Theory and Method of Power System Integrated Security Region Irrelevant to Operation States: An Introduction

Yixin Yu, Yanli Liu, Chao Qin, Tiankai Yang

Engineering ›› 2020, Vol. 6 ›› Issue (7) : 754-777.

PDF(2772 KB)
PDF(2772 KB)
Engineering ›› 2020, Vol. 6 ›› Issue (7) : 754-777. DOI: 10.1016/j.eng.2019.11.016
Research
Feature Article

Theory and Method of Power System Integrated Security Region Irrelevant to Operation States: An Introduction

Author information +
History +

Abstract

How to comprehensively consider the power flow constraints and various stability constraints in a series of power system optimization problems without affecting the calculation speed is always a problem. The computational burden of probabilistic security assessment is even more unimaginable. In order to solve such problems, a security region (SR) methodology is proposed, which is a brand-new methodology developed on the basis of the classical point-wise method. Tianjin University has been studying the SR methodology since the 1980s, and has achieved a series of original breakthroughs that are described in this paper. The integrated SR introduced in this paper is mainly defined in the power injection space, and includes SRs to ensure steady-state security, transient stability, static voltage stability, and small disturbance stability. These SRs are uniquely determined for a given network topology (as well as location and clearing process for transient faults) and given system component parameters, and are irrelevant to operation states. This paper presents 11 facts and related remarks to introduce the basic concepts, composition, dynamics nature, and topological and geometric characteristics of SRs. It also provides a practical mathematical description of SR boundaries and fast calculation methods to determine them in a concise and systematic way. Thus, this article provides support for the systematic understanding, future research, and applications of SRs. The most critical finding on the topological and geometric characteristics of SRs is that, within the scope of engineering concern, the practical boundaries of SRs in the power injection space can be approximated by one or a few hyperplanes. Based on this finding, the calculation time for power system probabilistic security assessment (i.e., risk analysis) and power system optimization with security constraints can be decreased by orders of magnitude.

Keywords

Security region / Composition / Power flow security / Static voltage stability / Small-disturbance stability / Transient stability / Dynamics nature / Topological and geometric characteristics Hyperplane

Cite this article

Download citation ▾
Yixin Yu, Yanli Liu, Chao Qin, Tiankai Yang. Theory and Method of Power System Integrated Security Region Irrelevant to Operation States: An Introduction. Engineering, 2020, 6(7): 754‒777 https://doi.org/10.1016/j.eng.2019.11.016

