SlideShare a Scribd company logo
University of technical education HCMC
                         Faculty of Electrical and Electronics
                                       Engineering


                                Power System Optimization
www.hcmute.edu.vn
                    Chapter 9




     STEADY-STATE
   SECURITY REGIONS


  Nguyễn Anh Toàn
FEEE
                                              University of technical education HCMC
                                            POWER SYSTEM OPTIMIZATION
                                           Faculty of Electrical and Electronics Engineering
          Ensuring Enhanced Education
          Group No 5
www.hcmute.edu.vn/feee/                 Chapter 9: STEADY-STATE SECURITY REGIONS

1. Introduction
                              Objectives



2.Model           Presenting the concept and definition of security
                  region
3. Numerical Example




                  Explaint various methods to contruct steady state
4. Appendix
                  security regions of power system

5. Conclusion
FEEE
                                                  University of technical education HCMC
                                                POWER SYSTEM OPTIMIZATION
                                               Faculty of Electrical and Electronics Engineering
           Ensuring Enhanced Education
          Group No 5
www.hcmute.edu.vn/feee/                     Chapter 9: STEADY-STATE SECURITY REGIONS

1. Introduction
        Agenda

       1                      Introduction

2.Model
      2                            Model


       3                Numerical Example
3. Numerical Example

       4                        Appendix

       5
4. Appendix
                               Conclusion




5. Conclusion
FEEE
                                                     University of technical education HCMC
                                                   POWER SYSTEM OPTIMIZATION
                                                  Faculty of Electrical and Electronics Engineering
          Ensuring Enhanced Education
          Group No 5
www.hcmute.edu.vn/feee/                      Chapter 9: STEADY-STATE SECURITY REGIONS

1. Introduction                   Introduction


                               Used to find the best or optimal solution
2.Model
                               Requires that all the mathematical functions
                               in the model be linear functions.
3. Numerical Example
                               The linear model consists of the following
                               components:

4. Appendix                             • A set of decision variables.
                                        • An objective function.

5. Conclusion                           • A set of constraints.
FEEE
                                                                            University of technical education HCMC
                                                                       POWER SYSTEM OPTIMIZATION
                                                                      Faculty of Electrical and Electronics Engineering
          Ensuring Enhanced Education
          Group No 5
www.hcmute.edu.vn/feee/                                        Chapter 9: STEADY-STATE SECURITY REGIONS

1. Introduction                        Models

                                                                                      Objective Function:
                                                                                            n 1
                                                                                                          M                   m
2.Model                                                                    MaxZ                    Wi ( PGi                 PGi )                 (9.72)
                                                                                          i nd 1

                                                                              Subject to constrains
3. Numerical Example
                                                                                                            n 1
                                  M            m
                            (P   Gi       P ) Gi        ( PGi max     PGi min )        (9.90)     ij min            ( Aik    Ajk ) PGk   ij max     (9.95)
                                                                                                           i nd 1
                                           m
                             PGi         PGi         PGi min        i=n d +1,..,n-1    (9.91)               m
                                                                                                          PGk when Aik -A jk 0
                             PGi          M
                                        PGi          PGi max        i=n d +1,..,n-1    (9.92)       PGk ={ M                   (9.96)
4. Appendix                                                                                               PGk when Aik -A jk 0
                                 nd            n 1
                                                         M
                             (         Pi -            PGi )=PGnm                      (9.93)     PM
                                                                                                   G         P0 +
                                                                                                             G               P0
                                                                                                                             G                      (9.97)
                                 i 1          i nd 1
                                  nd            n 1
                                                          m                                         Pm
                                                                                                     G        P0 +
                                                                                                              G              P0
                                                                                                                             G                      (9.98)
                             (         Pi -            P )=PGnM
                                                         Gi                            (9.94)
                                 i 1          i nd 1
5. Conclusion
FEEE
                                                   University of technical education HCMC
                                                 POWER SYSTEM OPTIMIZATION
                                                Faculty of Electrical and Electronics Engineering
          Ensuring Enhanced Education
          Group No 5
www.hcmute.edu.vn/feee/                      Chapter 9: STEADY-STATE SECURITY REGIONS

