SlideShare a Scribd company logo
1 of 12
Download to read offline
Management of Power System Dynamic Security
Uros Kerina
, Grega Bizjaka
, Edwin Lerchb
a
Faculty of electrical engineering, University of Ljubljana, Slovenia
b
E D SE PTI NC2, SIEMENS AG, Germany
Abstract - In this paper a research oriented prototype of a tool for dynamic security assessment is presented,
capable of analyzing system dynamic performance by making use of so-called performance indices. The tool is a
result of a research work carried out in cooperation of the University of Ljubljana, Slovenia, and SIEMENS AG,
Germany. The aim of the tool is to help managing power system stability problems by alerting the control
operator to conditions that represent a significant risk to system security and provide practical information for
decision making.
1 Introduction
The impact power outages have on industry and consequently economy is enormous. The EURELECTRIC task
force (Final Report 06-2004) has estimated that the typical costs for industrial consumers are about 1000€ per
kWh lost in case of short outages and way over for long outages. As a matter of fact, the economic loss of major
blackouts is easily compared to ones of natural disasters. For example, the economic loss of 2003 USA-Canada
power outage is estimated to be about 10% of costs introduced by the Katrina hurricane (~10.5 billion US
dollars). The ten most severe blackouts that took place all over the world are summarized in Figure 1. As one can
see, a lot of people have been affected and it usually took a significant amount of time for the power system
operators to reestablish full operation of their systems.
Figure 1 The ten most severe blackouts
The subject of great interest for dispatching centers have always been the tasks of static security assessment
(SSA), typically involving optimal power flow solution, identification of bottle necks and validation of voltages
and power flows. These tasks sufficiently address the problem of quasi-steady state system operation and are
usually performed off-line on a day-ahead basis. But in the constantly changing system structure and at market-
driven power pricing the assumptions made within SSA are less and less valid and to aid the security
management on-line tools for security assessment are required.
To increase situational awareness of dispatchers the task force investigating the 2003 U.S.-Canada blackout
suggests the use of real-time dynamic security assessment. Dynamic security assessment (DSA) includes
methods to evaluate stability and quality of system transition from a pre- to post-disturbance state. Similar
directives have also been released by the European Network of Transmission System Operators for Electricity
(ENTSO-E). One of the ENTSO-E appeals concerning the future network development is that tools to assess the
dynamic security of the pan-European electrical network should be developed to minimize the probability of
operational irregularities. These tools should primarily rely on the well established computational techniques
enabling ‘What if’ analysis and assessment of the distance to the system security limits [1].
In this paper a research oriented prototype of a tool for DSA is presented, capable of analyzing system dynamic
performance by making use of so-called performance indices. The tool is a result of a research work carried out
by international team of experts from University of Ljubljana, Slovenia, electric companies headquartered in
various European countries and SIEMENS AG, Germany. The task of the university was to explore and develop
DSA methods under constraints of practical applications, whereas the technical advisors from the industry
provided expert knowledge from experiences. The aim of the tool is to help managing power system stability
problems by alerting the control operator to conditions that represent a significant risk to system security and
providing practical information for decision making.
2 Analysis in System Operations
While it is true that power systems are designed to be stable, in actual practice, systems may be prone to being
unstable. This is largely due to uncertainties related to assumptions made during the design process. For example,
when designing a system its stability and limits of secure operation are usually determined under some assumed
load levels, generation, topology structure, etc. But the fact is that in many power systems such principal
assumptions strongly deviate from the actual circumstances.
To deal with the unpredictability of operations, especially in the systems with a significant share of dispersed
generation, it is necessary to perform on-line security investigations. The main issue is a classification problem:
given a present operating point and a single or multiple contingencies (outage of transmission elements, sudden
loss of wind power, faults, etc.) the system analysts determines, on-line, if the situation is secure or insecure,
regarding the contingencies. The weak points are identified for the existent condition and by preventive control
the security of the system can be maintained on the required level. The investigation can be conducted at regular
intervals e.g. generator dispatch cycle or on demand. In any case, the power flow is derived from real time data
and is together with other required data required for calculations passed to DSA software residing on dedicated
computers. The security of the system is assessed against criteria, typically including:
• rotor angle stability, voltage stability, frequency stability,
• frequency excursions during the dynamic state (dip or rise) beyond specified threshold levels,
• voltage excursions during the dynamic state (dip or rise) beyond specified threshold levels,
• damping of power swings inside subsystems and between subsystems on an interconnected network.
A flow chart of the generalized DSA process is illustrated in Figure 2. Such a process can be conveniently
incorporated into existing configuration of an operational control room. Experiences of the control operators
relying on the on-line investigations in daily operations are reported in [2]-[4]. The solutions they use help them
to quickly assess a potentially rapidly changing system state and to formulate corrective control actions in real
time.
Figure 2 Flow chart of an on-line DSA process
3 Dynamic Security Inference
Two approaches may be used regarding the system state classification: direct classification of the operating state
or inference of the value of important variable or some index, then used for classification. In the direct approach,
the system analyst carries out full simulation and dynamic performance of the system is validated against
allowable limits through application of the system’s model. Concerning the security a yes-or-no answer is
provided. An answer like this is may be used for classification of system states in absolute terms (secure -
insecure), however in marginal situations, where the operating point is still designated as secure, but is very
close to limits, it can lead to inadequate decision making and ultimately operator performance errors.
The other possibility is to use so-called performance indices. These indices refer to values of system parameters
which vary significantly with the prevailing conditions in the system. There are many important parameters of
which dynamic response can be used for establishing contingency severity levels as a measure of power system
security. Some important ones are rotor angle of system generators, frequency, voltage, and damping of
oscillations. Figure 3 suggests that it is crucial to keep these parameters within limits continually otherwise the
system may undergo stability problems.
Figure 3 Region of secure system operation
3.1 Indices for evaluation
The DSA solution presented in this paper is based on inference of 18 complementary security indices, capable of
capturing the dynamic state of the power system during and after contingencies. Each of these indices captures a
single security aspect and in combination with the others leads to a more accurate contingency evaluation
scheme. The indices are able to estimate consequences on the system, such as overloading of transmission
elements, relays operation, angle stability loss, voltage drop, etc. Their exact definitions and argumentation are
available in [5]-[7]. Every single index is a well-thought relation between the actual and maximum acceptable
value of an observed system parameter. A general index form is given by equation 1, where x is the actual
(temporary) value of the system parameter during and after a contingency and y is its corresponding acceptable
value. Note that by using this approach all the security issues are normalized and can be compared to each other.
The output range of the indices is between 0 and 1.
min 1,max
x
index
y
  
=   
  
(1)
The temporary values over time may be obtained by measurement or simulation, for evaluation of existent or
future system states respectively. The maximum acceptable values of system state variables are usually enforced
through the grid code. For example, grid codes issued during the last years have invariably demanded that wind
farms must withstand voltage dips to a certain percentage of the nominal voltage and for a specified duration.
Such requirements are known as Fault Ride Through (FRT) and are described by a voltage vs. time characteristic
(Figure 4).
Figure 4 FRT curve for high and extra high voltage levels (EON Germany)
The FRT requirements imply that the voltage at the generator connecting nodes needs to be observed at any
instant. For that purpose the Voltage Ride Through Index (VRTI) is proposed. The index monitors the voltage
behavior and delivers the relative agreement between the actual and limiting voltage pattern after disturbances. It
reports whether a disturbance would cause a generator to trip and gives the security margin to a disconnection.
The index is given by definitions (2)-(4) and considers a transient voltage dip both in percentage deviation and in
time duration; the fault-on and post-fault voltage dynamics is taken into account by comparing the surface
captured by the voltage deviation (with respect to the normal voltage band) with the reference surface specified
by the transient time and voltage limits. For the sake of evaluation, the reference surface can be treated as one or
divided into a number of segments. So, each stage of the voltage transient can be evaluated regarding the
corresponding limits; good results are obtained if two areas are defined: one for the fault-on and the other for the
post-fault period (Figure 5).
Figure 5 Areas for determining fault impact on generator connecting nodes
max
min 1,max
A
area j
area j
i
t
area j
adm
V dt
VRTI
  
