SlideShare a Scribd company logo
Consequence driven decomposition
of large-scale power system security
analysis
Florence Fonteneau-Belmudes∗, Damien Ernst∗,
Christophe Druet†, Patrick Panciatici‡, Louis
Wehenkel∗
*University of Li`ege, Belgium - † ELIA (Belgian TSO) - ‡ RTE (French TSO)
2010 IREP Symposium, Buzios, Rio de Janeiro, Brazil, 1-6 August 2010
Power system security assessment
Power system security assessment = Identifying
contingencies/scenarios that could lead to unacceptable
operating conditions (dangerous contingencies) if no
preventive actions were taken.
Problem may be approximated by running a security
analysis for every element of a set of potentially
dangerous contingencies.
Size of this set of potentially dangerous contingencies:
• grows with the size of the power system
• grows with increasing uncertainties about the future
power injection patterns, load patterns and system
topologies.
Question: What should you do when the size of the set
becomes so large that you cannot screen every
contingency one by one?
2
Traditional solutions:
• Increase the computational resources (note that the
security analysis task can be easily parallelized).
• Use filtering techniques (= simplified conservative
analysis techniques) to identify a subset of
contingencies on which the full security analysis is
carried out.
Shortcomings:
• Do not work in case of very large number of
contingencies (say for example 1010).
• Reliable and efficient filtering techniques are difficult
to develop.
3
Our solution
A generic approach to identify dangerous contingencies
by running a full security analysis for a number of
contingencies greater that the number of dangerous ones
but much smaller than the number of potentially
dangerous contingencies.
Why generic? Work whatever the type of security
analysis (e.g., static security, transient stability, voltage
stability).
Come atop of existing security analysis tools and can be
combined with any of them.
4
And no magic is necessary for the approach to work...
5
How does it work:
1. Draw at random a subset of contingencies C.
2. Run a security analysis for every element of C. Add
the dangerous contingencies to the set DC.
3. Use the information collected from the security
analyses to draw a new set C more likely to contain
new dangerous contingencies.
4. If computational resources are exhausted output DC,
else go back to 2.
6
3. Use the information collected from the security analyses to draw a new
set C more likely to contain new dangerous contingencies.
Tools needed:
• A post-processor of the security analysis results to
associate to a contingency a severity index (e.g., amount
of load lost in the post-fault configuration).
• A method to embed the contingency space in a compact
metric space where the severity indices vary in a
“progressive way”.
Solution:
1. Identify among the contingencies already analyzed those
with the highest severity index.
2. Identify among a family of sampling densities over the
compact metric space, the one which is the most likely to
generate the contingencies identified at Step 1.
3. Draw a new set C using the sampling density identified at
Step 2.
7
Illustrative example
Test network:
Set of potentially dangerous contingencies: N-1
contigencies, loss of a transmission element, 634 elements.
Available computational resources: 125 security analyses
(load-flows) can be carried out.
What we want: To identify the 6 contingencies that cause an
overload on a critical transmission line.
8
Tools needed:
• A post-processor of the security analysis results to associate to a
contingency a severity index (e.g., amount of load lost in the post-fault
configuration).
• A method to embed the contingency space in a compact metric space
where the severity indices vary in a “progressive way”.
• Severity index: overload on the critical transmission line.
• Compact metric space: the plane is divided into
surfaces corresponding to the contingencies according to
their location on the geographical map.
9
A typical run of the algorithm with multi-dimensional
Gaussian sampling densities:
Iteration 1 Iteration 2
Iteration 3 Iteration 4
10
Probability of finding at least
n dangerous contingencies.
n Our approach Monte Carlo
1 0.99 0.69
2 0.90 0.31
3 0.76 0.09
4 0.47 0.04
5 0.20 0
6 0.04 0
Comments:
• Results get even better with the decrease of the ratio:
number of dangerous contingencies
number of potentially dangerous contingencies
• Many improvements have already been brought to the
basic version of the approach presented here.
11
Willing to know more...
“Consequence driven decomposition of large-scale power system security
analysis”. F. Fonteneau-Belmudes, D. Ernst, C. Druet, P. Panciatici and L.
Wehenkel. In Proceedings of the 2010 IREP Symposium - Bulk Power
Systems Dynamics and Control - VIII, Buzios, Rio de Janeiro, Brazil, 1-6
August 2010. (8 pages).
“Pseudo-geographical representations of power system buses by
multidimensional scaling”. F. Belmudes, D. Ernst and L. Wehenkel. In
Proceedings of the 15th International Conference on Intelligent System
Applications to Power Systems (ISAP 2009), Curitiba, Brazil, 8-12 November
2009. (6 pages).
“A rare-event approach to build security analysis tools when N − k (k > 1)
analyses are needed (as they are in large-scale power systems)”. F. Belmudes,
D. Ernst and L. Wehenkel. In Proceedings of the 2009 IEEE Bucharest Power
Tech Conference, June 28th-July 2nd, Bucharest, Romania. (8 pages).
“Cross-entropy based rare-event simulation for the identification of dangerous
events in power systems”. F. Belmudes, D. Ernst and L. Wehenkel. In
Proceedings of the 10th International Conference on Probabilistic Methods
Applied to Power Systems (PMAPS-08), pages 1290-1295. Rincon, Puerto
Rico, 25-29 May 2008.
12

