Framework for trajectory-based probabilistic security assessment of power systems

Samuel Perkin*, Camille Hamon, Ragnar Kristjansson, Hlynur Stefansson, Pall Jensson

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

2 Citations (Scopus)

Abstract

Transmission system operators prepare against threats to system security through preventive actions and the planning of corrective actions. Required actions are determined by performing security analyses according to some reliability management approach and criterion. Probabilistic approaches have been proposed as an alternative to the deterministic N − 1 approach, by using a probabilistically filtered contingency list. This study begins by formally defining system trajectories, as a means of connecting the initiating contingency to the system response, corrective control, and restoration activities. A system trajectory considers the realisation of exogenous variables, as well as a sequence of contingencies and the subsequent system response and control behaviours. Using this definition, it is argued that the system trajectory should be modelled until service and component outages are resolved, rather than only modelling its reaction to the initiating contingency. The authors then propose some simplifying assumptions to achieve a scalable approach to probabilistic real-time security assessment. To support this argument, contingency-based and trajectory-based probabilistic security assessments are compared in terms of their residual risk (the risk associated with future system trajectories that are not modelled). This comparison shows that security assessments based on trajectories allow for previously implicit assumptions on modelling accuracy to be made explicit.

Original languageEnglish
Pages (from-to)1088-1094
Number of pages7
JournalIET Generation, Transmission and Distribution
Volume13
Issue number7
DOIs
Publication statusPublished - 9 Apr 2019

Bibliographical note

Funding Information:
(Springer, New Delhi, 2014), pp. 67–84 Vaiman, M., Bell, K., Chen, Y., et al.: ‘Risk assessment of cascading outages: methodologies and challenges’, IEEE Trans. Power Syst., 2012, 27, (2), pp. 631–641 IEEE PES CAMS task force on understanding, prediction, mitigation and restoration of cascading failures: ‘Initial review of methods for cascading failure analysis in electric power transmission systems’. 2008 IEEE Power and Energy Society General Meeting – Conversion and Delivery of Electrical Energy in the 21st Century, Pittsburgh, USA, 2008, pp. 1–8 Kirschen, D.S., Jayaweera, D.: ‘Comparison of risk-based and deterministic security assessments’, IET Gener. Transm. Distrib., 2007, 1, (4), pp. 527–527 Chen, Q., McCalley, J.D.: ‘Operational defence of cascading sequences’. 2011 IEEE Power and Energy Society General Meeting, Detroit, Michigan, USA, 2011, pp. 1–8 Grigg, C., Wong, P., Albrecht, P., et al.: ‘The IEEE reliability test system-1996. A techreport prepared by the reliability test system task force of the application of probability methods subcommittee’, IEEE Trans. Power Syst., 1999, 14, (3), pp. 1010–1020 Kile, H., Uhlen, K.: ‘Data reduction via clustering and averaging for contingency and reliability analysis’, Int. J. Electr. Power Energy Syst., 2012, 43, (1), pp. 1435–1442 eHighway-2050 Consortium: ‘D8.2.a enhanced methodology for the computation of demand/generation scenarios’, (EU Commission grant agreement 308908, 2015) Papaefthymiou, G., Kurowicka, D.: ‘Using copulas for modeling stochastic dependence in power system uncertainty analysis’, IEEE Trans. Power Syst., 2009, 24, (1), pp. 40–49 Growe-Kuska, N., Heitsch, H., Romisch, W.: ‘Scenario reduction and scenario tree construction for power management problems’. 2003 Power Tech Conf. Proc., Bologna, Italy, 2003, vol. 3, pp. 7–pp Rios, M., Bell, K., Kirschen, D., et al.: ‘Computation of the value of security’ (Manchester Centre for Electrical Energy, Manchester, UK, 1999), p. 17 Papic, M., Bell, K., Chen, Y., et al.: ‘Survey of tools for risk assessment of cascading outages’. 2011 IEEE Power and Energy Society General Meeting, Detroit, Michigan, USA, 2011, pp. 1–9 Novosel, D., Begovic, M.M., Madani, V.: ‘Shedding light on blackouts’, IEEE Power Energy Mag., 2004, 2, (1), pp. 32–43 Perkin, S., Svendsen, A.B., Tollefsen, T., et al.: ‘Modelling weather dependence in online reliability assessment of power systems’, Proc. Inst. Mech. Eng. O, J. Risk Reliab., 2017, 231, (4), pp. 364–372 Kile, H., Uhlen, K., Kjølle, G.: ‘Scenario selection in composite reliability assessment of deregulated power systems’, Int. J. Electr. Power Energy Syst., 2014, 63, pp. 124–131 Rios, M.A., Kirschen, D.S., Jayaweera, D., et al.: ‘Value of security: modeling time-dependent phenomena and weather conditions’, IEEE Trans. Power Syst., 2002, 17, (3), pp. 543–548 Heylen, E., Van-Hertem, D.: ‘Importance and difficulties of comparing reliability criteria and the assessment of reliability’. IEEE Young Researchers Symp., Gent, Belgium, 2014, pp. 1–6 Kirschen, D.S., Bell, K.R.W., Nedic, D.P., et al.: ‘Computing the value of security’, IEE Proc., Gener. Transm. Distrib., 2003, 150, (6), pp. 673–678 Panciatici, P., Bareux, G., Wehenkel, L.: ‘Operating in the fog: security management under uncertainty’, IEEE Power Energy Mag., 2012, 10, (5), pp. 40–49 McCalley, J., Asgarpoor, S., Bertling, L., et al.: ‘Probabilistic security assessment for power system operations’. IEEE Power Engineering Society General Meeting, Denver, CO, USA, 2004, vol. 2, pp. 212–220 Wang, Q., McCalley, J.D.: ‘Risk and N(휀? 1 criteria coordination for real-time operations’, IEEE Trans. Power Syst., 2013, 28, (3), pp. 3505–3506 Hofmann, M., Seljeseth, H., Volden, G.H., et al.: ‘Study on estimation of costs due to electricity interruptions and voltage disturbances’, SINTEF Energy Res., SINTEF technical report number is TD A6978, 2010, pp. 21–42 Henneaux, P., Kirschen, D.S.: ‘Probabilistic security analysis of optimal transmission switching’, IEEE Trans. Power Syst., 2016, 31, (1), pp. 508–517 Billinton, R., Li, W.: ‘Reliability assessment of electric power systems using Monte Carlo methods’ (Springer Science & Business Media, New York, USA, 2013) Zimmerman, R.D., Murllo-Sánchez, C.E., Thomas, R.J.: ‘Matpower: steady-state operations, planning, and analysis tools for power systems research and education’, IEEE Trans. Power Syst., 2011, 26, (1), pp. 12–19 Wächter, A., Biegler, L.T.: ‘On the implementation of an interior-point filter line-search algorithm for large-scale nonlinear programming’, Math. Program., 2006, 106, (1), pp. 25–57 GARPUR consortium: ‘D8.3 results from near real-life pilot testing’, (EU Commission grant agreement 608540, 2017)

Funding Information:
The authors would like to thank members of the GARPUR project for many useful discussions, in particular Efthymios Karangelos and Gudjon Hugberg Bjornsson. The research leading to these results has received funding from the European Union Seventh Framework Programme (FP7/2007-2013) under grant agreement no. 608540.

Publisher Copyright:
© The Institution of Engineering and Technology 2019.

Fingerprint

Dive into the research topics of 'Framework for trajectory-based probabilistic security assessment of power systems'. Together they form a unique fingerprint.

Cite this