∆ ⋅  
  
=   
  
  
  
∫
(2)
min
min min min
min
, if
V , if < V
0 , if V
area j
i adm
area j band area j band
i adm i adm i adm
band
i adm
V V
V V V V
V
 ∞ <

∆ = − <
 ≥
(3)
( )max min maxA tarea j area j area j
adm n adm admV V= − ⋅ (4)
In the expressions, the superscript denotes j-th reference area for the evaluation, which is given by the maximum
admissible time of i-th node voltage for being at its minimum admissible value.
The list of all indices proposed for security inference is given in table 1. Four deliver degree of dynamic security
on system-level; six are for quantifying variations in dynamic security on element-level, whereas eight are for
evaluation of post-contingency steady state condition.
Table 1 Proposed power system security indices
System Indices Dynamic Indices Quasi-Steady State Indices
Small Signal Stability
Index
SSSI Angle Index AI Quasi Stationery Voltage Index QSVI
Energy Margin Index EMI Dynamic Voltage Index DVI Line Power Flow Index LPFI
Voltage Collapse Index VCI Voltage Ride Through Index VRTI Transformer Power Flow Index TPFI
Protection Security Index PSI Frequency Recovery Time
Index
FRTI Load Shedding Index LSI
Frequency Gradient Index FGI Nodal Loading Index NLI
Maximum Frequency
Deviation Index
MFDI Thevenin Index THI
Approximated Voltage Index APVI
Under Over Voltage Index UOVI
3.2 Composite Index
Experience from the development of an on-line implementation contingency screening and ranking in static
security assessment suggests that:
• no single security index can reliably capture the entire system state;
• a combination of complementary indices can be used to reliably rank and select contingencies while
each of individual indices may not give enough information for a 100% accurate ranking.
One way to combine the individual indices into a composite index in dynamic security assessment is to calculate
a weighted sum. This approach has been extensively used by many experts (e.g. see [8]). The weighted-sum
technique is simple to understand and easy to implement; but it has two main shortcomings: often the optimal
solution distribution is not uniform, and more seriously, the technique is often implemented as a convex
combination of objectives, where the sum of all weights is constant and negative weights are not allowed, thus
wrong choice of weights may result in selection of an inferior solution by missing important solutions in the non-
convex regions.
An alternative to the weighted-sum method is a technique coming from soft computing. Assuming that the
system analyst is able to represent its knowledge about the system as a set of facts and rules, the uncertainties
related to proper weight selection and formation of the composite index can be more efficiently handled by
means of fuzzy logic. Fuzzy logic is considered as a very important tool of artificial intelligence which could be
used in various fields of human decision support systems. Its capabilities have been proved by many practical
applications. In this work it is used as a methodology for composing of the composite dynamic security index.
The main components of a three stage Fuzzy Inference System (FIS) that is used for that purpose are shown in
Figure 6. The figure shows, the system is suitable for implementation into an existing environment in a control
room, defined by data sources, including system state estimator, SCADA system and PMUs, on one side, and
system control assets on the other. To take the advantage of the data delivered by the synchrophasors is in
particular important since these devices are considered one of the most important measuring devices in the future
of power systems. In the figure, the abbreviations FFI, FVI, FPI, FSI and FDSI stand for Fuzzy Frequency Index,
Fuzzy Voltage Index, Fuzzy Performance Index, Fuzzy Stability Index and Fuzzy Dynamic Security Index
respectively.
SSSI
AI
EMI
VCI
FSI
FPI
FDSI
PSI
FVI
UOVI
APVI
VRTI
QSVI
DVI
LPFI
LSI
TPFI
NLI
THI
FFI
FGI
FRTI
MFDI
Stability
FIS
(Fuzzy
Inference
System)
Security
FIS
PMU
(V, I - magnitude, phase angle)
SCADA, disturbance recorders
Voltage
FIS
Power Flow
FIS
Frequency
FIS
Trend
analysis /
Pattern
recognition
Situation awareness
Reporting and Visualization
(local, web, EMS)
System
status bar
Operator's
decisions
System
control
Figure 6 Implementation of the proposed DSA solution
3.3 Visualization of results
For visualizing dynamic security of a power system under different network states by making use of the security
indices, a deliberate visualization form is introduced. It enables an overview of the security degree of a disturbed
system in reference to the security threshold and a disturbance (contingency) applied. Applying a visualization
technique similar as in traffic control, the proposed security indices can communicate the security degree by
means of indicative colors. These need to be carefully selected in order to deliver a suggestive message; if
remedial actions are needed, for example. As illustrated in Figure 7, both, a smoothly changing color scale or a
limited set of colors are suitable.
Figure 7 Visualizing power system security indices
The selected color scale refers to an index magnitude equally distributed along the interval [0 1]. The scale-ends
denote the absolute security degree: secure-insecure. Although any color scale is adequate for the purpose, the
most obvious is to use green and red for denoting the absolute secure and insecure system condition and a color-
mix in between for security variation. In this way, the dramatic progression of reporting is introduced, suggesting
the alert level and the expected magnitude of remedial actions for improvement of the condition. A five-color
color scale seems suitable for the application; it is easy to intuitively relate red, orange, yellow, dark yellow and
green to SAFE, ALERT LOW, ALERT HIGH, DANGER and INSECURE condition of the power system.
4 The DSA tool
By following the principles of wrapper interfacing the presented DSA solution has been upgraded to a research-
oriented DSA tool. Through a Graphical User Interface (GUI) the user is able to manipulate the performance of
the computational engine (PSS®
NETOMAC) and algorithms for security evaluation. The GUI consists of a
number of components. The main ones are: main program window, auxiliary program window and contingency
builder. By using the functionalities these components offer, one can define contingencies and scenarios to be
investigated, arrange settings of computations, and investigate the DSA results in a systematic way.
The main program window is shown in Figure 8. Simultaneously it serves as the main management panel and
results board. It contains a command menu bar, a panel that displays operations and a status bar. There are many
actions available to the user. Through this window it is possible to access functionalities of contingency builder,
input calculation related settings, and initiate investigations.
Figure 8 Main program window
After computations have finished, the FDSI provides both color and numeric indication of the security degree in
the display panel. It is shown for each contingency and has the form of a bar chart. When one clicks on one of
the charts to select it a sub-window window appears containing more detailed results. The program windows are
organized into a hierarchy as show in Figure 9.
Figure 9 Program windows hierarchy
There are two possible ways of visualizing the results; by using a dedicated GUI, where one can systematically
go into details of each contingency and inspect diagrams of observed system parameters, or in a single display,
such as shown in Figure 10. The matrix visualization technique allows organizing the results automatically
according to a network condition, calculated security indices and color scale. The general picture of the system
dynamic performance under different contingencies is immediately obtained. Rows refer to contingencies and
columns to individual security indices. Visualized are the results of 6 study cases for 12 elementary indices and 6
derived ones. Note that the blank fields in the matrix indicate that a particular security index has not been
included in a certain study case.
Figure 10 Matrix visualization
5 Case study and performance
In order to evaluate performance capabilities of the developed tools a test is conducted. In the test a power
system is assessed for dynamic security under a set of credible contingencies. The main objective is to determine
total time required for carrying out the security assessment and determine if it complies with the requirements of
on-line applications. A model of a medium size power system has been used in the test. It includes 119
generators, including AVRs and governors, 527 high voltage transmission lines, 261 transformers, 415 nodes
and 319 loads. The system has four main voltage levels: 500-, 230-, 115-, and 69 kV. A topology of the main
500 kV and 230 kV transmission network is shown in Figure 11. Six contingencies are put under investigation:
• loss of a generator in the southern part of the system (1),
• loss of a large generator in the metropolitan area (2),
• transient fault at 500 kV voltage level (3),
• a single 230 kV line outage in south-eastern region (4),
• a single 230 kV line outage in north-eastern region (5),
• three phase fault and consequent loss of parallel 230 kV lines connecting central and southern region (6).
Figure 11 500 kV and 230 kV network topology
From the perspective of on-line tools, the performance is normally measured in terms of total time required for
carrying out a task or procedure. The faster the speed of computations the better the performance is a common
understanding relating to this matter. The total time for investigation of the contingency set is given in Table 2
and is 202 seconds or 3.36 minutes. Considering the typical requirements on time outlined in [3] and [4] one may
suggest that the developed DSA-tool is able to deliver performance as expected from on-line tools.
Table 2 Total computational time
Prepare data Execute computations Inference Total time
cnt small
signal
dynamic transient
small
signal
dynamic transient FIS DSA
time in seconds
1 0.252 0.623 5.259 23.058 2.036 31.228
2 0.252 0.641 4.837 22.871 1.613 30.214
3 0.192 2.083 0.158 4.962 23.121 9.606 2.051 42.173
4 0.256 1.968 4.962 23.027 1.884 32.097
5 0.258 1.997 4.994 22.965 1.961 32.175
6 0.252 2.140 5.071 23.323 3.376 34.162
202.049
The total time has three components: time required for preparing input databases, computational time, and time
required for fuzzy inference and construction of the single all-encompassing security index FDSI. The time to
prepare input data and execute computations is further divided into three sub-components: time for small signal
stability [5] and transient stability assessment [6], and time for calculating the performance indices [7]. The
inference results by making use of the matrix visualization technique are shown in Figure 10. Three
contingencies are classified as insecure and clearly require immediate operator’s attention whereas three are
secure, but with the security margin that still implies preventive actions; given the numeric and color designation
the most severe are contingencies 4 and 6.
Contingency 4 involves a spontaneous loss of a single 230 kV line. The tripping causes voltage to go out of
bounds and overloading of some power lines. Violated are voltage static limits and voltage dynamic constraints,
which is reported by QSVI and DVI respectively, while LPFI indicates violation of static limit referring to
maximum power flow through transmission lines. Consequently the derived indices FSI and FPI report
insecurity, and so does the composite FDSI. The voltage diagram at critical nodes is given in Figure 12. The
development of voltage instability is clearly observable. The dynamic response of generators located in a close
proximity to the tripped line is shown in Figure 13.
Figure 12 Voltage collapse at 115 kV nodes
Figure 13 Rotor angle of nearby machines
Contingency 6 can be designated as a worst case scenario since it causes the system to break into two parts. The
first part comprises of northern, eastern and central region and second part is the southern region. The first part
remains stable, while the second one undergoes instability (Figure 14). Figure 15 shows voltage at two 230 kV
network nodes. The voltage at node South 2 collapses, whereas it recovers at node S. West 1. Security indices
indicate that the transient condition the system undergoes violates all security limits set but one; the load flow
limit of high voltage transformers (refer to TPFI in Figure 10).
Figure 14 Frequency at 230kV system nodes
Figure 15 Voltage at 230 kV system nodes
6 Discussion and conclusion
Although being at the development/test stage the proposed research-oriented DSA-tool has a great practical
potential. One possibility is to use it as a self-standing supporting tool in power system operations. Suppose in
the system control room there is a machine with the tool installed and the system model is updated regularly so
the quasi steady state conditions as in actual network are resembled in a e.g. generator dispatch cycle. Each time
a new operating point is established the operator can select a set of credible contingencies and/or scenarios and
check system dynamic security under them; if insecurity is detected an alarm is raised and the operator can
systematically identify sources of poor network condition and decide whether it is reasonable to change the
operating point of the system and improve security or to leave it as it is and take the risk of blackout.
7 Literature
[1] ENTSO-E, “Research and development plan EUROGRID 2020”, first edition, December 2009
[2] E. Lerch, O. Ruhle, D. Vickovic, “Real-Time Stability Assessment in the Control Centers of the ISO of
Bosnia and Herzegovina and a National Dispatching System in North Africa”, in Proceedings of Power
Systems Conference & Exposition, 15-18 March, Seattle, USA, 2009
[3] S. Boroczky, E. Gentle, “Real-Time Transient Security Assessment in Australia at NEMMCO”, in Proce. of
IEEE Power Systems Conference & Exposition, 15-18 March, Seattle, 2009
[4] L.E. Arnold, J. Hajagos, ”LIPA Implementation of Real-Time Stability Monitoring in a CIM Compliant
Environment“, in Proce. of Power Systems Conference & Exposition, 15-18 March, Seattle, 2009
[5] U. Kerin, E. Lerch and , G. Bizjak, 'Monitoring and Reporting of Security of Power System Low-frequency
Oscillations', Electric Power Components and Systems, Vol. 38, No. 9, pp. 1047 — 1060, June 2010
[6] C.K. Tang, C.E. Graham, M. El-Kady, R.T.H. Alden, “Transient Stability Index from Conventional Time
domain Simulation”, IEEE Transactions on Power Systems, Vol. 9, No. 3,
[7] J.M. Gimenez and P.E. Mercado, “A new approach for power system online DSA using distributed
processing and fuzzy logic”, Electric Power System Research 77, pp. 106 – 118
[8] C. Fu and A. Bose, “Contingency Ranking Based on Severity Indices in Dynamic Security Analysis”, IEEE
Transactions on power systems, Vol. 14, No. 3, August 1999

