• No results found

El Hombre y la Máquina ISSN: Universidad Autónoma de Occidente Colombia

N/A
N/A
Protected

Academic year: 2021

Share "El Hombre y la Máquina ISSN: Universidad Autónoma de Occidente Colombia"

Copied!
11
0
0

Loading.... (view fulltext now)

Full text

(1)

maquina@uao.edu.co

Universidad Autónoma de Occidente Colombia

Díaz, F. F.; Caicedo, N. G.; Murcia, F. J.; Candelo, J. E.

Security System for High-Frequency Oscillations in Isolated Power Systems El Hombre y la Máquina, núm. 28, enero-junio, 2007, pp. 78-87

Universidad Autónoma de Occidente Cali, Colombia

Available in: http://www.redalyc.org/articulo.oa?id=47802810

How to cite Complete issue

More information about this article Journal's homepage in redalyc.org

Scientific Information System Network of Scientific Journals from Latin America, the Caribbean, Spain and Portugal Non-profit academic project, developed under the open access initiative

(2)

Security System

for High-Frequency

Oscillations in Isolated

Power Systems

F. F. DÍAZ1 N. G. CAICEDO2 F. J. MURCIA3 J. E. CANDELO4 Resumen

Este artículo presenta el di-seño de un sistema de seguridad para oscilaciones bruscas de frecuencia para un sistema de potencia débilmente interconec-tado y que ocasionalmente opera aislado de un sistema de poten-cia fuertemente interconectado. Este sistema de seguridad debe operar en tiempo real y se basa en algoritmos de decisión que tienen como objetivo evaluar el riesgo de pérdida de estabilidad y determinar una combinación de disparo de unidades de genera-ción y/o circuitos de carga. Para determinar las combinaciones de disparo, se considera la topología y punto de operación del sistema de potencia débilmente interco-nectado. Los algoritmos de deci-sión se desarrollaron combinando técnicas de inteligencia artificial con algoritmos secuenciales. La efectividad de las combinaciones de disparo obtenidas a través de los algoritmos de decisión, se 1 Electrical Engineer of Universidad del Valle, Cali, faferdi@gmail.com;

2 PhD, Professor of Universidad del Valle, GRALTA, glacadel@univalle.edu.co; 3 M.Sc, Technical Department Manager EPSA E.S.P Cali, Colombia. fjmurcia@epsa.com.co 4 Electrical Engineer and PhD Student of Universidad del Valle, johncandle@email.com. Fecha de recepción: Enero de 2007 Fecha de aceptación: Marzo de 2007

(3)

determinó con simulaciones en Dig Silent, donde se modeló un sistema de potencia débilmente interconectado cuando opera for-tuitamente aislado de un sistema de transmisión regional.

Palabras clave: Frecuencia, algoritmos de decisión, seguri-dad, operación aislada, potencia crítica de transmisión.

Abstract

This article presents the de-sign of a security system for high-frequency oscillations in isolated and weakly interconnected power systems. The security system operates online and is based on two decision algorithms, which evaluate the system instability risk and determine the generat-ing units and load circuits to be opened after a disturbance. In order to determine the generator tripping and load shedding com-binations, the topology and the operating point of the weakly interconnected power system is considered. The decision algo-rithms were developed combin-ing artificial intelligence and sequential algorithms techniques. The obtained tripping and shed-ding combination were simulated in DIG SILENT, where an iso-lated and weakly interconnected power system was modeled.

Key words:Frequency oscil-lations, decision algorithm, secu-rity system, isolated operation, critical power transfer.

In weakly interconnected power systems, the frequency stability is a fi rst order problem due to the interconnected line outage produces high-frequency variations and being able to conduct the power system to a collapse when the frequency is over limited [2].

When a high-frequency de-viation exists, the system can be conducted to an emergency condi-tion, therefore is necessary to take corrective actions using the security scheme, which allows restarting the normal operating condition of the power system.

The security scheme is imple-mented in the power system to avoid the instability, to minimize the risk of damage to generating plants, to diminish the possibility of cascade events as a consequence of the generation unit outage due to the high-frequency oscillations and to restore the system frequency close to a normal value. The security sys-tem presented in this article is based on two types of disconnections:

Under-frequency load shed-ding UFLS: its function is to avoid under-frequency instability when the generation is reduced after a disturbance [3], [4], [5].