References

[1]
Bergen AR. Power systems analysis. New Jersey: Prentice-Hall Inc.; 1986.
[2]
Kundur P. Power system stability and control. New York: McGraw-Hill; 1994.
[3]
Wu FF, Tsai YK, Yu YX. Probabilistic steady-state and dynamic security assessment. IEEE Trans Power Syst 1988;3(1):1–9.
[4]
Wu FF, Tsai YK. Probabilistic dynamic security assessment of power systems: part I—basic model. IEEE Trans Circ Syst 1983;30(3):148–59.
[5]
Kaye RJ, Wu FF. Dynamic security regions of power system. IEEE Trans Circ Syst 1982;29(9):612–23.
[6]
Liu CC. A new method for the construction of maximal steady-state security regions of power systems. IEEE Trans Power Syst 1986;1(4):19–26.
[7]
Yu Y. Security regions of power system. Beijing: China Electric Power Press; 2014. Chinese.
[8]
Araposthatis A, Sastry S, Varaiya P. Analysis of power-flow equation. Int J Electr Power Energy Syst 1981;3(3):115–26.
[9]
Liu CC, Wu FF. Analysis of small disturbance stability regions of power system models with real and reactive power flows. In: Proceedings of the 1984 American Control Conference; 1984 Jun 6–8; San Diego, CA, USA; 1984.
[10]
Wu FF, Kumagai S. Steady-state security regions of power systems. IEEE Trans Circ Syst 1982;29(11):703–11.
[11]
Yu YX, Feng F. Active power steady-state security region of power system. Sci China Ser A 1990;33(12):664–72. Chinese.
[12]
Yu Y, Huang C, Feng F. A study on reactive power steady-state security regions. Electr Mach Power Syst 1989;17(3):155–66.
[13]
Yu Y, Luan W. Practical dynamic security regions of power systems. Proc Chin Soc Elect Eng 1990;10(Suppl 1):22–8. Chinese.
[14]
Fei F, Yu Y. Differential topological characterizations of the dynamic security region of power systems. Proc EPSA 1991;3(1):48–59.
[15]
Makarov YV, Lu S, Guo X, Gronquist J, Du P, Nguyen TB, et al. Wide area security region. Final report. Richland: Pacific Northwest National Lab; 2010 Mar. Report No.: PNNL-19331. Contract No.: AC05-76RL01830.
[16]
Venkatasubramanian V, Schattler H, Zaborszky J. Analysis of local bifurcation mechanisms in large differential-algebraic systems such as the power system. In: Proceedings of the 32nd IEEE Conference on Decision and Control; 1993 Dec 15–17; San Antonio, TX, USA; 1993. p. 3727–33.
[17]
Yu Y. Security region of bulk power system. In: Proceedings of the 2002 International Conference on Power System Technology; 2002 Oct 13–17; Kunming, China; 2002. p. 13–7.
[18]
Yu Y. Review of study on methodology of security regions of power system. J Tianjin Univ 2008;41(6):635–46. Chinese.
[19]
Yu Y, Chen L. Power system security and stability. Beijing: Science Press; 1988. Chinese.
[20]
Yu Y, Wang C. Theory and method on the stability of electrical power system. Beijing: Science Press; 1999. Chinese.
[21]
Yu YX, Jia HJ, Wang CS. Chaotic phenomena and small signal stability region of electrical power systems. Sci China Ser E 2001;44(2):187–99.
[22]
Jia H, Yu Y, Li P, Su J. Relationships of power system chaos and instability modes. Proc Chin Soc Elect Eng 2003;23(2):1–4.
[23]
Zaborszky J, Venkatasubramanian V. Application of taxonomy theory, volume 1: computation a Hopf bifurcation-related segment of the feasibility boundary. Final report. Palo Alto: Electric Power Research Inst.; 1995 Oct. Report No.: EPRI-TR-105492-V1.
[24]
Li P. From equilibrium to oscillation, dissertation. Tianjin: Tianjin University; 2004. Chinese.
[25]
Yu Y, Fan J, Feng F. Relationship between the number of critical cut-sets and the type of unstable equilibrium point with respect to transient angle stability. Proc Chin Soc Elect Eng 2006;26(8):1–6. Chinese.
[26]
Guo C, Yu Y. Boundary of thermal security region in decision making space of power system. Autom Electr Power Syst 2013;37(18):42–7. Chinese.
[27]
Yang T, Yu Y. Static voltage security region-based coordinated voltage control in smart distribution grids. IEEE Trans Smart Grid 2018;9(6): 5494–502.
[28]
Yang T, Yu Y. Steady-state security region-based voltage/var optimization considering power injection uncertainties in distribution grids. IEEE Trans Smart Grid 2019;10(3):2904–11.
[29]
Xiao J, Gu W, Wang C, Li F. Distribution system security region: definition, model and security assessment. IET Gener Transm Distrib 2012;6 (10):1029–35.
[30]
Zeng Y, Fan JC, Yu YX, Lu F, Fang YG. Practical dynamic security regions of bulk power systems. Autom Electr Power Syst 2001;25(16):6–10. Chinese.
[31]
Yu Y, Lin J. Practical analytic expression of power system dynamic security region’s boundary. J Tianjin Univ 1997;30(1):1–8. Chinese.
[32]
Zeng Y, Yu Y, Jia H, Lee ST, Zhang P. Computation of dynamic security region based on active power perturbation analysis. Autom Electr Power Syst 2006;30 (20):5–9. 31. Chinese.
[33]
Liang M, Yu Y, Lee ST, Zhang P. Identification method of instability modes and its application in dynamic security region. Autom Electr Power Syst 2004;28 (11):28–32. Chinese.
[34]
Yu YX, Zeng Y, Feng F. Differential topological characteristics of the DSR on injection space of electrical power system. Sci China Ser E 2002;45(6):576–84. Chinese.
[35]
