Lecture 10 Power System Security Dr.QI Huang School of Energy Science and Engineering,UESTC
Lecture 10 Power System Security Dr. QI Huang School of Energy Science and Engineering, UESTC
Contents Introduction Secure state ■ Security analysis-linear sensitivity analysis method 电力拿镜广城洲量写控制四川省重点实验蜜 家电
电力系统广域测量与控制四川省重点实验室 Contents Introduction Secure state Security analysis-linear sensitivity analysis method
Introduction Power system not only needs to be economic, but more needs to be secure. System security:the system can continue to be in normal operation state after some devices get faulted. How to guarantee (enhance)system security? o Reserve Enhance the reliability of the devices Operator's decision making 电力拿镜广城洲量写控制四川省童点实验蜜 家电
电力系统广域测量与控制四川省重点实验室 Introduction Power system not only needs to be economic, but more needs to be secure. System security: the system can continue to be in normal operation state after some devices get faulted. How to guarantee (enhance) system security? Reserve Enhance the reliability of the devices Operator’s decision making
Introduction System security has three functionalities: 口系统监视(System Monitoring.) 口预想事故分析(Contingency Analysis.) ▣考虑安全约束的最优潮流(Security-constrained optimal power flow) 电力康镜广城测量与控制四川省重点实验蜜 家电
电力系统广域测量与控制四川省重点实验室 Introduction System security has three functionalities: 系统监视(System Monitoring) 预想事故分析(Contingency Analysis) 考虑安全约束的最优潮流(Security-constrained optimal power flow)
Introduction System monitoring Voltage,current,power flow,breaker status,switch status; frequency,generator output,tap changer,etc. SCADA,state estimation Contingency analysis: Perform analysis of possible faults beforehand,and then make plans for outages,or alert when the outages are to be occuring Security constrained OPF Optimal dispatch ▣Post-fault analysis Secure dispatch Post-fault security 电力镜广城测量乌控制四川省重点实验蜜 家电
电力系统广域测量与控制四川省重点实验室 Introduction System monitoring Voltage, current, power flow, breaker status, switch status; frequency, generator output, tap changer, etc. SCADA, state estimation Contingency analysis: Perform analysis of possible faults beforehand, and then make plans for outages, or alert when the outages are to be occuring Security constrained OPF Optimal dispatch Post-fault analysis Secure dispatch Post-fault security