A Unified Application Software for Steady-State Security and Automatic Cross-Border Transmission Capacity Assessments

Author(s):  
D.P. Popovic ◽  
D.M. Dobrijevic ◽  
S. Minic ◽  
M. Marinkovic ◽  
A. Petric ◽  
...  
2009 ◽  
Vol 22 (1) ◽  
pp. 49-60 ◽  
Author(s):  
Dragan Popovic

The paper deals with relevant methodological and practical aspects of automatic cross-border transmission capacity assessment in electric power interconnections. It is based on advanced methodology for steady-state security analyses, using all its favourable properties, respecting the latest criterions, standards and practice of European Transmission System Operators (ETSO). The practical presentation of developed computer program is made on example of transmission capacity calculation in condition of ex Second UCTE synchronous zone. This presentation gives an overview of the characteristics and possibilities of this computer program, regarding the real necessities of operational practice in new conditions of liberalized electricity markets. .


Author(s):  
Bassam A. Hemade ◽  
Hamed A. Ibrahim ◽  
Hossam E.A. Talaat

Background: The security assessment plays a crucial role in the operation of the modern interconnected power system network. Methods: Hence, this paper addresses the application of k-means clustering algorithm equipped with Principal Component Analysis (PCA) and silhouette analysis for the classification of system security states. The proposed technique works on three principal axes; the first stage involves contingency quantification based on developed insecurity indices, the second stage includes dataset preparation to enhance the overall performance of the proposed method using PCA and silhouette analysis, and finally the application of the clustering algorithm over data. Results: The proposed composite insecurity index uses available synchronized measurements from Phasor Measurement Units (PMUs) to assess the development of cascading outages. Considering different operational scenarios and multiple levels of contingencies (up to N-3), Fast Decoupled Power Flow (FDPF) have been used for contingency replications. The developed technique applied to IEEE 14-bus and 57-bus standard test system for steady-state security evaluation. Conclusion: The obtained results ensure the robustness and effectiveness of the established procedure in the assessment of the system security irrespective of the network size or operating conditions.


Energies ◽  
2020 ◽  
Vol 14 (1) ◽  
pp. 148
Author(s):  
Lili Wu ◽  
Ganesh K. Venayagamoorthy ◽  
Jinfeng Gao

Power system steady-state security relates to its robustness under a normal state as well as to withstanding foreseeable contingencies without interruption to customer service. In this study, a novel cellular computation network (CCN) and hierarchical cellular rule-based fuzzy system (HCRFS) based online situation awareness method regarding steady-state security was proposed. A CCN-based two-layer mechanism was applied for voltage and active power flow prediction. HCRFS block was applied after the CCN prediction block to generate the security level of the power system. The security status of the power system was visualized online through a geographic two-dimensional visualization mechanism for voltage magnitude and load flow. In order to test the performance of the proposed method, three types of neural networks were embedded in CCN cells successively to analyze the characteristics of the proposed methodology under white noise simulated small disturbance and single contingency. Results show that the proposed CCN and HCRFS combined situation awareness method could predict the system security of the power system with high accuracy under both small disturbance and contingencies.


Author(s):  
Pei Yong ◽  
Yi Wang ◽  
Tomislav Capuder ◽  
Zhenfei Tan ◽  
Ning Zhang ◽  
...  

Author(s):  
Evelyn Heylen ◽  
Steven De Boeck ◽  
Marten Ovaere ◽  
Hakan Ergun ◽  
Dirk Van Hertem
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document