analysis used to investigate system’s system security can be represented by its own index [3]
performance in the planning stage as well as in its operation is nevertheless also methods for a single all-encompassing
power system security assessment. security index are available [4-5]. Reliable indices are
Events of past years (blackouts in USA and Italy) show important for successful contingency screening and ranking.
that the conservative guidelines for power system operation The screening methods classify contingencies into secure and
are not sufficient enough in competitive environment, insecure cases, whereas the ranking methods rank their
constrained not only by system limits but also by higher severity.
Moreover, simulation in time domain is known for its
computational burden. Although modern processors have
U. Kerin is with Faculty of electrical engineering, University of Ljubljana,
1000 Ljubljana, Slovenia (e-mail: uros.kerin@fe.uni-lj.si).
bridged the gap between the available computing power and
G. Bizjak is with Faculty of electrical engineering, University of Ljubljana, expectations, the online application is still challenging.
1000 Ljubljana, Slovenia (e-mail: grega.bizjak@fe.uni-lj.si). Common approach to enhance the computational efficiency is
E. Lerch is with Siemens AG, PTD SE PTI NC, 91050 Erlangen, Germany to use parallel processing [6] and criteria for early termination
(e-mail: edwin.lerch@siemens.com).
O. Ruhle is with Siemens AG, PTD SE PTI NC, 91050 Erlangen, Germany of the simulation [7].
(e-mail: olaf.ruhle@siemens.com). In this paper, implementation of DSA concept into real
R. Krebs is with Siemens AG, PTD SE PTI NC, 91050 Erlangen, Germany time simulation environment is described. For the purpose, a
(e-mail: rainer.krebs@siemens.com).

©2008 IEEE.
2

powerful simulation system has been used and a flexible


security assessment framework has been developed. DSA Data
acquisition
application constructed targets high flexibility in investigation
of power system operation scenarios and maximum Computation and Visualization
Analysis
performance at minimum hardware requirements. Power
The paper is organized as follows. First, a general system
model
classification of power system security is given in Section II.
Than in Section III main elements of DSA system are
introduced, which are in Section IV used as a guidelines for Control
simulation system implementation. The application is put
under test in Section V, where real time performance is Figure 2 Main components of DSA system
evaluated by a case study. The paper is concluded by general
The accuracy of a DSA system is strongly related to the
findings in Section VI.
quality of input data. Important are detailed representation of
a power system and a credible snapshot of the system’s
II. POWER SYSTEM SECURITY
condition. The data can be acquired from a number of
In operation, electrical system is considered as secure if it sources. Since all power systems have SCADA systems, this
is in the normal state and will remain in the normal state remains the primary source for data acquisition, nevertheless
following a contingency. Then again, the system is considered various multifunctional measurement or monitoring units can
as insecure if following the contingency, the operating also provide any system quantities. Moreover, the inputs can
constraints are violated and the emergency state arises. In be further improved by system operation scheduling data and
order to ensure the system’s security in normal operation, adjustments based on human experience.
preventive measures are applied. However, to re-establish its DSA of a current system condition or a future operating
security after an emergency state, effective corrective and condition can be carried out in respect to the boundaries set
restoration strategies are necessary. The transition among by the load, operation and security constraints. Considered
different operating states of a system is illustrated in Fig. 1. can be margins to thermal limits of transmission elements,
margins of steady state and transient state voltage and
frequency variations, stability margins, and others. The limits
representing the security constraints can be expressed by
concrete criteria like critical under- or over-voltages, critical
loading of lines, critical under- or over-frequencies or critical
angle differences between generators or system areas.
Full functionality of a DSA system is achieved by
application of visualization functions. Modern design tools
offer unlimited options nevertheless security assessment
results should be displayed in simple and meaningful manner.
Prime way is to use multilevel structure, different display
formats, and to highlight crucial information.
If in DSA a contingency or system condition potentially
leading to security violation is determined, remedial control
Figure 1 Operation states of a power system
measures must be taken. These measures include preventive
and emergency actions, determined according to the
III. SECURITY ASSESSMENT FRAMEWORK
operational limits of active and passive system components,
To accurately assess the security of a power system a and settings of protection devices. Based on analysis, the DSA
flexible and modern assessment framework is necessary. It system can invoke the system operator to take reinforcement
should aim to perform analysis in real time and provide actions in order to improve system security in optimal
reliable results. Elements of such framework can be grouped manner.
in main components shown in Fig. 2.
IV. INTEGRATED DSA SYSTEM
The DSA architecture adjusted for software
implementation is illustrated in Fig. 3. Data referring to a
power system model are acquired from common database and
modified to meet specific operating condition. Moreover, by
application of system events (contingencies) study cases are
defined and computed using real time simulation system.
Modular structure adopted allows horizontal task distribution
3

