SlideShare a Scribd company logo
1 of 15
University of technical education HCMC
                         Faculty of Electrical and Electronics
                                       Engineering


                                Power System Optimization
www.hcmute.edu.vn
                    Chapter 9




     STEADY-STATE
   SECURITY REGIONS


  Nguyễn Anh Toàn
FEEE
                                              University of technical education HCMC
                                            POWER SYSTEM OPTIMIZATION
                                           Faculty of Electrical and Electronics Engineering
          Ensuring Enhanced Education
          Group No 5
www.hcmute.edu.vn/feee/                 Chapter 9: STEADY-STATE SECURITY REGIONS

1. Introduction
                              Objectives



2.Model           Presenting the concept and definition of security
                  region
3. Numerical Example




                  Explaint various methods to contruct steady state
4. Appendix
                  security regions of power system

5. Conclusion
FEEE
                                                  University of technical education HCMC
                                                POWER SYSTEM OPTIMIZATION
                                               Faculty of Electrical and Electronics Engineering
           Ensuring Enhanced Education
          Group No 5
www.hcmute.edu.vn/feee/                     Chapter 9: STEADY-STATE SECURITY REGIONS

1. Introduction
        Agenda

       1                      Introduction

2.Model
      2                            Model


       3                Numerical Example
3. Numerical Example

       4                        Appendix

       5
4. Appendix
                               Conclusion




5. Conclusion
FEEE
                                                     University of technical education HCMC
                                                   POWER SYSTEM OPTIMIZATION
                                                  Faculty of Electrical and Electronics Engineering
          Ensuring Enhanced Education
          Group No 5
www.hcmute.edu.vn/feee/                      Chapter 9: STEADY-STATE SECURITY REGIONS

1. Introduction                   Introduction


                               Used to find the best or optimal solution
2.Model
                               Requires that all the mathematical functions
                               in the model be linear functions.
3. Numerical Example
                               The linear model consists of the following
                               components:

4. Appendix                             • A set of decision variables.
                                        • An objective function.

5. Conclusion                           • A set of constraints.
FEEE
                                                                            University of technical education HCMC
                                                                       POWER SYSTEM OPTIMIZATION
                                                                      Faculty of Electrical and Electronics Engineering
          Ensuring Enhanced Education
          Group No 5
www.hcmute.edu.vn/feee/                                        Chapter 9: STEADY-STATE SECURITY REGIONS

1. Introduction                        Models

                                                                                      Objective Function:
                                                                                            n 1
                                                                                                          M                   m
2.Model                                                                    MaxZ                    Wi ( PGi                 PGi )                 (9.72)
                                                                                          i nd 1

                                                                              Subject to constrains
3. Numerical Example
                                                                                                            n 1
                                  M            m
                            (P   Gi       P ) Gi        ( PGi max     PGi min )        (9.90)     ij min            ( Aik    Ajk ) PGk   ij max     (9.95)
                                                                                                           i nd 1
                                           m
                             PGi         PGi         PGi min        i=n d +1,..,n-1    (9.91)               m
                                                                                                          PGk when Aik -A jk 0
                             PGi          M
                                        PGi          PGi max        i=n d +1,..,n-1    (9.92)       PGk ={ M                   (9.96)
4. Appendix                                                                                               PGk when Aik -A jk 0
                                 nd            n 1
                                                         M
                             (         Pi -            PGi )=PGnm                      (9.93)     PM
                                                                                                   G         P0 +
                                                                                                             G               P0
                                                                                                                             G                      (9.97)
                                 i 1          i nd 1
                                  nd            n 1
                                                          m                                         Pm
                                                                                                     G        P0 +
                                                                                                              G              P0
                                                                                                                             G                      (9.98)
                             (         Pi -            P )=PGnM
                                                         Gi                            (9.94)
                                 i 1          i nd 1
5. Conclusion
FEEE
                                                   University of technical education HCMC
                                                 POWER SYSTEM OPTIMIZATION
                                                Faculty of Electrical and Electronics Engineering
          Ensuring Enhanced Education
          Group No 5
www.hcmute.edu.vn/feee/                      Chapter 9: STEADY-STATE SECURITY REGIONS