More Related Content

Viewers also liked

Architecture to Scale. DONN ROCHETTE at Big Data Spain 2012
Architecture to Scale. DONN ROCHETTE at Big Data Spain 2012Architecture to Scale. DONN ROCHETTE at Big Data Spain 2012
Architecture to Scale. DONN ROCHETTE at Big Data Spain 2012
Big Data Spain
 
Presentation on Big Data Analytics
Presentation on Big Data AnalyticsPresentation on Big Data Analytics
Presentation on Big Data Analytics
S P Sajjan
 
Pill Camera ppt
Pill Camera pptPill Camera ppt
Pill Camera ppt
Avinash Kunapareddy
 
What are the Top Supplements for Seniors?
What are the Top Supplements for Seniors?What are the Top Supplements for Seniors?
What are the Top Supplements for Seniors?
Jaclyn Werner
 
The 33 best gifts for travelers in 2014
The 33 best gifts for travelers in 2014The 33 best gifts for travelers in 2014
The 33 best gifts for travelers in 2014Pieter Prinsloo
 
Integration of renewable energy sources and demand-side management into distr...
Integration of renewable energy sources and demand-side management into distr...Integration of renewable energy sources and demand-side management into distr...
Integration of renewable energy sources and demand-side management into distr...
Université de Liège (ULg)
 
2014 World Auto Forum & Awards
2014 World Auto Forum & Awards2014 World Auto Forum & Awards
2014 World Auto Forum & AwardsPooja Singh
 
Mgw Pitch Deck
Mgw Pitch DeckMgw Pitch Deck
Mgw Pitch Deck
Natalie Kyriacou
 
Quantitative Systems Pharmacology Speaker Pack
Quantitative Systems Pharmacology Speaker PackQuantitative Systems Pharmacology Speaker Pack
Quantitative Systems Pharmacology Speaker Pack
Katerina Josephides
 
Mr John Berrill - Employment, superannuation & insurance issues for people wi...
Mr John Berrill - Employment, superannuation & insurance issues for people wi...Mr John Berrill - Employment, superannuation & insurance issues for people wi...
Mr John Berrill - Employment, superannuation & insurance issues for people wi...
Peer Support Network
 
My Green World Pitch Deck
My Green World Pitch DeckMy Green World Pitch Deck
My Green World Pitch Deck
Natalie Kyriacou
 
Mobile Printing Across Various Industries
Mobile Printing Across Various IndustriesMobile Printing Across Various Industries
Mobile Printing Across Various Industries
ADCBarcode
 
La transition énergétique, l'affaire de tous
La transition énergétique, l'affaire de tousLa transition énergétique, l'affaire de tous
La transition énergétique, l'affaire de tous
Université de Liège (ULg)
 
Batteries and disrupting business models for the energy sector
Batteries and disrupting business models for the energy sectorBatteries and disrupting business models for the energy sector
Batteries and disrupting business models for the energy sector
Université de Liège (ULg)
 

Viewers also liked (16)