More Related Content

What's hot

Directional over current relay
Directional over current relayDirectional over current relay
Directional over current relayCS V
 
Modern power system planning new
Modern power system planning newModern power system planning new
Modern power system planning newBayu imadul Bilad
 
Basics of Electrical Machines
Basics of Electrical MachinesBasics of Electrical Machines
Basics of Electrical Machinesmaneesh001
 
Economic load dispatch(with and without losses)
Economic load dispatch(with and without losses)Economic load dispatch(with and without losses)
Economic load dispatch(with and without losses)Asha Anu Kurian
 
Newton Raphson
Newton RaphsonNewton Raphson
Newton RaphsonAisu
 
a project report on MPPT algorithm for PV panel
a project report on MPPT algorithm for PV panela project report on MPPT algorithm for PV panel
a project report on MPPT algorithm for PV panelgauravchitransh
 
An Optimal Power Flow (OPF) Method with Improved Voltage Stability Analysis
An Optimal Power Flow (OPF) Method withImproved Voltage Stability AnalysisAn Optimal Power Flow (OPF) Method withImproved Voltage Stability Analysis
An Optimal Power Flow (OPF) Method with Improved Voltage Stability AnalysisNiraj Solanki
 
Power System Analysis!
Power System Analysis!Power System Analysis!
Power System Analysis!PRABHAHARAN429
 
Electric traction
Electric tractionElectric traction
Electric tractionManish Sahu
 
Automatic Load Frequency Control ppt.pdf
Automatic Load Frequency Control ppt.pdfAutomatic Load Frequency Control ppt.pdf
Automatic Load Frequency Control ppt.pdfPhenomAssassin
 
UPPCL,33/11KV H.A.L SUBSTATION,INDIRANAGAR(LUCKNOW)
UPPCL,33/11KV H.A.L SUBSTATION,INDIRANAGAR(LUCKNOW)UPPCL,33/11KV H.A.L SUBSTATION,INDIRANAGAR(LUCKNOW)
UPPCL,33/11KV H.A.L SUBSTATION,INDIRANAGAR(LUCKNOW)Sogendra Rajput
 
Mppt and mppt with pi converter based phtovoltic system
Mppt and mppt with pi converter based phtovoltic systemMppt and mppt with pi converter based phtovoltic system
Mppt and mppt with pi converter based phtovoltic systemMadhu Kundu
 

What's hot (20)

Lecture 16
Lecture 16Lecture 16
Lecture 16
 
Directional over current relay
Directional over current relayDirectional over current relay
Directional over current relay
 
Modern power system planning new
Modern power system planning newModern power system planning new
Modern power system planning new
 
Apfc project 2016 17
Apfc project 2016 17Apfc project 2016 17
Apfc project 2016 17
 
Load flow study
Load flow studyLoad flow study
Load flow study
 
Mppt
MpptMppt
Mppt
 
Unit4questions
Unit4questionsUnit4questions
Unit4questions
 
Basics of Electrical Machines
Basics of Electrical MachinesBasics of Electrical Machines
Basics of Electrical Machines
 
Power Quality Audit.pptx
Power Quality Audit.pptxPower Quality Audit.pptx
Power Quality Audit.pptx
 
Economic load dispatch(with and without losses)
Economic load dispatch(with and without losses)Economic load dispatch(with and without losses)
Economic load dispatch(with and without losses)
 
Newton Raphson
Newton RaphsonNewton Raphson
Newton Raphson
 
Relay testing procedure
Relay testing procedure Relay testing procedure
Relay testing procedure
 
a project report on MPPT algorithm for PV panel
a project report on MPPT algorithm for PV panela project report on MPPT algorithm for PV panel
a project report on MPPT algorithm for PV panel
 
An Optimal Power Flow (OPF) Method with Improved Voltage Stability Analysis
An Optimal Power Flow (OPF) Method withImproved Voltage Stability AnalysisAn Optimal Power Flow (OPF) Method withImproved Voltage Stability Analysis
An Optimal Power Flow (OPF) Method with Improved Voltage Stability Analysis
 
Power System Analysis!
Power System Analysis!Power System Analysis!
Power System Analysis!
 
Electric traction
Electric tractionElectric traction
Electric traction
 
Automatic Load Frequency Control ppt.pdf
Automatic Load Frequency Control ppt.pdfAutomatic Load Frequency Control ppt.pdf
Automatic Load Frequency Control ppt.pdf
 
Power System Stability Introduction
Power System Stability IntroductionPower System Stability Introduction
Power System Stability Introduction
 
UPPCL,33/11KV H.A.L SUBSTATION,INDIRANAGAR(LUCKNOW)
UPPCL,33/11KV H.A.L SUBSTATION,INDIRANAGAR(LUCKNOW)UPPCL,33/11KV H.A.L SUBSTATION,INDIRANAGAR(LUCKNOW)
UPPCL,33/11KV H.A.L SUBSTATION,INDIRANAGAR(LUCKNOW)
 
Mppt and mppt with pi converter based phtovoltic system
Mppt and mppt with pi converter based phtovoltic systemMppt and mppt with pi converter based phtovoltic system
Mppt and mppt with pi converter based phtovoltic system
 

Similar to Management of Power System Dynamic Security

Cluster Computing Environment for On - line Static Security Assessment of lar...
Cluster Computing Environment for On - line Static Security Assessment of lar...Cluster Computing Environment for On - line Static Security Assessment of lar...
Cluster Computing Environment for On - line Static Security Assessment of lar...IDES Editor
 
On-line Power System Static Security Assessment in a Distributed Computing Fr...
On-line Power System Static Security Assessment in a Distributed Computing Fr...On-line Power System Static Security Assessment in a Distributed Computing Fr...
On-line Power System Static Security Assessment in a Distributed Computing Fr...idescitation
 
Microcontroller based transformer protectio
Microcontroller based transformer protectioMicrocontroller based transformer protectio
Microcontroller based transformer protectioAminu Bugaje
 
H15 POWER SYSTEM PROTECTION EMERSON EDUARDO RODRIGUES.pdf
H15 POWER SYSTEM PROTECTION EMERSON EDUARDO RODRIGUES.pdfH15 POWER SYSTEM PROTECTION EMERSON EDUARDO RODRIGUES.pdf
H15 POWER SYSTEM PROTECTION EMERSON EDUARDO RODRIGUES.pdfEMERSON EDUARDO RODRIGUES
 
عرض تقديمي1.pptx
عرض تقديمي1.pptxعرض تقديمي1.pptx
عرض تقديمي1.pptxssuserf314411
 
Reliability Prediction of Port Harcourt Electricity Distribution Network Usin...
Reliability Prediction of Port Harcourt Electricity Distribution Network Usin...Reliability Prediction of Port Harcourt Electricity Distribution Network Usin...
Reliability Prediction of Port Harcourt Electricity Distribution Network Usin...theijes
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
ENHANCEMENT OF POWER SYSTEM SECURITY USING PSO-NR OPTIMIZATION TECHNIQUE
ENHANCEMENT OF POWER SYSTEM SECURITY USING PSO-NR OPTIMIZATION TECHNIQUEENHANCEMENT OF POWER SYSTEM SECURITY USING PSO-NR OPTIMIZATION TECHNIQUE
ENHANCEMENT OF POWER SYSTEM SECURITY USING PSO-NR OPTIMIZATION TECHNIQUEIAEME Publication
 
LATEST TRENDS IN CONTINGENCY ANALYSIS OF POWER SYSTEM
LATEST TRENDS IN CONTINGENCY ANALYSIS OF POWER SYSTEMLATEST TRENDS IN CONTINGENCY ANALYSIS OF POWER SYSTEM
LATEST TRENDS IN CONTINGENCY ANALYSIS OF POWER SYSTEMijiert bestjournal
 
Power System Contingency Ranking Using Fast Decoupled Load Flow Method
Power System Contingency Ranking Using Fast Decoupled Load Flow MethodPower System Contingency Ranking Using Fast Decoupled Load Flow Method
Power System Contingency Ranking Using Fast Decoupled Load Flow Methodpaperpublications3
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Continuation Power Flow Method based Assessment of Static Voltage Stability c...
Continuation Power Flow Method based Assessment of Static Voltage Stability c...Continuation Power Flow Method based Assessment of Static Voltage Stability c...
Continuation Power Flow Method based Assessment of Static Voltage Stability c...IJERA Editor
 
psoc subject topic - SYSTEM SECURITY.pptx
psoc subject topic - SYSTEM SECURITY.pptxpsoc subject topic - SYSTEM SECURITY.pptx
psoc subject topic - SYSTEM SECURITY.pptxGayathriM270621
 
IRJET- Location Identification for FACTs Device
IRJET- Location Identification for FACTs DeviceIRJET- Location Identification for FACTs Device
IRJET- Location Identification for FACTs DeviceIRJET Journal
 
Security analysis black and white 2007
Security analysis black and white 2007Security analysis black and white 2007
Security analysis black and white 2007Viren Pandya
 
A Novel Back Up Wide Area Protection Technique for Power Transmission Grids U...
A Novel Back Up Wide Area Protection Technique for Power Transmission Grids U...A Novel Back Up Wide Area Protection Technique for Power Transmission Grids U...
A Novel Back Up Wide Area Protection Technique for Power Transmission Grids U...Power System Operation
 
REAL-TIME APPLICATIONS OF PHASOR MEASUREMENT UNITS (PMU) FOR VISUALIZATION, ...
REAL-TIME APPLICATIONS OF PHASOR  MEASUREMENT UNITS (PMU) FOR VISUALIZATION, ...REAL-TIME APPLICATIONS OF PHASOR  MEASUREMENT UNITS (PMU) FOR VISUALIZATION, ...
REAL-TIME APPLICATIONS OF PHASOR MEASUREMENT UNITS (PMU) FOR VISUALIZATION, ...Power System Operation
 
protectionsettings-120425102109-phpapp01.ppt
protectionsettings-120425102109-phpapp01.pptprotectionsettings-120425102109-phpapp01.ppt
protectionsettings-120425102109-phpapp01.pptThien Phan Bản
 

Similar to Management of Power System Dynamic Security (20)

Power system security and smart grid
Power system security  and  smart gridPower system security  and  smart grid
Power system security and smart grid
 
Cluster Computing Environment for On - line Static Security Assessment of lar...
Cluster Computing Environment for On - line Static Security Assessment of lar...Cluster Computing Environment for On - line Static Security Assessment of lar...
Cluster Computing Environment for On - line Static Security Assessment of lar...
 