and coordination of data processing. The DSA system is fully implementation and management of DSA tasks.
automated. DSA applications, including load flow, time The implementation is done by programming of syntaxes
domain simulation, and analysis, can be performed for a in common database, used as the reference by the simulation
number of cases (i) without user interaction. If security system. Syntaxes are grouped into macro instructions
constraints are violated, the DSA documents the contingency assessing areas of power system security. Macro specific
and more detailed investigation of a study case is possible. operations are defined using Block Oriented Simulation
Language (BOSL) and simulation system built-in functions.
A. Software Implementation
Simulation system used for implementation is
PSS™NETOMAC [8]. The simulation system provides open
environment for user interaction and enables simple
COMMON DATABASE

Network status Status change


i
(i)

Reference network,
Events,
Next study case (i+) Study case Event
i Results,
(i) Etc.

REAL TIME SIMULATION


(i)

Modular architecture

Transient Voltage Frequency Small signal Thermal ...


stability stability stability stability overloading

DATA PROCESSING (i)

Quick Overview Detailed


investigation

Generators Lines Nodes ...

PV Curves Time Bar Status


diagrams diagrams Nomograms Matrix Meters Reports Etc...

Figure 3 DSA software implementation framework

In computations, the macros are initialized in hierarchical developed user interface to create contingencies is shown in
order, so DSA associated tasks can be, in addition to the Fig. 4. The contingency builder allows selecting grid
horizontal management, also managed vertically on a elements, equipment and events and combination of them to
multilevel basis. Moreover, the use of batch definitions is write a scenario file.
possible. In general, DSA can be performed in two manners. The contingency screening process is implemented by
In a single manner one study case in a run is processed, Boolean algorithms. In processing, power system state
whereas in a continuous manner any number of study cases variables are searched for violations of limits representing the
can be processed. security criteria and if any are determined, Boolean variables
The common database comprises definitions of DSA adopt a binary TRUE (insecure) or in the opposite case a
associated tasks, including input/output data management, binary FALSE (secure). In final, each security issue is
security assessment procedures, simulation system control represented by a binary record, adequate for direct security
and monitoring functions. Some tasks are open for user assessment or for construction of security indices. An
modifications and can be modified by means of direct example of criteria and indices for contingency screening and
database access or by application of a graphical interface. In ranking is given in the following chapter.
either way, input data have to be in form of simulation system
readable code and inputted according to some input rules. The
4

k = 1,...., m

Ik ≤ Ik max (3)

where Ik is the current carried by the k-th component, Ik max


is the thermal rating of the same component and m is the
number of components. The boundary can be a time variable
if short overloading of components is acceptable. Frequency
deviation in network buses is constrained by (4), where fk is
the bus frequency, f0 is the rating frequency and ∆fkmax is the
Figure 4 Snapshot of the contingency builder
maximum admissible deviation.
The use of step-by-step simulation system enforces DSA j = 1,...., m
based on simultaneous evaluation of power system
trajectories. This enables accurate analysis of system
f j − f 0 ≤ ∆f k max ( 4)
conditions however it can impose heavy computational
burden. In the considered DSA framework, at this stage, two
Control variables are subject to the inequality constraints
basic speed enhancement measures are applied: if system
formulated by (5), (6) and (7). PGk and QGk are the active and
remains secure after fault clearing, computational time step is
reactive power produced and VGk the voltage established by
progressively increased as the simulation progresses and if
the k-th generation unit. In addition, rotor angles of generators
security violation is detected an early termination scheme
should not exceed the limits given by (8).
terminates the simulation before it reaches the simulation time
set. Using these measures, the DSA system considered meets k = 1,...., z
a typical performance demand of processing 10 load flow
cases with about 20 contingencies checked and reported in 10 PGk min ≤ PGk ≤ PGk max (5)
minutes on single processor computer system.
B. Contingency Screening and Ranking QGk min ≤ QGk ≤ QGk max ( 6)
The dynamic behaviour of power systems is known as
complex and difficult to classify. The problem is especially VGk min ≤ VGk ≤ VGk max (7 )
apparent in the area of defining security measures for
screening and ranking of contingencies. In screening, δ Gk min ≤ δ Gk ≤ δ Gk max (8)
contingencies are classified as secure or insecure, whereas in
ranking they are ranked considering their severity. The Deterministic methods are sufficient in determining if
screening and ranking can be done using traditional security criteria are violated, for example if generator stability
deterministic approach or risk-based approach. is reached, if voltage is below a certain level, if angle
In the deterministic approach, security limits are expressed difference between two nodes is larger than allowed, etc.
in form of inequality constraints providing admissible limits However, to determine the level of security risk-based
of system quantities. The implemented constraints are as approach is needed.
follows. In risk-based approach security indices are calculated.
Bus voltages are constrained by (1) They are able to capture the change of state variables in
j = 1,..., n power system transition from pre- to post-contingency
condition and can be based on:

V j min ≤ V j ≤ V j max (1)


• change of rotor angle differences
where j is the investigated system bus and n the number of • change of rotor angle differences with respect to centre of
system buses. The boundaries are a time variable in order to inertia
assure satisfactory voltage transient with regards to • change of voltage and currents
angle/voltage stability system requirements. Moreover, • change of generator speed or system frequency
maximum voltage difference between two neighbouring nodes • change of transient energy of generators
is constrained by (2), where Vi and Vj are the node voltages • acceleration of generators
and ∆Vij is the maximum admissible voltage difference. • system oscillation and damping
Vi − V j ≤ ∆Vij max ( 2)
In literature various definitions of security indices are
Thermal overloading of network components is limited by given. Nevertheless, for time domain implementation the ones
(3) with analytical background are most convenient. Examples
5

are given in [5], [9]. ωi is the rotor speed with respect to COI
In [5], security indices based on ratio of maximum NG is the total number of generators
deviation achieved and maximal deviation admissible of Θi is the rotor angles with respect to COI
different state variables are defined. A ratio is calculated for a Θicl is the rotor angle of i-th generator at fault clearing
time frame considered and if it equals 1 or is greater the time
security violation is reported. The security indices given are
for rotor angle deviation of network generators, maximum and In the considered DSA system security indices have not
total frequency deviation, dynamic and quasi-stationary been implemented yet.
voltage deviation, power flow through transmission lines and C. Visualization and Monitoring
load shedding. An example of security index considering rotor
Clear graphical representation of power system security is
angle deviation is given by (9). For other indices see [5].
essential in recognizing weakest points of a system.
The Angle Index (AI) is defined as the minimum
Therefore, DSA must include meaningful visualization of
between 1 and maximum ratio of maximum deviation of the
information characterizing important security issues.
load angle of i-th generator and the maximum admissible load
Considered DSA system provides various output formats to
angle given by the protection relay. Namely, the relays,
meet these requirements, including interactive graphics,
protecting the generator against asynchronous operation, are
animations, matrix representation, electrical diagrams, tables,
adjusted is such a way that the load angle of a generator (δi)
etc. as shown in Fig. 5.
does not exceed a certain value (e.g. 120°). The value 1 of this
1) Interactive graphic
index represents that at least one generator in the system
Interactive graphic provides plots of system quantities with
reaches the considered limit.
time reference and enables output format manipulations. User
⎧⎪ ⎛ δ ci , max ⎞⎫ selected plots can be easily scaled by pre- or user-defined
AI = min ⎨1, max ⎜ ⎟⎪
⎬ (9) mathematical expressions and analyzed by application of
i =1,...NG ⎜ δ c , max, adm ⎟⎪
⎪⎩ ⎝ ⎠⎭ Fourier analysis. Moreover, each plot can be investigated in
detail by zooming in the time scope and using on-line cursor
In [9], a different approach is used. Introduced are the control.
indices based on three dot products. A dot product is defined
for detecting the exit point in the transient energy function. Detailed re-calculations Matrix-
The indices give the measure of total accelerating power and representation
the power system response to this accelerating power. The
indices are defined as follows:
Fehler! Es ist nicht möglich, durch die Bearbeitung von
Feldfunktionen Objekte zu erstellen.

