Professional Documents
Culture Documents
1. Introduction
The growth of large interconnected power systems demands a high degree of security for normal
operation. The primary aim of an electric power system is to provide adequate uninterrupted
supply of electrical power to customer premises within the set limits of frequency and voltage
levels. The current trend towards deregulation and the participation of many players in the power
market are contributing to the decrease in the security margin.
A power system at any time can never be totally secure. It is always possible to devise a
sequence of events that will lead to a total or partial collapse of the system. Single contingencies
are more frequent than multiple contingencies. Power system security poses an important issue in
planning and operation stages of a power system. Security assessment, basically, deals with
evaluating the ability of the system to continue to provide service in the event of an unforeseen
contingency. Conventional method of security evaluation involves solving full AC load flow
equations and transient stability analysis of the current system state by time domain simulation
program.
Security assessment is a major concern in planning, design and operation stages of electric power
systems. Security assessment consists of three modes, static, transient and dynamic. The
traditional method used in static security analysis involves solving full AC load flow equations
for each contingency scenario. This is highly time consuming and inadequate for real time
applications. Security assessment is the analysis performed to determine whether, and to what
extent, the system is reasonably safe from serious interference to its operation. Occurrence of
certain severe disturbances may cause the system to go to an undesirable emergency state, if the
system security is not well defined beforehand. Hence, effective control of power systems
demands a quick security evaluation of their operating states. Conventional method of security
evaluation, performed by simulation program, involves long computer time and inadequate for
real time applications.
Security assessment is the analysis performed to determine whether, and to what extent, the
system is reasonably safe from serious interference to its operation. It is duty of the system
operator to maintain the system in a normal state. Under certain conditions, occurrence of some
severe disturbances may cause the system to go to emergency state. Under such situations, the
operator must take immediate control actions to retain the system in normal operating state,
wherein system security needs to be well defined. Hence, effective control of power systems
demands a quick security evaluation of their operating states.
Security analysis may be broadly classified as Static Security Assessment (SSA) and Transient
Security Assessment (TSA). Static security analysis evaluates the post contingency steady state
condition of the system neglecting the transient behavior and other time dependent variations.
Transient security analysis evaluates the performance of the system as it progress after a
disturbance. Analysis of power system stability, namely, rotor angle stability, is an essential
component in TSA. This has made the security evaluation more important and demands the
investigation of fast and reliable techniques to allow on-line transient security assessment (TSA).
Under normal operating conditions of power systems, the following constraints must be satisfied:
NG
∑ P=
i =1
Gi PD + PLoss
(6.1)
P min
Gi ≤ PGi ≤ P max
Gi i=
1, 2...NG
Vkmin ≤ Vk ≤ Vkmax k =
1,2...NB
(6.2)
Pkm ≤ Pkmmax for ∀ branch k − m
where P Gi represents real power generation at bus i, P D is the total system demand; P LOSS is the
total real power loss in the transmission network; V k is the voltage magnitude at bus; P km
represents the real power flow at branch k-m; NG is number of generators and NB is the numbers
of buses in the system.
Constraints (1) and (2), when referred to post contingency scenarios, are referred to as Security
Constraints [2]. The system operating state is classified as secure if constraints (1) and (2) are
satisfied for a given operating condition under contingencies, such as line outages, transformer
outages, etc. If constraints (1) and/or (2) are violated for any post-contingency scenarios, the
system operating state is classified as insecure. In conventional practice, security assessment is
obtained by analytically modeling the network and solving the load flow equation repeatedly and
checking the security constraints for all the prescribed outages, one contingency at a time [8].
This traditional approach is not entirely satisfactory because a huge number of simulations need
to be carried out. Hence, a new promising technique called pattern recognition is suggested for
online security evaluation.
Restorative state:
The power system disturbance, based on its nature, can lead the power systems to a blackout or
brownout state. In the blackout state, the entire load is separated from the generators, through
either the tripping of the generators or the transmission lines. No load is supplied. In the
brownout state, partial load is supplied through the transmission network. The blackout state is
more severe than the brownout state and requires several stages for restoring in back to the
normal operating state.
After the disturbance has occurred, the operator in an EMS tries to bring back the power system
to normal operating state through measures known as restorative strategies. In this process the
generators and lines which have tripped will be bought back to service through a sequence of
steps known as restorative measures
Summary:
This section describes the security assessment in power systems.