New techniques for secure power system operation

Azah Mohamed, C. B. Jasmon

Research output: Contribution to journalArticle

1 Citation (Scopus)

Abstract

This paper describes a security algorithm that incorporates load flows, contingency selection, AC outage studies and security control. The load flow method is based on the superdecoupled load flow method of Haley and Ayres, which gives rapid and exact load flow solutions. Separate contingency selection methods for real power flow and voltage security analyses have been developed. For real power analysis the line overload contingency selection technique of Stott et al. has been adopted, but for voltage security analysis a new voltage contingency selection technique has been developed. Critical outages selected from the contingency selection functions are analysed in detail with AC outage simulations of line and generator outages. For security control a range of feasible corrective actions are provided which inclued phase shifter control, generation rescheduling and/or load shedding to alleviate the line overload problem and transformer taps to adjust the bus voltage deviations. New and fast line overload alleviation techniques have been developed by using injections at the terminating buses of the overloaded line without having to compute the sensitivity and Jacobian line flow matrices. The proposed security algorithm has been validated by testing on several standard test systems.

Original languageEnglish
Pages (from-to)226-238
Number of pages13
JournalInternational Journal of Electrical Power and Energy Systems
Volume11
Issue number4
DOIs
Publication statusPublished - 1989

Fingerprint

Outages
Electric potential
Phase shifters
Testing

Keywords

  • load flow
  • on-line control strategies
  • security assessment

ASJC Scopus subject areas

  • Energy Engineering and Power Technology
  • Electrical and Electronic Engineering

Cite this

New techniques for secure power system operation. / Mohamed, Azah; Jasmon, C. B.

In: International Journal of Electrical Power and Energy Systems, Vol. 11, No. 4, 1989, p. 226-238.

Research output: Contribution to journalArticle

@article{dc44e469b2124d0f975fd14178feae30,
title = "New techniques for secure power system operation",
abstract = "This paper describes a security algorithm that incorporates load flows, contingency selection, AC outage studies and security control. The load flow method is based on the superdecoupled load flow method of Haley and Ayres, which gives rapid and exact load flow solutions. Separate contingency selection methods for real power flow and voltage security analyses have been developed. For real power analysis the line overload contingency selection technique of Stott et al. has been adopted, but for voltage security analysis a new voltage contingency selection technique has been developed. Critical outages selected from the contingency selection functions are analysed in detail with AC outage simulations of line and generator outages. For security control a range of feasible corrective actions are provided which inclued phase shifter control, generation rescheduling and/or load shedding to alleviate the line overload problem and transformer taps to adjust the bus voltage deviations. New and fast line overload alleviation techniques have been developed by using injections at the terminating buses of the overloaded line without having to compute the sensitivity and Jacobian line flow matrices. The proposed security algorithm has been validated by testing on several standard test systems.",
keywords = "load flow, on-line control strategies, security assessment",
author = "Azah Mohamed and Jasmon, {C. B.}",
year = "1989",
doi = "10.1016/0142-0615(89)90033-1",
language = "English",
volume = "11",
pages = "226--238",
journal = "International Journal of Electrical Power and Energy Systems",
issn = "0142-0615",
publisher = "Elsevier Limited",
number = "4",

}

TY - JOUR

T1 - New techniques for secure power system operation

AU - Mohamed, Azah

AU - Jasmon, C. B.

PY - 1989

Y1 - 1989

N2 - This paper describes a security algorithm that incorporates load flows, contingency selection, AC outage studies and security control. The load flow method is based on the superdecoupled load flow method of Haley and Ayres, which gives rapid and exact load flow solutions. Separate contingency selection methods for real power flow and voltage security analyses have been developed. For real power analysis the line overload contingency selection technique of Stott et al. has been adopted, but for voltage security analysis a new voltage contingency selection technique has been developed. Critical outages selected from the contingency selection functions are analysed in detail with AC outage simulations of line and generator outages. For security control a range of feasible corrective actions are provided which inclued phase shifter control, generation rescheduling and/or load shedding to alleviate the line overload problem and transformer taps to adjust the bus voltage deviations. New and fast line overload alleviation techniques have been developed by using injections at the terminating buses of the overloaded line without having to compute the sensitivity and Jacobian line flow matrices. The proposed security algorithm has been validated by testing on several standard test systems.

AB - This paper describes a security algorithm that incorporates load flows, contingency selection, AC outage studies and security control. The load flow method is based on the superdecoupled load flow method of Haley and Ayres, which gives rapid and exact load flow solutions. Separate contingency selection methods for real power flow and voltage security analyses have been developed. For real power analysis the line overload contingency selection technique of Stott et al. has been adopted, but for voltage security analysis a new voltage contingency selection technique has been developed. Critical outages selected from the contingency selection functions are analysed in detail with AC outage simulations of line and generator outages. For security control a range of feasible corrective actions are provided which inclued phase shifter control, generation rescheduling and/or load shedding to alleviate the line overload problem and transformer taps to adjust the bus voltage deviations. New and fast line overload alleviation techniques have been developed by using injections at the terminating buses of the overloaded line without having to compute the sensitivity and Jacobian line flow matrices. The proposed security algorithm has been validated by testing on several standard test systems.

KW - load flow

KW - on-line control strategies

KW - security assessment

UR - http://www.scopus.com/inward/record.url?scp=38249004170&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=38249004170&partnerID=8YFLogxK

U2 - 10.1016/0142-0615(89)90033-1

DO - 10.1016/0142-0615(89)90033-1

M3 - Article

VL - 11

SP - 226

EP - 238

JO - International Journal of Electrical Power and Energy Systems

JF - International Journal of Electrical Power and Energy Systems

SN - 0142-0615

IS - 4

ER -