Over-frequency generation trip-ping OFGT: its function is to avoid over-frequency instability when the generation exceeds the load after a disturbance [6], [7], [8].

This centralized scheme allows tripping generation and shedding loads to maintain the power system stability of weakly interconnected power systems after an intercon-nected line outage. In this case is necessary: Monitoring the genera-tion unit status, the interconnected line status and the load power, in order to evaluate the risk of reaching system instability, selecting the best shedding or tripping combination and sending the opening signals to

the breakers for an emergency con-dition. In order to maintain system stability, frequency variation must be inside a secure operating range when an emergency condition is presented.

2. Critical power transfer The system frequency variation df/dt depends on the operating fre-quency, the power imbalance PT and the system inertia H [9], as shown in Equation (1).

(1)

In Fig 1, a weakly intercon-nected power system is illustrated, the power imbalance between the generation and the load is refl ected in the power transfer though the interconnected line, therefore the critical power transfer is the maxi-mum power imbalance that a power system can support before reaching instability. It is considered that a system is unstable if the frequency varies in a divergent form outside of the operating limits. It means that the system cannot operate over the frequency limit fl over for an over-frequency condition and under the frequency limit fl under for an under-frequency condition.

1. Introduction

A sudden active power imbal-ance in a power system can be produced as a result of a topol-ogy change, for example, a line or generation outage [1]. This power imbalance affects the system fre-quency.

Figure 1. Simplifi ed diagram of a weakly interconnected power system. In order to calculate the critical power transfer though the intercon-nected lines, the generating power is increased maintaining a constant load and the interconnected line is opened. This procedure is repeated until fi nding a power imbalance in

df f0PT

(4)

the lines and the limit flover at gen-eration nodes, for over-frequency conditions. Similarly for under-fre-quency conditions, the generating power is decreased until finding the power imbalance in lines and the limit flunder at generation nodes.

4. Minimum load shedding for each under-frequency condi-tion.

A. Over-frequency condition The first criterion implies two conditions:

Condition 1: Maximum operat-ing power PGmax ≥ PD (2) Con: PGmax = Pni (3) (4) Where: PGmax Maximum generat-ing power for all the system units.

Pn Nominal power for the online units. n Number of generating units. PD Power system demand Pg Power generation for each online unit before generation are tripped PT

Power transfer through the interconnected line. Condition 2: Minimum power generation.

PGmax ≤ PD (5) With:

(6) Where:

PGmin: Minimum generating power for all the system units.

Pr: Minimum operating power for the online unit i.

The second criterion implies two conditions:

Condition 1:

This condition guarantees that the accelerating power after tripping generators does not conduct to over-frequency instability.

Pa ≤ PCRS (7) With:

3. Security system

From the topology and the operating conditions of the power system, the different load shedding and generation tripping combina-tions are evaluated and the best combination is chosen in order to maintain the system stability. These operations allow maintaining the frequency response inside a secure operating range.

The security system monitors: The generated active power and the breaker status for each generating unit, the active power demand of the automatic load shedding cir-cuits, the active power flow and the breaker status of the interconnected lines. From these variables and the operating constraints of the weakly interconected power system, the security function determines a load shedding and generation tripping combination in order to maintain the system stability after the inter-conected line outage.

The load shedding or generation tripping determined by the decision algorithms guarantees four techni-cal operating criteria:

1. Operation of the generating units inside an allowed range, after the units are tripped. 2. System stability after the load

shedding and generation trip-ping combination is carried out.

3. Selectivity of the provided service to the consumers, ac-cording to the economic-tech-nical criteria considered by the electric power companies.

Security System for High-Frequency Oscillations in Isolated Power Systems F. F. Díaz • N. G. Caicedo • F. J. Murcia • J. E. Candelo

PD = Pgi -PT

(5)

(8) Where:

Pa: Accelerating power after tripping generators.

Pd: Total tripped power PCRB: Critical power transfer for over-frequency

condition. Condition 2:

This condition guarantees that the accelerating power after trip-ping generators does not conduct to under-frequency instability.

Pa ≥ PCRB (9) Where:

Pa : Accelerating power after tripping generators. PCRB: Critical power transfer for

under-frequency condi-tion.

