Evaluation of Operating Domains in Power Systems

DOI: 10.4236/epe.2012.44037   PDF   HTML     3,962 Downloads   5,937 Views  


This paper presents the results of a recent major industry-supported study with the aim to provide power system operators with more meaningful and effective means to quickly identify feasible operating boundaries as well as more flexibility to select alternate operating scenarios. In this regard, the paper outlines the main theoretical basis and computational framework for the development of innovative computerized schemes capable of identifying and processing various system integrity domains. The novel framework allows system operators to determine – in a fast and reliable manner – the most favorable operating scenarios which maintain system security, reliability and operating performance quality. For demonstration purposes, and without loss of generality, an emphasis is given to the dynamic system security problem where the Transient Energy Function (TEF) method is used to define quantitative measures of the level (degree) of system security for a given operating scenario. Nonetheless, the framework presented is applicable quite as well to other system performance functions and criteria that may be considered. A demonstrative application is presented for a 9-bus benchmark system, widely used in the literature. In addition, a practical application is also presented for the Saudi Electricity Company (SEC) power system where the operating security domain was evaluated in the operating parameter space spanned by two major interface flows in the system.

Share and Cite:

M. El-Kady, Y. Alturki and M. Al-Saud, "Evaluation of Operating Domains in Power Systems," Energy and Power Engineering, Vol. 4 No. 4, 2012, pp. 274-282. doi: 10.4236/epe.2012.44037.

Conflicts of Interest

The authors declare no conflicts of interest.


[1] D. P. Popovic, D. M. Dobrijevic, N. A. Mijuskovic and D. J. Vlaisavljevic, “An Advanced Methodology for Steady- State Security Assessment of Power Systems,” ETEP, Vol. 1, No. 4, 2001, pp. 227-233. doi:10.1002/etep.4450110403
[2] M. S. Owayedh and M. A. El-Kady, “Integration of Economy and Quality Requirements: Practical Application to Power System Operation,” Proceeding of the 7th Saudi Engineering Conference, Riyadh, 26-28 November 2007, Paper # SEC-013.
[3] J. Aghaei, H. A. Shayanfar and N. Amjady, “Joint Market Clearing in a Stochastic Framework Considering Power System Security,” Applied Energy, Vol. 86, No. 9, 2009, pp. 1675-1682. doi:10.1016/j.apenergy.2009.01.021
[4] M.A. El-Kady, “Direct Analysis of Transient Stability for Large Power Systems,” Final Report, No. EL-4980, EPRI Project No. 2206-1, Ontario Hydro, Iowa State University, 1986.
[5] J. Srivani and K. S. Swarup, “Power System Static Security Assessment and Evaluation Using External System Equivalents,” Electrical Power and Energy Systems, Vol. 30, 2008, pp. 83-92. doi:10.1016/j.ijepes.2007.06.008
[6] Y. Zeng, P. Zhang, M. Wang, H. Jia, Y. Yu and S. T. Lee, “Development of a New Tool for Dynamic Security Assessment Using Dynamic Security Region,” Proceeding of the 2006 International Conference on Power System Technology, Chongqing, 22-26 October 2006, 5 p. doi:10.1109/ICPST.2006.321756
[7] M.A. El-Kady and E. A. Al-Ammar, “Framework for Identification of Power System Operating Security Regions,” Proceedings of 3rd International Conference on Network and System Security, Gold Coast, 19-21 October 2009. doi:10.1109/NSS.2009.16
[8] U. D. Annakkage and B. Jayasekara, “Ensuring Power System Security against Contingencies,” Proceeding of the 2nd International Conference on Industrial and Information Systems, Sri Lanka, 8-11 August 2007, pp. 559-564. doi:10.1109/ICIINFS.2007.4579239
[9] M. A. El-Kady, B. A. Alaskar, A. M. Shaalan and B. M. Al-Shammri, “Composite Reliability and Quality Assessment of Interconnected Power Systems,” International Journal for Computation and Mathematic in Electrical and Electronic Engineering, Vol. 26, No. 1, 2007, Paper SSD05-PES-12.
[10] K. Tomsovic, D. E. Bakken, V. Venkatasubramanian and A. Bose, “Designing the Next Generation of Real-Time Control, Communication, and Computations for Large Power Systems,” Proceeding of the IEEE, Vol. 93, No. 5, 2005, pp. 965-979. doi:10.1109/JPROC.2005.847249
[11] M.A. El-Kady, M.S. El-Sobki and N. K. Sinha, “Reliability Evaluation for Optimally Operated Large Electric Power Systems,” IEEE Transactions on Reliability, Vol. R-35, No. 1, 1986, pp. 41-47. doi:10.1109/TR.1986.4335340
[12] Z. Benguo, W. Dapeng, L. Lei, X. S. Niu, H. Z. Zang and Y. S. Zhao, “Research of Incentive Revelation Mechanism in Power System Optimal Security Control,” Proceeding of the 2006 International Conference on Power System Technology, Chongqing, 22-26 October 2006, 5 p.
[13] M. A. El-Kady, B. D. Bell, V. F. Carvalho, R. C. Burchett, H. H. Happ and D. R. Vierath, “Assessment of Real-Time Optimal Voltage Control,” IEEE Transactions on Power Systems, Vol. PWRS-1, 1986, pp. 98-107. doi:10.1109/TPWRS.1986.4334912
[14] T. Athay, R. Podmore and S. Virmani, “A Practical Method for Direct Analysis of Transient Energy Stability,” IEEE Transactions on Power Apparatus and Systems, Vol. 98, No. 2, 1979, pp. 573-584. doi:10.1109/TPAS.1979.319407
[15] M.A. El-Kady, C. K. Tang, V. F. Carvalho, A. A. Fouad and V. Vittal, “Dynamic Security Assessment Utilizing the Transient Energy Function Method,” IEEE Transactions on Power Apparatus and Systems, Vol. PWRS-1, No. 3, 1986, pp. 284-291.
[16] M. A. El-Kady and R. W. D. Ganton, “Fast Decoupled Transient Stability,” Canadian Electrical Engineering Journal, Vol. 14, No. 2, 1989, pp. 63-66.
[17] R. Patel, T. S. Bhatti and D. P. Kothari, “MATLAB/ Simulink-Based Transient Stability Analysis of a Multimachine Power System,” International Journal of Electrical Engineering Education, Vol. 39, No. 4, 2002, pp. 320-336.
[18] P. M. Anderson and A. A. Fouad, “Power System Control and Stability,” Iowa State University Press, Ames, 1977.

comments powered by Disqus

Copyright © 2020 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.