Escolar Documentos
Profissional Documentos
Cultura Documentos
2, MAY 2001
287
I. INTRODUCTION
288
(4)
Fig. 2.
where
:
(1)
(5)
where
(2)
(3)
Equation (1) shows that the mathematical model of the phase
shifter makes the bus unsymmetrical. In order to make the
bus symmetrical, the phase shifter can be simulated by installing
the additional injections at the terminal buses as shown in Fig. 2.
The additional injections in Fig. 2 can be simplified as follows
[1].
where
:
:
:
:
:
:
:
:
where
:
:
:
:
B. Constraints
In addition to the general linear/nonlinear constraints, the
constraints relating to phase shifter variables such as phase
shifter angle and maximal adjustment numbers should be
included in the OPF formulation with phase shifter. The
candidate constraints are as follows:
Constraint 1: Real power flow equation
Constraint 2: Reactive power flow equation
Constraint 3: Upper and lower limits of real power output of
the generators
Constraint 4: Upper and lower limits of reactive power
output of the generators
Constraint 5: Upper and lower limits of node voltages
Constraint 6: Available transfer capacity of the transmission
lines
Constraint 7: Upper and lower limits of transformer taps
Constraint 8: Upper and lower limits of phase shifter taps
Constraint 9: Maximal adjustment times of phase shifters per
day
Notably, Constraints 8 and 9 are the phase shifter constraints that
were used in the rule-based search technique. And, the limits of
all control and state variables are determined for the specific
system under study.
A. Objective Functions
Due to the installation of phase shifter, the system will have
lots of benefits such as overload release, system loss reduction,
generation cost reduction, and generation adjustment reduction
etc. All these benefits may be selected as objective functions
MOMOH et al.: POWER SYSTEM SECURITY ENHANCEMENT BY OPF WITH PHASE SHIFTER
289
is based on the linearized load flow around base load flow solution for small perturbation. The details refer to the reference
[10]. The reduced OPF model has the format:
(6)
with
(7)
290
Fig. 4. Flowchart of the integrated scheme for OPF with phase shifter.
MOMOH et al.: POWER SYSTEM SECURITY ENHANCEMENT BY OPF WITH PHASE SHIFTER
291
TABLE III
RESULTS OF CONTINGENCY ANALYSIS AT THE PEAK LOAD T18
TABLE II
SUMMARY OF CONTINGENCY ANALYSIS
where
: performance index of line overloads;
: the overload flow on transmission line ;
: set of overloaded lines.
Through power flow analysis without contingency for each
time stage, line overloads only appeared at hours 8, 15, 16, 17,
18, and 19, which are peak load periods. The violation amounts
of line flow for each time stage are summarized in Table I.
The line overloads will become more serious if system contingency scenarios are considered. Therefore, OPF with phase
shifter adjustment should be employed for enhancing power
system security.
For the purpose of simulation, the following line contingency
scenarios are given, that is,
,
and
.
Table II is the summary of contingency analysis and the
total power violations for all time stages are shown. It can
be observed from Table II that the line
outage is the
most serious contingency case, where the total line violation is
107.26 MW.
Table III gives the details of contingency calculation under
the peak load (at hour 18).
Fig. 6 shows power violations during the period of peak
Fig. 6.
Fig. 7. Contingency analysis result under the worst fault scenario (line L
outage).
contingency ranks for different time stages are not totally the
same, the selected worst contingency case is the same, i.e., line
outage. Fig. 7 gives the detail results of contingency
calculation for all time stages under the worst contingency case
( outage).
292
Fig. 8. Line overload results under the worst fault scenario at the highest load
level.
TABLE IV
RANKING OF PHASE SHIFTER LOCATION BASED ON SENSITIVITY ANALYSIS
(LSF=1.55, OUTAGE LINE L )
Fig. 9. Object function value with and without phase shifter (Load level
LSF = 1:55; Outage line L ).
