Você está na página 1de 2

2824 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 30, NO.

5, SEPTEMBER 2015

N-k Induced Cascading Contingency Screening


Youwei Jia, Student Member, IEEE, Ke Meng, Member, IEEE, and Zhao Xu, Senior Member, IEEE

AbstractThis letter proposes a novel method for N-k induced


cascading contingency screening based on random vector func-
tional-link (RVFL) neural network and quantum inspired multi-
objective evolutionary algorithm (QMEA). This method can con-
duct reliable and simultaneous screening for various N-k contin-
gencies. The proposed method has been proved to be highly ef-
fective through a preliminary case study using the New England
39-bus system.
Index TermsCascading failures, N-k contingency screening,
quantum inspired multi-objective evolutionary algorithm, random
vector functional-link neural network.

I. INTRODUCTION

T HE classical N-1 criterion was intended to inhibit cas- Fig. 1. Structure of proposed contingency screening method.
cading failures in power systems. However, the deciency
of this criterion has come to light after many recent blackout
events. This highlights the need of more strengthened security module (REM), and contingency screening module (CSM).
criterion for power system robust operation. The electricity in- CFSM generates cascading risk database containing different
dustry has revised the reliability standards (e.g., NERC Standard operating scenarios, which is utilized to train RVFL network
PRC-023, U.S.) to require utilities to consider not only single in REM. A well-trained REM can efciently assess the cas-
contingencies, but also N-k (where ) contingencies which cading risk of an N-k failure using simple matrix calculation.
could initiate cascades. In formulating the PNIP as a multi-objective problem, QMEA
N-k contingency analysis, also called as power network in- utilized in CSM can effectively capture a bunch of Pareto fronts
terdiction problem (PNIP), is always intractable because of 1) of contingencies with different rankings in a large search space.
high computational cost; 2) complexity of power system net- A. Cascading Failure Simulation Module
work; and 3) various system operating conditions. In consid-
ering post-contingency phase, an extra layer of complexity (i.e., Modeling of cascading process remains an open problem when
a variety of cascading chains) is added to PNIP and makes it considering different mechanisms. A comprehensive review of
more challenging to be solved. A methodology that can ef- cascades modeling and risk assessment is given in [2]. In this
ciently and accurately identify a specic set of N-k contingen- letter, we are more interested in hidden failures [3] of protection
cies with high cascading risk is therefore valuable. facilities to evaluate cascading risk, since it has been reported
In this letter, we pose the PNIP as a multi-objective optimiza- that over 70% of cascades are caused by malfunction of relays.
tion problem to maximize the cascading risk while minimizing A cascade is triggered by an N-k failure, after which the
the number of transmission line outages . The method relies on system will be re-dispatched and some overloaded lines are ex-
RVFL network for fast estimating cascading risk under different posed. An overloaded line will be tripped with a particular prob-
operating scenarios, and QMEA for N-k contingencies screening ability, which is based on the hidden failure model [3]. In our
with a wide range of . This method successfully overcomes the model, we assume that all generators have limited capability to
difculties mentioned above, and also takes into account the post- ramp up or down to accommodate generation-load imbalance.
contingency cascading process, which is barely or inadequately Thereby, a homogeneous load shedding strategy will be served
concerned by existing optimization methods (e.g., [1]). to the system to maintain generation-load balance. A cascading
simulation terminates on the conditions of no overloaded line or
II. METHODOLOGY non-convergence of power ow.
Since the cascading chain differs with different probability,
As shown in Fig. 1, the proposed method consists of cas- Monte Carlo simulations are applied to each N-k cascading risk
cading failure simulation module (CFSM), risk estimation estimation. Parallel computing is employed in this step to speed
up simulation process.
Manuscript received May 20, 2014; accepted September 23, 2014. Date of In order to evaluate the combined impact of load shedding
publication October 14, 2014; date of current version July 17, 2015. This work and voltage violation, the risk is dened as (1):
was supported in part by Hong Kong RGC GRF Grant no. 528412, and in part
by Theme Based Research Scheme Grant no. T23-407/13-N. Paper no. PESL- (1)
00071-2014.
Y. Jia and Z. Xu are with the Department of Electrical Engineering, The where risk is dened as probability times consequence (i.e., load
Hong Kong Polytechnic University, Hong Kong (e-mail: corey.jia@connect. shed or voltage violation). and are entropy weights of av-
polyu.hk; eezhaoxu@polyu.edu.hk). erage risk of load shedding and voltage violation, respectively.
K. Meng is with the Centre of Intelligent Electricity Networks, The University
For each N-k contingency, data entropy can perfectly reect the
of Newcastle, Callaghan, Australia (e-mail: kemeng@ieee.org).
Color versions of one or more of the gures in this paper are available online information uncertainty of load shed and voltage violation based
at http://ieeexplore.ieee.org. on a number of Monte Carlo simulations. For more analysis of
Digital Object Identier 10.1109/TPWRS.2014.2361723 entropy weight, readers can refer to our previous study [4].

0885-8950 2014 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
JIA et al.: N-K INDUCED CASCADING CONTINGENCY SCREENING 2825

Given a set of Monte Carlo simulation results ,


where the rst row indicates the risk of load shedding and the
second one for voltage violation, the entropy of each type of risk
is expressed as

Thus, the entropy weight can be formulated as (2):

(2)

Fig. 2. Pareto fronts (solid lines for heavy load condition; dash line for light
load condition).
B. Risk Evaluation Module
TABLE I
The essential part of REM is RVFL, which works for a single N-2 CONTINGENCIES
hidden-layer feed forward neural network (SLFN) [5]. The
structure of RVFL network is shown in Fig. 1. A training data set
with N arbitrary distinct samples
is generated by CFSM, where the input vector consists of
power ow on each line and voltage on each bus indicating
different operating scenarios. RVFL network with a specic
activation function and randomly assigned input weights
can efciently approximate all sample data with zero error:
III. EXPERIMENTAL RESULTS
The proposed contingency screening method is preliminarily
tested using New England 39-bus system, where only two oper-
where is the weight vector connecting the th hidden node and ating conditions (i.e., light load and heavy load) are considered.
the input nodes, is the weight vector connecting the th hidden Fig. 2 compares the results obtained by different conditions.
node and the output nodes. is the threshold of the th hidden In order to validate the effectiveness of our screening method,
node, and is the number of neurons in hidden layer. Details of a complete cascading failure simulation based screening is con-
RVFL network training mechanism can be referred to [5]. ducted for N-2 contingencies. Some results are shown in Table I,
As reported in [5], RVFL features extremely fast training which is consistent with the ones obtained by the proposed
speed and overcomes the drawbacks of gradient-based learning method.
algorithms for training SLFNs (i.e., local minima, slow conver-
gence, and poor sensitivity to learning rate setting). By using IV. CONCLUSION
RVFL network in REM, an average cascading risk of N-k con- An N-k induced cascading contingency screening method is
tingency can be predicted efciently through simple matrix cal- proposed. It is advantageous over other methods in 1) modeling
culation, which makes it computationally feasible to consider a the post-contingency cascading process based on risk assess-
variety of post-contingency cascading chains. ment; 2) generating the ranking lists for N-k contingencies con-
sidering different 's through one Pareto optimization proce-
C. Contingency Screening Module dure; and 3) high adaptability for different operating conditions.
QMEA in CSM serves as a problem-solving engine, which Future work is underway to further enhance each module.
features high capability of solution exploration and exploita-
tion [6]. By incorporating the fast non-dominated sorting (FNS) REFERENCES
[7] technique into QMEA, solutions close to the Pareto-optimal [1] D. Bienstock and A. Verma, The nk problem in power grids: New
front can be obtained. Further, a wide span of Pareto front is en- models, formulations, numerical experiments, SIAM J. Optimiz., vol.
20, pp. 23522380, 2010.
sured by using the crowding distance measure (CDM) [7]. This [2] M.Vaiman,K.Bell,Y.Chen,B.Chowdhury,I.Dobson,andP.Hinesetal.,
well fullls the goal of our method that tends to nd as many Risk assessment of cascading outages: Methodologies and challenges,
solutions as possible in a large search space. IEEE Trans. Power Syst., vol. 27, no. 2, pp. 631641, May 2012.
[3] J. Chen, J. S. Thorp, and I. Dobson, Cascading dynamics and miti-
In each generation, the population is divided into several gation assessment in power system disturbances via a hidden failure
groups, which are sorted according to FNS. The rst group, model, Int. J. Elect. Power Energy Syst., vol. 27, pp. 318326, 2005.
which contains the best solutions, is used to guide the evolution. [4] Y. Jia and Z. Xu, Risk assessment based on information entropy of
cascading failure in power systems, in Proc. 2012 IEEE Power and
Identical solutions in the rst group should be replaced by the Energy Society General Meeting, 2012, pp. 15.
subsequent solutions so as to ensure the diversity and elitism of [5] B. Igelnik and Y. H. Pao, Stochastic choice of basis functions in adap-
population during the evolution. tive function approximation and the functional-link net, IEEE Trans.
Neural Netw., vol. 6, no. 6, pp. 13201329, Nov. 1995.
The Pareto-optimal front only contains those highest-risk [6] H. Kuk-Hyun and K. Jong-Hwan, Quantum-inspired evolutionary al-
N-k contingency under different 's, which is insufcient for, gorithm for a class of combinatorial optimization, IEEE Trans. Evol.
e.g., security assessment. Therefore, the second best Pareto Computat., vol. 6, no. 6, pp. 580593, Dec. 2002.
[7] K. Deb, A. Pratap, S. Agarwal, and T. Meyarivan, A fast and elitist
front (called 2nd front) and the front of even higher order can multiobjective genetic algorithm: NSGA-II, IEEE Trans. Evol. Com-
be generated through FNS in our method as well. putat., vol. 6, no. 2, pp. 182197, Apr. 2002.

Você também pode gostar