∑ f ⋅ω
NG
dot1 = i i (10)
i =1 Animations
Numerical visualization &
general re-calculations
Mi
fi = Pmi − Pei − ⋅ PCOI (11)
Mt Figure 5 Visualization and monitoring of the dynamic behaviour of power
systems in case of system contingencies

∑ (P
NG
PCOI = − Pei ) (12) 2) Matrix representation
mi
i =1 Common approach in providing of security assessment
results is to use summary tables. These tables comprise a list
of investigated contingencies and information regarding
∑ f ⋅Θ
NG
dot 2 = i i (13) security violations. Matrix representation shown in Fig. 6
i =1 extends the visualization frame of such summary tables by
sorting the system events by applied contingency and related

∑ω ⋅(Θ − Θ )
NG network element, assessment criteria, and by organizing them
cl
dot 3 = (14)
i i i in reference to a colour scale. Moreover, the matrix comprises
i =1
hyperlinks enabling direct access to an event associated
where graphics.
Mi is the inertia constant of each generator
Mt is the total inertia constant of all generators
Pmi is the mechanical power input of each generator
Pei is the electrical power output for each generator
6

Figure 6. Matrix and electrical diagram representation


Figure 7. Interarea oscillation after300 MW trip, WAMS recordings
3) Recalculations and Animations
If the DSA system reports a security criteria violation,
recalculation of conditions leading to this violation is possible.
By definition of additional scenarios more exact security
boundaries can be determined and remedial actions examined
before applied. Moreover, associated system transients can be
further investigated using bar or vector animations of network
quantities in respect to a selected security criteria. Animations
are available for simulation time set and are controlled
through traditional control panel (play, pause, stop).

4) Other formats
In addition, other formats, such as for electrical
representation of a power system or for table representation of
security assessment associated data, are available. These
formats can be adjusted to meet user requirements and enable Figure 8. Interarea oscillation after300 MW trip, simulation results
multi-level overview of DSA results.
Using the eigenvalue mode of the DSA system the inter-
D. Study case area oscillations of the power system can be easily monitored,
The European UCTE system has been used to demonstrate moreover the system also shows how and which generators
the performance of the DSA. The system has an installed are involved in the oscillation (Fig. 9).
capacity of about 530 000 MW (2004) with a maximum load
demand of about 386 000 MW (2004). A model of the system
has been built with 610 generators, 4400 nodes, 12000 grid
branches, and 1050 controllers. The system model has been
validated using measurements of the installed Wide Area
Measuring System (WAMS).
Based on the comparison of the simulation results of a
300MW trip in Spain shown in Fig 8 and the recordings of
WAMS shown in Fig 7 it can be concluded that the model
represents the overall electromechanical system behaviour
with sufficient accuracy. The simulation has been performed
for 15 seconds under real time conditions. To achieve real
time conditions time steps of 10 ms are the limit. However,
for the electromechanically behaviour the accuracy with time
steps of 20 – 50 ms is also suitable.

Figure 9 Monitoring of geographical mode shape of an inter-area oscillation in


the UCTE system (Spain oscillates against Central Europe and the CENTREL
Counties)

Because of the flexible change from time domain to


frequency domain calculation remedial actions and preventive
7

measures can be checked very fast. Fig 10 depicts [6] M. Ni et al., ''Software implementation of online risk-based security
assessment'', IEEE transactions on power systems, Vol. 18, No. 3, pp.
countermeasures at different generators to increase damping 1165-1172, August 2003
in the system, here shown in the time domain, but analyzed in [7] Y. Xue et al., ''Quantitative assessment for transient voltage security'',
the frequency domain by system eigenvectors and residues. IEEE transactions on power systems, vol. 15, no. 3, pp. 1077-1083,
August 2000
[8] Lerch, E.; Kulicke, B.; Ruhle, O.; Winter, W.: “NETOMAC - Calculating,
Analyzing and Optimizing the Dynamic of Electrical Systems in Time and
Frequency Domain“, in Proc. 3rd IPST '99, Budapest, Ungarn, 20.-
24.06.1999
[9] Fu, C. and Bose, A. ''Contingency Ranking Based on Severity Indices in
Dynamic Security Analysis'', IEEE Transactions on Power Systems, Vol.
14. No. 3, pp. 980-986, August 1999

VII. BIOGRAPHIES

Uros Kerin (1979) received the B.S. degree from the


University of Ljubljana, Slovenia, in 2004, where he is
currently pursuing the Ph.D. degree. Since 2004, he is with
the laboratory for power networks and devices at Faculty of
electrical engineering. In 2004 and 2007, he was a guest
researcher at Siemens AG PTD SE, Germany, and Arsenal
Research, Austria, respectively. His main research interest is
power system modeling, system operation and operation
security evaluation.

Grega Bizjak (1966) received the B.S., M.S. and Ph.D. in


1990, 1993 and 1997 respectively. He was a teaching
Figure 10 Countermeasures to improve system stability and reduce inter-area assistant at laboratory for power networks and devices and a
oscillation, checked by frequency deviation monitoring in different countries guest researcher at Siemens AG PTD SE, Germany.
Currently he is head of Laboratory of lighting, engineering
and photometry at University of Ljubljana. His main
V. CONCLUSION
research interest is power system modeling, modeling of
In this paper, a simulation system implementation of a system devices and operation dynamics of industrial networks.
DSA is described. The outcome is user oriented application
providing high flexibility in power system research and Edwin N. Lerch (1953) received his Dipl.-Ing. degree from
the University of Wuppertal/Germany in 1979, where he
capable of performing in real time. Using graphical interface also completed his PhD (Dr.-Ing.) in electrical engineering
options user can define contingencies and construct scenarios, in 1984. Since 1985 he has been a member of the systems
which are in computations considered in respect to user planning department at Siemens in the industrial power
system and machine group. He is currently working in the
defined security constraints. Severity of contingencies can be areas of power system stability, dynamics of multimachine
investigated using traditional deterministic security systems, control, optimization and identification problems in
assessment or risk-based security assessment. For reporting of electrical power systems. Since 1994 he is director of the department group
‘Industrial Systems, Dynamic of Grid and Machine’.
DSA results different visualization formats are optional.
Moreover, multilevel view is possible. The application has Olaf U. Ruhle (1965) received Dipl.-Ing. and his Ph.D.
been tested for performance in a case study. Successful degree in electrical engineering from the Technical
security assessment of a very large electrical system proved University of Berlin in 1990 and 1994 respectively. Since
1993 he is a member of Power Transmission and
the real time opportunities of implemented DSA system and
Distribution Group and the system planning and consulting
sufficient accuracy of results. department at Siemens in Erlangen, Germany. He is working
on power system stability, dynamics of multimachine
VI. REFERENCES systems, control, optimization and identification problems in
electrical power systems. He is responsible for the NETOMAC program system
[1] IEEE/CIGRE joint Task Force on Stability Terms and Definitions, support, sale and training worldwide.
''Definition and classification of power system stability'', IEEE
transactions on power systems, vol. 19, no. 2, May 2004
Rainer Krebs, born 1958 in Germany (member of VDE, CIGRE, IEC and
[2] K. Morsion, L. Wang and P. Kundur, ''Power system security assessment, ''
DKE), received his Dipl.-Ing. degree from the University of
IEEE power & energy magazine, pp. 31-39 September/October 2004
Erlangen in 1982. From 1983 to 1990 he worked as an
[3] K. W. Chan, Q. Zhou, and T. S. Chung, ''Dynamic security contingency
assistant professor at the Institute for Electrical Power Supply
ranking and generation reallocation using time domain simulation based
at the same University. In 1990 he received his Dr.-Eng.
severity indices, '' in Proc. Int. Conf. Power System Technology 2000
degree in Electrical Engineering. 1990 he joined Siemens
(PowerCon 2000) , Dec. 4–7, 2000, vol. 3, pp. 1275–1280.
AG, Power Transmission and Distribution, System Planning
[4] C. Fu and A. Bose, ''Contingency Ranking Based on Severity Indices in
Department. Since 1998 he is director of the System-
Dynamic Security Analysis'', IEEE Transactions on power systems, Vol.
Protection and System-Analysis Tools Department and since
14, No. 3, August 1999
2006 he is ‘Principal Expert for Power Technologies’. In parallel he started in
[5] J.M. Gimenez and P.E. Mercado, ''Online Inference of the Dynamic
2003 as lecturer at the University of Magdeburg.
Security Level of Power Systems using Fuzzy Techniques'', IEEE
transactions on power systems, Vol. 22, No. 2, May 2007

You might also like