1. Introduction                   Models

                                        X2
                         1000                                   Let’s take a closer look at
2.Model                                                              the optimal point
                           800                                             Infeasible

3. Numerical Example       600



4. Appendix
                                             Feasible
                                             Feasible
                                             region
                                             region
                                                                                                X1
5. Conclusion
                                                    400     600      800
FEEE
                                                   University of technical education HCMC
                                              POWER SYSTEM OPTIMIZATION
                                             Faculty of Electrical and Electronics Engineering
          Ensuring Enhanced Education
          Group No 5
www.hcmute.edu.vn/feee/                  Chapter 9: STEADY-STATE SECURITY REGIONS

1. Introduction                   Numerical Examples


                               To assess or compare the size of Ωp for
2.Model                        different means, the following performance
                               index is introduced:
                                                        n 1
                                                               (PM
                                                                 Gi     Pm )
                                                                         Gi
                                                    i nd 1
3. Numerical Example                       PI=     n 1
                                                                                            (9.99)
                                                          ( P max
                                                             Gi         P min )
                                                                         Gi
                                                 i nd 1



4. Appendix
                                 or
                                                    M           m
                                                  PGi         PGi
                                          PI=                         i=n d +1,.....,n-1 (9.100)
                                                PGi max       PGi min

5. Conclusion
FEEE
                                                            University of technical education HCMC
                                                      POWER SYSTEM OPTIMIZATION
                                                     Faculty of Electrical and Electronics Engineering
          Ensuring Enhanced Education
          Group No 5
www.hcmute.edu.vn/feee/                       Chapter 9: STEADY-STATE SECURITY REGIONS

1. Introduction                   Numerical Examples


                             Table 9.14 Comparison of security region results for IEEE 6-bus system.

2.Model
                                                 Security         Generator   Generator     Total
                                 Method
                                                 regions            PG4         PG5         PI%

                                                      PM
                                                       Gi           4.200        2.200
3. Numerical Example                                    m
                                                      PGi
                                Method 1                            0.184        1.378       71%
                                                     PI i %         96%          31%
                                                      PM
                                                       Gi           3.750        2.649
4. Appendix                                             m
                                Method 2              PGi           2,449        1.400       37%
                                                     PI i %         31%          47%
                                Method 1: optimization method.
5. Conclusion                   Method 2: the expanding method.
FEEE
                                                          University of technical education HCMC
                                                        POWER SYSTEM OPTIMIZATION
                                                       Faculty of Electrical and Electronics Engineering
          Ensuring Enhanced Education
          Group No 5
www.hcmute.edu.vn/feee/                       Chapter 9: STEADY-STATE SECURITY REGIONS

1. Introduction                   Numerical Examples
                               Table 9.15 Comparison of security region results for IEEE 30-bus system
                                                                                    Gen     Gen
                                            Security       Gen     Gen     Gen                     Total
                                method                                              PG      PG
                                            regions        PG2     PG5     PG8                     PI%
2.Model                                                                              11     13
                                               PM
                                                Gi        0.800   0.500    0.350   0.300   0.384

                                Method            m
                                                PGi       0.439   0.150    0.100   0.100   0.120    85%
                                  1
3. Numerical Example
                                              PI i %       80%    100%     100%    100%     94%

                                               PM
                                                Gi        0.712   0.402    0.350   0.300   0.400
4. Appendix
                                Method            m
                                                PGi       0.428   0.150    0.148   0.100   0.177    70%
                                  2

                                              PI i %       47%     72%     81%     100%     80%

5. Conclusion                   Method 1: optimization method.
                                Method 2: the expanding method.
FEEE
                                                      University of technical education HCMC
                                                   POWER SYSTEM OPTIMIZATION
                                                  Faculty of Electrical and Electronics Engineering
          Ensuring Enhanced Education
          Group No 5
www.hcmute.edu.vn/feee/                        Chapter 9: STEADY-STATE SECURITY REGIONS

1. Introduction                   Numerical Examples




2.Model                            Table 9.16 Results for security regions on IEEE 6-bus system (p.u.)