The technical criteria 3 and 4 are not applied for over-frequency conditions.

B. Under-frequency condi-tion

The first criterion implies two conditions: Condition 1: PGmax ≥ PD (10) With: (11)

� �

i=1n i PGmax = �Pn

The second criterion implies two conditions.

Condition 1:

This condition guarantees that after shedding the load circuits, the system reaches no over-frequency condition.

(13) With:

(14) Where:

Pmax Maximum tripped power. Condition 2:

This condition guarantees that after shedding the load circuits, the system reaches no under-frequency condition.

Pe ≥ Pmin (15) With:

Pmd = PTPmin (16) Where:

Pmin Minimum tripped power. In the third criterion, the electric company must define the priority in providing the service to the power demand. This priority is represented by means of a vector P, whose ele-ments contain the loads that are part of the automatic load shedding; the position of each element defines the priority in the provided service. For example, if the electric power company defines the vector P as Equation (17), then the load shed-ding circuits are C1, C2, C3, C4 and C5 and the load shedding orders in an emergency condition are C5, C4, C1 C3 and C2. P= [ C5 C4 C1 C3 C2] (17) + P -P

� �

n T i=1 �Pgi e PD= (12) Where:

Pe Total power shedding for the considered load combination. Condition 2:

This condition is similar to the over-frequency condition.

Pe ≤ Pmax Pmax = PT + Pmax

In the fourth criterion, the algo-rithm searches for a load shedding combination, whose total power Pa = Pd PT

(6)

is approximately equal to the load shed power, as defined in Equation (18)

Pshedding = PT - PCRB (18) 4. Determination of the

tripping and shedding combinations

The selection of a load shedding or generation tripping combination is carried out using criteria to con-duct the searching among the pos-sible solutions, which is determined by the topology and the operating point. Besides, the shedding or trip-ping combination must comply with the operating criteria.

A Load shedding algorithm Due to the searching space size of a load shedding combination depends on the amount of the con-nected distribution circuits to the power system, a genetic algorithm is used as a technique oriented to the search of a shedding combination that complies with the established operating constraints in the techni-cal operating criteria.

The genetic algorithm is based on two basic ideas: The representa-tion of the combinarepresenta-tion by means of binary strings and the execution of an operator created from the genetic laws. Using the representation by binary strings, the size of the search-ing space depends on the amount of bits used to represent the shedding combination., if a binary string of L bits is used, the size of the searching space is 2L, it correspond geometrically to a hypercube of L dimensions. The convergence of the genetic algorithms for this represen-tation has been tested in [10].

The representation of the shed-ding combination is carried out sim-ilar to the chromosomal information in biological systems. Therefore, each gene represents the breaker status of a load shedding circuit and each chromosome corresponds to

the shedding combination.

In general, the genetic algorithm consists of three stages.

• Determination of the po-pulation in a systematic form.

• Systematic crossover of genetic information • Constraints verification. 1) Determination of the population

in a systematic form: Searching for the load shedding combi-nation that complies with the equation (19).

Pe ≥ Pshedding (19) Security System for High-Frequency Oscillations in Isolated Power Systems F. F. Díaz • N. G. Caicedo • F. J. Murcia • J. E. Candelo

Where

Pe Total active power of the selected load shedding combination. Pshedding Load shed

active power

2) Systematic crossover of genetic information: This process allo-ws to generate load shedding combinations for all the load breakers, therefore, two initial chromosomes are generated, Father 1 and Father 2, which are characterized by:

Father 1: To characterize this chromosome, a binary number of n bits are generated, where n rep-resents the size of the population and for each gene a bit of the binary number is assigned.

Father 2: the genes of this chro-mosome are opposed to the genes of chromosome Father 1.

Once the chromosomes are characterized, a systematic inter-change with genetic information is carried out in order to form the chromosomes Son 1 and Son 2, which represent the possible load shedding combinations. Fig. 2 shows this process.

(7)

Figure 2. Systematic crossover of genetic information

3) Constraints verifi cation: It verifi es that one of the chro-mosomes Son complies with the operating constraints. For example, if the population is characterized by the vector V= [X1 X2 X3 X4 X5] and the chromosome Son is characterized by the vector [0 1 1 0 1], it means that the load shedding combination is [X2 X3 X5]. If no Son complies with the criterion, the algorithm creates new Fathers and returns to the second stage.

B Generation tripping algorithm

As a searching strategy, the generation tripping combination is generated in a systematic form, according to the breaker status and active power of each generating unit, then a generation tripping combination is searched, which complies with the technical operat-ing criteria; if a solution exists, the searching strategy is able to fi nd it, but if the space is large enough, the required time to fi nd it can be long enough. Therefore, the searching strategy has a fast time of response in small power systems.

C Integrated Algorithm The security system for

(8)

Figure 4. Flow chart of the generation tripping algorithm

Figure 5. Flow chart of the integrated algorithm ed algorithm for the decision algorithm

operation according to the power fl ow direction through the interconnected lines. Figure 5. shows the fl ow chart of the integrated algorithm.

5. Validation of the decision algorithms

The validation of the decision algorithm was carried out in a small

power system interconnected to a large power system in radial dis-tribution. Therefore, this system is appropriated to validate the decision algorithms for the proposed security system. A simplified single-wire diagram representation of the sys-tem is shown in Figure 6.

This power system has two 13 MW generators and two 24 MW Security System for High-Frequency Oscillations in Isolated Power Systems F. F. Díaz • N. G. Caicedo • F. J. Murcia • J. E. Candelo

(9)

generators. Maximum load and generation were assumed in order to validate the decision algorithm.

The effectiveness of the pro-posed security scheme is evaluated by means of comparing the power system frequency with and without load shedding and generation trip-ping operation.

Table 1 shows the operating conditions of the power system before the interconnected lines out-ages. Fig. 7 shows the simulation results. Characteristic 1 shows how the system becomes unstable in a period less than 1.5 seconds, when no generators are tripped. Charac-teristic 2 shows the system stability when the determined generating units by the decision algorithm are tripped, for this operating condition units G1 and G4 are tripped, after the interconnected line outage.

Tables 2 and 3 show other operating conditions before the interconnected line outages. Fig. 8 presents the simulation results. Characteristic 1 shows how the system becomes unstable during a period less than 2 seconds when no generators are tripped. Characteris-tic 2 shows how the system becomes unstable during a period less than 1 second when no load shedding is carried out. The decision algorithms for this condition obtained that units G1 and G3 must be tripped, besides loads C1, C2 and C3 must be shed in order to obtain the balance between the power generation and the power demand when an interconnected lines outage is presented.

Due to the considered power system only has four generating units, there are a maximum number of 14 possible tripping combina-tions for an over-frequency condi-tion and it means that there is not always possible to fi nd a tripping combination to maintain system sta-bility for an over-frequency condi-tion, because it can be tripped more

Figure 6. Simplifi ed single-wire diagram of a weakly interconnected power system

System conditions G1 G2 G3 G4 L1 L2 LC1 LC2

Initial State of the

Breakers 1 1 1 1 1 1 1 1

Active power

[MW] 12 11.5 23 23.4 18 18.2 16.2 17.5

Reactive power [MVAR] 0.4 0.4 0.5 0.5 0.1 0.2 1.35 0.11 Power fl ow direction (-) (-) (-) (-) (+) (+) (+) (+)

Table 1. Operating conditions for the case OFGT

System conditions G1 G2 G3 G4 L1 L2 LC1 LC2

Initial State of the

Breakers 1 1 0 1 1 1 1 1

Active power

[MW] 10 10 0 20.3 7.4 7.6 11.65 13.65

Reactive power [MVAR] 0.13 0.12 - 0.11 0.09 0.11 0.3 0.25 Power fl ow direction (-) (-) - (-) (-) (-) (+) (+)

Table 2. Operating conditions for the case UFLS-OFGT

Circuit C1 C2 C3 C4 C5 C14 SP IND

Active Power [MW] 1.61 2.58 0.80 2.68 0.89 0.19 2.66 1.57

Circuit C6 C7 C8 C9 C10 C11 C12 C13

Active power [MW] 2.5 0.25 2.78 0.19 0.74 2.72 0.82 2.3 Table 3. Operating conditions for the case UFLS-OFGT

(10)

than the required power and reach-ing under-frequency instability. Therefore it is not necessary to trip generating units to avoid

over-fre-Figure 7. Frequency response on time for the isolated system – case OFGT

Figure 8. Frequency response on time for the isolated system – case OFGT - UFLS

quency instability and to shed load circuits to avoid under-frequency instability. The load shedding and generation tripping obtained by the Security System for High-Frequency Oscillations in Isolated Power Systems F. F. Díaz • N. G. Caicedo • F. J. Murcia • J. E. Candelo

(11)

decision algorithm are effective for an over-frequency condition. 6. Conclusions

The security system for abrupt frequency oscillation in isolated power systems is characterized by:

– Online operation.