On-line Power System Static Security Assessment in a Distributed Computing Fr...
On-line Power System Static Security Assessment in a Distributed Computing Fr...On-line Power System Static Security Assessment in a Distributed Computing Fr...
On-line Power System Static Security Assessment in a Distributed Computing Fr...
 
Microcontroller based transformer protectio
Microcontroller based transformer protectioMicrocontroller based transformer protectio
Microcontroller based transformer protectio
 
H15 POWER SYSTEM PROTECTION EMERSON EDUARDO RODRIGUES.pdf
H15 POWER SYSTEM PROTECTION EMERSON EDUARDO RODRIGUES.pdfH15 POWER SYSTEM PROTECTION EMERSON EDUARDO RODRIGUES.pdf
H15 POWER SYSTEM PROTECTION EMERSON EDUARDO RODRIGUES.pdf
 
operational states security constraints
operational states security constraintsoperational states security constraints
operational states security constraints
 
عرض تقديمي1.pptx
عرض تقديمي1.pptxعرض تقديمي1.pptx
عرض تقديمي1.pptx
 
Reliability Prediction of Port Harcourt Electricity Distribution Network Usin...
Reliability Prediction of Port Harcourt Electricity Distribution Network Usin...Reliability Prediction of Port Harcourt Electricity Distribution Network Usin...
Reliability Prediction of Port Harcourt Electricity Distribution Network Usin...
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
ENHANCEMENT OF POWER SYSTEM SECURITY USING PSO-NR OPTIMIZATION TECHNIQUE
ENHANCEMENT OF POWER SYSTEM SECURITY USING PSO-NR OPTIMIZATION TECHNIQUEENHANCEMENT OF POWER SYSTEM SECURITY USING PSO-NR OPTIMIZATION TECHNIQUE
ENHANCEMENT OF POWER SYSTEM SECURITY USING PSO-NR OPTIMIZATION TECHNIQUE
 
LATEST TRENDS IN CONTINGENCY ANALYSIS OF POWER SYSTEM
LATEST TRENDS IN CONTINGENCY ANALYSIS OF POWER SYSTEMLATEST TRENDS IN CONTINGENCY ANALYSIS OF POWER SYSTEM
LATEST TRENDS IN CONTINGENCY ANALYSIS OF POWER SYSTEM
 
Power System Contingency Ranking Using Fast Decoupled Load Flow Method
Power System Contingency Ranking Using Fast Decoupled Load Flow MethodPower System Contingency Ranking Using Fast Decoupled Load Flow Method
Power System Contingency Ranking Using Fast Decoupled Load Flow Method
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Continuation Power Flow Method based Assessment of Static Voltage Stability c...
Continuation Power Flow Method based Assessment of Static Voltage Stability c...Continuation Power Flow Method based Assessment of Static Voltage Stability c...
Continuation Power Flow Method based Assessment of Static Voltage Stability c...
 
psoc subject topic - SYSTEM SECURITY.pptx
psoc subject topic - SYSTEM SECURITY.pptxpsoc subject topic - SYSTEM SECURITY.pptx
psoc subject topic - SYSTEM SECURITY.pptx
 
IRJET- Location Identification for FACTs Device
IRJET- Location Identification for FACTs DeviceIRJET- Location Identification for FACTs Device
IRJET- Location Identification for FACTs Device
 
Security analysis black and white 2007
Security analysis black and white 2007Security analysis black and white 2007
Security analysis black and white 2007
 
A Novel Back Up Wide Area Protection Technique for Power Transmission Grids U...
A Novel Back Up Wide Area Protection Technique for Power Transmission Grids U...A Novel Back Up Wide Area Protection Technique for Power Transmission Grids U...
A Novel Back Up Wide Area Protection Technique for Power Transmission Grids U...
 
REAL-TIME APPLICATIONS OF PHASOR MEASUREMENT UNITS (PMU) FOR VISUALIZATION, ...
REAL-TIME APPLICATIONS OF PHASOR  MEASUREMENT UNITS (PMU) FOR VISUALIZATION, ...REAL-TIME APPLICATIONS OF PHASOR  MEASUREMENT UNITS (PMU) FOR VISUALIZATION, ...
REAL-TIME APPLICATIONS OF PHASOR MEASUREMENT UNITS (PMU) FOR VISUALIZATION, ...
 
protectionsettings-120425102109-phpapp01.ppt
protectionsettings-120425102109-phpapp01.pptprotectionsettings-120425102109-phpapp01.ppt
protectionsettings-120425102109-phpapp01.ppt
 

More from Power System Operation

Thermography test of electrical panels
Thermography test of electrical panelsThermography test of electrical panels
Thermography test of electrical panelsPower System Operation
 
Big Data Analytics for Power Grid Operations
Big Data Analytics for Power Grid OperationsBig Data Analytics for Power Grid Operations
Big Data Analytics for Power Grid OperationsPower System Operation
 
SPS to RAS Special Protection Scheme Remedial Action Scheme
SPS to RAS Special Protection Scheme  Remedial Action SchemeSPS to RAS Special Protection Scheme  Remedial Action Scheme
SPS to RAS Special Protection Scheme Remedial Action SchemePower System Operation
 
SVC PLUS Frequency Stabilizer Frequency and voltage support for dynamic grid...
SVC PLUS Frequency Stabilizer Frequency and voltage support for  dynamic grid...SVC PLUS Frequency Stabilizer Frequency and voltage support for  dynamic grid...
SVC PLUS Frequency Stabilizer Frequency and voltage support for dynamic grid...Power System Operation
 
Principles & Testing Methods Of Earth Ground Resistance
Principles & Testing Methods Of Earth Ground ResistancePrinciples & Testing Methods Of Earth Ground Resistance
Principles & Testing Methods Of Earth Ground ResistancePower System Operation
 
Gas Insulated Switchgear? Gas-Insulated High-Voltage Switchgear (GIS)
Gas Insulated Switchgear?  Gas-Insulated High-Voltage Switchgear (GIS)Gas Insulated Switchgear?  Gas-Insulated High-Voltage Switchgear (GIS)
Gas Insulated Switchgear? Gas-Insulated High-Voltage Switchgear (GIS)Power System Operation
 
Electrical Transmission Tower Types - Design & Parts
Electrical Transmission Tower  Types - Design & PartsElectrical Transmission Tower  Types - Design & Parts
Electrical Transmission Tower Types - Design & PartsPower System Operation
 
The Need for Enhanced Power System Modelling Techniques & Simulation Tools
The Need for Enhanced  Power System  Modelling Techniques  &  Simulation Tools The Need for Enhanced  Power System  Modelling Techniques  &  Simulation Tools
The Need for Enhanced Power System Modelling Techniques & Simulation Tools Power System Operation
 
Power Quality Trends in the Transition to Carbon-Free Electrical Energy System
Power Quality  Trends in the Transition to  Carbon-Free Electrical Energy SystemPower Quality  Trends in the Transition to  Carbon-Free Electrical Energy System
Power Quality Trends in the Transition to Carbon-Free Electrical Energy SystemPower System Operation
 

More from Power System Operation (20)

ENERGY TRANSITION OUTLOOK 2021
ENERGY TRANSITION OUTLOOK  2021ENERGY TRANSITION OUTLOOK  2021
ENERGY TRANSITION OUTLOOK 2021
 
Thermography test of electrical panels
Thermography test of electrical panelsThermography test of electrical panels
Thermography test of electrical panels
 
What does peak shaving mean
What does peak shaving meanWhat does peak shaving mean
What does peak shaving mean
 
What's short circuit level
What's short circuit levelWhat's short circuit level
What's short circuit level
 
Power System Restoration Guide
Power System Restoration Guide  Power System Restoration Guide
Power System Restoration Guide
 
Big Data Analytics for Power Grid Operations
Big Data Analytics for Power Grid OperationsBig Data Analytics for Power Grid Operations
Big Data Analytics for Power Grid Operations
 
SPS to RAS Special Protection Scheme Remedial Action Scheme
SPS to RAS Special Protection Scheme  Remedial Action SchemeSPS to RAS Special Protection Scheme  Remedial Action Scheme
SPS to RAS Special Protection Scheme Remedial Action Scheme
 
Substation Neutral Earthing
Substation Neutral EarthingSubstation Neutral Earthing
Substation Neutral Earthing
 
SVC PLUS Frequency Stabilizer Frequency and voltage support for dynamic grid...
SVC PLUS Frequency Stabilizer Frequency and voltage support for  dynamic grid...SVC PLUS Frequency Stabilizer Frequency and voltage support for  dynamic grid...
SVC PLUS Frequency Stabilizer Frequency and voltage support for dynamic grid...
 
Principles & Testing Methods Of Earth Ground Resistance
Principles & Testing Methods Of Earth Ground ResistancePrinciples & Testing Methods Of Earth Ground Resistance
Principles & Testing Methods Of Earth Ground Resistance
 
Gas Insulated Switchgear? Gas-Insulated High-Voltage Switchgear (GIS)
Gas Insulated Switchgear?  Gas-Insulated High-Voltage Switchgear (GIS)Gas Insulated Switchgear?  Gas-Insulated High-Voltage Switchgear (GIS)
Gas Insulated Switchgear? Gas-Insulated High-Voltage Switchgear (GIS)
 
Electrical Transmission Tower Types - Design & Parts
Electrical Transmission Tower  Types - Design & PartsElectrical Transmission Tower  Types - Design & Parts
Electrical Transmission Tower Types - Design & Parts
 
What is load management
What is load managementWhat is load management
What is load management
 
What does merit order mean
What does merit order meanWhat does merit order mean
What does merit order mean
 
What are Balancing Services ?
What are  Balancing Services ?What are  Balancing Services ?
What are Balancing Services ?
 
The Need for Enhanced Power System Modelling Techniques & Simulation Tools
The Need for Enhanced  Power System  Modelling Techniques  &  Simulation Tools The Need for Enhanced  Power System  Modelling Techniques  &  Simulation Tools
The Need for Enhanced Power System Modelling Techniques & Simulation Tools
 
Power Quality Trends in the Transition to Carbon-Free Electrical Energy System
Power Quality  Trends in the Transition to  Carbon-Free Electrical Energy SystemPower Quality  Trends in the Transition to  Carbon-Free Electrical Energy System
Power Quality Trends in the Transition to Carbon-Free Electrical Energy System
 
Power Purchase Agreement PPA
Power Purchase Agreement PPA Power Purchase Agreement PPA
Power Purchase Agreement PPA
 
Harmonic study and analysis
Harmonic study and analysisHarmonic study and analysis
Harmonic study and analysis
 
What is leakage current testing
What is leakage current testingWhat is leakage current testing
What is leakage current testing
 

Recently uploaded

Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 

Recently uploaded (20)

9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 

Management of Power System Dynamic Security

  • 1. Management of Power System Dynamic Security Uros Kerina , Grega Bizjaka , Edwin Lerchb a Faculty of electrical engineering, University of Ljubljana, Slovenia b E D SE PTI NC2, SIEMENS AG, Germany Abstract - In this paper a research oriented prototype of a tool for dynamic security assessment is presented, capable of analyzing system dynamic performance by making use of so-called performance indices. The tool is a result of a research work carried out in cooperation of the University of Ljubljana, Slovenia, and SIEMENS AG, Germany. The aim of the tool is to help managing power system stability problems by alerting the control operator to conditions that represent a significant risk to system security and provide practical information for decision making. 1 Introduction The impact power outages have on industry and consequently economy is enormous. The EURELECTRIC task force (Final Report 06-2004) has estimated that the typical costs for industrial consumers are about 1000€ per kWh lost in case of short outages and way over for long outages. As a matter of fact, the economic loss of major blackouts is easily compared to ones of natural disasters. For example, the economic loss of 2003 USA-Canada power outage is estimated to be about 10% of costs introduced by the Katrina hurricane (~10.5 billion US dollars). The ten most severe blackouts that took place all over the world are summarized in Figure 1. As one can see, a lot of people have been affected and it usually took a significant amount of time for the power system operators to reestablish full operation of their systems. Figure 1 The ten most severe blackouts The subject of great interest for dispatching centers have always been the tasks of static security assessment (SSA), typically involving optimal power flow solution, identification of bottle necks and validation of voltages and power flows. These tasks sufficiently address the problem of quasi-steady state system operation and are usually performed off-line on a day-ahead basis. But in the constantly changing system structure and at market- driven power pricing the assumptions made within SSA are less and less valid and to aid the security management on-line tools for security assessment are required.
  • 2. To increase situational awareness of dispatchers the task force investigating the 2003 U.S.-Canada blackout suggests the use of real-time dynamic security assessment. Dynamic security assessment (DSA) includes methods to evaluate stability and quality of system transition from a pre- to post-disturbance state. Similar directives have also been released by the European Network of Transmission System Operators for Electricity (ENTSO-E). One of the ENTSO-E appeals concerning the future network development is that tools to assess the dynamic security of the pan-European electrical network should be developed to minimize the probability of operational irregularities. These tools should primarily rely on the well established computational techniques enabling ‘What if’ analysis and assessment of the distance to the system security limits [1]. In this paper a research oriented prototype of a tool for DSA is presented, capable of analyzing system dynamic performance by making use of so-called performance indices. The tool is a result of a research work carried out by international team of experts from University of Ljubljana, Slovenia, electric companies headquartered in various European countries and SIEMENS AG, Germany. The task of the university was to explore and develop DSA methods under constraints of practical applications, whereas the technical advisors from the industry provided expert knowledge from experiences. The aim of the tool is to help managing power system stability problems by alerting the control operator to conditions that represent a significant risk to system security and providing practical information for decision making. 2 Analysis in System Operations While it is true that power systems are designed to be stable, in actual practice, systems may be prone to being unstable. This is largely due to uncertainties related to assumptions made during the design process. For example, when designing a system its stability and limits of secure operation are usually determined under some assumed load levels, generation, topology structure, etc. But the fact is that in many power systems such principal assumptions strongly deviate from the actual circumstances. To deal with the unpredictability of operations, especially in the systems with a significant share of dispersed generation, it is necessary to perform on-line security investigations. The main issue is a classification problem: given a present operating point and a single or multiple contingencies (outage of transmission elements, sudden loss of wind power, faults, etc.) the system analysts determines, on-line, if the situation is secure or insecure, regarding the contingencies. The weak points are identified for the existent condition and by preventive control the security of the system can be maintained on the required level. The investigation can be conducted at regular intervals e.g. generator dispatch cycle or on demand. In any case, the power flow is derived from real time data and is together with other required data required for calculations passed to DSA software residing on dedicated computers. The security of the system is assessed against criteria, typically including: • rotor angle stability, voltage stability, frequency stability, • frequency excursions during the dynamic state (dip or rise) beyond specified threshold levels, • voltage excursions during the dynamic state (dip or rise) beyond specified threshold levels, • damping of power swings inside subsystems and between subsystems on an interconnected network. A flow chart of the generalized DSA process is illustrated in Figure 2. Such a process can be conveniently incorporated into existing configuration of an operational control room. Experiences of the control operators relying on the on-line investigations in daily operations are reported in [2]-[4]. The solutions they use help them to quickly assess a potentially rapidly changing system state and to formulate corrective control actions in real time.
  • 3. Figure 2 Flow chart of an on-line DSA process 3 Dynamic Security Inference Two approaches may be used regarding the system state classification: direct classification of the operating state or inference of the value of important variable or some index, then used for classification. In the direct approach, the system analyst carries out full simulation and dynamic performance of the system is validated against allowable limits through application of the system’s model. Concerning the security a yes-or-no answer is provided. An answer like this is may be used for classification of system states in absolute terms (secure - insecure), however in marginal situations, where the operating point is still designated as secure, but is very close to limits, it can lead to inadequate decision making and ultimately operator performance errors. The other possibility is to use so-called performance indices. These indices refer to values of system parameters which vary significantly with the prevailing conditions in the system. There are many important parameters of which dynamic response can be used for establishing contingency severity levels as a measure of power system security. Some important ones are rotor angle of system generators, frequency, voltage, and damping of oscillations. Figure 3 suggests that it is crucial to keep these parameters within limits continually otherwise the system may undergo stability problems. Figure 3 Region of secure system operation 3.1 Indices for evaluation The DSA solution presented in this paper is based on inference of 18 complementary security indices, capable of capturing the dynamic state of the power system during and after contingencies. Each of these indices captures a single security aspect and in combination with the others leads to a more accurate contingency evaluation scheme. The indices are able to estimate consequences on the system, such as overloading of transmission elements, relays operation, angle stability loss, voltage drop, etc. Their exact definitions and argumentation are available in [5]-[7]. Every single index is a well-thought relation between the actual and maximum acceptable
  • 4. value of an observed system parameter. A general index form is given by equation 1, where x is the actual (temporary) value of the system parameter during and after a contingency and y is its corresponding acceptable value. Note that by using this approach all the security issues are normalized and can be compared to each other. The output range of the indices is between 0 and 1. min 1,max x index y    =       (1) The temporary values over time may be obtained by measurement or simulation, for evaluation of existent or future system states respectively. The maximum acceptable values of system state variables are usually enforced through the grid code. For example, grid codes issued during the last years have invariably demanded that wind farms must withstand voltage dips to a certain percentage of the nominal voltage and for a specified duration. Such requirements are known as Fault Ride Through (FRT) and are described by a voltage vs. time characteristic (Figure 4). Figure 4 FRT curve for high and extra high voltage levels (EON Germany) The FRT requirements imply that the voltage at the generator connecting nodes needs to be observed at any instant. For that purpose the Voltage Ride Through Index (VRTI) is proposed. The index monitors the voltage behavior and delivers the relative agreement between the actual and limiting voltage pattern after disturbances. It reports whether a disturbance would cause a generator to trip and gives the security margin to a disconnection. The index is given by definitions (2)-(4) and considers a transient voltage dip both in percentage deviation and in time duration; the fault-on and post-fault voltage dynamics is taken into account by comparing the surface captured by the voltage deviation (with respect to the normal voltage band) with the reference surface specified by the transient time and voltage limits. For the sake of evaluation, the reference surface can be treated as one or divided into a number of segments. So, each stage of the voltage transient can be evaluated regarding the corresponding limits; good results are obtained if two areas are defined: one for the fault-on and the other for the post-fault period (Figure 5).
  • 5. Figure 5 Areas for determining fault impact on generator connecting nodes max min 1,max A area j area j i t area j adm V dt VRTI    ∆ ⋅      =             ∫ (2) min min min min min , if V , if < V 0 , if V area j i adm area j band area j band i adm i adm i adm band i adm V V V V V V V  ∞ <  ∆ = − <  ≥ (3) ( )max min maxA tarea j area j area j adm n adm admV V= − ⋅ (4) In the expressions, the superscript denotes j-th reference area for the evaluation, which is given by the maximum admissible time of i-th node voltage for being at its minimum admissible value. The list of all indices proposed for security inference is given in table 1. Four deliver degree of dynamic security on system-level; six are for quantifying variations in dynamic security on element-level, whereas eight are for evaluation of post-contingency steady state condition. Table 1 Proposed power system security indices System Indices Dynamic Indices Quasi-Steady State Indices Small Signal Stability Index SSSI Angle Index AI Quasi Stationery Voltage Index QSVI Energy Margin Index EMI Dynamic Voltage Index DVI Line Power Flow Index LPFI Voltage Collapse Index VCI Voltage Ride Through Index VRTI Transformer Power Flow Index TPFI Protection Security Index PSI Frequency Recovery Time Index FRTI Load Shedding Index LSI Frequency Gradient Index FGI Nodal Loading Index NLI Maximum Frequency Deviation Index MFDI Thevenin Index THI Approximated Voltage Index APVI Under Over Voltage Index UOVI 3.2 Composite Index Experience from the development of an on-line implementation contingency screening and ranking in static security assessment suggests that:
  • 6. • no single security index can reliably capture the entire system state; • a combination of complementary indices can be used to reliably rank and select contingencies while each of individual indices may not give enough information for a 100% accurate ranking. One way to combine the individual indices into a composite index in dynamic security assessment is to calculate a weighted sum. This approach has been extensively used by many experts (e.g. see [8]). The weighted-sum technique is simple to understand and easy to implement; but it has two main shortcomings: often the optimal solution distribution is not uniform, and more seriously, the technique is often implemented as a convex combination of objectives, where the sum of all weights is constant and negative weights are not allowed, thus wrong choice of weights may result in selection of an inferior solution by missing important solutions in the non- convex regions. An alternative to the weighted-sum method is a technique coming from soft computing. Assuming that the system analyst is able to represent its knowledge about the system as a set of facts and rules, the uncertainties related to proper weight selection and formation of the composite index can be more efficiently handled by means of fuzzy logic. Fuzzy logic is considered as a very important tool of artificial intelligence which could be used in various fields of human decision support systems. Its capabilities have been proved by many practical applications. In this work it is used as a methodology for composing of the composite dynamic security index. The main components of a three stage Fuzzy Inference System (FIS) that is used for that purpose are shown in Figure 6. The figure shows, the system is suitable for implementation into an existing environment in a control room, defined by data sources, including system state estimator, SCADA system and PMUs, on one side, and system control assets on the other. To take the advantage of the data delivered by the synchrophasors is in particular important since these devices are considered one of the most important measuring devices in the future of power systems. In the figure, the abbreviations FFI, FVI, FPI, FSI and FDSI stand for Fuzzy Frequency Index, Fuzzy Voltage Index, Fuzzy Performance Index, Fuzzy Stability Index and Fuzzy Dynamic Security Index respectively. SSSI AI EMI VCI FSI FPI FDSI PSI FVI UOVI APVI VRTI QSVI DVI LPFI LSI TPFI NLI THI FFI FGI FRTI MFDI Stability FIS (Fuzzy Inference System) Security FIS PMU (V, I - magnitude, phase angle) SCADA, disturbance recorders Voltage FIS Power Flow FIS Frequency FIS Trend analysis / Pattern recognition Situation awareness Reporting and Visualization (local, web, EMS) System status bar Operator's decisions System control Figure 6 Implementation of the proposed DSA solution
  • 7. 3.3 Visualization of results For visualizing dynamic security of a power system under different network states by making use of the security indices, a deliberate visualization form is introduced. It enables an overview of the security degree of a disturbed system in reference to the security threshold and a disturbance (contingency) applied. Applying a visualization technique similar as in traffic control, the proposed security indices can communicate the security degree by means of indicative colors. These need to be carefully selected in order to deliver a suggestive message; if remedial actions are needed, for example. As illustrated in Figure 7, both, a smoothly changing color scale or a limited set of colors are suitable. Figure 7 Visualizing power system security indices The selected color scale refers to an index magnitude equally distributed along the interval [0 1]. The scale-ends denote the absolute security degree: secure-insecure. Although any color scale is adequate for the purpose, the most obvious is to use green and red for denoting the absolute secure and insecure system condition and a color- mix in between for security variation. In this way, the dramatic progression of reporting is introduced, suggesting the alert level and the expected magnitude of remedial actions for improvement of the condition. A five-color color scale seems suitable for the application; it is easy to intuitively relate red, orange, yellow, dark yellow and green to SAFE, ALERT LOW, ALERT HIGH, DANGER and INSECURE condition of the power system. 4 The DSA tool By following the principles of wrapper interfacing the presented DSA solution has been upgraded to a research- oriented DSA tool. Through a Graphical User Interface (GUI) the user is able to manipulate the performance of the computational engine (PSS® NETOMAC) and algorithms for security evaluation. The GUI consists of a number of components. The main ones are: main program window, auxiliary program window and contingency builder. By using the functionalities these components offer, one can define contingencies and scenarios to be investigated, arrange settings of computations, and investigate the DSA results in a systematic way. The main program window is shown in Figure 8. Simultaneously it serves as the main management panel and results board. It contains a command menu bar, a panel that displays operations and a status bar. There are many actions available to the user. Through this window it is possible to access functionalities of contingency builder, input calculation related settings, and initiate investigations.
  • 8. Figure 8 Main program window After computations have finished, the FDSI provides both color and numeric indication of the security degree in the display panel. It is shown for each contingency and has the form of a bar chart. When one clicks on one of the charts to select it a sub-window window appears containing more detailed results. The program windows are organized into a hierarchy as show in Figure 9. Figure 9 Program windows hierarchy There are two possible ways of visualizing the results; by using a dedicated GUI, where one can systematically go into details of each contingency and inspect diagrams of observed system parameters, or in a single display, such as shown in Figure 10. The matrix visualization technique allows organizing the results automatically according to a network condition, calculated security indices and color scale. The general picture of the system dynamic performance under different contingencies is immediately obtained. Rows refer to contingencies and columns to individual security indices. Visualized are the results of 6 study cases for 12 elementary indices and 6 derived ones. Note that the blank fields in the matrix indicate that a particular security index has not been included in a certain study case.
  • 9. Figure 10 Matrix visualization 5 Case study and performance In order to evaluate performance capabilities of the developed tools a test is conducted. In the test a power system is assessed for dynamic security under a set of credible contingencies. The main objective is to determine total time required for carrying out the security assessment and determine if it complies with the requirements of on-line applications. A model of a medium size power system has been used in the test. It includes 119 generators, including AVRs and governors, 527 high voltage transmission lines, 261 transformers, 415 nodes and 319 loads. The system has four main voltage levels: 500-, 230-, 115-, and 69 kV. A topology of the main 500 kV and 230 kV transmission network is shown in Figure 11. Six contingencies are put under investigation: • loss of a generator in the southern part of the system (1), • loss of a large generator in the metropolitan area (2), • transient fault at 500 kV voltage level (3), • a single 230 kV line outage in south-eastern region (4), • a single 230 kV line outage in north-eastern region (5), • three phase fault and consequent loss of parallel 230 kV lines connecting central and southern region (6). Figure 11 500 kV and 230 kV network topology From the perspective of on-line tools, the performance is normally measured in terms of total time required for carrying out a task or procedure. The faster the speed of computations the better the performance is a common understanding relating to this matter. The total time for investigation of the contingency set is given in Table 2 and is 202 seconds or 3.36 minutes. Considering the typical requirements on time outlined in [3] and [4] one may suggest that the developed DSA-tool is able to deliver performance as expected from on-line tools.
  • 10. Table 2 Total computational time Prepare data Execute computations Inference Total time cnt small signal dynamic transient small signal dynamic transient FIS DSA time in seconds 1 0.252 0.623 5.259 23.058 2.036 31.228 2 0.252 0.641 4.837 22.871 1.613 30.214 3 0.192 2.083 0.158 4.962 23.121 9.606 2.051 42.173 4 0.256 1.968 4.962 23.027 1.884 32.097 5 0.258 1.997 4.994 22.965 1.961 32.175 6 0.252 2.140 5.071 23.323 3.376 34.162 202.049 The total time has three components: time required for preparing input databases, computational time, and time required for fuzzy inference and construction of the single all-encompassing security index FDSI. The time to prepare input data and execute computations is further divided into three sub-components: time for small signal stability [5] and transient stability assessment [6], and time for calculating the performance indices [7]. The inference results by making use of the matrix visualization technique are shown in Figure 10. Three contingencies are classified as insecure and clearly require immediate operator’s attention whereas three are secure, but with the security margin that still implies preventive actions; given the numeric and color designation the most severe are contingencies 4 and 6. Contingency 4 involves a spontaneous loss of a single 230 kV line. The tripping causes voltage to go out of bounds and overloading of some power lines. Violated are voltage static limits and voltage dynamic constraints, which is reported by QSVI and DVI respectively, while LPFI indicates violation of static limit referring to maximum power flow through transmission lines. Consequently the derived indices FSI and FPI report insecurity, and so does the composite FDSI. The voltage diagram at critical nodes is given in Figure 12. The development of voltage instability is clearly observable. The dynamic response of generators located in a close proximity to the tripped line is shown in Figure 13. Figure 12 Voltage collapse at 115 kV nodes Figure 13 Rotor angle of nearby machines
  • 11. Contingency 6 can be designated as a worst case scenario since it causes the system to break into two parts. The first part comprises of northern, eastern and central region and second part is the southern region. The first part remains stable, while the second one undergoes instability (Figure 14). Figure 15 shows voltage at two 230 kV network nodes. The voltage at node South 2 collapses, whereas it recovers at node S. West 1. Security indices indicate that the transient condition the system undergoes violates all security limits set but one; the load flow limit of high voltage transformers (refer to TPFI in Figure 10). Figure 14 Frequency at 230kV system nodes Figure 15 Voltage at 230 kV system nodes 6 Discussion and conclusion Although being at the development/test stage the proposed research-oriented DSA-tool has a great practical potential. One possibility is to use it as a self-standing supporting tool in power system operations. Suppose in the system control room there is a machine with the tool installed and the system model is updated regularly so the quasi steady state conditions as in actual network are resembled in a e.g. generator dispatch cycle. Each time a new operating point is established the operator can select a set of credible contingencies and/or scenarios and check system dynamic security under them; if insecurity is detected an alarm is raised and the operator can systematically identify sources of poor network condition and decide whether it is reasonable to change the operating point of the system and improve security or to leave it as it is and take the risk of blackout. 7 Literature [1] ENTSO-E, “Research and development plan EUROGRID 2020”, first edition, December 2009 [2] E. Lerch, O. Ruhle, D. Vickovic, “Real-Time Stability Assessment in the Control Centers of the ISO of Bosnia and Herzegovina and a National Dispatching System in North Africa”, in Proceedings of Power Systems Conference & Exposition, 15-18 March, Seattle, USA, 2009
  • 12. [3] S. Boroczky, E. Gentle, “Real-Time Transient Security Assessment in Australia at NEMMCO”, in Proce. of IEEE Power Systems Conference & Exposition, 15-18 March, Seattle, 2009 [4] L.E. Arnold, J. Hajagos, ”LIPA Implementation of Real-Time Stability Monitoring in a CIM Compliant Environment“, in Proce. of Power Systems Conference & Exposition, 15-18 March, Seattle, 2009 [5] U. Kerin, E. Lerch and , G. Bizjak, 'Monitoring and Reporting of Security of Power System Low-frequency Oscillations', Electric Power Components and Systems, Vol. 38, No. 9, pp. 1047 — 1060, June 2010 [6] C.K. Tang, C.E. Graham, M. El-Kady, R.T.H. Alden, “Transient Stability Index from Conventional Time domain Simulation”, IEEE Transactions on Power Systems, Vol. 9, No. 3, [7] J.M. Gimenez and P.E. Mercado, “A new approach for power system online DSA using distributed processing and fuzzy logic”, Electric Power System Research 77, pp. 106 – 118 [8] C. Fu and A. Bose, “Contingency Ranking Based on Severity Indices in Dynamic Security Analysis”, IEEE Transactions on power systems, Vol. 14, No. 3, August 1999