                                                   Security
                                         -cut                     PG4          PG5           PG6
                                                   regions
                                                        M
3. Numerical Example                                  PGi        4.200        2.2240        3.8990
                                          1
                                                      P m
                                                       Gi        0.1840       1.3700        0.0000
                                                        M
                                                      PGi        4.0050       202245        4.5480
                                         0.6            m
                                                      PGi        0.1701       1.1500        0.0000
                                                        m
                                                      PGi        4.0050       2.2245        4.7100
                                         0.5            m
                                                      PGi
4. Appendix                                                      0.1620       1.0693        0.0000
                                                        M
                                                      PGi        3.9755       2.4245        5.1849
                                          0             m
                                                      PGi        0.1215        1.000        0.0000



5. Conclusion
FEEE
                                                 University of technical education HCMC
                                               POWER SYSTEM OPTIMIZATION
                                              Faculty of Electrical and Electronics Engineering
          Ensuring Enhanced Education
          Group No 5
www.hcmute.edu.vn/feee/                   Chapter 9: STEADY-STATE SECURITY REGIONS

1. Introduction                   Appendix

                               Standard Form of LP
2.Model
                              Max/min            z = c1x1 + c2x2 + ... + cnxn
                              subject to:
                                               a11x1 + a12x2 + ... + a1nxn (≤, =, ≥) b1
3. Numerical Example                           a21x1 + a22x2 + ... + a2nxn (≤, =, ≥) b2
                                                       :
                                               am1x1 + am2x2 + ... + amnxn (≤, =, ≥) bm
4. Appendix
                                   xj = decision variables
                                   bi = constraint levels
                                   cj = objective function coefficients
5. Conclusion                      aij = constraint coefficients
FEEE
                                                      University of technical education HCMC
                                                   POWER SYSTEM OPTIMIZATION
                                                  Faculty of Electrical and Electronics Engineering
          Ensuring Enhanced Education
          Group No 5
www.hcmute.edu.vn/feee/                    Chapter 9: STEADY-STATE SECURITY REGIONS

1. Introduction                   Infeasibility


                                                   No point, simultaneously,
2.Model                                            lies both above line 1 and
                                                   below lines 2 and 3.

3. Numerical Example


                              2
4. Appendix




5. Conclusion                                                            1
                                                  3
FEEE
                                                University of technical education HCMC
                                              POWER SYSTEM OPTIMIZATION
                                             Faculty of Electrical and Electronics Engineering
          Ensuring Enhanced Education
          Group No 5
www.hcmute.edu.vn/feee/                  Chapter 9: STEADY-STATE SECURITY REGIONS

1. Introduction                   Unbounded solution




2.Model




3. Numerical Example




4. Appendix




5. Conclusion
FEEE
                                                    University of technical education HCMC
                                                  POWER SYSTEM OPTIMIZATION
                                                 Faculty of Electrical and Electronics Engineering
          Ensuring Enhanced Education
          Group No 5
www.hcmute.edu.vn/feee/                   Chapter 9: STEADY-STATE SECURITY REGIONS

1. Introduction                   Unbounded solution



                                                          Primal              Dual
2.Model                            Objective              max cTx             min bTy
                                   Variables              x1, …, xn           y1,…, ym
                                   Constraint matrix      A                   AT
3. Numerical Example               Right-hand vector b                        c
                                   Constraints            ith constraint: ·   yi ¸ 0
                                   versus                 ith constraint: ¸   yi · 0
                                   Variables              ith constraint: =   yi unrestricted
4. Appendix
                                                                                         ,
                                                          xj ¸ 0              jth constraint: ¸
                                                          xj · 0              jth constraint: ·
                                                          xj unrestricted     jth constraint: =
5. Conclusion
FEEE
                                              University of technical education HCMC
                                            POWER SYSTEM OPTIMIZATION
                                           Faculty of Electrical and Electronics Engineering
          Ensuring Enhanced Education
          Group No 5
www.hcmute.edu.vn/feee/                 Chapter 9: STEADY-STATE SECURITY REGIONS

