Documente Academic
Documente Profesional
Documente Cultură
CHAPTER 1
INTRODUCTION
1.1
INTRODUCTION
As power systems become more complex and more heavily loaded,
1.2
behavior can be understood by studying the steady state voltage profile under
various loading levels. Maintaining adequate voltage stability level has
become a major problem because many utilities are squeezing the maximum
possible capacity from their bulk transmission network to avoid the capital
cost of building new lines and generation facilities. A common measure of
static voltage stability is MW/MVAr distance to point of collapse. Q-V and PV curves are commonly used methods for static voltage stability studies. The
shape of the P-V curve (Mansour 1994) shown in Figure 1.1 is similar to that
of a parabola. The knee point of this parabola gives the critical loading of the
bus. The distance between the operating point and the knee point gives the
voltage stability margin in MW for the given load factor (Van cutsen and
Vournas 1998). Voltage stability has been defined in terms of ability to
maintain voltage so that when load admittance is increased, load power will
increase and so both the power and voltage are controllable. The curve shows
the bus voltage as a function of total load. The tip of the curve is associated
with voltage collapse. Voltage and power are controllable in the upper region
of the P-V curve. Assuming a contingency such as loss of a line occurs at the
base case loading and the system destabilizes after the transients, the voltage
profile as a function of loading will move to the contingency state. It can be
seen that the nose point moves to a lower loading and the loading margin is
reduced.
1.3
the power systems secure operation in all conditions and at all operating
points. In this thesis the security assessment is studied by using L-index
method. L index is proposed as a good voltage stability indicator with its
value change between zero (no load) and one (voltage collapse) (Kessel and
Glavitsch 1986). Moreover, it can be used as a quantitative measure to
estimate the voltage stability margin against the operating point.
1.5
EVOLUTIONARY ALGORITHMS
Evolutionary Algorithms (EAs) (Fonseca and Fleming 1995) are
stochastic and direct search optimization algorithms which are inspired by the
process of natural evolution. Most of the EAs descend from Genetic
Algorithm, Evolutionary strategies and Evolutionary programming which
work independently with developed approaches. All these algorithms work on
the basis of organic evolution models.
EAs differ from other optimization methods in possessing the
following features:
EAs search from a population of points and not a single point.
The population can move over hills and across valleys. EAs
can, therefore discover a globally or near globally optimum
point. The computation for each individual in the population is
independent of others, since it has inherent parallel
computation ability.
EAs use information directly for search direction, not
derivatives or other auxiliary knowledge. EAs, therefore can
deal with non-smooth, non-continuous and non-differentiable
functions that are the real life optimization problems.
EAs use probabilistic transition rules not deterministic rules,
to select generations, so they are a kind of stochastic
Genetic Algorithms
Genetic algorithms (GA) (Goldberg 1989) are generalized search
1.5.2
10
LITERATURE REVIEW
Voltage stability is a major aspect of power system security
controls the system in the pre-contingency state such that voltage stability
margins are maintained with respect to potentially dangerous contingencies.
11
programming
is
special
form
of
nonlinear
12
13
Voltage
Security
Constrained
Optimal
Power
Flow
14
2003) for
15
16
17
optimal set. This approach is time consuming and tends to find weak Paretooptimal solutions. But the ability of evolutionary algorithm techniques like
genetic algorithm to find multiple optimal solutions in one single simulation
run makes them unique in solving multi-objective optimization problems
(Deb 2001).
1.6.2
et.al. 1999).
FACTS devices are good choice to improve the static voltage
stability in a power system, which operates near the steady state stability limit
and may reach in voltage instability of the system (Farsangi et.al. 2006 and
2007). The benefits in increasing the system transmission capacity and power
flow (Saravana et.al. 2007) controls the flexibility and rapidity by FACTS
devices. The PSO technique was used here to find the optimal location of
multi-type of FACTS devices with minimum cost of installation and to
improve the system loadability. The optimal location of SVC and other types
of shunt compensation devices for voltage stability enhancement is in
(Mansour et.al. 1994). A methodology for selection of static VAR
18
19
20
21
be the most vulnerable bus in the system. Gao et.al. (1992) developed the
modal analysis technique to compute the voltage stability level of the system.
A simple and efficient algorithm for the alleviation of line
overloads and voltage violations by corrective rescheduling is proposed in
Bijwe et.al. (1993) and the stability constrained optimal power flow in
Lukmanul et.al. (2009) considers generation rescheduling and load
curtailment as the control variables of the optimization problem. The
development of non linear methodology for evaluating load shedding as a
corrective action to improve the dynamic security of power systems when
angle or voltage instability is detected is in Enrico et.al. (2000). Yue et.al.
(2006) discussed the corrective control for the voltage stability of complex
power systems based on Primal- Dual Interior point method. Sarosh and
Ramesh (1994) dealt with control actions to counter the ill effects of sudden
disturbances. Wang et.al. (1998) solved both preventive and corrective control
problems for satisfying a certain level of the voltage stability margin, but the
condition at the base solution after applying the controls is not taken into
account. Angel et.al. (2010) present a sensitivity based heuristic tool to
determine corrective action, so as to help the system operator in the reactive
power flow control problem. An iterative approach was solved by (Florin
et.al. 2008 and 2009) with the corrective action for coupling optimization and
dynamic simulation of voltage instabilities. Generator ramp rates can
significantly restrict the speed with which active power is rerouted in the
network. In the above literature the heuristic tool used to solve these
optimization problem leads to premature convergence and degrade its
performance and reduces its search capability.
Hence in this thesis in chapter 4, Particle Swarm Optimization
(PSO) algorithm is proposed to solve the OPF optimization through corrective
control strategy of voltage security enhancement problem with the
22
voltage security constrained OPF problem which can be used for power
system rescheduling. The following issues are addressed in developing the
Evolutionary Algorithm- based approach to solve the voltage security
enhancement problems.
Representation of the solution
In the conventional methods, the solution variables are represented as
a continuous one. But, in practice, those values are discrete in nature, such as the
transformer tap setting and capacitor setting. So, a natural representation of the
solution variables is proposed.
Evaluation of the solution
The power system operator has the control to vary only a few
variables in the system. Some of these independent variables called control
variables will be represented as solution variables in the population. From
those candidate solutions (control variables), the dependent variables (state
23
secure and cost effective operation. Power system security is a very complex
multidimensional problem. It is suggested that improvements of power system
security can be achieved by complementing and/or modifying both
operational philosophy and control, which naturally includes technology and
infrastructure. However, suggestions for such improvements should be
supported by demonstration of incentives. These statements also form the
basis for the work summarized in this thesis.
The major objectives of the research work are,
Implementation of multi-objective genetic algorithm for
voltage security enhancement.
Optimal placement and sizing of SVC for voltage security
enhancement.
Inclusion of the ramp rate constraint in the contingency
control problem.
24
25
in the system and the location of SVC device is done by the voltage stability
evaluation called L-index method.
Chapter 4 The Particle swarm optimization technique is used to
solve the security enhancement problem with a corrective control strategy.
This chapter explains the problem formulation with the inclusion of the
generator ramp rate constraints. Simulation results have been obtained from
the IEEE 30-bus and IEEE 57-bus test systems to demonstrate the
effectiveness of the proposed approach to improve the voltage stability of the
system. The optimal results are presented.
Chapter 5 presents the summary of the thesis and the specific
contribution of this research work as well as the directions for future work.