1. Introduction                   Models

                                        X2
                         1000                                   Let’s take a closer look at
2.Model                                                              the optimal point
                           800                                             Infeasible

3. Numerical Example       600



4. Appendix
                                             Feasible
                                             Feasible
                                             region
                                             region
                                                                                                X1
5. Conclusion
                                                    400     600      800
FEEE
                                                   University of technical education HCMC
                                              POWER SYSTEM OPTIMIZATION
                                             Faculty of Electrical and Electronics Engineering
          Ensuring Enhanced Education
          Group No 5
www.hcmute.edu.vn/feee/                  Chapter 9: STEADY-STATE SECURITY REGIONS

1. Introduction                   Numerical Examples


                               To assess or compare the size of Ωp for
2.Model                        different means, the following performance
                               index is introduced:
                                                        n 1
                                                               (PM
                                                                 Gi     Pm )
                                                                         Gi
                                                    i nd 1
3. Numerical Example                       PI=     n 1
                                                                                            (9.99)
                                                          ( P max
                                                             Gi         P min )
                                                                         Gi
                                                 i nd 1



4. Appendix
                                 or
                                                    M           m
                                                  PGi         PGi
                                          PI=                         i=n d +1,.....,n-1 (9.100)
                                                PGi max       PGi min

5. Conclusion
FEEE
                                                            University of technical education HCMC
                                                      POWER SYSTEM OPTIMIZATION
                                                     Faculty of Electrical and Electronics Engineering
          Ensuring Enhanced Education
          Group No 5
www.hcmute.edu.vn/feee/                       Chapter 9: STEADY-STATE SECURITY REGIONS

1. Introduction                   Numerical Examples


                             Table 9.14 Comparison of security region results for IEEE 6-bus system.

2.Model
                                                 Security         Generator   Generator     Total
                                 Method
                                                 regions            PG4         PG5         PI%

                                                      PM
                                                       Gi           4.200        2.200
3. Numerical Example                                    m
                                                      PGi
                                Method 1                            0.184        1.378       71%
                                                     PI i %         96%          31%
                                                      PM
                                                       Gi           3.750        2.649
4. Appendix                                             m
                                Method 2              PGi           2,449        1.400       37%
                                                     PI i %         31%          47%
                                Method 1: optimization method.
5. Conclusion                   Method 2: the expanding method.
FEEE
                                                          University of technical education HCMC
                                                        POWER SYSTEM OPTIMIZATION
                                                       Faculty of Electrical and Electronics Engineering
          Ensuring Enhanced Education
          Group No 5
www.hcmute.edu.vn/feee/                       Chapter 9: STEADY-STATE SECURITY REGIONS

1. Introduction                   Numerical Examples
                               Table 9.15 Comparison of security region results for IEEE 30-bus system
                                                                                    Gen     Gen
                                            Security       Gen     Gen     Gen                     Total
                                method                                              PG      PG
                                            regions        PG2     PG5     PG8                     PI%
2.Model                                                                              11     13
                                               PM
                                                Gi        0.800   0.500    0.350   0.300   0.384

                                Method            m
                                                PGi       0.439   0.150    0.100   0.100   0.120    85%
                                  1
3. Numerical Example
                                              PI i %       80%    100%     100%    100%     94%

                                               PM
                                                Gi        0.712   0.402    0.350   0.300   0.400
4. Appendix
                                Method            m
                                                PGi       0.428   0.150    0.148   0.100   0.177    70%
                                  2

                                              PI i %       47%     72%     81%     100%     80%

5. Conclusion                   Method 1: optimization method.
                                Method 2: the expanding method.
FEEE
                                                      University of technical education HCMC
                                                   POWER SYSTEM OPTIMIZATION
                                                  Faculty of Electrical and Electronics Engineering
          Ensuring Enhanced Education
          Group No 5
www.hcmute.edu.vn/feee/                        Chapter 9: STEADY-STATE SECURITY REGIONS

1. Introduction                   Numerical Examples




2.Model                            Table 9.16 Results for security regions on IEEE 6-bus system (p.u.)