1. Introduction




2.Model




3. Numerical Example




4. Appendix
                                                              GROUP 5


5. Conclusion

More Related Content

More from spk53

quản trị bán hàng
quản trị bán hàngquản trị bán hàng
quản trị bán hàngspk53
 
quản trị thương hiệu
quản trị thương hiệuquản trị thương hiệu
quản trị thương hiệuspk53
 
chuyen de nang cao
chuyen de nang caochuyen de nang cao
chuyen de nang caospk53
 
đánh giá độ tin cậy
đánh giá độ tin cậyđánh giá độ tin cậy
đánh giá độ tin cậyspk53
 
Chương trình hội nhập nhân viên mới
Chương trình hội nhập nhân viên mớiChương trình hội nhập nhân viên mới
Chương trình hội nhập nhân viên mới
spk53
 
Toan 2222
Toan 2222Toan 2222
Toan 2222spk53
 

More from spk53 (6)

quản trị bán hàng
quản trị bán hàngquản trị bán hàng
quản trị bán hàng
 
quản trị thương hiệu
quản trị thương hiệuquản trị thương hiệu
quản trị thương hiệu
 
chuyen de nang cao
chuyen de nang caochuyen de nang cao
chuyen de nang cao
 
đánh giá độ tin cậy
đánh giá độ tin cậyđánh giá độ tin cậy
đánh giá độ tin cậy
 
Chương trình hội nhập nhân viên mới
Chương trình hội nhập nhân viên mớiChương trình hội nhập nhân viên mới
Chương trình hội nhập nhân viên mới
 
Toan 2222
Toan 2222Toan 2222
Toan 2222
 

Recently uploaded

Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Landownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptxLandownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptx
JezreelCabil2
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
ArianaBusciglio
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
NelTorrente
 

Recently uploaded (20)

Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Landownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptxLandownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptx
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
 

tối ưu hóa trong hệ thống điện

  • 1. University of technical education HCMC Faculty of Electrical and Electronics Engineering Power System Optimization www.hcmute.edu.vn Chapter 9 STEADY-STATE SECURITY REGIONS Nguyễn Anh Toàn
  • 2. FEEE University of technical education HCMC POWER SYSTEM OPTIMIZATION Faculty of Electrical and Electronics Engineering Ensuring Enhanced Education Group No 5 www.hcmute.edu.vn/feee/ Chapter 9: STEADY-STATE SECURITY REGIONS 1. Introduction Objectives 2.Model Presenting the concept and definition of security region 3. Numerical Example Explaint various methods to contruct steady state 4. Appendix security regions of power system 5. Conclusion
  • 3. FEEE University of technical education HCMC POWER SYSTEM OPTIMIZATION Faculty of Electrical and Electronics Engineering Ensuring Enhanced Education Group No 5 www.hcmute.edu.vn/feee/ Chapter 9: STEADY-STATE SECURITY REGIONS 1. Introduction Agenda 1 Introduction 2.Model 2 Model 3 Numerical Example 3. Numerical Example 4 Appendix 5 4. Appendix Conclusion 5. Conclusion
  • 4. FEEE University of technical education HCMC POWER SYSTEM OPTIMIZATION Faculty of Electrical and Electronics Engineering Ensuring Enhanced Education Group No 5 www.hcmute.edu.vn/feee/ Chapter 9: STEADY-STATE SECURITY REGIONS 1. Introduction Introduction Used to find the best or optimal solution 2.Model Requires that all the mathematical functions in the model be linear functions. 3. Numerical Example The linear model consists of the following components: 4. Appendix • A set of decision variables. • An objective function. 5. Conclusion • A set of constraints.
  • 5. FEEE University of technical education HCMC POWER SYSTEM OPTIMIZATION Faculty of Electrical and Electronics Engineering Ensuring Enhanced Education Group No 5 www.hcmute.edu.vn/feee/ Chapter 9: STEADY-STATE SECURITY REGIONS 1. Introduction Models Objective Function: n 1 M m 2.Model MaxZ Wi ( PGi PGi ) (9.72) i nd 1 Subject to constrains 3. Numerical Example n 1 M m (P Gi P ) Gi ( PGi max PGi min ) (9.90) ij min ( Aik Ajk ) PGk ij max (9.95) i nd 1 m PGi PGi PGi min i=n d +1,..,n-1 (9.91) m PGk when Aik -A jk 0 PGi M PGi PGi max i=n d +1,..,n-1 (9.92) PGk ={ M (9.96) 4. Appendix PGk when Aik -A jk 0 nd n 1 M ( Pi - PGi )=PGnm (9.93) PM G P0 + G P0 G (9.97) i 1 i nd 1 nd n 1 m Pm G P0 + G P0 G (9.98) ( Pi - P )=PGnM Gi (9.94) i 1 i nd 1 5. Conclusion
  • 6. FEEE University of technical education HCMC POWER SYSTEM OPTIMIZATION Faculty of Electrical and Electronics Engineering Ensuring Enhanced Education Group No 5 www.hcmute.edu.vn/feee/ Chapter 9: STEADY-STATE SECURITY REGIONS 1. Introduction Models X2 1000 Let’s take a closer look at 2.Model the optimal point 800 Infeasible 3. Numerical Example 600 4. Appendix Feasible Feasible region region X1 5. Conclusion 400 600 800
  • 7. FEEE University of technical education HCMC POWER SYSTEM OPTIMIZATION Faculty of Electrical and Electronics Engineering Ensuring Enhanced Education Group No 5 www.hcmute.edu.vn/feee/ Chapter 9: STEADY-STATE SECURITY REGIONS 1. Introduction Numerical Examples To assess or compare the size of Ωp for 2.Model different means, the following performance index is introduced: n 1 (PM Gi Pm ) Gi i nd 1 3. Numerical Example PI= n 1 (9.99) ( P max Gi P min ) Gi i nd 1 4. Appendix or M m PGi PGi PI= i=n d +1,.....,n-1 (9.100) PGi max PGi min 5. Conclusion
  • 8. FEEE University of technical education HCMC POWER SYSTEM OPTIMIZATION Faculty of Electrical and Electronics Engineering Ensuring Enhanced Education Group No 5 www.hcmute.edu.vn/feee/ Chapter 9: STEADY-STATE SECURITY REGIONS 1. Introduction Numerical Examples Table 9.14 Comparison of security region results for IEEE 6-bus system. 2.Model Security Generator Generator Total Method regions PG4 PG5 PI% PM Gi 4.200 2.200 3. Numerical Example m PGi Method 1 0.184 1.378 71% PI i % 96% 31% PM Gi 3.750 2.649 4. Appendix m Method 2 PGi 2,449 1.400 37% PI i % 31% 47% Method 1: optimization method. 5. Conclusion Method 2: the expanding method.
