Security analysis and optimization
- 1 January 1987
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in Proceedings of the IEEE
- Vol. 75 (12), 1623-1644
- https://doi.org/10.1109/proc.1987.13931
Abstract
An operationally "secure" power system is one with low probability of blackout or equipment damage. The power system control processes needed to maintain a designated security level at minimum operating cost are extremely complicated. They increasingly depend upon on-line computer security analysis and optimization. This on-line technology is still relatively new, with enormous further potential. Since security and optimality are normally conflicting requirements of power system control, it is inappropriate to treat them separately. Therefore, they are slowly becoming coalesced into a unified hierarchical mathematical problem formulation: one that is, however, far too complex to afford anything but an approximate, near-optimal solution. The practical validity of this unifying trend relies on being able to incorporate all significant security constraints within the process. The main two current computational tools in this field are contingency analysis and special operations-oriented versions of optimal power flow (OPF). Contingency analysis identifies potential emergencies through extensive "what if?." simulations on the power system network. OPF is a major extension to the conventional dispatch calculation. It can respect system static security limits, and can schedule reactive as well as active power. Moreover, the advanced versions of OPF include or interface with contingency analysis. This paper reviews present formulations and methods, and tries to point out areas of difficulty that constitute the main challenges for successful practical on-line implementations over the coming years.Keywords
This publication has 64 references indexed in Scilit:
- A Newton Optimal Power Flow Program for Ontario Hydro EMSIEEE Transactions on Power Systems, 1987
- Optimal Power Flow By Newton ApproachIEEE Transactions on Power Apparatus and Systems, 1984
- Security Constrained Dispatch at the New York Power PoolIEEE Transactions on Power Apparatus and Systems, 1982
- Emergency Adjustments to Var Control Variables to Alleviate Over-Voltages, Under-Voltages,and Generator Var Limit ViolationsIEEE Transactions on Power Apparatus and Systems, 1982
- Power System Security Corridors Concept and ComputationIEEE Transactions on Power Apparatus and Systems, 1981
- Optimal Control of Reactive Power flow for Improvements in Voltage Profiles and for Real Power Loss MinimizationIEEE Transactions on Power Apparatus and Systems, 1981
- Generalized Generation Distribution Factors for Power System Security EvaluationsIEEE Transactions on Power Apparatus and Systems, 1981
- Linear Programming for Power-System Network Security ApplicationsIEEE Transactions on Power Apparatus and Systems, 1979
- Security Constrained DispatchIEEE Transactions on Power Apparatus and Systems, 1979
- Power System Security Control Calculations Using Linear Programming, Part IIEEE Transactions on Power Apparatus and Systems, 1978