1. Static Security Assessment of EEPCo’s
InterconnectedTransmission System
A project Proposal Submitted for the Partial fulfillment of the
completion of the course- Research Methods in Engineering
(ECEG7901)
By: Moges Alemu (GSR/2274/07)
Examiner: Dr. Getachew Bekele, PhD
2. Contents
Introduction
Problem Statement
Conceptual Framework
Objective of the Study
Delimitation and Limitations of the study
Methodology
Schedule
Budget
School of ECEG2
4. Cont’d…
School of ECEG4
Their principal task is to deliver the power requested by the
customers, without:
• exceeding acceptable voltage limits and
• transmission overloading.
Thus, the security of the system must be explored and strengthened
in order that the reliable energy supply can be maintained.
5. Cont’d…
School of ECEG5
Power system security is used to mean the ability of electric power
system to withstand sudden disturbances such as short circuits or
unanticipated loss of system components.
1. following the occurrence of a sudden disturbance, the power
system should survive the ensuing transient and move into an
acceptable steady-state condition. (Dynamic Security
Assessment (DSA))
2. in this new steady-state condition, all power system components
should operate within established limits. (Static Security
Assessment (SSA))
6. Cont’d…
School of ECEG6
Static security assessment of a power system enables to
detect line flow violation or an out of limit bus voltage
following a given list of contingencies.
Complete SSA involves checking for voltage and thermal limit
violations in the post-contingency steady state.
Static security of a power system addresses whether, after a
disturbance, the system reaches a steady state operating point
without violating system operating constraints called security
constraints.
7. Cont’d…
School of ECEG7
These constraints are:
1. There should be a perfect balance between power
generation and load demand; consequently, the
load flow equations can be satisfied.
𝑷 𝑮𝒊
𝑵 𝒈
𝒊=𝟏
= 𝑷 𝑫 + 𝑷𝒍𝒐𝒔𝒔 , 𝑷 𝑮𝒊
𝒎𝒊𝒏
≤ 𝑷 𝑮𝒊 ≤ 𝑷 𝑮𝒊
𝒎𝒂𝒙
𝑸 𝑮𝒊
𝑵 𝒈
𝒊=𝟏
= 𝑸 𝑫 + 𝑸𝒍𝒐𝒔𝒔 , 𝑸 𝑮𝒊
𝒎𝒊𝒏
≤ 𝑸 𝑮𝒊 ≤ 𝑸 𝑮𝒊
𝒎𝒂𝒙
8. Cont’d…
School of ECEG8
2. The bus voltage magnitude |Vk | should be within the prescribed
limit, i.e.
𝑽 𝒌
𝒎𝒊𝒏
≤ 𝑽 𝒌 ≤ 𝑽 𝒌
𝒎𝒂𝒙
, where k = 1, 2, 3…𝑵 𝒃
3.The bus voltage magnitude |Vk | should be within the prescribed
limit, i.e.
𝑺 𝒌𝒎 ≤ 𝑺 𝒌𝒎
𝒎𝒂𝒙
⦡ 𝑩𝒓𝒂𝒏𝒄𝒉𝒆𝒔 𝒌 − 𝒎
4.The frequency should be constant throughout the system.
5.There should not exist any load shedding.
9. Problem Statement (Motivation)
School of ECEG9
The present-day power systems are dynamic in nature, with
network topology changing frequently with load demand.
With increase in load demand, the power network is loaded to
its limits thus making it susceptible to partial or total blackout
under minor or major disturbances.
Different blackouts have been occurred in EEPCO power
system with different time frames.
10. Cont’d…
School of ECEG10
For instance,
February 12, 2006,
November 30, 2007,
September 3, 2008,
December 31, 2008,
June 10, 2008,
December 15, 2015 total blackouts and
May 28, 2008,
June 21, 2008,
October 20, 2007 partial blackouts have been occurred .
Thus, to overcome this problem, power system
security analysis is a necessity.
11. Cont’d…
School of ECEG11
In order to operate the power system economically, the
state of the system has to be identified as secure or
insecure.
The above practical problem has become a
motivation to do power system static security
study of EEPCO-interconnected system.
13. Objectives
School of ECEG13
Main objective: assessment of EEPCo’s power system
Static Security and propose possible solutions.
Specific Objectives:
Assess the current power security problems in EEPCo’s Electric
grid
Develop SSA of the power system using ac power flow method
Investigate the secure dispatch of the system
Make necessary recommendations for our grid security
enhancement
14. Delimitation and Limitation
School of ECEG14
1. The steady state security assessment is limited by the thermal limit
of transmission lines and bus voltage limit only, since these
constraints are generally accepted as security criteria for most
work in security assessment.
2. And simulate the system b varying different contingencies
Limitation of the study
1. The contingency analysis of the EEPCO interconnected system to
determine whether it is secure or not is based on N-1 criterion
15. Methodology
School of ECEG15
Reading Similar Literatures Data Collection (LDC)
Modeling the interconnected system Data Analysis
Power Flow Analysis(using PowerWorld Simulator)
Analysis of the result
Draw Conclusions and Recommendations
16. Significance of the Study
School of ECEG16
security enhancement measures
secure dispatch analysis
system expansion study
17. Work Plan
School of ECEG17
No Task Moths , starting from February, 2016 (2nd month)
2n
d
3rd 4t
h
5th 6t
h
7th 8th 9th 10
th
11
th
1 • Writing proposal
2 • Reading similar literatures
• Collect required Data from EEP &
EEU
3 • Load flow analysis
• Contingency analysis
• Data analysis including SSA
4 Propose solutions, Simulate
system with contingencies,
5 Accept or reject the proposed
solutions based on the simulation
results
Reach conclusions
6 Reviewing my work and analysis
Finish Final Paper and Prepare
for Final Checkout
7 Final Presentation
18. Budget
School of ECEG18
Materials required Total Price
Stationaries 1000 ETB
Software 200 ETB
CDMA 5000 ETB
Reading table and chair 1000 ETB
Transportation and related
expenses
15,000 ETB
Total 22,200 ETB