Architecture to Scale. DONN ROCHETTE at Big Data Spain 2012
Architecture to Scale. DONN ROCHETTE at Big Data Spain 2012Architecture to Scale. DONN ROCHETTE at Big Data Spain 2012
Architecture to Scale. DONN ROCHETTE at Big Data Spain 2012
 
Presentation on Big Data Analytics
Presentation on Big Data AnalyticsPresentation on Big Data Analytics
Presentation on Big Data Analytics
 
Pill Camera ppt
Pill Camera pptPill Camera ppt
Pill Camera ppt
 
PILL CAMERA
PILL CAMERAPILL CAMERA
PILL CAMERA
 
What are the Top Supplements for Seniors?
What are the Top Supplements for Seniors?What are the Top Supplements for Seniors?
What are the Top Supplements for Seniors?
 
The 33 best gifts for travelers in 2014
The 33 best gifts for travelers in 2014The 33 best gifts for travelers in 2014
The 33 best gifts for travelers in 2014
 
Integration of renewable energy sources and demand-side management into distr...
Integration of renewable energy sources and demand-side management into distr...Integration of renewable energy sources and demand-side management into distr...
Integration of renewable energy sources and demand-side management into distr...
 
2014 World Auto Forum & Awards
2014 World Auto Forum & Awards2014 World Auto Forum & Awards
2014 World Auto Forum & Awards
 
Mgw Pitch Deck
Mgw Pitch DeckMgw Pitch Deck
Mgw Pitch Deck
 
Quantitative Systems Pharmacology Speaker Pack
Quantitative Systems Pharmacology Speaker PackQuantitative Systems Pharmacology Speaker Pack
Quantitative Systems Pharmacology Speaker Pack
 
Mr John Berrill - Employment, superannuation & insurance issues for people wi...
Mr John Berrill - Employment, superannuation & insurance issues for people wi...Mr John Berrill - Employment, superannuation & insurance issues for people wi...
Mr John Berrill - Employment, superannuation & insurance issues for people wi...
 
The Global Grid
The Global GridThe Global Grid
The Global Grid
 
My Green World Pitch Deck
My Green World Pitch DeckMy Green World Pitch Deck
My Green World Pitch Deck
 
Mobile Printing Across Various Industries
Mobile Printing Across Various IndustriesMobile Printing Across Various Industries
Mobile Printing Across Various Industries
 
La transition énergétique, l'affaire de tous
La transition énergétique, l'affaire de tousLa transition énergétique, l'affaire de tous
La transition énergétique, l'affaire de tous
 
Batteries and disrupting business models for the energy sector
Batteries and disrupting business models for the energy sectorBatteries and disrupting business models for the energy sector
Batteries and disrupting business models for the energy sector
 

Similar to Consequence driven decomposition of large-scale power system security analysis

Big Data Framework for Predictive Risk Assessment of Weather Impacts on Elect...
Big Data Framework for Predictive Risk Assessment of Weather Impacts on Elect...Big Data Framework for Predictive Risk Assessment of Weather Impacts on Elect...
Big Data Framework for Predictive Risk Assessment of Weather Impacts on Elect...
Power System Operation
 
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
IEEEGLOBALSOFTSTUDENTPROJECTS
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
Draft comparison of electronic reliability prediction methodologies
Draft comparison of electronic reliability prediction methodologiesDraft comparison of electronic reliability prediction methodologies
Draft comparison of electronic reliability prediction methodologies
Accendo Reliability
 
ICSRS_R038.pptx
ICSRS_R038.pptxICSRS_R038.pptx
ICSRS_R038.pptx
Javier Fernández Muñoz
 
INTELLIGENT MALWARE DETECTION USING EXTREME LEARNING MACHINE
INTELLIGENT MALWARE DETECTION USING EXTREME LEARNING MACHINEINTELLIGENT MALWARE DETECTION USING EXTREME LEARNING MACHINE
INTELLIGENT MALWARE DETECTION USING EXTREME LEARNING MACHINE
IRJET Journal
 
Kost for china-2011
Kost for china-2011Kost for china-2011
Kost for china-2011
Mathmodels Net
 
Applications of Artificial Neural Networks in Cancer Prediction
Applications of Artificial Neural Networks in Cancer PredictionApplications of Artificial Neural Networks in Cancer Prediction
Applications of Artificial Neural Networks in Cancer Prediction
IRJET Journal
 
