0% found this document useful (0 votes)
43 views21 pages

An Early Warning and Security Countermeasure (EWSC) System For Electric Power Control Centers

The document describes an Early Warning and Security Countermeasure (EWSC) system for electric power control centers presented at the 8th Workshop on EPCC. The EWSC system provides real-time monitoring and assessment of power system security, and issues early warnings and recommends preventive control actions. It analyzes multiple dimensions including time, space, and objectives. Key techniques include defining contingencies, rebuilding real-time information, issuing alarms and controls, and evaluating margins through indices. Test results demonstrate its ability to enhance transient stability. A PC cluster is used to evaluate contingencies in under a minute.

Uploaded by

mayalasan1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views21 pages

An Early Warning and Security Countermeasure (EWSC) System For Electric Power Control Centers

The document describes an Early Warning and Security Countermeasure (EWSC) system for electric power control centers presented at the 8th Workshop on EPCC. The EWSC system provides real-time monitoring and assessment of power system security, and issues early warnings and recommends preventive control actions. It analyzes multiple dimensions including time, space, and objectives. Key techniques include defining contingencies, rebuilding real-time information, issuing alarms and controls, and evaluating margins through indices. Test results demonstrate its ability to enhance transient stability. A PC cluster is used to evaluate contingencies in under a minute.

Uploaded by

mayalasan1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

A presentation for 8th Workshop on EPCC, June 5-9, Les Diablerets, Switzherland

An Early Warning and Security


Countermeasure (EWSC) System
for Electric Power Control Centers

Boming Zhang, Ph D, Prof., SMIEEE


Dept. of Electrical Eng.
Tsinghua Univ.
Beijing 100084, China
Email: zhangbm@tsinghua.edu.cn
Online Dynamic Security Assessment --
On-line Implementation Issue
zEPRI , Siemens & North State Power : on-line DSA
[ ]G. C. Ejebe, et al., “On-line dynamic security assessment in an EMS”,
IEEE Computer Application in Power, pp. 43-47, Jun. 1998

zBPA: implementing Voltage stability and ATC,


plan to implement DSA
[ ]Carson W. Taylor, “The future in on-line security assessment and
wide-area stability control”, 0-7803-5935-6 2000 IEEE

zONS, a Brazilian ISO: an on-line automatic DSA to


be implemented
[ ]Jorge L. Jardim, Carlos S. Neto, Wes T. Kwasnicki, Design features
of a dynamic security assessment system, Proc. of Power Systems
Conference and Exposition, Vol.1, IEEE PES 10-13 Oct. 2004, pp. 446 -
452
Security and reliability of power system
operation -- a new point of view

This issue can be thought from three directions:

zTime dimension:
‹fastest transient state
‹faster dynamic state
‹slowest steady state

A blackout is actually a time evolution process of a sequence of


events from faults to contingencies which forces a shift of the
power system state from security, to warning, to emergency, to
contingencies and finally to black out.
zSpace dimension
‹Sub-networksto be analyzed are hierarchical in
management and distributed in space distance

zObjective dimension
‹voltage oriented
‹phase angle oriented
and
‹security oriented
‹economy oriented
Design flow chart of
the EWSC system
Emergency alarm and corrective control
countermeasure

to alarm and correct following violations of


zSteady-state thermal transmission limit;
zVoltage magnitude limit;
zPower transmission limit with transient
stability constraints ;
zLimit on minimum CCT (Critical Cutting Time);
zLimit on voltage stability
Security and stability analysis, early warning
and preventive countermeasure in normal
insecure state

(1) If any insecurity is met, following early warnings


and preventive countermeasures are done according
to
zSteady state insecurity:
zDynamic state insecurity;
zVoltage stability insecurity.
(2) If no insecurity is met, the margin to insecurity is
checked. If this margin is very close to the
insecurity, following enhancement countermeasure
is given to enhance
zSteady state margin;
zDynamic state margin;
zVoltage stability margin
zshort circuit currents for all possible elements
are scanned and ranked , and protective relay
settings are checked

Predicted mode of EWSC system


Hardware configuration

2 x PC Protective Operation Operator Operator


Coordinator Relay MMI Planning MMI MMI
SCADA

PC 1 PC 2 …… PC 6

Fig 2 Hardware configuration of the EWSC system


Key Techniques adopted in the EWSC

(1) How to define


contingency set

Fig 3 structure of contingency set


(2) Real-time information rebuilding
z Switch status identification;
z Network topology analysis;
z State estimation and bad data identification;
z Real-time load flow;
z Transmission line parameter estimation.

(3)Emergency alarm and corrective countermeasure


zEmergency limits are determined based on
steady and dynamic analysis
zCorrective countermeasures for relieving
thermal limit and power overloading and voltage
violation are done resorting to quasi-steady-state
sensitivity analysis
(4)Early warning and preventive
countermeasure in normal state

z Power loading index:


2
⎛ Pl (t ) ⎞
PI loading (t ) = ∑ ⎜ max ⎟
l∈∀lines ⎝ Pl ⎠
z Voltage profile flat index:
2
⎛ Vi (t ) − Vi average

PIV _ profile (t ) = ∑ ⎜ max ⎟
i∈∀Bus ⎝ (Vi − Vi
min
) / 2 ⎠
zFrangibility index on transient stability:

CCT _ MIN (t ) = Min {CCTi (t ) | i ∈ ∀Faults}


i
zFrangibility index on voltage stability:

λ min (t ) = Min {λir e al ( Jacobi(t ) ) , i = 1, 2,...n}


i

zDistance index to voltage collapse:

Distance = (Nose point load – Base load)/Base load

And some others


(5)Early warning and preventive countermeasure

in steady state
zN-1 scanning
zEvaluate severe contingencies
zpreventive countermeasure for insecure case

in dynamic state

zA mixed method combining Extended Equal Area


Criterion(EEAC) with Step-By-Step (SBS) digital simulation
is used
z margins of energy, critical generator MW output and CCT
zMW transmission limit under transient stability constraints
zPreventive countermeasures are given by sensitivity
method for some problem cases
for voltage stability

zCalculate the distance to voltage collapse point for a


given load increasing mode;
zCalculate minimum singular value in current operation
state;
zFind out weak point of voltage stability and give location
and amount of MVar compensation to enhance voltage
stability;
zEvaluate severity of N-1 contingencies to voltage stability
and rank and screen out severe ones;
zCalculate preventive countermeasure for weak cases by
using the sensitivity of voltage collapse point to controls;
zPost-contingency evaluation for severe contingencies to
check correctness of the analysis results done just now.
(6)Evaluation and enhancement countermeasure in
normal secure state

(7)Integrated early warning


Characters of the EWSC system

zRun real-time and on-line:


zTrack variation of system state:
zAutomatization:
zEarly warning and prevention:
z Fast speed in calculation:
¾ PC cluster used
zExtendable and portable:
¾ Qt used to support UNIX or NT ; IEC 61970 CIM/XML
Test Results

Min Singular value

Time

Fig. 4 Minimum singular values in one day


CCT

After control

Before control Fault order number

Fig. 5 CCT Ranking for faults before and after preventive control
Pt i e- Vl oad Cur ve
steady
VL( p. u. )
state limit
1. 1 In base
case
1

0. 9
Tr ansi ent st abi l i t y
steady state
0. 8 l i mi t
limit in most
0. 7 severe N-1
0. 6
370 570 770 970 1170 1370 1570 1770 1970 2170 2370 2570 2770

Pt i e( MW)
l oad1 l oad1( wi t h f aul t 6)

Fig. 6 Transient stability limit on double 500 kV tie lines


Computing issue

zThe tasks: ranking, screening and evaluation


for all 50 contingencies
za cluster of 3 PCs is used

Bus Gen load branch 3 PCs


267 95 148 451 65.5s

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy