On-line Estimation of Power System Security Limits

Similar documents
Power System Security Boundary Enhancement Using Evolutionary-Based Query Learning

A PMU-Based Three-Step Controlled Separation with Transient Stability Considerations

CART for Online Security Evaluation and Preventive Control of Power Systems

Stability Assessment of Electric Power Systems using Growing Neural Gas and Self-Organizing Maps

Standard Development Timeline

Proposal for Development and Use of Node- Breaker Topology Representations for Offline and Real-time Study Models November 12, 2013

PRC Coordination of Protection Systems for Performance During Faults

Face Detection using Hierarchical SVM

A Neuro-Fuzzy Application to Power System

Grid Operations - Program 39

Artificial Neural Network-Based Prediction of Human Posture

EFFICIENT NEURAL NETWORK ARCHITECTURE FOR TOPOLOGY IDENTIFICATION IN SMART GRID. Yue Zhao, Jianshu Chen and H. Vincent Poor

Phasor Technology Research Road Map to Improve Grid Reliability and Market Efficiency. Presented to TAC on April 5, 2005 and PAC on April 22, 2005

Re-Dispatching Generation to Increase Power System Security Margin and Support Low Voltage Bus

Implementation Issues for Hierarchical State Estimators

Project Consideration of Commission Directives in Order No. 693

Comments by the Northeast Power Coordinating Council FERC Reactive Power Technical Conference

Proceedings of the 2016 International Conference on Industrial Engineering and Operations Management Detroit, Michigan, USA, September 23-25, 2016

On the Relationship of Server Disk Workloads and Client File Requests

Transient Stability Improvement of Long Transmission Line System by Using SVC

Unofficial Comment Form Project Disturbance Monitoring

Real Time Monitoring of

The missing links in the BGP-based AS connectivity maps

Supplemental Information

SIMEAS Q80 quality recorder: Voltage quality starts with measurement.

Requirements Engineering for Enterprise Systems

Artificial Neural Networks (Feedforward Nets)

A Data Classification Algorithm of Internet of Things Based on Neural Network

9. Lecture Neural Networks

Distributed Load Flow using Partitioning and Equivalencing of Power Networks

Simplifying OCR Neural Networks with Oracle Learning

OPTIMAL LOCATION OF SVC USING BENEFIT FACTORS TO IMPROVE THE VOLTAGE PROFILE IN POWER SYSTEMS

Specifics of Implementation

Character Recognition Using Convolutional Neural Networks

J. Electrical Systems 13-2 (2017): Regular paper

Modeling of RAS and Relays in Power Flow Contingency Analysis. Jamie Weber

Seismic regionalization based on an artificial neural network

CANCER PREDICTION USING PATTERN CLASSIFICATION OF MICROARRAY DATA. By: Sudhir Madhav Rao &Vinod Jayakumar Instructor: Dr.

Fast Algorithms for Detecting Circular VAR Flows in Large Power-Flow Models

XXXXX XXXX Wind Generation Project

A NEURAL NETWORK BASED TRAFFIC-FLOW PREDICTION MODEL. Bosnia Herzegovina. Denizli 20070, Turkey. Buyukcekmece, Istanbul, Turkey

Data Exchange Design and A Textured State Estimation Algorithm For Distributed Multi-Utility Operations In Electric Power Market.

Peak V&R R-T Voltage Security Assessment (VSA) Tool Validation 9/9/2014, JSIS. Hongming Zhang EMS Applications Manager, PEAK RC

4.12 Generalization. In back-propagation learning, as many training examples as possible are typically used.

Using Local Trajectory Optimizers To Speed Up Global. Christopher G. Atkeson. Department of Brain and Cognitive Sciences and

Real-time Power System Operation. Energy Management Systems. Introduction

D.A. Karras 1, S.A. Karkanis 2, D. Iakovidis 2, D. E. Maroulis 2 and B.G. Mertzios , Greece,

CHAPTER 8 COMPOUND CHARACTER RECOGNITION USING VARIOUS MODELS

RTDMS CAISO TRAINING SESSION

Feasibility Study on Load Flow and Short Circuit Project

AMOL MUKUND LONDHE, DR.CHELPA LINGAM

IMPROVING POWER SYSTEM RELIABILITY USING MULTIFUNCTION PROTECTIVE RELAYS

Efficient Object Extraction Using Fuzzy Cardinality Based Thresholding and Hopfield Network

Parameter optimization model in electrical discharge machining process *

Chapter X Security Performance Metrics

Sump Temperature as a Function of Time and Break Size

E-R Model. Hi! Here in this lecture we are going to discuss about the E-R Model.

EMS-LECTURE 2: WORKING OF EMS

DRAFT Reliability Guideline: Modeling Distributed Energy Resources in Dynamic Load Models

The Encoding Complexity of Network Coding

Importance Sampling Simulation for Evaluating Lower-Bound Symbol Error Rate of the Bayesian DFE With Multilevel Signaling Schemes

Perry. Lakeshore. Avon. Eastlake

A nodal based evolutionary structural optimisation algorithm

Understanding Large Transport Network Performance Subject to Unexpected Traffic Demand

Analysis and Algorithms for Partial Protection in Mesh Networks

Achieving Smarter Grid Operation With On-Line DSA Technology

FACE RECOGNITION USING FUZZY NEURAL NETWORK

Visualization of Dynamic Simulation Data for Power System Stability Assessment

Introduction: Model Relationships Network Model Overview Example Commercial Model Overview Component Hierarchy & Definitions Example of Structure

MIT Samberg Center Cambridge, MA, USA. May 30 th June 2 nd, by C. Rea, R.S. Granetz MIT Plasma Science and Fusion Center, Cambridge, MA, USA

IJETST- Volume 01 Issue 09 Pages November ISSN

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 7, Issue 1, July 2017

Flexible High-Speed Load Shedding Using a Crosspoint Switch

Creating Situational Awareness with Spacecraft Data Trending and Monitoring

Adaptive Boosting for Spatial Functions with Unstable Driving Attributes *

The Comparative Study of Machine Learning Algorithms in Text Data Classification*

WECC Criterion MOD-(11 and 13)-WECC-CRT-1.1

Detection, Classification, & Identification of Objects in Cluttered Images

( ) Regional Reliability Standard ( ) Regional Criteria ( ) Policy (x) Guideline ( ) Report or other ( ) Charter M&VWG. Physical location: Web URL:

Research Article An Improved Topology-Potential-Based Community Detection Algorithm for Complex Network

Review on Methods of Selecting Number of Hidden Nodes in Artificial Neural Network

L-Bit to M-Bit Code Mapping To Avoid Long Consecutive Zeros in NRZ with Synchronization

Unofficial Comment Form 1st Draft of PRC-005-3: Protection System and Automatic Reclosing Maintenance (Project )

Original Contribution EFFECTS OF PARALLEL FACTS CONTROLLERS ON STAEDY STATE VOLTAGE STABILITY MARGIN M. A. Kamarposhti 1 *, H.

Standard Development Timeline

Recurrent Neural Network Models for improved (Pseudo) Random Number Generation in computer security applications

PARAMETERS OF OPTIMUM HIERARCHY STRUCTURE IN AHP

PERFORMANCE OF GRID COMPUTING FOR DISTRIBUTED NEURAL NETWORK. Submitted By:Mohnish Malviya & Suny Shekher Pankaj [CSE,7 TH SEM]

Gibbs Sampling. Stephen F. Altschul. National Center for Biotechnology Information National Library of Medicine National Institutes of Health

Chapter 2 State Estimation and Visualization

Application of Artificial Neural Network to Predict Static Loads on an Aircraft Rib

Order No Assessment of Protection System Single Points of Failure Based on the Section 1600 Data Request. September, 2015

Procedures for cross-border transmission capacity assessments PROCEDURES FOR CROSS-BORDER TRANSMISSION CAPACITY ASSESSMENTS.

Chemometrics. Description of Pirouette Algorithms. Technical Note. Abstract

Training Digital Circuits with Hamming Clustering

Why Do Nearest-Neighbour Algorithms Do So Well?

IMPLEMENTATION ISSUES FOR HIERARCHICAL, DISTRIBUTED STATE ESTIMATORS

Power System Studies. The Power of Trust. The Future of Energy.

Feature Selection. CE-725: Statistical Pattern Recognition Sharif University of Technology Spring Soleymani

POWER FLOW ANALYSIS AND PROTECTION COORDINATION OF REAL TIME SYSTEM

Transcription:

Bulk Power System Dynamics and Control V, August 26-31, 2001, Onomichi, Japan On-line Estimation of Power System Security Limits K. Tomsovic A. Sittithumwat J. Tong School of Electrical Engineering and Computer Science Washington State University Pullman, WA 99165 Abstract This paper proposes a fast pattern matching technique using Artificial Networks that takes advantage of the off-line studies to accurately estimate security limits on-line. The precise methodology of operation planners is followed to establish the limits used to train the networks. A hierarchical design combining margin s for different security criteria and operating conditions is developed. Here this framework is applied to dynamic security. 1. Introduction In the deregulated environment, determining the system operational limits has become increasingly important. In current practice, operational planners employ detailed power system studies to find the maximum allowable loadings in particular areas and the associated transfers across key interfaces. Reliability standards require that the system withstand any credible contingency and furthermore, must be operated with some security margin to allow operators the possibility of responding to events. Under this approach, the system ratings tend to be conservative, as studies are based on highly stressed conditions and incomplete, as the studies cannot analyze all combinations of loading and equipment out-of-service. This paper proposes a fast pattern matching technique using Artificial Networks (ANNs) that takes advantage of the off-line studies to accurately estimate security limits on-line. Generally speaking, each operational planning study must look at static, dynamic and voltage security concerns. For a given loading condition and the status of any significant equipment out-of-service, response to all credible and major contingencies is investigated. The loading or other key system parameter (KSP) is varied to determine the proximity, or margin, to a security problem. For example in voltage security assessment, one may employ P-V and/or V-Q curves [1] with the distance to the nose representing the margin. The allowable margins and associate reliability criteria are based on the regional council guidelines, e.g., [2]. s for each scenario can be determined and documented in look-up tables or nomograms. The operator will then base the real time decisions on this information. Look-up tables have the obvious drawback of inflexibility and are prone to errors, as operators must search for the relevant scenario in the tables. Nomograms on the other hand provide slightly greater flexibility as they depict trade-offs in operating conditions, for example between some loading condition and a transfer across a key interface. Still, nomograms fail to fully capture all the information contained in the off-line studies and moreover lack the ability to manage more varied situations. Note this practical approach differs significantly from much of the on-line security literature. Those approaches focus on contingency screening and fast methods for calculating the security. While in practice, the security limits are tabulated off-line as described above. In recent years, there have been several ANNs based methods introduced for finding security limits [e.g., 3-4]. The essential idea is to select a set of representative features, say line flows, loads, generator limits and so on, and train the ANN on simulation data so that one can estimate the security margin. The ANN is expected to interpolate or generalize to similar unstudied cases. The problem with much of this previous work is that researchers have focused on generic power system models that ignore the practical difficulties in determining these limits. Our earlier work has shown that accurate estimates can be obtained for voltage security on practical systems, specifically, the WSCC system [5], only by developing very narrowly focused s. For example, different ANNs need to be trained based on specific major equipment outages and security criteria. In this paper, this early framework is extended to other security considerations. A hierarchical design combining margin s for different security criteria and operating conditions is developed. A voting mechanism is introduced that combines individual ANN estimates. Each ANN is designed using statistical criteria that ensure optimal performance [6]. Numerical examples show the viability of the approach. 2. Background 2.1 Operational Planning and Reliability Policies System security depends on the cooperation of different interconnected entities to coordinate operation of the system. The primary method to ensure this coordination in practice is to establish precise guidelines for the allowable effects neighboring systems may have upon each other. These

guidelines are based on both field experience and extensive operational studies. Different performance levels are used depending on the type of disturbance. For example under WSCC guidelines, allowable post transient voltage deviation is 5% for a single generator outage and 10% for the outage of two generators. Thus, each reliability criteria depends on the type of disturbance. The disturbance should not violate constraints on: loading within emergency equipment ratings, transient voltage dip both in percentage deviation and in time duration, minimum transient frequency, post transient voltage deviation, positive damping, i.e., stability. Operation planners generally address these criteria through detailed time domain simulation studies for different loading conditions and all major contingencies. In addition, there may be further requirements on running system studies. In the WSCC, this includes using both the P-V method (MW margin) and V-Q method (MVar margin) to determine an adequate voltage security margin. System operators, to greater or lesser degree depending on the utility, tend to rely heavily on the limits identified by operational planners and make relatively limited use of on-line security tools. For on-line static security analysis, modern computational speeds allow load flow studies of a large number of contingencies in near real-time. Such software is a standard component of the energy management system (EMS), although it should be noted that this software usually does not directly compute a security margin. On-line dynamic security has focused on using fast methods to quickly determine system stability including both time-domain simulation for transient stability indices and various energy function based methods. This in sharp contrast to the comprehensive, detailed and time-consuming studies employed in operational planning. Voltage security has been based primarily on static or pseudo-dynamic methods. 2.2 Remarks In order to bridge the gap between the practical procedures employed to determine power system interface limits and the various proposed methods for on-line security, we note the following should be considered: Operational planning methods cannot identify all possible operating conditions that may arise and are generally too slow to repeat on-line when unstudied system conditions arise. Operators do not have full access to all the detailed assumptions that might have been used in an off-line study. Further, they only have access to the conclusions of a study, i.e., the actual transfer limit and limiting outage, and not all the underlying case studies that might have been performed. Many of the proposed on-line security methods are fast methods to determine security but are not as effective at determining a practical operating limit, say, the transfer between systems. The various proposed on-line security methods work well under certain conditions but will fail at other times that may not be well-understood. Most of the on-line security methods do not base assessment on the detailed reliability requirements employed by the various regional councils. Practical system security assessment always has a certain degree of system specific considerations that do not lend themselves to more formal analysis. In the following, a framework is introduced to address these concerns and to take advantage of the benefits of both approaches. 3. Real-time Security Framework 3.1 Proposed Security Analysis Approach The primary method to take better advantage of the off-line operational studies is to form a type of associative memory. That is, each of the studies cases is recorded in terms of the system conditions and the estimated security margin. Our earlier studies have shown the following [5]: Simple linear regression models cannot accurately estimate the security margin. Feedforward ANNs have the best understood design criteria and for this type of estimation problem display the most favorable performance. No single appears to be workable across a variety of security indices or widely different network topologies regardless of the number of study cases. A family of smaller ANNs with different network parameters whose estimates are combined through a voting mechanism will perform better than a single large ANN. We propose then several layers to the on-line estimation of security limits. At the highest level, the current state and major equipment outages are used to identify the appropriate set of margin s. This is depicted in Fig. 1. The set of s includes different s for different topologies, this means not necessarily a separate for each outage scenario but say an which represents the base case, a wide range of operating conditions and includes the possibility of one or possibly two major

State Estimator Major Equipment Outages Set 1 Set 2 Set 3 equipment outages. This is in addition to the fact that the margin itself includes consideration of all contingencies. This is emphasized graphically in Fig. 2. At the lowest level, a family of ANNs is used to estimate the security margin for a specific security criterion and operating condition. The structure of an for a given set of operating conditions and a specific security criterion is shown in Fig. 3. 3.2 Operating Planning Studies For each of the system performance criteria identified in section 2.1, the limits of the power system operation are established. This may be total load in an area, interface transfer limit or some other KSP. Starting from a base case, a set of relevant system variables is recorded and a full analysis of all major contingencies performed. The KSP is incremented and the analysis repeated until the limits of the system is identified. Thus for each performance criterion, there is a large set of studies that establish the operating limit and a correspondingly large set of variables describing the operating conditions. 3.3 Estimator Design Security margin s Minimum estimate Fig. 1 Overall security margin estimation A feedforward ANN based on the Levenberg-Marquardt algorithm is used [6]. There are five primary considerations in design of the neural networks. 3.3.1 Feature selection. Selected features should be based on engineering knowledge and statistical correlation coefficients between the seleted features and the computed security margins computed from security studies. These will typically be variables such as: real and reactive power flow, reactive power reserve, voltage levels, and so on. A large set of features can be selected and then reduced based on the correlation coefficients. 3.3.2 Principal component analysis. Principal component analysis (PCA) assesses the independence of the features in the selected feature set. This is in essence finding an A B orthogonal set of features to present to the, improving both training time and accuracy. For example the P-V margin for the WSCC system [5], the 106 system variables were reduced to 46 for training. 3.3.3 Hidden layers. Generally, multiple hidden layers will improve the approximation process and thus, two hidden layers are needed when finding estimates for larger systems with more complicated non-linearities. 3.3.4 ANN nodes and voting scheme. The number of nodes in the hidden layers significantly impact the performance. In the Bayesian framework of MacKay [7], the parameters are then estimated using statistical techniques. Here, several ANNs with parameters near the determined optima are trained. The estimates from these networks can be combined using a voting scheme. For example, one effective method is to disregard the lowest and largest margin estimates from such a set of networks and then average the remaining estimates. 3.3.5 Splitting training data for estimation and validation. A statistical theory of the overfitting phenomenon that may occur with ANNs is presented in [8]. If N is the size of the training set and W is the number of free parameters in the network with N<W, the optimum split of the training data between estimation and validation subsets is given by 2W 1 1 r opt = 1 (1) 2( W 1) where is r opt is the fraction to be used for training. 4. Numerical Examples C Fig. 2 Hierarchical structure of security margin s The proposed methodology has also been successfully applied to estimate the transfer limits on the WSCC system using a static method, P-V curves, to determine voltage security limits [5]. Here the examples are presented for dynamic events that satisfy the WSCC disturbance criteria for performance level A [2]. The performance of is demonstrated here using the New England 39-bus system. The system has been modified to represent a system with different zones and critical interfaces. Figure 4 shows a load center of buses 17,18 and 27 with three tie lines 3-18, 16-17 and 26-27. The total system loading for the base case is 6150.5 MW and 1658.90 Mvar. The flow

Inputs (feature set) network 1 network 2... network n Voting mechanism estimate across the interface of this load center is the parameter of interest here. Since this is a rather small system, satisfactory performance is obtained here using a simplified of only one ANN. To determine the security limits, detailed time domain studies are for each contingency under increasingly heavily loaded conditions. The transfer is incremented in 400 MW blocks and the point at which a performance criterion fails for a given contingency determines the transfer limit. This rather rough estimate of the transfer limit serves for demonstration purposes here but obviously would requirement more refinement for a practical system. Real and reactive power flows in the network are used to form the initial feature set. A line outage is represented by an arbitrarily large line flow in that line. 4.1 Voltage Instability The first performance criteria considered is voltage stability as seen by the post-disturbance voltage response. The Load center Fig. 3 Individual s with voting mechanism maximum voltage dip at any bus following a contingency cannot exceed 25% and a more than 20% dip cannot last for more than 20 cycles. The post-transient voltage dip should not exceed 5%. Finally, there must be positive damping. Note this obviously may overlap with the angle instability criteria. The designed ANN has a single hidden layer with 10 hidden nodes. There are 131 test cases of which 20% are used for testing. The overall performance is shown in Table 1 and indicates very low percentage errors. Notice also that the combination of PCA and correlation greatly reduces the number of needed features. Figure 5 plots these estimates for the test data. 4.2 Angle Instability The second performance criteria considered is angular stability. The minimum transient frequency dip at any bus following a contingency cannot exceed 59.6Hz for more than 6 cycles. Again, the system must have positive damping. The ANN has a single hidden layer with 15 hidden nodes. Again there are 131 test cases of which 20% are used for testing. The overall performance is shown in Table 2 and again there very low percentage errors are seen. Figure 6 plots these estimates for the test data. 5. Discussion Fig. 4 New England 39 bus system This paper proposes an involved framework employing ANNs to estimate on-line security estimates. The primary advantage of the approach is in taking advantage of the numerous detailed off-line studies performed during operations planning. At the same time, it does create an added burden on planners to perform more extensive studies. In previous work, it was established that this methodology will work for practical systems for static security. This work demonstrates the initial stages on estimates for dynamic security. While the results appear promising, the difficulty in implementing these

Max error 1.0012 / 0.093% Table 1 Errors in estimate of voltage security limits Mean error Standard Deviation Min error 0.0062 / 0.0015% 0.3549 / 0.031% PCA (MW) 0.186 30 4 correlation Max error 1.9799 / 0.25% Min error approaches lies in applications for large systems. Larger systems not only contain more complicated non-linearities but also numerous system specific constraints that make application more difficult. Application to the WSCC system is on-going. Table 2 Errors in estimate of angular security limits Mean error Standard Deviation 0.0650 / 0.0041% 0.4096 / 0.060% PCA (MW) 0.602 32 6 correlation [8] S. Amari, N. Murata, K.-R. Muller, M. Finke, and H. Yang, Statistical Theory of Overtraining - Is Crossvalidation Asymptotically Effective? Advances in Information Processing Systems, Vol. 8, Cambridge, MA: MIT Press, 1996, pp. 176-182. Future efforts will also investigate the use of energy function methods and transient stability indices. While these methods have limitations that prevent establishing security limits definitively, by virtue of computational speed they would allow a more extensive set of studies to be carried out for training the ANNs. Acknowledgments This work was supported in part through the NSF Industry/University Cooperative Research Center PSerc. References (MW) 2500 2000 1500 1000 500 assessment using feed forward network assessment [1] C. W. Taylor, Power System Voltage Stability, McGraw- Hill, 1994, New York. [2] Western Systems Coordinating Council, Reliability Criteria, Aug. 1998. [3] A.A. EI-Keib and X. Ma, Application of Artificial Networks in Voltage Stability Assessment, IEEE Transactions on Power System, Vol. 10, No.4, Nov. 1995, pp. 1890-1896. [4] S. Chauhan and M.P. Dava, Kohonen Network Classifier for Voltage Collapse Estimation, Electric Machines and Power Systems, Vol. 25, no. 6, July 1997, pp. 607-619. [5] L. Chen, K. Tomsovic, A. Bose and R. Stuart, Estimating Reactive for Determining Transfer Limits, submitted to IEEE Transactions on Power Systems. [6] S. Haykin, Networks, a Comprehensive Foundation, 2 nd Edition, Prentice Hall, 1999, New Jersey. [7] D.J.C. MacKay, Bayesian Interpolation, Computation, Vol. 4, No. 3, 1992, pp. 415-447. 0 0 5 10 15 20 25 30 35 case Fig. 5 estimate for voltage stability Fig. 6 estimate for angle stability