                                                   Security
                                         -cut                     PG4          PG5           PG6
                                                   regions
                                                        M
3. Numerical Example                                  PGi        4.200        2.2240        3.8990
                                          1
                                                      P m
                                                       Gi        0.1840       1.3700        0.0000
                                                        M
                                                      PGi        4.0050       202245        4.5480
                                         0.6            m
                                                      PGi        0.1701       1.1500        0.0000
                                                        m
                                                      PGi        4.0050       2.2245        4.7100
                                         0.5            m
                                                      PGi
4. Appendix                                                      0.1620       1.0693        0.0000
                                                        M
                                                      PGi        3.9755       2.4245        5.1849
                                          0             m
                                                      PGi        0.1215        1.000        0.0000



5. Conclusion
FEEE
                                                 University of technical education HCMC
                                               POWER SYSTEM OPTIMIZATION
                                              Faculty of Electrical and Electronics Engineering
          Ensuring Enhanced Education
          Group No 5
www.hcmute.edu.vn/feee/                   Chapter 9: STEADY-STATE SECURITY REGIONS

1. Introduction                   Appendix

                               Standard Form of LP
2.Model
                              Max/min            z = c1x1 + c2x2 + ... + cnxn
                              subject to:
                                               a11x1 + a12x2 + ... + a1nxn (≤, =, ≥) b1
3. Numerical Example                           a21x1 + a22x2 + ... + a2nxn (≤, =, ≥) b2
                                                       :
                                               am1x1 + am2x2 + ... + amnxn (≤, =, ≥) bm
4. Appendix
                                   xj = decision variables
                                   bi = constraint levels
                                   cj = objective function coefficients
5. Conclusion                      aij = constraint coefficients
FEEE
                                                      University of technical education HCMC
                                                   POWER SYSTEM OPTIMIZATION
                                                  Faculty of Electrical and Electronics Engineering
          Ensuring Enhanced Education
          Group No 5
www.hcmute.edu.vn/feee/                    Chapter 9: STEADY-STATE SECURITY REGIONS

1. Introduction                   Infeasibility


                                                   No point, simultaneously,
2.Model                                            lies both above line 1 and
                                                   below lines 2 and 3.

3. Numerical Example


                              2
4. Appendix




5. Conclusion                                                            1
                                                  3
FEEE
                                                University of technical education HCMC
                                              POWER SYSTEM OPTIMIZATION
                                             Faculty of Electrical and Electronics Engineering
          Ensuring Enhanced Education
          Group No 5
www.hcmute.edu.vn/feee/                  Chapter 9: STEADY-STATE SECURITY REGIONS

1. Introduction                   Unbounded solution




2.Model




3. Numerical Example




4. Appendix




5. Conclusion
FEEE
                                                    University of technical education HCMC
                                                  POWER SYSTEM OPTIMIZATION
                                                 Faculty of Electrical and Electronics Engineering
          Ensuring Enhanced Education
          Group No 5
www.hcmute.edu.vn/feee/                   Chapter 9: STEADY-STATE SECURITY REGIONS

1. Introduction                   Unbounded solution



                                                          Primal              Dual
2.Model                            Objective              max cTx             min bTy
                                   Variables              x1, …, xn           y1,…, ym
                                   Constraint matrix      A                   AT
3. Numerical Example               Right-hand vector b                        c
                                   Constraints            ith constraint: ·   yi ¸ 0
                                   versus                 ith constraint: ¸   yi · 0
                                   Variables              ith constraint: =   yi unrestricted
4. Appendix
                                                                                         ,
                                                          xj ¸ 0              jth constraint: ¸
                                                          xj · 0              jth constraint: ·
                                                          xj unrestricted     jth constraint: =
5. Conclusion
FEEE
                                              University of technical education HCMC
                                            POWER SYSTEM OPTIMIZATION
                                           Faculty of Electrical and Electronics Engineering
          Ensuring Enhanced Education
          Group No 5
www.hcmute.edu.vn/feee/                 Chapter 9: STEADY-STATE SECURITY REGIONS

1. Introduction




2.Model




3. Numerical Example




4. Appendix
                                                              GROUP 5


5. Conclusion

More Related Content

More from spk53

quản trị bán hàng
quản trị bán hàngquản trị bán hàng
quản trị bán hàngspk53
 
quản trị thương hiệu
quản trị thương hiệuquản trị thương hiệu
quản trị thương hiệuspk53
 
chuyen de nang cao
chuyen de nang caochuyen de nang cao
chuyen de nang caospk53
 
đánh giá độ tin cậy
đánh giá độ tin cậyđánh giá độ tin cậy
đánh giá độ tin cậyspk53
 
Chương trình hội nhập nhân viên mới
Chương trình hội nhập nhân viên mớiChương trình hội nhập nhân viên mới
Chương trình hội nhập nhân viên mớispk53
 
Toan 2222
Toan 2222Toan 2222
Toan 2222spk53
 

More from spk53 (6)

quản trị bán hàng
quản trị bán hàngquản trị bán hàng
quản trị bán hàng
 
quản trị thương hiệu
quản trị thương hiệuquản trị thương hiệu
quản trị thương hiệu
 
chuyen de nang cao
chuyen de nang caochuyen de nang cao
chuyen de nang cao
 
đánh giá độ tin cậy
đánh giá độ tin cậyđánh giá độ tin cậy
đánh giá độ tin cậy
 
Chương trình hội nhập nhân viên mới
Chương trình hội nhập nhân viên mớiChương trình hội nhập nhân viên mới
Chương trình hội nhập nhân viên mới
 
Toan 2222
Toan 2222Toan 2222
Toan 2222
 

Recently uploaded

Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesShubhangi Sonawane
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 

Recently uploaded (20)

Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 

tối ưu hóa trong hệ thống điện

  • 1. University of technical education HCMC Faculty of Electrical and Electronics Engineering Power System Optimization www.hcmute.edu.vn Chapter 9 STEADY-STATE SECURITY REGIONS Nguyễn Anh Toàn
  • 2. FEEE University of technical education HCMC POWER SYSTEM OPTIMIZATION Faculty of Electrical and Electronics Engineering Ensuring Enhanced Education Group No 5 www.hcmute.edu.vn/feee/ Chapter 9: STEADY-STATE SECURITY REGIONS 1. Introduction Objectives 2.Model Presenting the concept and definition of security region 3. Numerical Example Explaint various methods to contruct steady state 4. Appendix security regions of power system 5. Conclusion
  • 3. FEEE University of technical education HCMC POWER SYSTEM OPTIMIZATION Faculty of Electrical and Electronics Engineering Ensuring Enhanced Education Group No 5 www.hcmute.edu.vn/feee/ Chapter 9: STEADY-STATE SECURITY REGIONS 1. Introduction Agenda 1 Introduction 2.Model 2 Model 3 Numerical Example 3. Numerical Example 4 Appendix 5 4. Appendix Conclusion 5. Conclusion
  • 4. FEEE University of technical education HCMC POWER SYSTEM OPTIMIZATION Faculty of Electrical and Electronics Engineering Ensuring Enhanced Education Group No 5 www.hcmute.edu.vn/feee/ Chapter 9: STEADY-STATE SECURITY REGIONS 1. Introduction Introduction Used to find the best or optimal solution 2.Model Requires that all the mathematical functions in the model be linear functions. 3. Numerical Example The linear model consists of the following components: 4. Appendix • A set of decision variables. • An objective function. 5. Conclusion • A set of constraints.
  • 5. FEEE University of technical education HCMC POWER SYSTEM OPTIMIZATION Faculty of Electrical and Electronics Engineering Ensuring Enhanced Education Group No 5 www.hcmute.edu.vn/feee/ Chapter 9: STEADY-STATE SECURITY REGIONS 1. Introduction Models Objective Function: n 1 M m 2.Model MaxZ Wi ( PGi PGi ) (9.72) i nd 1 Subject to constrains 3. Numerical Example n 1 M m (P Gi P ) Gi ( PGi max PGi min ) (9.90) ij min ( Aik Ajk ) PGk ij max (9.95) i nd 1 m PGi PGi PGi min i=n d +1,..,n-1 (9.91) m PGk when Aik -A jk 0 PGi M PGi PGi max i=n d +1,..,n-1 (9.92) PGk ={ M (9.96) 4. Appendix PGk when Aik -A jk 0 nd n 1 M ( Pi - PGi )=PGnm (9.93) PM G P0 + G P0 G (9.97) i 1 i nd 1 nd n 1 m Pm G P0 + G P0 G (9.98) ( Pi - P )=PGnM Gi (9.94) i 1 i nd 1 5. Conclusion
  • 6. FEEE University of technical education HCMC POWER SYSTEM OPTIMIZATION Faculty of Electrical and Electronics Engineering Ensuring Enhanced Education Group No 5 www.hcmute.edu.vn/feee/ Chapter 9: STEADY-STATE SECURITY REGIONS 1. Introduction Models X2 1000 Let’s take a closer look at 2.Model the optimal point 800 Infeasible 3. Numerical Example 600 4. Appendix Feasible Feasible region region X1 5. Conclusion 400 600 800
  • 7. FEEE University of technical education HCMC POWER SYSTEM OPTIMIZATION Faculty of Electrical and Electronics Engineering Ensuring Enhanced Education Group No 5 www.hcmute.edu.vn/feee/ Chapter 9: STEADY-STATE SECURITY REGIONS 1. Introduction Numerical Examples To assess or compare the size of Ωp for 2.Model different means, the following performance index is introduced: n 1 (PM Gi Pm ) Gi i nd 1 3. Numerical Example PI= n 1 (9.99) ( P max Gi P min ) Gi i nd 1 4. Appendix or M m PGi PGi PI= i=n d +1,.....,n-1 (9.100) PGi max PGi min 5. Conclusion
  • 8. FEEE University of technical education HCMC POWER SYSTEM OPTIMIZATION Faculty of Electrical and Electronics Engineering Ensuring Enhanced Education Group No 5 www.hcmute.edu.vn/feee/ Chapter 9: STEADY-STATE SECURITY REGIONS 1. Introduction Numerical Examples Table 9.14 Comparison of security region results for IEEE 6-bus system. 2.Model Security Generator Generator Total Method regions PG4 PG5 PI% PM Gi 4.200 2.200 3. Numerical Example m PGi Method 1 0.184 1.378 71% PI i % 96% 31% PM Gi 3.750 2.649 4. Appendix m Method 2 PGi 2,449 1.400 37% PI i % 31% 47% Method 1: optimization method. 5. Conclusion Method 2: the expanding method.
  • 9. FEEE University of technical education HCMC POWER SYSTEM OPTIMIZATION Faculty of Electrical and Electronics Engineering Ensuring Enhanced Education Group No 5 www.hcmute.edu.vn/feee/ Chapter 9: STEADY-STATE SECURITY REGIONS 1. Introduction Numerical Examples Table 9.15 Comparison of security region results for IEEE 30-bus system Gen Gen Security Gen Gen Gen Total method PG PG regions PG2 PG5 PG8 PI% 2.Model 11 13 PM Gi 0.800 0.500 0.350 0.300 0.384 Method m PGi 0.439 0.150 0.100 0.100 0.120 85% 1 3. Numerical Example PI i % 80% 100% 100% 100% 94% PM Gi 0.712 0.402 0.350 0.300 0.400 4. Appendix Method m PGi 0.428 0.150 0.148 0.100 0.177 70% 2 PI i % 47% 72% 81% 100% 80% 5. Conclusion Method 1: optimization method. Method 2: the expanding method.
  • 10. FEEE University of technical education HCMC POWER SYSTEM OPTIMIZATION Faculty of Electrical and Electronics Engineering Ensuring Enhanced Education Group No 5 www.hcmute.edu.vn/feee/ Chapter 9: STEADY-STATE SECURITY REGIONS 1. Introduction Numerical Examples 2.Model Table 9.16 Results for security regions on IEEE 6-bus system (p.u.) Security -cut PG4 PG5 PG6 regions M 3. Numerical Example PGi 4.200 2.2240 3.8990 1 P m Gi 0.1840 1.3700 0.0000 M PGi 4.0050 202245 4.5480 0.6 m PGi 0.1701 1.1500 0.0000 m PGi 4.0050 2.2245 4.7100 0.5 m PGi 4. Appendix 0.1620 1.0693 0.0000 M PGi 3.9755 2.4245 5.1849 0 m PGi 0.1215 1.000 0.0000 5. Conclusion
  • 11. FEEE University of technical education HCMC POWER SYSTEM OPTIMIZATION Faculty of Electrical and Electronics Engineering Ensuring Enhanced Education Group No 5 www.hcmute.edu.vn/feee/ Chapter 9: STEADY-STATE SECURITY REGIONS 1. Introduction Appendix Standard Form of LP 2.Model Max/min z = c1x1 + c2x2 + ... + cnxn subject to: a11x1 + a12x2 + ... + a1nxn (≤, =, ≥) b1 3. Numerical Example a21x1 + a22x2 + ... + a2nxn (≤, =, ≥) b2 : am1x1 + am2x2 + ... + amnxn (≤, =, ≥) bm 4. Appendix xj = decision variables bi = constraint levels cj = objective function coefficients 5. Conclusion aij = constraint coefficients
  • 12. FEEE University of technical education HCMC POWER SYSTEM OPTIMIZATION Faculty of Electrical and Electronics Engineering Ensuring Enhanced Education Group No 5 www.hcmute.edu.vn/feee/ Chapter 9: STEADY-STATE SECURITY REGIONS 1. Introduction Infeasibility No point, simultaneously, 2.Model lies both above line 1 and below lines 2 and 3. 3. Numerical Example 2 4. Appendix 5. Conclusion 1 3
  • 13. FEEE University of technical education HCMC POWER SYSTEM OPTIMIZATION Faculty of Electrical and Electronics Engineering Ensuring Enhanced Education Group No 5 www.hcmute.edu.vn/feee/ Chapter 9: STEADY-STATE SECURITY REGIONS 1. Introduction Unbounded solution 2.Model 3. Numerical Example 4. Appendix 5. Conclusion
  • 14. FEEE University of technical education HCMC POWER SYSTEM OPTIMIZATION Faculty of Electrical and Electronics Engineering Ensuring Enhanced Education Group No 5 www.hcmute.edu.vn/feee/ Chapter 9: STEADY-STATE SECURITY REGIONS 1. Introduction Unbounded solution Primal Dual 2.Model Objective max cTx min bTy Variables x1, …, xn y1,…, ym Constraint matrix A AT 3. Numerical Example Right-hand vector b c Constraints ith constraint: · yi ¸ 0 versus ith constraint: ¸ yi · 0 Variables ith constraint: = yi unrestricted 4. Appendix , xj ¸ 0 jth constraint: ¸ xj · 0 jth constraint: · xj unrestricted jth constraint: = 5. Conclusion
  • 15. FEEE University of technical education HCMC POWER SYSTEM OPTIMIZATION Faculty of Electrical and Electronics Engineering Ensuring Enhanced Education Group No 5 www.hcmute.edu.vn/feee/ Chapter 9: STEADY-STATE SECURITY REGIONS 1. Introduction 2.Model 3. Numerical Example 4. Appendix GROUP 5 5. Conclusion

Editor's Notes

  1. Nội dung trình bày: