A Novel Method of Static Security Analysis Based on Multithread Technology

Article Preview

Abstract:

With the UHV (Ultra High Voltage) power grid construction and the interconnection of regional power grids, the scale of power grids in China is increasing rapidly. At the same time, significant uncertainty and variability is being introduced into power grid operation with the integration of large-scale renewable energy in power systems. All of these pose an enormous challenge to the operation control of power systems in China. For a long time, online static security analysis, as an important part of EMS (Energy Management System), has been an effective tool for power grid operation. However, it is increasingly difficult for traditional static security analysis in serial computing mode to be online applied in bulk power grids in China. A new practical parallel approach for online static security analysis is put forward in this paper. A multithread parallelism is introduced into contingency screening, detailed contingency evaluation and decision support for reducing the execution time. By employing the multithread technology, the hardware resources of multi-processor/multi-core computer can be fully used and the program can be speeded up effectively. The performance of the parallel static security analysis is demonstrated by tests on two large-scale power systems. The test results show that the proposed method can be online applied in real bulk power grids.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 732-733)

Pages:

639-645

Citation:

Online since:

August 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] B. Stott, O. Alsac, and A. Monticelli, "Security analysis and optimization," Proceedings of the IEEE, 75, No. 12, p.1623–1644, 1987.

DOI: 10.1109/proc.1987.13931

Google Scholar

[2] J. S. Wu,Static Security Analysis on Electric Power System, Shanghai: Shanghai Jiaotong University Press, 1985 (in Chinese).

Google Scholar

[3] G. Ejebe, B.F. Wollemberg, "Automatic contingency selection," IEEE Trans. Power Apparatus Syst, PAS–98 (1), p.97–109, 1979.

DOI: 10.1109/tpas.1979.319518

Google Scholar

[4] J.A. Refaee, M. Mohandes, H. Maghrabi, "Radial basis function networks for contingency analysis of bulk power systems," IEEE Trans. on Power system, 0885–8950, vol.14, no.2, p.772–778, 1999.

DOI: 10.1109/59.761911

Google Scholar

[5] D. V. M. Chary, J. Amarnath, "Power System Contingency Analysis Using Complex Valued Neural Networks," International Journal of Applied Engineering Research, 0973–4562, vol.4, no.9, p.1789–1800, 2009.

Google Scholar

[6] C. Tinguely, A. Bart, A.J. Germont, "Knowleadge base for and expert system used for steady state security analysis," Electrical Power Energy Syst. 16 (1), p.49–58, 1994.

DOI: 10.1016/0142-0615(94)90057-4

Google Scholar

[7] J. C. Mendes, O. R. Saavedra, S. Feitosa, "A parallel complete method for real-time security analysis in power systems," Electric Power Systems Research, 56, p.27–34, 2000.

DOI: 10.1016/s0378-7796(00)00094-8

Google Scholar

[8] A. B. Alves, A. Monticelli, "Static security analysis using pipeline decomposition," IEE proceedings. Part C, Generation, Transmission, and Distribution, 1350–2360, vol. 145, no. 2, p.105–110, 1998.

DOI: 10.1049/ip-gtd:19981785

Google Scholar

[9] D. Butenhof, "Programming with POSIX threads," Addison-Wesley Professional Computing Series, 1997.

Google Scholar

[10] S. M. CHAN, V. BRANDWAJN, "Partial matrix refactorization," IEEE Trans. on Power System, PWRS-1(1), p.193–200, 1986.

DOI: 10.1109/tpwrs.1986.4334868

Google Scholar

[11] B. Q. Tang, F. Li, Y. J. Yu, et al, "Online contingency analysis considering automatic device simulation for large power systems," Automation of Electric Power Systems, vol. 35, no. 14, p.107–111, 2011 (in Chinese).

Google Scholar