Yu YX, Feng F. Dynamic security regions of power system critical cutsets. In: Proceedings of the 5th National Conference on Electrical Mathematics; 1995 Nov 23–30; Kunming, China; 1995. Chinese.
[36]
Fan J, Yu Y. Transient stability-constrained power transfer limit of a critical cutset and generation economic dispatching. Autom Electr Power Syst 2003;27 (17):4–7,88. Chinese.
[37]
Yu Y, Dong C, Lee ST. Practical dynamic security region in complex power injection space. J Tianjin Univ 2006;39(2):129–34. Chinese.
[38]
Fan J, Yu Y. Study on practical dynamic security regions of AC/DC parallel systems. Proc Chin Soc Elect Eng 2005;25(23):19–24. Chinese.
[39]
Qin C, Liu Y, Yu Y. Dynamic security region of power systems with double fed induction generator. Trans China Electrotech Soc 2015;30(18):157–63. Chinese.
[40]
Fang W, Liu H, Qin T, Wang J, Feng Z. Dynamic security region with largescale photovoltaic plant. Electr Power Autom Equip 2019;39(3):189–93,99. Chinese.
[41]
Yu Y, Su J, Jia H, Li P. Study on visualization of voltage stability feasible region of bulk power system. Autom Electr Power Syst 2001;25(22):1–5. Chinese.
[42]
Han Q, Yu Y, Li H, Jia H, Li P, Lee ST, et al. A practical boundary expression of static voltage stability region in injection space of power systems. Proc Chin Soc Elect Eng 2005;25(5):8–14. Chinese.
[43]
Han Q, Yu Y, Jia H, Li P, Lee ST, Zhang P. Analytical forms of boundaries of static voltage stability region with nonlinear terms. Autom Electr Power Syst 2005;29(11):10–4. Chinese.
[44]
Yu Y, Li P, Sun Q, Jia H. Study on topological properties of boundary of power flow feasibility region and algorithm for boundary computation. Autom Electr Power Syst 2006;30(10):6–11. Chinese.
[45]
Yu Y, Li P, Jia H. Computing the boundary of the power flow feasible region based on the hybrid method. Autom Electr Power Syst 2004;28(13):18–25. Chinese.
[46]
Wang C, Xu X, Yu Y, Wei W, Lee ST, Zhang P. Visualization of power system static voltage stability region in cut-set space. Proc Chin Soc Elect Eng 2004;24 (9):13–8. Chinese.
[47]
Li H, Yu Y, Han Q, Su J, Zhao J, Lee ST, et al. Practical boundary of static voltage stability region in cut-set power space of power systems. Autom Electr Power Syst 2005;29(4):18–23. Chinese.
[48]
Zhao J, Yu Y, Jia H, Li P, Niu B, Yang Y, et al. Visualization of the static voltage stability region in cut-sets space of power systems. Autom Electr Power Syst 2005;29(5):56–61. Chinese.
[49]
Zhao J, Yu Y. Determination of power system voltage stability regions and critical sections. Autom Electr Power Syst 2008;32(17):1–5.
[50]
Sun Q, Yu Y, Li P, Jia H. Topological characteristics of power system small signal stability region in critical oscillation modes. Autom Electr Power Syst 2007;31 (15):6–10. Chinese.
[51]
Qin C, Yu Y. Small signal stability region of power systems with DFIG in injection space. J Mod Power Syst Clear Energy 2013;1(2):127–33.
[52]
Yu Y, Zhao Y, Liu H, Zeng Y. Power system security cost optimization based on practical dynamic security region. Proc Chin Soc Elect Eng 2004;24(6):13–8. Chinese.
[53]
Yu Y, Liu H, Zeng Y. A novel optimization method of transient stability emergence control based on practical dynamic security region (PDSR) of power systems. Sci China Technol Sci 2004;47(3):376–84.
[54]
Binkou A, Yu Y, Sun G. Security region based real and reactive power optimization of power systems. Proc Chin Soc Elect Eng 2006;26 (12):1–10.
[55]
Yu Y, Qin C. Security region based security-constrained unit commitment. Sci China Technol Sci 2013;56(11):2732–44.
[56]
Yu Y, Wang YJ. Security region based real and reactive power pricing of power system. Sci China Technol Sci 2008;51(12):2095–111.
[57]
Yu Y, Wang J, Lv X. Security value based expansion planning of power system with integration of large-scale wind power. Sci China Technol Sci 2012;55 (7):1908–22.
[58]
Irisarri G, Kimball LM, Clements KA, Bagchi A, Davis PW. Economic dispatch with network and ramping constraints via interior point methods. IEEE Trans Power Syst 1998;13(1):236–42.
[59]
Bazrafshan M, Gatsis N. Decentralized stochastic optimal power flow in radial networks with distributed generation. IEEE Trans Smart Grid 2016;8 (2):787–801.
[60]
Yang TK. Steady-state security region based optimal power flow, dissertation. Tianjin: Tianjin University; 2019. Chinese.
[61]
Erseghe T. Distributed optimal power flow using ADMM. IEEE Trans Power Syst 2014;29(5):2370–80.
[62]
Khodr HM, Martínez-Crespo J. Integral methodology for distribution systems reconfiguration based on optimal power flow using benders decomposition technique. IET Gener Transm Distrib 2009;3(6):521–34.
[63]
Yu Y, Wang D. Dynamic security risk assessment and optimization of power transmission system. Sci China Technol Sci 2008;51(6):713–23.
[64]
Liu Y, Yu Y. Probabilistic steady-state and dynamic security assessment of power transmission system. Sci China Technol Sci 2013;56(5):1198–207.
[65]
Liu Y, Yu Y. Transient stability probability of a power system incorporating a wind farm. Sci China Technol Sci 2016;59(6):973–9.
AI Summary AI Mindmap
PDF(2772 KB)

Accesses

Citations

Detail

Sections
Recommended

/