AN INTEGRATED PACKAGE FOR REAL-TIME SECURITY ENHANCEMENT

被引:33
作者
BERTRAM, TJ
DEMAREE, KD
DANGELMAIER, LC
机构
[1] ESCA Corporation, Bellevue, Washington
关键词
D O I
10.1109/59.54570
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper describes a set of algorithms for security-constrained optimal power flow (SCOPF) and their configuration in an integrated package for real-time security enhancement. The emphasis of the paper will be on the discussion of the SCOPF algorithms and the insights gained from their implementation. As input, the package requires network, security and optimization models (built offline), and a network state solution (from the real-time Energy Management System). The output of a single execution, presented to the control center operator, consists of the static security assessment and five different strategies for security enhancement. Each strategy is the solution of a different SCOPF problem, each having a different mix of base case corrective, pre-contingent preventive and post-contingent corrective action. The SCOPF solutions incorporate base case and contingent state load flow solutions, network switching, staged constraint and control activation, and linear program solutions. The linear program optimizes the convex subproblem, and includes a representation of multiple post-contingent networks simultaneously constraining the current operating state. The entire security enhancement package has undergone development and testing, and is currently in operation in a major utility’s control center. © 1990 IEEE
引用
收藏
页码:592 / 600
页数:9
相关论文
共 11 条
[1]   NETWORK TOPOLOGY OPTIMIZATION WITH SECURITY CONSTRAINTS [J].
BACHER, R ;
GLAVITSCH, H .
IEEE TRANSACTIONS ON POWER SYSTEMS, 1986, 1 (04) :103-111
[2]  
BACHER R, 1988, 1988 IEEE PES WIN M
[3]   SECURITY-CONSTRAINED OPTIMAL POWER FLOW WITH POST-CONTINGENCY CORRECTIVE RESCHEDULING [J].
MONTICELLI, A ;
PEREIRA, MVF ;
GRANVILLE, S .
IEEE TRANSACTIONS ON POWER SYSTEMS, 1987, 2 (01) :175-182
[4]   LINEAR-PROGRAMMING FOR POWER SYSTEM NETWORK SECURITY APPLICATIONS [J].
STOTT, B ;
MARINHO, JL .
IEEE TRANSACTIONS ON POWER APPARATUS AND SYSTEMS, 1979, 98 (03) :837-848
[5]   SECURITY ANALYSIS AND OPTIMIZATION [J].
STOTT, B ;
ALSAC, O ;
MONTICELLI, AJ .
PROCEEDINGS OF THE IEEE, 1987, 75 (12) :1623-1644
[6]   FAST DECOUPLED LOAD FLOW [J].
STOTT, B ;
ALSAC, O .
IEEE TRANSACTIONS ON POWER APPARATUS AND SYSTEMS, 1974, PA93 (03) :859-869
[7]   OPTIMAL POWER FLOW BY NEWTON APPROACH [J].
SUN, DI ;
ASHLEY, B ;
BREWER, B ;
HUGHES, A ;
TINNEY, WF .
IEEE TRANSACTIONS ON POWER APPARATUS AND SYSTEMS, 1984, 103 (10) :2864-2880
[8]   SPARSE VECTOR METHODS [J].
TINNEY, WF ;
BRANDWAJN, V ;
CHAN, SM .
IEEE TRANSACTIONS ON POWER APPARATUS AND SYSTEMS, 1985, 104 (02) :295-301
[9]  
VAAHEDI E, 1988, 1988 IEEE PES SUMM M
[10]  
VARNEY T, 1988, SEP M ED EL I DEARB