Lung Cancer Detection Using Convolutional Neural Network
Lung Cancer Detection Using Convolutional Neural NetworkLung Cancer Detection Using Convolutional Neural Network
Lung Cancer Detection Using Convolutional Neural Network
IRJET Journal
 
JPJ1439 On False Data-Injection Attacks against Power System State Estimation...
JPJ1439 On False Data-Injection Attacks against Power System State Estimation...JPJ1439 On False Data-Injection Attacks against Power System State Estimation...
JPJ1439 On False Data-Injection Attacks against Power System State Estimation...
chennaijp
 
Crowd Density Estimation Using Base Line Filtering
Crowd Density Estimation Using Base Line FilteringCrowd Density Estimation Using Base Line Filtering
Crowd Density Estimation Using Base Line Filtering
paperpublications3
 
Management of Power System Dynamic Security
Management of Power System Dynamic Security Management of Power System Dynamic Security
Management of Power System Dynamic Security
Power System Operation
 
AI: Belief Networks
AI: Belief NetworksAI: Belief Networks
AI: Belief Networks
DataminingTools Inc
 
AI: Belief Networks
AI: Belief NetworksAI: Belief Networks
AI: Belief Networks
Datamining Tools
 
On false data injection attacks against power system
On false data injection attacks against power systemOn false data injection attacks against power system
On false data injection attacks against power system
Shakas Technologies
 
Intelligent Wireless Sensor Network Simulation: Flood Use Case
Intelligent Wireless Sensor Network Simulation: Flood Use CaseIntelligent Wireless Sensor Network Simulation: Flood Use Case
Intelligent Wireless Sensor Network Simulation: Flood Use Case
catherine roussey
 
on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...
swathi78
 
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
aciijournal
 
Novel Methodology of Data Management in Ad Hoc Network Formulated using Nanos...
Novel Methodology of Data Management in Ad Hoc Network Formulated using Nanos...Novel Methodology of Data Management in Ad Hoc Network Formulated using Nanos...
Novel Methodology of Data Management in Ad Hoc Network Formulated using Nanos...
Drjabez
 
عرض تقديمي1.pptx
عرض تقديمي1.pptxعرض تقديمي1.pptx
عرض تقديمي1.pptx
ssuserf314411
 

Similar to Consequence driven decomposition of large-scale power system security analysis (20)

Big Data Framework for Predictive Risk Assessment of Weather Impacts on Elect...
Big Data Framework for Predictive Risk Assessment of Weather Impacts on Elect...Big Data Framework for Predictive Risk Assessment of Weather Impacts on Elect...
Big Data Framework for Predictive Risk Assessment of Weather Impacts on Elect...
 
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
 
Draft comparison of electronic reliability prediction methodologies
Draft comparison of electronic reliability prediction methodologiesDraft comparison of electronic reliability prediction methodologies
Draft comparison of electronic reliability prediction methodologies
 
ICSRS_R038.pptx
ICSRS_R038.pptxICSRS_R038.pptx
ICSRS_R038.pptx
 
INTELLIGENT MALWARE DETECTION USING EXTREME LEARNING MACHINE
INTELLIGENT MALWARE DETECTION USING EXTREME LEARNING MACHINEINTELLIGENT MALWARE DETECTION USING EXTREME LEARNING MACHINE
INTELLIGENT MALWARE DETECTION USING EXTREME LEARNING MACHINE
 
Kost for china-2011
Kost for china-2011Kost for china-2011
Kost for china-2011
 
Applications of Artificial Neural Networks in Cancer Prediction
Applications of Artificial Neural Networks in Cancer PredictionApplications of Artificial Neural Networks in Cancer Prediction
Applications of Artificial Neural Networks in Cancer Prediction
 
Lung Cancer Detection Using Convolutional Neural Network
Lung Cancer Detection Using Convolutional Neural NetworkLung Cancer Detection Using Convolutional Neural Network
Lung Cancer Detection Using Convolutional Neural Network
 
JPJ1439 On False Data-Injection Attacks against Power System State Estimation...
JPJ1439 On False Data-Injection Attacks against Power System State Estimation...JPJ1439 On False Data-Injection Attacks against Power System State Estimation...
JPJ1439 On False Data-Injection Attacks against Power System State Estimation...
 
Crowd Density Estimation Using Base Line Filtering
Crowd Density Estimation Using Base Line FilteringCrowd Density Estimation Using Base Line Filtering
Crowd Density Estimation Using Base Line Filtering
 
Management of Power System Dynamic Security
Management of Power System Dynamic Security Management of Power System Dynamic Security
Management of Power System Dynamic Security
 
AI: Belief Networks
AI: Belief NetworksAI: Belief Networks
AI: Belief Networks
 
AI: Belief Networks
AI: Belief NetworksAI: Belief Networks
AI: Belief Networks
 
On false data injection attacks against power system
On false data injection attacks against power systemOn false data injection attacks against power system
On false data injection attacks against power system
 
Intelligent Wireless Sensor Network Simulation: Flood Use Case
Intelligent Wireless Sensor Network Simulation: Flood Use CaseIntelligent Wireless Sensor Network Simulation: Flood Use Case
Intelligent Wireless Sensor Network Simulation: Flood Use Case
 
on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...
 
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
 
Novel Methodology of Data Management in Ad Hoc Network Formulated using Nanos...
Novel Methodology of Data Management in Ad Hoc Network Formulated using Nanos...Novel Methodology of Data Management in Ad Hoc Network Formulated using Nanos...
Novel Methodology of Data Management in Ad Hoc Network Formulated using Nanos...
 
عرض تقديمي1.pptx
عرض تقديمي1.pptxعرض تقديمي1.pptx
عرض تقديمي1.pptx
 

More from Université de Liège (ULg)

Reinforcement learning for electrical markets and the energy transition
Reinforcement learning for electrical markets and the energy transitionReinforcement learning for electrical markets and the energy transition
Reinforcement learning for electrical markets and the energy transition
Université de Liège (ULg)
 
Algorithms for the control and sizing of renewable energy communities
Algorithms for the control and sizing of renewable energy communitiesAlgorithms for the control and sizing of renewable energy communities
Algorithms for the control and sizing of renewable energy communities
Université de Liège (ULg)
 
AI for energy: a bright and uncertain future ahead
AI for energy: a bright and uncertain future aheadAI for energy: a bright and uncertain future ahead
AI for energy: a bright and uncertain future ahead
Université de Liège (ULg)
 
Extreme engineering for fighting climate change and the Katabata project
Extreme engineering for fighting climate change and the Katabata projectExtreme engineering for fighting climate change and the Katabata project
Extreme engineering for fighting climate change and the Katabata project
Université de Liège (ULg)
 
Ex-post allocation of electricity and real-time control strategy for renewabl...
Ex-post allocation of electricity and real-time control strategy for renewabl...Ex-post allocation of electricity and real-time control strategy for renewabl...
Ex-post allocation of electricity and real-time control strategy for renewabl...
Université de Liège (ULg)
 
Big infrastructures for fighting climate change
Big infrastructures for fighting climate changeBig infrastructures for fighting climate change
Big infrastructures for fighting climate change
Université de Liège (ULg)
 
Harvesting wind energy in Greenland: a project for Europe and a huge step tow...
Harvesting wind energy in Greenland: a project for Europe and a huge step tow...Harvesting wind energy in Greenland: a project for Europe and a huge step tow...
Harvesting wind energy in Greenland: a project for Europe and a huge step tow...
Université de Liège (ULg)
 
Décret favorisant le développement des communautés d’énergie renouvelable
Décret favorisant le développement des communautés d’énergie renouvelableDécret favorisant le développement des communautés d’énergie renouvelable
Décret favorisant le développement des communautés d’énergie renouvelable
Université de Liège (ULg)
 
Harnessing the Potential of Power-to-Gas Technologies. Insights from a prelim...
Harnessing the Potential of Power-to-Gas Technologies. Insights from a prelim...Harnessing the Potential of Power-to-Gas Technologies. Insights from a prelim...
Harnessing the Potential of Power-to-Gas Technologies. Insights from a prelim...
Université de Liège (ULg)
 
Reinforcement learning, energy systems and deep neural nets
Reinforcement learning, energy systems and deep neural nets Reinforcement learning, energy systems and deep neural nets
Reinforcement learning, energy systems and deep neural nets
Université de Liège (ULg)
 
Soirée des Grands Prix SEE - A glimpse at the research work of the laureate o...
Soirée des Grands Prix SEE - A glimpse at the research work of the laureate o...Soirée des Grands Prix SEE - A glimpse at the research work of the laureate o...
Soirée des Grands Prix SEE - A glimpse at the research work of the laureate o...
Université de Liège (ULg)
 
Reinforcement learning for data-driven optimisation
Reinforcement learning for data-driven optimisationReinforcement learning for data-driven optimisation
Reinforcement learning for data-driven optimisation
Université de Liège (ULg)
 
Electricity retailing in Europe: remarkable events (with a special focus on B...
Electricity retailing in Europe: remarkable events (with a special focus on B...Electricity retailing in Europe: remarkable events (with a special focus on B...
Electricity retailing in Europe: remarkable events (with a special focus on B...
Université de Liège (ULg)
 
Projet de décret « GRD »: quelques remarques du Prof. Damien ERNST
Projet de décret « GRD »: quelques remarques du Prof. Damien ERNSTProjet de décret « GRD »: quelques remarques du Prof. Damien ERNST
Projet de décret « GRD »: quelques remarques du Prof. Damien ERNST
Université de Liège (ULg)
 
Belgian offshore wind potential
Belgian offshore wind potentialBelgian offshore wind potential
Belgian offshore wind potential
Université de Liège (ULg)
 
Time to make a choice between a fully liberal or fully regulated model for th...
Time to make a choice between a fully liberal or fully regulated model for th...Time to make a choice between a fully liberal or fully regulated model for th...
Time to make a choice between a fully liberal or fully regulated model for th...
Université de Liège (ULg)
 
Electrification and the Democratic Republic of the Congo
Electrification and the Democratic Republic of the CongoElectrification and the Democratic Republic of the Congo
Electrification and the Democratic Republic of the Congo
Université de Liège (ULg)
 
Energy: the clash of nations
Energy: the clash of nationsEnergy: the clash of nations
Energy: the clash of nations
Université de Liège (ULg)
 
Smart Grids Versus Microgrids
Smart Grids Versus MicrogridsSmart Grids Versus Microgrids
Smart Grids Versus Microgrids
Université de Liège (ULg)
 
Uber-like Models for the Electrical Industry
Uber-like Models for the Electrical IndustryUber-like Models for the Electrical Industry
Uber-like Models for the Electrical Industry
Université de Liège (ULg)
 

More from Université de Liège (ULg) (20)

Reinforcement learning for electrical markets and the energy transition
Reinforcement learning for electrical markets and the energy transitionReinforcement learning for electrical markets and the energy transition
Reinforcement learning for electrical markets and the energy transition
 
Algorithms for the control and sizing of renewable energy communities
Algorithms for the control and sizing of renewable energy communitiesAlgorithms for the control and sizing of renewable energy communities
Algorithms for the control and sizing of renewable energy communities
 
AI for energy: a bright and uncertain future ahead
AI for energy: a bright and uncertain future aheadAI for energy: a bright and uncertain future ahead
AI for energy: a bright and uncertain future ahead
 
Extreme engineering for fighting climate change and the Katabata project
Extreme engineering for fighting climate change and the Katabata projectExtreme engineering for fighting climate change and the Katabata project
Extreme engineering for fighting climate change and the Katabata project
 
Ex-post allocation of electricity and real-time control strategy for renewabl...
Ex-post allocation of electricity and real-time control strategy for renewabl...Ex-post allocation of electricity and real-time control strategy for renewabl...
Ex-post allocation of electricity and real-time control strategy for renewabl...
 
Big infrastructures for fighting climate change
Big infrastructures for fighting climate changeBig infrastructures for fighting climate change
Big infrastructures for fighting climate change
 
Harvesting wind energy in Greenland: a project for Europe and a huge step tow...
Harvesting wind energy in Greenland: a project for Europe and a huge step tow...Harvesting wind energy in Greenland: a project for Europe and a huge step tow...
Harvesting wind energy in Greenland: a project for Europe and a huge step tow...
 
Décret favorisant le développement des communautés d’énergie renouvelable
Décret favorisant le développement des communautés d’énergie renouvelableDécret favorisant le développement des communautés d’énergie renouvelable
Décret favorisant le développement des communautés d’énergie renouvelable
 
Harnessing the Potential of Power-to-Gas Technologies. Insights from a prelim...
Harnessing the Potential of Power-to-Gas Technologies. Insights from a prelim...Harnessing the Potential of Power-to-Gas Technologies. Insights from a prelim...
Harnessing the Potential of Power-to-Gas Technologies. Insights from a prelim...
 
Reinforcement learning, energy systems and deep neural nets
Reinforcement learning, energy systems and deep neural nets Reinforcement learning, energy systems and deep neural nets
Reinforcement learning, energy systems and deep neural nets
 
Soirée des Grands Prix SEE - A glimpse at the research work of the laureate o...
Soirée des Grands Prix SEE - A glimpse at the research work of the laureate o...Soirée des Grands Prix SEE - A glimpse at the research work of the laureate o...
Soirée des Grands Prix SEE - A glimpse at the research work of the laureate o...
 
Reinforcement learning for data-driven optimisation
Reinforcement learning for data-driven optimisationReinforcement learning for data-driven optimisation
Reinforcement learning for data-driven optimisation
 
Electricity retailing in Europe: remarkable events (with a special focus on B...
Electricity retailing in Europe: remarkable events (with a special focus on B...Electricity retailing in Europe: remarkable events (with a special focus on B...
Electricity retailing in Europe: remarkable events (with a special focus on B...
 
Projet de décret « GRD »: quelques remarques du Prof. Damien ERNST
Projet de décret « GRD »: quelques remarques du Prof. Damien ERNSTProjet de décret « GRD »: quelques remarques du Prof. Damien ERNST
Projet de décret « GRD »: quelques remarques du Prof. Damien ERNST
 
Belgian offshore wind potential
Belgian offshore wind potentialBelgian offshore wind potential
Belgian offshore wind potential
 
Time to make a choice between a fully liberal or fully regulated model for th...
Time to make a choice between a fully liberal or fully regulated model for th...Time to make a choice between a fully liberal or fully regulated model for th...
Time to make a choice between a fully liberal or fully regulated model for th...
 
Electrification and the Democratic Republic of the Congo
Electrification and the Democratic Republic of the CongoElectrification and the Democratic Republic of the Congo
Electrification and the Democratic Republic of the Congo
 
Energy: the clash of nations
Energy: the clash of nationsEnergy: the clash of nations
Energy: the clash of nations
 
Smart Grids Versus Microgrids
Smart Grids Versus MicrogridsSmart Grids Versus Microgrids
Smart Grids Versus Microgrids
 
Uber-like Models for the Electrical Industry
Uber-like Models for the Electrical IndustryUber-like Models for the Electrical Industry
Uber-like Models for the Electrical Industry
 

Recently uploaded

block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
MuhammadTufail242431
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DuvanRamosGarzon1
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
Kamal Acharya
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
Kamal Acharya
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 

Recently uploaded (20)

block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 

Consequence driven decomposition of large-scale power system security analysis

  • 1. Consequence driven decomposition of large-scale power system security analysis Florence Fonteneau-Belmudes∗, Damien Ernst∗, Christophe Druet†, Patrick Panciatici‡, Louis Wehenkel∗ *University of Li`ege, Belgium - † ELIA (Belgian TSO) - ‡ RTE (French TSO) 2010 IREP Symposium, Buzios, Rio de Janeiro, Brazil, 1-6 August 2010
  • 2. Power system security assessment Power system security assessment = Identifying contingencies/scenarios that could lead to unacceptable operating conditions (dangerous contingencies) if no preventive actions were taken. Problem may be approximated by running a security analysis for every element of a set of potentially dangerous contingencies.
  • 3. Size of this set of potentially dangerous contingencies: • grows with the size of the power system • grows with increasing uncertainties about the future power injection patterns, load patterns and system topologies. Question: What should you do when the size of the set becomes so large that you cannot screen every contingency one by one? 2
  • 4. Traditional solutions: • Increase the computational resources (note that the security analysis task can be easily parallelized). • Use filtering techniques (= simplified conservative analysis techniques) to identify a subset of contingencies on which the full security analysis is carried out. Shortcomings: • Do not work in case of very large number of contingencies (say for example 1010). • Reliable and efficient filtering techniques are difficult to develop. 3
  • 5. Our solution A generic approach to identify dangerous contingencies by running a full security analysis for a number of contingencies greater that the number of dangerous ones but much smaller than the number of potentially dangerous contingencies. Why generic? Work whatever the type of security analysis (e.g., static security, transient stability, voltage stability). Come atop of existing security analysis tools and can be combined with any of them. 4
  • 6. And no magic is necessary for the approach to work... 5
  • 7. How does it work: 1. Draw at random a subset of contingencies C. 2. Run a security analysis for every element of C. Add the dangerous contingencies to the set DC. 3. Use the information collected from the security analyses to draw a new set C more likely to contain new dangerous contingencies. 4. If computational resources are exhausted output DC, else go back to 2. 6
  • 8. 3. Use the information collected from the security analyses to draw a new set C more likely to contain new dangerous contingencies. Tools needed: • A post-processor of the security analysis results to associate to a contingency a severity index (e.g., amount of load lost in the post-fault configuration). • A method to embed the contingency space in a compact metric space where the severity indices vary in a “progressive way”. Solution: 1. Identify among the contingencies already analyzed those with the highest severity index. 2. Identify among a family of sampling densities over the compact metric space, the one which is the most likely to generate the contingencies identified at Step 1. 3. Draw a new set C using the sampling density identified at Step 2. 7
  • 9. Illustrative example Test network: Set of potentially dangerous contingencies: N-1 contigencies, loss of a transmission element, 634 elements. Available computational resources: 125 security analyses (load-flows) can be carried out. What we want: To identify the 6 contingencies that cause an overload on a critical transmission line. 8
  • 10. Tools needed: • A post-processor of the security analysis results to associate to a contingency a severity index (e.g., amount of load lost in the post-fault configuration). • A method to embed the contingency space in a compact metric space where the severity indices vary in a “progressive way”. • Severity index: overload on the critical transmission line. • Compact metric space: the plane is divided into surfaces corresponding to the contingencies according to their location on the geographical map. 9
  • 11. A typical run of the algorithm with multi-dimensional Gaussian sampling densities: Iteration 1 Iteration 2 Iteration 3 Iteration 4 10
  • 12. Probability of finding at least n dangerous contingencies. n Our approach Monte Carlo 1 0.99 0.69 2 0.90 0.31 3 0.76 0.09 4 0.47 0.04 5 0.20 0 6 0.04 0 Comments: • Results get even better with the decrease of the ratio: number of dangerous contingencies number of potentially dangerous contingencies • Many improvements have already been brought to the basic version of the approach presented here. 11
  • 13. Willing to know more... “Consequence driven decomposition of large-scale power system security analysis”. F. Fonteneau-Belmudes, D. Ernst, C. Druet, P. Panciatici and L. Wehenkel. In Proceedings of the 2010 IREP Symposium - Bulk Power Systems Dynamics and Control - VIII, Buzios, Rio de Janeiro, Brazil, 1-6 August 2010. (8 pages). “Pseudo-geographical representations of power system buses by multidimensional scaling”. F. Belmudes, D. Ernst and L. Wehenkel. In Proceedings of the 15th International Conference on Intelligent System Applications to Power Systems (ISAP 2009), Curitiba, Brazil, 8-12 November 2009. (6 pages). “A rare-event approach to build security analysis tools when N − k (k > 1) analyses are needed (as they are in large-scale power systems)”. F. Belmudes, D. Ernst and L. Wehenkel. In Proceedings of the 2009 IEEE Bucharest Power Tech Conference, June 28th-July 2nd, Bucharest, Romania. (8 pages). “Cross-entropy based rare-event simulation for the identification of dangerous events in power systems”. F. Belmudes, D. Ernst and L. Wehenkel. In Proceedings of the 10th International Conference on Probabilistic Methods Applied to Power Systems (PMAPS-08), pages 1290-1295. Rincon, Puerto Rico, 25-29 May 2008. 12