Digital computer applications in the control of electric power systems

Digital computer applications in the control of electric power systems

Digi tal Computer Applications to Process Control, Van Nauta Lemke, ed. © IFAC and North-Holland Publishing Company (1977) TA~ 0. UTE 5-4 TIO:; O...

1MB Sizes 0 Downloads 62 Views

Digi tal Computer Applications to Process Control, Van Nauta Lemke, ed. © IFAC and North-Holland Publishing Company (1977)

TA~

0. UTE

5-4

TIO:;

O:T O-"-J

o ~

e Cle ela

Ele vela

,0 ia -

a er re

Ool

I TRODUCTIO The evol tion of a toma ion in s stems has kept pace with ec a a es in da a-acquisition, on and ma -machine interfaces. These are based on the real-time appli digital comp ers. A s r e of rol in power s s em b Quazza [lJ

A

OPE OF

AB TRACT This

I

owe

cen

733

Y rE· OPE

TIO~

D::i: I

734

S-4

IO~T

L

As we

tions er ain a

Direct

0

ro

or

being Insti plant ins a lations herma are bei

o era s 0

e

e 0

ap::--=-=-ca-:

- _e

co_...... ::o~ or.: ·'-ers.

e

5-4

735

ower co.=:--la','::'._o or.e :,oc,=-·

0::

~.a·:

-e

- 2-:: -::':--.e e~se 0:.. '"'e-.-· a:.i. '"'L ~o~.:.ro'=- :.. . o~ -~e

I...er_:.::'a'=-i~e

:.i.e-~::'~-..e

~e~e __:.::'a:i.=e

-

::.~_

v~a:.

eal...~. ~_e.:

e ...

e-'::'a:.::'o~~

-..rt e::'e

a ';;e,-e ..:.::'a:":' ze':' a:,:,::' ::'s a. a-'c',,;e

:,r e::~e

~

..

I

736

TA

5-4

of

lant

rol The opti izin use

layer

rol "ti e

0

o o si er sec

0

t rbine

SUPER ISORY

0 TROL OLT

E CO=TROL

owe

svs em

on ro

ITI

5-4

TE

OL 0

APPLICATIO S I

E~EC

IC

0 E

S S E·

737

o

T is has vo e 0 ical ion, esign 0 the sophis i a-

mantion

Let s look more lose i to he 0 ce t o~ s stem sec rity. yste security is t e ability of a power system in normal operation to un er 0 a is rbance witho t ettin in 0 an emergency con ·tion. In ractice, system security is etermined with refere ce to a so-called e t- 0 in en et whi h is an arbi rary subset of the complete isturban e set. The hoice 0 the om osition of the next-contingency set is based in the probability of occurrence 0 the contingency within a short period 0 ime (in the or er of minutes) into the uture and the onsequences to the system shoul the contingen y occur. For a given set of system 0 erating req irements, the space of all easib e normal operating states may be partitioned into wo disjoint s bspaces - sec re and insecure. That is, a normal operating system is either secure or insecure. The operating point may be the ost economical but it may be insecure. In which case, security may be ob ained at a rice, the cost incurre in leaving he most economical 0 erating point. e see that the addi ion of security onsi erations in the desi n of control ce ters entails he seq ence 0 unc ions, as fol ows: (1) I entify whe her not.

he system is

he a li a io s 01 make ime ata as acquire rom the here i ow a rend to rocess the ata ~irst b s ate estimation proce res. Present state estima ors a ress steady-state on it·ons only. Althoug there are ·us a few 0 rol enters with state estimatio i service, the value to operation 0 this function i becomin more wi ely a knowle ed. As presently racti e , state estima ion is used or ecurity onitoring an ec ri y Analysis (see Asal [15J, Peterson [16J, Dopazo [17J). Security Analy is Se urity Anal sis (SA) onsists of two funcions. The irst unction is to determine whether the normal system is secure or insecure. This is commonly k own as "ontingen e aluation" since, by de inition, the security 0 a system is etermi ed with reference 0 a set 0 next-contingencies. The second fun tion is to etermine what orrective action hould be taken when the system is in ecure. In

state-o - he-art,

or al or

(2) If normal, etermi e whe her the s em is ot nor al, go 0 sec re or i secure. I ep

( 3) I 0

ly

e ac ion

insec ake

re.

( )

tion

0

.a e

e s me ho =or eas

Sec

g

i e era i on re ires a a grea er s a e b a co rol

738

c ..

5-4

(2)

s

rol

739

5-4

o

ly

e

Re

U:·· R

r.:ea '~ ...~e a:.. . :.:-:e i. e. a~~ 'wa::e

S-4

APPL C rTllO S

740

R:2F:2

A

ers and inibe instal e . p i a ions are s ill qui e rare. evelo ment proje ts omp ters for ro e no ma'or breakthro hs

The se 0: ig al power real- ime

lk

om

E

.

[ J

, "Power P a lark D.R. an Bilski, R. mere I;::, t DD - Were Has I Bee an oing" , 75-537, P oceedings I A-75 on ere ce, ilwaukee, October 1975·

[ J

Bea, D.E., "The Plan omputer As An Opera in Too ", 75-539, Pro eedin lSA-75 on eren e, ilwa kee, October 1975.

[5J

an il, .A., "DDC - A van a es Over onventional ontrol", 1976 EEl 0 P er Fo . Lo i , e tember 1976.

[ J

a agna, L. , " on rol ompu er y terns in Gene a in a io in 0 tario Hy ro", 916 EEl om u er Forum, t. Lo is, ep ember 91 a ro

moni orin . service have s power cir i breakers sec rity analysis. servi e at 8 on ro

:::=

, "Do umenta ion of ess Comp ters ompen iu , Re earch

is i

[8J e ica io ren ion an

[lOJ

[ 1J

e,

_Ht::

8-4

0

m_o

741

[17J

[ 8J

Loa -92,

[19J

[20J

[15J

U

Y

Offi-

ober 1 75.

[21J

[16J

ar e , stem for om any ry amp ter Orleans,