  • 9. FEEE University of technical education HCMC POWER SYSTEM OPTIMIZATION Faculty of Electrical and Electronics Engineering Ensuring Enhanced Education Group No 5 www.hcmute.edu.vn/feee/ Chapter 9: STEADY-STATE SECURITY REGIONS 1. Introduction Numerical Examples Table 9.15 Comparison of security region results for IEEE 30-bus system Gen Gen Security Gen Gen Gen Total method PG PG regions PG2 PG5 PG8 PI% 2.Model 11 13 PM Gi 0.800 0.500 0.350 0.300 0.384 Method m PGi 0.439 0.150 0.100 0.100 0.120 85% 1 3. Numerical Example PI i % 80% 100% 100% 100% 94% PM Gi 0.712 0.402 0.350 0.300 0.400 4. Appendix Method m PGi 0.428 0.150 0.148 0.100 0.177 70% 2 PI i % 47% 72% 81% 100% 80% 5. Conclusion Method 1: optimization method. Method 2: the expanding method.
  • 10. FEEE University of technical education HCMC POWER SYSTEM OPTIMIZATION Faculty of Electrical and Electronics Engineering Ensuring Enhanced Education Group No 5 www.hcmute.edu.vn/feee/ Chapter 9: STEADY-STATE SECURITY REGIONS 1. Introduction Numerical Examples 2.Model Table 9.16 Results for security regions on IEEE 6-bus system (p.u.) Security -cut PG4 PG5 PG6 regions M 3. Numerical Example PGi 4.200 2.2240 3.8990 1 P m Gi 0.1840 1.3700 0.0000 M PGi 4.0050 202245 4.5480 0.6 m PGi 0.1701 1.1500 0.0000 m PGi 4.0050 2.2245 4.7100 0.5 m PGi 4. Appendix 0.1620 1.0693 0.0000 M PGi 3.9755 2.4245 5.1849 0 m PGi 0.1215 1.000 0.0000 5. Conclusion
  • 11. FEEE University of technical education HCMC POWER SYSTEM OPTIMIZATION Faculty of Electrical and Electronics Engineering Ensuring Enhanced Education Group No 5 www.hcmute.edu.vn/feee/ Chapter 9: STEADY-STATE SECURITY REGIONS 1. Introduction Appendix Standard Form of LP 2.Model Max/min z = c1x1 + c2x2 + ... + cnxn subject to: a11x1 + a12x2 + ... + a1nxn (≤, =, ≥) b1 3. Numerical Example a21x1 + a22x2 + ... + a2nxn (≤, =, ≥) b2 : am1x1 + am2x2 + ... + amnxn (≤, =, ≥) bm 4. Appendix xj = decision variables bi = constraint levels cj = objective function coefficients 5. Conclusion aij = constraint coefficients
  • 12. FEEE University of technical education HCMC POWER SYSTEM OPTIMIZATION Faculty of Electrical and Electronics Engineering Ensuring Enhanced Education Group No 5 www.hcmute.edu.vn/feee/ Chapter 9: STEADY-STATE SECURITY REGIONS 1. Introduction Infeasibility No point, simultaneously, 2.Model lies both above line 1 and below lines 2 and 3. 3. Numerical Example 2 4. Appendix 5. Conclusion 1 3
  • 13. FEEE University of technical education HCMC POWER SYSTEM OPTIMIZATION Faculty of Electrical and Electronics Engineering Ensuring Enhanced Education Group No 5 www.hcmute.edu.vn/feee/ Chapter 9: STEADY-STATE SECURITY REGIONS 1. Introduction Unbounded solution 2.Model 3. Numerical Example 4. Appendix 5. Conclusion
  • 14. FEEE University of technical education HCMC POWER SYSTEM OPTIMIZATION Faculty of Electrical and Electronics Engineering Ensuring Enhanced Education Group No 5 www.hcmute.edu.vn/feee/ Chapter 9: STEADY-STATE SECURITY REGIONS 1. Introduction Unbounded solution Primal Dual 2.Model Objective max cTx min bTy Variables x1, …, xn y1,…, ym Constraint matrix A AT 3. Numerical Example Right-hand vector b c Constraints ith constraint: · yi ¸ 0 versus ith constraint: ¸ yi · 0 Variables ith constraint: = yi unrestricted 4. Appendix , xj ¸ 0 jth constraint: ¸ xj · 0 jth constraint: · xj unrestricted jth constraint: = 5. Conclusion
  • 15. FEEE University of technical education HCMC POWER SYSTEM OPTIMIZATION Faculty of Electrical and Electronics Engineering Ensuring Enhanced Education Group No 5 www.hcmute.edu.vn/feee/ Chapter 9: STEADY-STATE SECURITY REGIONS 1. Introduction 2.Model 3. Numerical Example 4. Appendix GROUP 5 5. Conclusion

Editor's Notes

  1. Nội dung trình bày: