Professional Documents
Culture Documents
Contingency Analysis
Contingency Analysis
net/publication/310796556
Contingency Analysis
CITATIONS READS
0 6,332
1 author:
Mohamed Fayez
Cairo University
2 PUBLICATIONS 0 CITATIONS
SEE PROFILE
All content following this page was uploaded by Mohamed Fayez on 24 November 2016.
Master of Science
in
Electrical Power System
By:
𝟐. 𝟏 INTODUCTION ---------------------------------------------------------------------------------------------- 𝟖
𝟐. 𝟔 Contingency Evaluation-------------------------------------------------------------------- 𝟐𝟗
𝟑. 𝟏 Introduction------------------------------------------------------------------------------------- 𝟑𝟎
𝟒 Contingency Analysis in Power System using Load Flow Solution (paper) ----𝟑𝟗
𝟓 References ---------------------------------------------------------------------------------- 𝟒𝟑
𝑃𝑎𝑔𝑒 1
Abstract
ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ
𝑃𝑎𝑔𝑒 2
it has become a major threat to the operation of many systems. The
transfer of power through a transmission
𝑃𝑎𝑔𝑒 3
CHAPTER – 1
INTRODUCTION
ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ
𝑃𝑎𝑔𝑒 4
Conventional methods for contingency analysis involve load
flow analysis which is an iterative method. Various methods like AC
load flow and several performance index (PI) based methods are
used for power system contingency analysis. In conventional
methods a power flow solution is required at each iteration, which
is again an iterative method itself. Therefore these methods are not
suitable for online applications due to the large computation time.
All these approaches involve a huge number of AC load flow
calculations to determine the bus voltages and line flows for each
contingency. It is a challenging task for today’s high contingency
analysis always uses approximate fast converging load flow
algorithms such as Fast Decoupled load flow analysis which has
poor convergence characteristics when dealing with heavily
loaded power systems. There are other simple techniques such as
most popular DC load flow analysis. The results are acceptable
when compared with standard AC load flow method; however it
can only provide the Real Power (MW) flow under each
contingency. Therefore voltage violations and line over loads due
to excessive Reactive Power (VAr) flows cannot be detected using
this method. Distribution factors and sensitivity analysis, another
method based on linear model can also be used for this purpose
but this method cannot provide accurate solution for a large power
system due to its nonlinearity.
𝑃𝑎𝑔𝑒 5
For security assessment purpose it is vital to reduce
computational time, since the security level of power system need
to be determined as quick as possible and the analysis of all
credible contingencies within a very short time is needed. Artificial
Neural Networks (ANNs) attracted many researchers and
engineers from power system area to look for the solutions to
some of complex problems to improve the speed in security level.
It has been proved that these ANNs are capable of learning from
raw data and they can be used to identify internal relationship
within raw data not explicitly given or even known by human
experts and there is no need to assume any linear relationship
between data. This method is preferred because it requires no
calculation based on mathematical model.
𝑃𝑎𝑔𝑒 6
The rapid deregulation of electric power industry and bi-
lateral power transactions between the participating areas have
necessitated the urgent requirement of new methods for
estimating and updating the available transfer capability (ATC).
This information must be updated on the web based OASIS (Open
Access Same Time Information System) for latest capacity
reservations and transactions.
𝑃𝑎𝑔𝑒 7
power flow i.e. re-dispatching the power and reactive power
injection by incorporating FACTS devices.
CHAPTER -2
2.1 INTODUCTION
𝑃𝑎𝑔𝑒 8
loads and under or over voltages existing in the parts of the
system can also be detected from this study.
The need of power flow study is summarized as follows:
𝑃𝑎𝑔𝑒 9
There are various methods used for contingency
analysis purpose. Methods based on AC power flow
calculations are considered to be deterministic methods
which are accurate compared to DC power flow methods. In
deterministic methods line outages are simulated by actual
removal of lines instead of modeling. AC power flow methods
are accurate but they are computationally expensive and
excessively demanding of computational time. Because
contingency analysis is the only tool for detecting possible
overloading conditions requiring the study by the power
system planner computational speed and ease of detection
are paramount considerations. A brief description of these
methods is given below.
𝑃𝑎𝑔𝑒 10
Each transmission line is represented by its susceptance Bij.
Impedance 𝑍 = 𝑟 + 𝑗𝑥 ---------- (2.1)
𝑟
𝐺= ≈ 0--------------------- (2.3)
𝑟 2 +𝑥 2
−𝑥 1
𝐵= ≈ − ---------------------(2.4)
𝑟 2 +𝑥 2 𝑥
1
𝐵′𝑖𝑘 = −𝐵𝐼𝑗 = -------------------(2.5)
𝑥𝑖𝑗
The angles and real powers are solved by iterating Equation 2.6.
𝑃𝑎𝑔𝑒 11
inverting the bus admittance matrix or it can be constructed by
using available algorithms. The fundamental approach to
contingency analysis using z-matrix method is to inject a fictitious
current in to one of the buses associated with the element to be
removed, of such value that the current flow through the element
equals the base case flow; all the other bus currents are set equal
to zero. In effect, this procedure creates throughout the system a
current flow pattern that will change in the same manner as the
This method is also based on load flow analysis and used for
determining the voltage collapse proximity. The value of L-index
ranges from 0 (no load condition) to 1 (Voltage collapse). The bus
with highest L-index value will be the most vulnerable bus in the
system. Calculation of L- index for a power system is briefly disused
below.
𝑃𝑎𝑔𝑒 12
Consider an N bus system with number of generators Ng
𝑰 𝒀 𝒀𝑮𝑳 𝑽
[ 𝑮 ] = [ 𝑮𝑮 ] = [ 𝑮 ] -------------------------- (2.7)
𝑰𝑳 𝒀𝑳𝑮 𝒀𝑳𝑳 𝑽𝑳
𝑽 𝒁 𝑭𝑳𝑮 𝑰
[ 𝑳 ] = [ 𝑳𝑳 ] = [ 𝑳 ] -------------------------- (2.8)
𝑰𝑮 𝑲𝑮𝑳 𝒀𝑮𝑮 𝑽𝑮
Where
𝑃𝑎𝑔𝑒 13
The L-index of the 𝑗𝑡ℎ node is given by
The value of 𝐹𝑗𝑖 are obtained from matrix 𝐹𝐿𝐺 from equation (2.9)
𝑃𝑎𝑔𝑒 14
In a power system there is a strong dependence between
injected real powers and bus voltage angles and between the
injective reactive power and bus voltage magnitudes that is strong
couplings between P and δ variables and between Q and |V|. The
coupling between Q and δ and P and |V| is weak. Therefore the
matrices N and J can be set to zero. Resulting linear equations
reduce to
𝑃𝑎𝑔𝑒 15
2.2.5 Fast decoupled Load Flow
𝑃𝑎𝑔𝑒 16
4. The injected reactive power at any bus is always much less
than the reactive power consumed by the elements
connected to this bus when these elements are shorted to
the ground
𝑃𝑎𝑔𝑒 17
The diagonal and off diagonal elements of 𝐽1
𝑃𝑎𝑔𝑒 18
Replacing the first term of this above equation with
−𝑄𝑖
𝑃𝑎𝑔𝑒 19
incident to bus i. In a typical power system the self
susceptane 𝐵𝑖𝑖 ≫ 𝑄𝑖 and assuming|𝑉𝑖2 | ≈ |𝑉𝑖 |,
which yields
𝑃𝑎𝑔𝑒 20
Here, 𝐵′ 𝑎𝑛𝑑 𝐵′′ are the imaginary part of bus admittance
matrix 𝑌𝐵𝑢𝑠 , therefore in fast decoupled load flow power
algorithm, the successive voltage magnitude and phase
angle changes are given by,
𝑃𝑎𝑔𝑒 21
𝑃𝑎𝑔𝑒 22
𝟐. 𝟑 Contingency analysis techniques
𝑃𝑎𝑔𝑒 23
𝑃𝑎𝑔𝑒 24
𝟐. 𝟒 Contingency Ranking
𝑃𝑎𝑔𝑒 25
R = Resistance of the line connecting buses i and p
𝑃𝑎𝑔𝑒 26
𝟐. 𝟓 Contingency Selection
𝑃𝑎𝑔𝑒 27
𝑃𝑎𝑔𝑒 28
𝟐. 𝟔 𝑪𝒐𝒏𝒕𝒊𝒏𝒈𝒆𝒏𝒄𝒚 𝑬𝒗𝒂𝒍𝒖𝒂𝒕𝒊𝒐𝒏
𝑃𝑎𝑔𝑒 29
CHAPTER -𝟑
Contingency Analysis using Power World Simulator
ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ
𝟑. 𝟏 Introduction
𝑃𝑎𝑔𝑒 30
Movement of generation, load, injection group, or
switched shunt MWs or Mvars.
𝑃𝑎𝑔𝑒 31
𝟑. 𝟑 Contingency Analysis Tool in Simulator
Contingency Analysis tools can be accessed by
selecting Tools ribbon tab � Contingency Analysis in
run mode.
Initially, no contingencies are defined for a case.
Right-click and
choose Insert
to add a
contingency
Select to
load from Select to allow Simulator to define
a file
𝑃𝑎𝑔𝑒 32
3.4 Auto-Insertion of Contingencies Dialog
Select to
include only
elements in
chosen
Choose areas
types
to
include
Apply
Advanced
Filters for
branches,
generators,
or buses
Include
only
elements
that are
near a
particular
bus
Specify
how to
create
automatic
names for
the
𝑃𝑎𝑔𝑒 33
3.5 Example using Power World simulator
7-Bus example as shown in the following figure
𝑃𝑎𝑔𝑒 34
Select Start Run
The result as shown in the following
figure
𝑃𝑎𝑔𝑒 35
Finished With 3 Violations
From this results we find the first Contingency
analysis (L One-Two C1) is the worst case
o We can select it to operate only as a following
𝑃𝑎𝑔𝑒 36
And the one-line diagram of Post-Contingent system in case
one (L One-Two C1) can be shown as following
𝑃𝑎𝑔𝑒 37
We can do this example for
𝑃𝑎𝑔𝑒 38
CHAPTER-𝟒
Contingency Analysis in Power System using Load
Flow Solution
ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ
ABSTRACT
In this paper, the objective is to check the real time security. By two
kinds of performance indices, i.e., active power index (PIP) and
reactive power index (PIV) the contingency selection is performed.
Using Newton Raphson (NR) iterative method the MATLAB
programming code is written for obtaining the solution of load
flow equation. Using the algorithm of singular transformation
method the MATLAB code for YBUS is written as the elements of
the bus admittance matrix (YBUS) used here. At last for
contingency ranking the performance indices are calculated. On an
IEEE 25 Bus, 35 Line test system; the effectiveness of this method
has been tested.
𝑃𝑎𝑔𝑒 39
determined at various buses. An IEEE 25 bus, 35 line system is
considered for the contingency analysis.
The system, holds 1 numbered slack bus, 4 PV buses (2 to 5)
and the rest 20 numbers are load buses. Total 35 transmission
lines are connected between various buses in the system. Using
NR iterative method load flow is carried out that acts as steady
state data. After each contingency case known as post
contingency data load flow is again carried out. Performance
indices are obtained by the use the equations of contingency
ranking (3.4), Figure-1 shows the graph of the system under
study. While developing YBUS matrix using singular
transformation technique it will be useful.
35 single line outage contingency cases are considered. In
table-1 and table-2 first 5 severity cases are tabulated (Both for
%PIP and %PIV).
𝑃𝑎𝑔𝑒 40
Similarly 595 double line outage contingency cases are considered also and first
5 severity cases are tabulated in table-3 and table-4 respectively for both %PIP
and %PIV.
𝑃𝑎𝑔𝑒 41
CONCLUSION
By calculating performance indices, i.e., active power performance index
(PIP) and reactive power performance index (PIV) the contingency selection
and contingency ranking are made in this paper. These two indices PIP and
PIV were calculated for an IEEE 25 bus, 35 line test system. The contingency
severity cases, i.e., single line outage and double line outage is accurately
indicated by the numerical values of PIP and PIV respectively. In off line
manner the indices are calculated for a single loading condition. From the
obtained results it can be concluded that the calculation of performance
indices gives a good measure about the severity of all the possible line
contingencies occurring in the system. The indices with higher value shows
a severe case which has the highest potential to make the system
𝑃𝑎𝑔𝑒 42
CHAPTER – 𝟓
REFERAENCES
ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ
[6] IEEE TF Report, “Proposed terms and definitions for power system
stability,” IEEE Trans. Power Apparatus and Systems, vol. PAS-101.
[7] Jena D, Prusty B.R, Power System Analysis: Operation and Control,
I.K. International Publishing House Pvt. Ltd., New Delhi, ISBN –
9789382332497.
[8] John J. Grainger, William D. Stevenson J., Power System Analysis,
McGraw-Hill, Inc., ISBN-0-07- 113338-0.
[9] Niebur D. And Germond A.J., “Power System Static Security
Assessment using the Kohenen Neural Network Classifier”, IEEE
Transactions on Power Systems, Vol. 7, No. 2, pp. 865-872, May 1992.
𝑃𝑎𝑔𝑒 43
[10] Prusty B. Rajanarayan, Pattnaik Bhagabati Prasad, Pandey Prakash
Kumar, Sai Santosh A., "Power System Security Analysis", International
Journal of Scientific & Engineering Research, Volume 5, Issue 5, May-
2014 849, ISSN 2229-5518
[11] Stott B, Alsac O and Monticelli A.J, “Security Analysis and
Optimization”, Proc. IEEE, vol.75, No. 12, pp. 1623-1644, Dec 1987.
[12] Stott B and Alsac O, “Fast Decouple Load Flow”, IEEE Transactions
on Power Apparatus and Systems, Vol. PAS-91, No.5, pp. 859-869, May
1974.
𝑃𝑎𝑔𝑒 44