– Being adaptable for differ-ent operating conditions of the power system.

– Guarantying the frequency stability of the weakly inter-connected power system. – Using optimization criteria

for load shedding.

– Recovering frequency of the weakly interconnected power system when it oper-ates isolated from a stronger interconnected power. The methodology conception for the OFGT and UFLS func-tion design is flexible, generic and includes the operating system constrains.

The operating constraints are used independently of the search-ing process; therefore they can be eliminated or added. This allows the design to be adaptable to other weakly interconnected power sys-tems.

[2] J. Bucciero, and M. Terbrueggen “Interconnected Power System Dy-namics Tutorial: DyDy-namics of Inter-connected Power Systems Tutorial,” Electric Power Reasearch Institute, EPRI, 3rd Ed, Jan 1998.

[3] Ch. Concordia; L.Fink.; G. Poullik-kns. “Load Shedding on an Isolated System.ʼʼ IEEE Trans. Power Sys-tems .Vol. 10, No. 3. Aug. 1995. [4] A. Elices, L. Rouco, “Análisis

Fun-damental del Impacto de la Reserva Primaria en Sistemas Eléctricos Aislados”. Actas de las Séptimas Jor-nadas Hispano-Lusas de Ingeniería Eléctrica, Leganés, 4 - 6 Julio 2001, Volumen II, páginas 335-340. [5] Haibo Y., V. Vittal, and Z. Yang,

“Selfhealing in power systems: an approach using islanding and rate of frequency decline-based load shed-ding,” IEEE Transactions on Power Systems, vol. 18, pp. 174-81, 2003. [6] Takahashi, K. Matsudawa, “Fast

generation shedding equipment based on the observation of swings of generators” IEEE Transactions on Power Systems, Vol. 3, No. 2, May 1988.

[7] Colombia. Esquema de Rechazo Automático de Generación - RAG para la subestación Chivor. Direc-ción PlaneaDirec-ción De La OperaDirec-ción. Documento ISA UENCND 180-03. Medellín, Octubre 21 de 2003 [8] Jarquin, E. Mora, E. Godoy, J. León.

Reliability Analysis for a Generation Shedding Scheme on the CFE Main Transmission Network. In 29th an-nual western protective relay confer-ence spokane, washington october 22-24, 2002

[9] J. J. Grainger, W. D. Stevenson. Análisis de Sistemas de Potencia. Ed. McGraw-Hill. 1998.

[10] M. Mitchell, “An Introduction to Genetic Algorithms” A Bradford Book,The MIT Press, 1998. Bibliography

[1] P. Kundur, Power System Stability and Control, Mc Graw-Hill, 1994.

References

Related documents

be covered by formula as melody or harmony, but to a greater improvisational degree. After playing melodically with the formula, practice playing those same avail­ able

and/or travel itinerary. The retailer identifies the traveler and uses the Travel Companion as a one-to-one channel for communications and support for marketing strategies.

This was evident in the narrative of her life, from her birth in the 1950s in a segregated country in which she was marginalised on grounds of her race, to her

Conference”, Malang, Indonesia, 27-29 November 2007, sponsored by Leiden University and the Indonesian Ministry of Religious Affairs.. boarding schools) 2 leaders frequently

[r]

Podem extreure dades i metadades dels dos elements, tot i que Twitter ens ofereix més variables per extreure més informació com per exemple de cerques, però aquesta informació

negative reinforcer undergoes extinction. Incompatible behavior is then less and less strongly reinforced, and the punished behavior eventually emerges. When punishment again

The effect on the profit and loss account for comparative figures for first-quarter 2006 is an increase in operating revenues of NOK 224 million and an increase in pre-tax profit