TABLE V
RESULTS OF PHASE SHIFTER ADJUSTMENT
Fig. 8 shows the line overload results under the peak load (at
hour 18) and the worst contingency case ( outage). In
order to determine the priority of phase shifters, the sensitivity
analysis of phase shifters is conducted under the peak load and
the worst contingency case. Simulation results show that system
security will be greatly enhanced if the phase shifter is installed
at location
,
respectively.
For the specified worst contingency, it can be seen from
Table IV and Fig. 9 that the best three locations for installing
and
phase shifter are
.
represent the value of the primary objective function value
MOMOH et al.: POWER SYSTEM SECURITY ENHANCEMENT BY OPF WITH PHASE SHIFTER
REFERENCES
[1] N. Srinivasan, K. S. Prakaesa, and S. S. Venkata, On-line computation of phase shifter distribution factors and line load alleviation, IEEE
Trans. on Power Systems, vol. PAS-104, no. 7, pp. 16561662, 1985.
[2] B. Stott and E. Hobson, Power system security control calculations
using linear programmingPart I, IEEE Trans. on Power Systems, vol.
PAS-97, pp. 17131719, 1978.
[3] R. Baldick and E. Kahn, Contract paths, phase shifters, and efficient
electricity trade, IEEE Trans. on Power Systems, vol. 12, no. 2, pp.
749755, 1997.
[4] M. R. Iravani and D. Maratukulam, Review of semiconductor-controlled (static) phase shifters for power system applications, IEEE
Trans. on Power Systems, vol. 9, no. 4, pp. 18331839, 1994.
[5] T. K. P. Medicherla, R. Billinton, and M. S. Sachdev, Generation
rescheduling and load shedding to alleviate line overloadsAnalysis,
IEEE Trans. on Power Systems, vol. PAS-98, pp. 18761884, 1979.
[6] A. D. Papalexopoulos, C. F. Imparato, and F. F. Wu, Large scale optimal power flow: Effects of initialization decoupling and discretization, IEEE Trans. on Power Systems, vol. 4, pp. 748759, 1989.
[7] O. Alsac and B. Sttot, Optimal power flow with steady-state security,
IEEE Trans. on Power System, vol. 93, pp. 745751, 1974.
[8] J. Z. Zhu and G. Y. Xu, A new real power economic dispatch method
with security, Electric Power Systems Research, vol. 25, no. 1, pp. 915,
1992.
[9] S. Granville, J. C. O. Mello, and A. C. G. Melo, Application of interior point methods to power flow unsolvability, IEEE Trans. on Power
System, vol. 11, pp. 10961103, 1996.
[10] J. A. Momoh, L. G. Dias, S. X. Guo, and R. A. Adapa, Economic operation and planning of multi-area interconnected power system, IEEE
Trans. on Power System, vol. 10, pp. 10441051, 1995.
293
Jizhong Zhu (SM98) received the B.S.E.E. (1985), M.S.E.E. (1987) and Ph.D.
degrees (1990) from Chongqing University, P.R. China. He is a Professor at
Chongqing University, China. He was a Royal Society Fellow and Visiting Research Fellow at Brunel University in the UK during 19951996. He was a Postdoctoral Fellow at National University of Singapore, and is currently a Research
Fellow at Howard University. His research interest is in the analysis, operation,
planning and control of power systems.
Garfield Boswell received the B.S.E.E. degree (1994) from University of the
West Indies (UWI). He was a Teacher at Belair High School during 19941996
and is a Private Contracting Engineer for WelloMed, Ltd. in Jamaica. He is
currently Graduate Student at Howard University. His research interests lie in
the area of power system operation, planning and design.
Stephen Hoffman received the B.S.E.E. degree (1991) from the University of
Missouri-Rolla, and the M.S.E.E. degree (1993) from Purdue University. He
is employed with ComEd in the Electric Operations Department. Areas of expertise and experience include power system operations, on-line transmission
system security applications programs, frequency bias measurement, and automatic generation control. Extensive contributions were made to the development
of the new NREC Control Performance Standard for AGC, and in its implementation at ComEd.