The interaction mechanism between AC and DC systems in a hybrid AC-DC transmission grid is discussed with PSS/E software. Analysis shows that receiving-end AC faults may cause much more damage on the HVDC system opera...The interaction mechanism between AC and DC systems in a hybrid AC-DC transmission grid is discussed with PSS/E software. Analysis shows that receiving-end AC faults may cause much more damage on the HVDC system operation than the sending-end AC faults in a multi-infeed HVDC system, and the damage severity depends on the power recovering rate of the HVDC systems. For HVDC systems with slow power recovering rate, the receiving-end AC faults may probably be a critical factor to constrain power transfer limits. Larger capacity of HVDC system means not only higher power transfer-limit of the parallel connected AC-DC transmission grid, but also more expensive stabilizing cost.展开更多
By integrating advanced digital technologies such as cloud computing and the Internet of Things in sensor measurement,information communication,and other fields,the digital DC distribution network can efficiently and ...By integrating advanced digital technologies such as cloud computing and the Internet of Things in sensor measurement,information communication,and other fields,the digital DC distribution network can efficiently and reliably access DistributedGenerator(DG)and Energy Storage Systems(ESS),exhibiting significant advantages in terms of controllability and meeting requirements of Plug-and-Play(PnP)operations.However,during device plug-in and-out processes,improper systemparametersmay lead to small-signal stability issues.Therefore,before executing PnP operations,conducting stability analysis and adjusting parameters swiftly is crucial.This study introduces a four-stage strategy for parameter optimization to enhance systemstability efficiently.In the first stage,state-of-the-art technologies in measurement and communication are utilized to correct model parameters.Then,a novel indicator is adopted to identify the key parameters that influence stability in the second stage.Moreover,in the third stage,a local-parameter-tuning strategy,which leverages rapid parameter boundary calculations as a more efficient alternative to plotting root loci,is used to tune the selected parameters.Considering that the local-parameter-tuning strategy may fail due to some operating parameters being limited in adjustment,a multiparameter-tuning strategy based on the particle swarm optimization(PSO)is proposed to comprehensively adjust the dominant parameters to improve the stability margin of the system.Lastly,system stability is reassessed in the fourth stage.The proposed parameter-optimization strategy’s effectiveness has been validated through eigenvalue analysis and nonlinear time-domain simulations.展开更多
This paper presents an analysis of the power flow within the Northern Interconnected Grid of Cameroon. The Newton-Raphson method has been performed, known for its accuracy, under MATLAB software, to model and solve co...This paper presents an analysis of the power flow within the Northern Interconnected Grid of Cameroon. The Newton-Raphson method has been performed, known for its accuracy, under MATLAB software, to model and solve complex power flow equations. This study simulates a series of outage scenarios to evaluate the responsiveness of the grid. The results obtained underline the crucial importance of reactive power management and highlight the urgent need to consolidate the grid infrastructure of North Cameroon. To increase grid resilience and stability, the paper recommends the strategic integration of renewables and the development of interconnections with other power grids. These measures are presented as viable solutions to meet current and future energy distribution challenges, ensuring a reliable and sustainable power supply for Cameroon.展开更多
How to comprehensively consider the power flow constraints and various stability constraints in a series of power system optimization problems without affecting the calculation speed is always a problem.The computatio...How to comprehensively consider the power flow constraints and various stability constraints in a series of power system optimization problems without affecting the calculation speed is always a problem.The computational burden of probabilistic security assessment is even more unimaginable.In order to solve such problems,a security region(SR)methodology is proposed,which is a brand-new methodology developed on the basis of the classical point-wise method.Tianjin University has been studying the SR methodology since the 1980s,and has achieved a series of original breakthroughs that are described in this paper.The integrated SR introduced in this paper is mainly defined in the power injection space,and includes SRs to ensure steady-state security,transient stability,static voltage stability,and smalldisturbance stability.These SRs are uniquely determined for a given network topology(as well as location and clearing process for transient faults)and given system component parameters,and are irrelevant to operation states.This paper presents 11 facts and related remarks to introduce the basic concepts,composition,dynamics nature,and topological and geometric characteristics of SRs.It also provides a practical mathematical description of SR boundaries and fast calculation methods to determine them in a concise and systematic way.Thus,this article provides support for the systematic understanding,future research,and applications of SRs.The most critical finding on the topological and geometric characteristics of SRs is that,within the scope of engineering concern,the practical boundaries of SRs in the power injection space can be approximated by one or a few hyperplanes.Based on this finding,the calculation time for power system probabilistic security assessment(i.e.,risk analysis)and power system optimization with security constraints can be decreased by orders of magnitude.展开更多
Because of the realization of HVDC connections parallel to the synchronous grid in Germany, operational concepts become more important in the context of system security aspects. In this article commonly known concepts...Because of the realization of HVDC connections parallel to the synchronous grid in Germany, operational concepts become more important in the context of system security aspects. In this article commonly known concepts are analyzed regarding their suitability for the German transmission system. Therefore, an approach for the analysis was developed and exemplary results are given using this approach. Under consideration of the overall system, the concepts of reducing losses in combination with minimizing(n-1)-warnings or-indications^1 as well as the sole minimization of(n-1)-warnings and-indications are the most reasonable approaches. However, under grid security aspects best results can be achieved by reducing operational limits and therefore, by the minimization of(n-1)-warnings.展开更多
Grid-tie voltage source converters(VSCs)can operate in three distinct modes:AC-dominant,DC-dominant,and balanced,depending on the placement of the stiff voltage sources.The distinct operation modes of the VSCs traditi...Grid-tie voltage source converters(VSCs)can operate in three distinct modes:AC-dominant,DC-dominant,and balanced,depending on the placement of the stiff voltage sources.The distinct operation modes of the VSCs traditionally demand different synchronization control techniques,leading to heterogeneous VSCs.It is challenging for the power system to accommodate and coordinate heterogeneous VSCs.A promising universal synchronization control technique for VSCs is the DC-link voltage synchronization control(DVSC)based on a lead compensator(LC).The LC DVSC stabilizes both the DC and AC voltages of a VSC while achieving synchronization with the AC grid.This results in a dual-port grid-forming(DGFM)characteristic for the VSC.However,there has been very limited study on the stability and synchronization controller design of the VSCs with the LC DVSC operating in various modes.To bridge this gap,the paper presents a quantitative analysis on the stability and steady-state performance of the LC DVSC in all three operation modes of the DGFM VSC.Based on the analysis,the paper provides step-by-step design guidelines for the LC DVSC.Furthermore,the paper uncovers an instability issue related to the LC DVSC when the DGFM VSC operates in the balanced mode.To tackle the instability issue,a virtual resistance control is proposed and integrated with the LC DVSC.Simulation results validate the analysis and demonstrate the effectiveness of the DGFM VSC with the LC DVSC designed using the proposed guidelines in all three operation modes.Overall,the paper demonstrates the feasibility of employing the DGFM VSC with the LC DVSC for all three possible operation modes,which can help overcome the challenges associated with accommodating and coordinating heterogeneous VSCs in the power system.展开更多
Security and stability control system(SSCS)in power systems involves collecting information and sending the decision from/to control stations at different layers;the tree structure of the SSCS requires more levels.Fai...Security and stability control system(SSCS)in power systems involves collecting information and sending the decision from/to control stations at different layers;the tree structure of the SSCS requires more levels.Failure of a station or channel can cause all the execution stations(EXs)to be out of control.The randomness of the controllable capacity of the EXs increases the difficulty of the reliability evaluation of the SSCS.In this study,the loop designed SSCS and reliability analysis are examined for the interconnected systems.The uncertainty analysis of the controllable capacity based on the evidence theory for the SSCS is proposed.The bidirectional and loop channels are introduced to reduce the layers and stations of the existing SSCS with tree configuration.The reliability evaluation and sensitivity analysis are proposed to quantify the controllability and vulnerable components for the SSCS in different configurations.By aiming at the randomness of the controllable capacity of the EXs,the uncertainty analysis of the controllable capacity of the SSCS based on the evidence theory is proposed to quantify the probability of the SSCS for balancing the active power deficiency of the grid.展开更多
This paper presents a method of tuning governor control parameters of an isolated hydropower generator considering the primary frequency performance and small-signal stability. First, generators that can be operated i...This paper presents a method of tuning governor control parameters of an isolated hydropower generator considering the primary frequency performance and small-signal stability. First, generators that can be operated in isolated state are identified. Second, different schemes are proposed for generator mode switching from on-grid to off-grid state through comparison and mechanism analysis. Third, the time domain model and frequency domain model of the isolated generator governor are constructed to respectively estimate the primary frequency performance and small signal stability. Parameter sets that satisfy the primary frequency performance and small signal stability are acquired as optimal values of governor control parameters. Finally, the measurement-based parameters of the governor are identified and validated using simulations to demonstrate the feasibility and effectiveness of the method.展开更多
In order to meet the requirements of Decree of the State Council of the People's Republic of China (No.599), this paper presents a three-defense line coordination strategy based on the Decree of the State Council ...In order to meet the requirements of Decree of the State Council of the People's Republic of China (No.599), this paper presents a three-defense line coordination strategy based on the Decree of the State Council (No.599). Taking the Guizhou power grid of 220 kV&500 kV as an example, the security and stability problem of the Guizhou power grid is analyzed. The strategy using three-defense line coordination for lowering the level of electricity safety accidents is researched. The analysis results show that the proposed coordination strategy is feasible, which can lower the level of electricity safety accidents under the same fault in same operation mode. Through studying the three-defense line of the Guizhou power grid, this paper presents a basic idea of the three-defense line coordination strategy based on the Decree of the State Council (No.599). The three-defense line coordination strategy provides reference for other provinces power grid.展开更多
In this paper, based on the theory of Donnell-type shallow shell, a new displacement-type stability equations is first developed for laminated composite circular conical shells with triangular grid stiffeners by using...In this paper, based on the theory of Donnell-type shallow shell, a new displacement-type stability equations is first developed for laminated composite circular conical shells with triangular grid stiffeners by using the variational calculus and generalized smeared-stiffener theory. The most general bending stretching couplings, the effect of eccentricity of stiffeners are considered. Then, for general stability of composite triangular grid stiffened conical shells without twist coupling terms, the approximate formulas are obtained for critical external pressure by using Galerkin's procedure. Numerical examples for a certain C/E composite conical shells with inside triangular grid stiffeners are calculated and the results are in good agreement with the experimental data. Finally, the influence of some parameters on critical external pressure is studied. The stability equations developed and the formulas for critical external pressure obtained in this paper should be very useful in the astronautical engineering design.展开更多
The method to calculate the aerodynamic stability derivates of aircrafts by using the sensitivity equations is ex- tended to flows with shock waves in this paper. Using the newly developed second-order cell-centered f...The method to calculate the aerodynamic stability derivates of aircrafts by using the sensitivity equations is ex- tended to flows with shock waves in this paper. Using the newly developed second-order cell-centered finite volume scheme on the unstructured-grid, the unsteady Euler equations and sensitivity equations are solved simultaneously in a non-inertial frame of reference, so that the aerodynamic stability derivatives can be calculated for aircrafts with complex geometries. Based on the numerical results, behavior of the aerodynamic sensitivity parameters near the shock wave is discussed. Furthermore, the stability derivatives are analyzed for supersonic and hypersonic flows. The numerical results of the stability derivatives are found in good agree- ment with theoretical results for supersonic flows, and variations of the aerodynamic force and moment predicted by the stability derivatives are very close to those obtained by CFD simulation for both supersonic and hypersonic flows.展开更多
Renewable sources of energy are being integrated into the power grids due to their economic and environmental merits as compared with the traditional fossil-fuel-fired power generation. However, their significant pene...Renewable sources of energy are being integrated into the power grids due to their economic and environmental merits as compared with the traditional fossil-fuel-fired power generation. However, their significant penetration demands a thorough research in terms of system reliability, that is, security and stability. In this paper, Security Constrained Multi Objective Dynamic Economic Dispatch (SCMODED) problem considering cubic thermal cubic cost function, wind, solar penetration, cubic transmission power losses and cubic emissions cost function as objectives is first formulated. Both HVDC and HVAC lines are included in their formulation. Various approaches like probabilistic load flow (PLF), scenario based method, participation factors and Harmony Search algorithm etc. are employed in the solution process. Security and stability effects of renewable energy (RE) penetration are investigated and analyzed. The simulated results reveal that RE penetration leads to reduced cost and emissions and increased security concerns. Further, there is increased power system instability and hence increased load shedding so as to help the power system attain steady state stability. Inclusion of HVDC lines facilitates rapid and fast control to increase the transient stability limit by the action of the converter ignition angle (CIA) and converter extinction angle (CEA).展开更多
Based on the measured data of geomagnetically induced currents (GIC) in Guangdong Ling' ao 500 kV power networks during several magnetic storms at the peak years of 23rd Solar Cycle, the GIC calculation results of ...Based on the measured data of geomagnetically induced currents (GIC) in Guangdong Ling' ao 500 kV power networks during several magnetic storms at the peak years of 23rd Solar Cycle, the GIC calculation results of 750 kV planning power grid in Shartxi, Gansu, Qinghai and Ningxia, the structure and characteristics of power networks from 500 kV to 1 000 kV, and super magnetic storm in 1859 are analyzed in this paper. Through the analysis, the possible impacts of extreme space weather on the future ultra-high voltage (UHV) grid, the security of large-scale power system in China are expounded, and the research suggestions coping with the strong solar storms are proposed.展开更多
China Southern Power Grid is a unique EHV AC/DC hybrid transmission network that operates in China. In its service area, the distribution of energy resources and the development of economy are extremely unbalanced, so...China Southern Power Grid is a unique EHV AC/DC hybrid transmission network that operates in China. In its service area, the distribution of energy resources and the development of economy are extremely unbalanced, so long-distance and bulk power transmission are needed; besides, the geography and climate conditions are serious, rains, fogs, lightning and typhoon as well as high temperature are common all the year round. Facing these challenges, the power grid enhanced stability control, improved the equipment and strengthen the network structure. In the future, the power grid plans to optimize the disposition of power sources and build digitalized power system.展开更多
This study presents a comprehensive impact analysis of the rotor angle stability of a proposed international connection between the Philippines and Sabah,Malaysia,as part of the Association of Southeast Asian Nations(...This study presents a comprehensive impact analysis of the rotor angle stability of a proposed international connection between the Philippines and Sabah,Malaysia,as part of the Association of Southeast Asian Nations(ASEAN)Power Grid.This study focuses on modeling and evaluating the dynamic performance of the interconnected system,considering the high penetration of renewable sources.Power flow,small signal stability,and transient stability analyses were conducted to assess the ability of the proposed linked power system models to withstand small and large disturbances,utilizing the Power Systems Analysis Toolbox(PSAT)software in MATLAB.All components used in the model are documented in the PSAT library.Currently,there is a lack of publicly available studies regarding the implementation of this specific system.Additionally,the study investigates the behavior of a system with a high penetration of renewable energy sources.Based on the findings,this study concludes that a system is generally stable when interconnection is realized,given its appropriate location and dynamic component parameters.Furthermore,the critical eigenvalues of the system also exhibited improvement as the renewable energy sources were augmented.展开更多
One of the significant challenges that smart grid networks face is cyber-security. Several studies have been conducted to highlight those security challenges. However, the majority of these surveys classify attacks ba...One of the significant challenges that smart grid networks face is cyber-security. Several studies have been conducted to highlight those security challenges. However, the majority of these surveys classify attacks based on the security requirements, confidentiality, integrity, and availability, without taking into consideration the accountability requirement. In this survey paper, we provide a classification of attacks based on the OSI model and discuss in more detail the cyber-attacks that can target the different layers of smart grid networks communication. We also propose new classifications for the detection and countermeasure techniques and describe existing techniques under each category. Finally, we discuss challenges and future research directions.展开更多
Smart distribution grid needs data communication systems as a support to complete their important functions. The smart distribution grid of the data and information are increasingly adopting internet protocol and Ethe...Smart distribution grid needs data communication systems as a support to complete their important functions. The smart distribution grid of the data and information are increasingly adopting internet protocol and Ethernet technology. The IP addresses are more and more important for the smart distribution grid equipment. The current IPv4 protocol occupies a dominant position; therefore, the challenges of the evolution to IPv6 and network security are faced by data communication systems of the smart distribution grid. The importance of data communications network and its main bearer of business were described. The data communications network from IPv4 to IPv6 evolution of the five processes and four stages of the transition were analyzed. The smart distribution grid data communications network security and types of their offensive and defensive were discussed. And the data communications network security architecture was established. It covers three dimensions, the security level, the communications network security engineering and the communications network security management. The security architecture safeguards the evolution to IPv6 for the smart distribution grid data communication systems.展开更多
Microgrids are local power systems that may or may not be connected to the distribution system and are typically controlled by the local operator.Interest in microgrids is rising and it is likely that the number of mi...Microgrids are local power systems that may or may not be connected to the distribution system and are typically controlled by the local operator.Interest in microgrids is rising and it is likely that the number of microgrids connected to distribution networks will increase.Currently,there is no consensus on how microgrids will interact with the distribution system―they have the potential to threaten stability,or to assist.However microgrids,with their emphasis on sophisticated control in order to manage their particular challenges,address many of the problems that will be required to overcome in realizing the smart grid.This paper examines some of the issues involved in connecting microgrids to the distribution networks,and illustrates how microgrids have a key role to play in the development of the smart grid.展开更多
If an explicit time scheme is used in a numerical model, the size of the integration time step is typically limited by the spatial resolution. This study develops a regular latitude–longitude grid-based global three-...If an explicit time scheme is used in a numerical model, the size of the integration time step is typically limited by the spatial resolution. This study develops a regular latitude–longitude grid-based global three-dimensional tracer transport model that is computationally stable at large time-step sizes. The tracer model employs a finite-volume flux-form semiLagrangian transport scheme in the horizontal and an adaptively implicit algorithm in the vertical. The horizontal and vertical solvers are coupled via a straightforward operator-splitting technique. Both the finite-volume scheme's onedimensional slope-limiter and the adaptively implicit vertical solver's first-order upwind scheme enforce monotonicity. The tracer model permits a large time-step size and is inherently conservative and monotonic. Idealized advection test cases demonstrate that the three-dimensional transport model performs very well in terms of accuracy, stability, and efficiency. It is possible to use this robust transport model in a global atmospheric dynamical core.展开更多
Intelligent electronic devices(IEDs)are interconnected via communication networks and play pivotal roles in transmitting grid-related operational data and executing control instructions.In the context of the heightene...Intelligent electronic devices(IEDs)are interconnected via communication networks and play pivotal roles in transmitting grid-related operational data and executing control instructions.In the context of the heightened security challenges within smart grids,IEDs pose significant risks due to inherent hardware and software vulner-abilities,as well as the openness and vulnerability of communication protocols.Smart grid security,distinct from traditional internet security,mainly relies on monitoring network security events at the platform layer,lacking an effective assessment mechanism for IEDs.Hence,we incorporate considerations for both cyber-attacks and physical faults,presenting security assessment indicators and methods specifically tailored for IEDs.Initially,we outline the security monitoring technology for IEDs,considering the necessary data sources for their security assessment.Subsequently,we classify IEDs and establish a comprehensive security monitoring index system,incorporating factors such as running states,network traffic,and abnormal behaviors.This index system contains 18 indicators in 3 categories.Additionally,we elucidate quantitative methods for various indicators and propose a hybrid security assessment method known as GRCW-hybrid,combining grey relational analysis(GRA),analytic hierarchy process(AHP),and entropy weight method(EWM).According to the proposed assessment method,the security risk level of IEDs can be graded into 6 levels,namely 0,1,2,3,4,and 5.The higher the level,the greater the security risk.Finally,we assess and simulate 15 scenarios in 3 categories,which are based on monitoring indicators and real-world situations encountered by IEDs.The results show that calculated security risk level based on the proposed assessment method are consistent with actual simulation.Thus,the reasonableness and effectiveness of the proposed index system and assessment method are validated.展开更多
文摘The interaction mechanism between AC and DC systems in a hybrid AC-DC transmission grid is discussed with PSS/E software. Analysis shows that receiving-end AC faults may cause much more damage on the HVDC system operation than the sending-end AC faults in a multi-infeed HVDC system, and the damage severity depends on the power recovering rate of the HVDC systems. For HVDC systems with slow power recovering rate, the receiving-end AC faults may probably be a critical factor to constrain power transfer limits. Larger capacity of HVDC system means not only higher power transfer-limit of the parallel connected AC-DC transmission grid, but also more expensive stabilizing cost.
基金supported by State Grid Information and Telecommunication Group Scientific and Technological Innovation Project“Research on Power Digital Space Technology System and Key Technologies”(Program No.SGIT0000XMJS2310456).
文摘By integrating advanced digital technologies such as cloud computing and the Internet of Things in sensor measurement,information communication,and other fields,the digital DC distribution network can efficiently and reliably access DistributedGenerator(DG)and Energy Storage Systems(ESS),exhibiting significant advantages in terms of controllability and meeting requirements of Plug-and-Play(PnP)operations.However,during device plug-in and-out processes,improper systemparametersmay lead to small-signal stability issues.Therefore,before executing PnP operations,conducting stability analysis and adjusting parameters swiftly is crucial.This study introduces a four-stage strategy for parameter optimization to enhance systemstability efficiently.In the first stage,state-of-the-art technologies in measurement and communication are utilized to correct model parameters.Then,a novel indicator is adopted to identify the key parameters that influence stability in the second stage.Moreover,in the third stage,a local-parameter-tuning strategy,which leverages rapid parameter boundary calculations as a more efficient alternative to plotting root loci,is used to tune the selected parameters.Considering that the local-parameter-tuning strategy may fail due to some operating parameters being limited in adjustment,a multiparameter-tuning strategy based on the particle swarm optimization(PSO)is proposed to comprehensively adjust the dominant parameters to improve the stability margin of the system.Lastly,system stability is reassessed in the fourth stage.The proposed parameter-optimization strategy’s effectiveness has been validated through eigenvalue analysis and nonlinear time-domain simulations.
文摘This paper presents an analysis of the power flow within the Northern Interconnected Grid of Cameroon. The Newton-Raphson method has been performed, known for its accuracy, under MATLAB software, to model and solve complex power flow equations. This study simulates a series of outage scenarios to evaluate the responsiveness of the grid. The results obtained underline the crucial importance of reactive power management and highlight the urgent need to consolidate the grid infrastructure of North Cameroon. To increase grid resilience and stability, the paper recommends the strategic integration of renewables and the development of interconnections with other power grids. These measures are presented as viable solutions to meet current and future energy distribution challenges, ensuring a reliable and sustainable power supply for Cameroon.
文摘How to comprehensively consider the power flow constraints and various stability constraints in a series of power system optimization problems without affecting the calculation speed is always a problem.The computational burden of probabilistic security assessment is even more unimaginable.In order to solve such problems,a security region(SR)methodology is proposed,which is a brand-new methodology developed on the basis of the classical point-wise method.Tianjin University has been studying the SR methodology since the 1980s,and has achieved a series of original breakthroughs that are described in this paper.The integrated SR introduced in this paper is mainly defined in the power injection space,and includes SRs to ensure steady-state security,transient stability,static voltage stability,and smalldisturbance stability.These SRs are uniquely determined for a given network topology(as well as location and clearing process for transient faults)and given system component parameters,and are irrelevant to operation states.This paper presents 11 facts and related remarks to introduce the basic concepts,composition,dynamics nature,and topological and geometric characteristics of SRs.It also provides a practical mathematical description of SR boundaries and fast calculation methods to determine them in a concise and systematic way.Thus,this article provides support for the systematic understanding,future research,and applications of SRs.The most critical finding on the topological and geometric characteristics of SRs is that,within the scope of engineering concern,the practical boundaries of SRs in the power injection space can be approximated by one or a few hyperplanes.Based on this finding,the calculation time for power system probabilistic security assessment(i.e.,risk analysis)and power system optimization with security constraints can be decreased by orders of magnitude.
文摘Because of the realization of HVDC connections parallel to the synchronous grid in Germany, operational concepts become more important in the context of system security aspects. In this article commonly known concepts are analyzed regarding their suitability for the German transmission system. Therefore, an approach for the analysis was developed and exemplary results are given using this approach. Under consideration of the overall system, the concepts of reducing losses in combination with minimizing(n-1)-warnings or-indications^1 as well as the sole minimization of(n-1)-warnings and-indications are the most reasonable approaches. However, under grid security aspects best results can be achieved by reducing operational limits and therefore, by the minimization of(n-1)-warnings.
基金supported in part by the Nebraska Center for Energy Sciences Research.
文摘Grid-tie voltage source converters(VSCs)can operate in three distinct modes:AC-dominant,DC-dominant,and balanced,depending on the placement of the stiff voltage sources.The distinct operation modes of the VSCs traditionally demand different synchronization control techniques,leading to heterogeneous VSCs.It is challenging for the power system to accommodate and coordinate heterogeneous VSCs.A promising universal synchronization control technique for VSCs is the DC-link voltage synchronization control(DVSC)based on a lead compensator(LC).The LC DVSC stabilizes both the DC and AC voltages of a VSC while achieving synchronization with the AC grid.This results in a dual-port grid-forming(DGFM)characteristic for the VSC.However,there has been very limited study on the stability and synchronization controller design of the VSCs with the LC DVSC operating in various modes.To bridge this gap,the paper presents a quantitative analysis on the stability and steady-state performance of the LC DVSC in all three operation modes of the DGFM VSC.Based on the analysis,the paper provides step-by-step design guidelines for the LC DVSC.Furthermore,the paper uncovers an instability issue related to the LC DVSC when the DGFM VSC operates in the balanced mode.To tackle the instability issue,a virtual resistance control is proposed and integrated with the LC DVSC.Simulation results validate the analysis and demonstrate the effectiveness of the DGFM VSC with the LC DVSC designed using the proposed guidelines in all three operation modes.Overall,the paper demonstrates the feasibility of employing the DGFM VSC with the LC DVSC for all three possible operation modes,which can help overcome the challenges associated with accommodating and coordinating heterogeneous VSCs in the power system.
基金supported by Science and Technology Project of SGCC“Research on Flat Architecture and Implementation Technology of Security and Stability Control System in Ultra Large Power Grid”(52170221000U).
文摘Security and stability control system(SSCS)in power systems involves collecting information and sending the decision from/to control stations at different layers;the tree structure of the SSCS requires more levels.Failure of a station or channel can cause all the execution stations(EXs)to be out of control.The randomness of the controllable capacity of the EXs increases the difficulty of the reliability evaluation of the SSCS.In this study,the loop designed SSCS and reliability analysis are examined for the interconnected systems.The uncertainty analysis of the controllable capacity based on the evidence theory for the SSCS is proposed.The bidirectional and loop channels are introduced to reduce the layers and stations of the existing SSCS with tree configuration.The reliability evaluation and sensitivity analysis are proposed to quantify the controllability and vulnerable components for the SSCS in different configurations.By aiming at the randomness of the controllable capacity of the EXs,the uncertainty analysis of the controllable capacity of the SSCS based on the evidence theory is proposed to quantify the probability of the SSCS for balancing the active power deficiency of the grid.
基金supported by the Fujian Provincial Government Project (Title: Research on whole process evaluation of dynamic stability and control strategy in condition of grid connection of ultra-high voltage and large scale penetration of nuclear power.No.2015H0023)the State Grid Science & Technology Project (Title: Research on the improvement on stability of primary frequency of generator in account of the tolerance of equipment.No.52130417002P)the Key project of State Grid Fujian Electric Power Company,Ltd (research on key technologies of primary frequency power oscillation mechanism analysis and inhibition measures in large-scale unit in Fujian power grid.No.52130417000J)
文摘This paper presents a method of tuning governor control parameters of an isolated hydropower generator considering the primary frequency performance and small-signal stability. First, generators that can be operated in isolated state are identified. Second, different schemes are proposed for generator mode switching from on-grid to off-grid state through comparison and mechanism analysis. Third, the time domain model and frequency domain model of the isolated generator governor are constructed to respectively estimate the primary frequency performance and small signal stability. Parameter sets that satisfy the primary frequency performance and small signal stability are acquired as optimal values of governor control parameters. Finally, the measurement-based parameters of the governor are identified and validated using simulations to demonstrate the feasibility and effectiveness of the method.
文摘In order to meet the requirements of Decree of the State Council of the People's Republic of China (No.599), this paper presents a three-defense line coordination strategy based on the Decree of the State Council (No.599). Taking the Guizhou power grid of 220 kV&500 kV as an example, the security and stability problem of the Guizhou power grid is analyzed. The strategy using three-defense line coordination for lowering the level of electricity safety accidents is researched. The analysis results show that the proposed coordination strategy is feasible, which can lower the level of electricity safety accidents under the same fault in same operation mode. Through studying the three-defense line of the Guizhou power grid, this paper presents a basic idea of the three-defense line coordination strategy based on the Decree of the State Council (No.599). The three-defense line coordination strategy provides reference for other provinces power grid.
基金The Project supported by the Doctoral Research Foundation of the State Education Commission of China
文摘In this paper, based on the theory of Donnell-type shallow shell, a new displacement-type stability equations is first developed for laminated composite circular conical shells with triangular grid stiffeners by using the variational calculus and generalized smeared-stiffener theory. The most general bending stretching couplings, the effect of eccentricity of stiffeners are considered. Then, for general stability of composite triangular grid stiffened conical shells without twist coupling terms, the approximate formulas are obtained for critical external pressure by using Galerkin's procedure. Numerical examples for a certain C/E composite conical shells with inside triangular grid stiffeners are calculated and the results are in good agreement with the experimental data. Finally, the influence of some parameters on critical external pressure is studied. The stability equations developed and the formulas for critical external pressure obtained in this paper should be very useful in the astronautical engineering design.
文摘The method to calculate the aerodynamic stability derivates of aircrafts by using the sensitivity equations is ex- tended to flows with shock waves in this paper. Using the newly developed second-order cell-centered finite volume scheme on the unstructured-grid, the unsteady Euler equations and sensitivity equations are solved simultaneously in a non-inertial frame of reference, so that the aerodynamic stability derivatives can be calculated for aircrafts with complex geometries. Based on the numerical results, behavior of the aerodynamic sensitivity parameters near the shock wave is discussed. Furthermore, the stability derivatives are analyzed for supersonic and hypersonic flows. The numerical results of the stability derivatives are found in good agree- ment with theoretical results for supersonic flows, and variations of the aerodynamic force and moment predicted by the stability derivatives are very close to those obtained by CFD simulation for both supersonic and hypersonic flows.
文摘Renewable sources of energy are being integrated into the power grids due to their economic and environmental merits as compared with the traditional fossil-fuel-fired power generation. However, their significant penetration demands a thorough research in terms of system reliability, that is, security and stability. In this paper, Security Constrained Multi Objective Dynamic Economic Dispatch (SCMODED) problem considering cubic thermal cubic cost function, wind, solar penetration, cubic transmission power losses and cubic emissions cost function as objectives is first formulated. Both HVDC and HVAC lines are included in their formulation. Various approaches like probabilistic load flow (PLF), scenario based method, participation factors and Harmony Search algorithm etc. are employed in the solution process. Security and stability effects of renewable energy (RE) penetration are investigated and analyzed. The simulated results reveal that RE penetration leads to reduced cost and emissions and increased security concerns. Further, there is increased power system instability and hence increased load shedding so as to help the power system attain steady state stability. Inclusion of HVDC lines facilitates rapid and fast control to increase the transient stability limit by the action of the converter ignition angle (CIA) and converter extinction angle (CEA).
基金National Nature Science Foundation of China (No.50477039 No.50677020)National High Technology Research and Development Program of China("863"Program) (No.2007AA04Z425)
文摘Based on the measured data of geomagnetically induced currents (GIC) in Guangdong Ling' ao 500 kV power networks during several magnetic storms at the peak years of 23rd Solar Cycle, the GIC calculation results of 750 kV planning power grid in Shartxi, Gansu, Qinghai and Ningxia, the structure and characteristics of power networks from 500 kV to 1 000 kV, and super magnetic storm in 1859 are analyzed in this paper. Through the analysis, the possible impacts of extreme space weather on the future ultra-high voltage (UHV) grid, the security of large-scale power system in China are expounded, and the research suggestions coping with the strong solar storms are proposed.
文摘China Southern Power Grid is a unique EHV AC/DC hybrid transmission network that operates in China. In its service area, the distribution of energy resources and the development of economy are extremely unbalanced, so long-distance and bulk power transmission are needed; besides, the geography and climate conditions are serious, rains, fogs, lightning and typhoon as well as high temperature are common all the year round. Facing these challenges, the power grid enhanced stability control, improved the equipment and strengthen the network structure. In the future, the power grid plans to optimize the disposition of power sources and build digitalized power system.
文摘This study presents a comprehensive impact analysis of the rotor angle stability of a proposed international connection between the Philippines and Sabah,Malaysia,as part of the Association of Southeast Asian Nations(ASEAN)Power Grid.This study focuses on modeling and evaluating the dynamic performance of the interconnected system,considering the high penetration of renewable sources.Power flow,small signal stability,and transient stability analyses were conducted to assess the ability of the proposed linked power system models to withstand small and large disturbances,utilizing the Power Systems Analysis Toolbox(PSAT)software in MATLAB.All components used in the model are documented in the PSAT library.Currently,there is a lack of publicly available studies regarding the implementation of this specific system.Additionally,the study investigates the behavior of a system with a high penetration of renewable energy sources.Based on the findings,this study concludes that a system is generally stable when interconnection is realized,given its appropriate location and dynamic component parameters.Furthermore,the critical eigenvalues of the system also exhibited improvement as the renewable energy sources were augmented.
文摘One of the significant challenges that smart grid networks face is cyber-security. Several studies have been conducted to highlight those security challenges. However, the majority of these surveys classify attacks based on the security requirements, confidentiality, integrity, and availability, without taking into consideration the accountability requirement. In this survey paper, we provide a classification of attacks based on the OSI model and discuss in more detail the cyber-attacks that can target the different layers of smart grid networks communication. We also propose new classifications for the detection and countermeasure techniques and describe existing techniques under each category. Finally, we discuss challenges and future research directions.
文摘Smart distribution grid needs data communication systems as a support to complete their important functions. The smart distribution grid of the data and information are increasingly adopting internet protocol and Ethernet technology. The IP addresses are more and more important for the smart distribution grid equipment. The current IPv4 protocol occupies a dominant position; therefore, the challenges of the evolution to IPv6 and network security are faced by data communication systems of the smart distribution grid. The importance of data communications network and its main bearer of business were described. The data communications network from IPv4 to IPv6 evolution of the five processes and four stages of the transition were analyzed. The smart distribution grid data communications network security and types of their offensive and defensive were discussed. And the data communications network security architecture was established. It covers three dimensions, the security level, the communications network security engineering and the communications network security management. The security architecture safeguards the evolution to IPv6 for the smart distribution grid data communication systems.
基金supported by the Australian Department of Environment,Water, Heritage and the Arts under Grant No. RDG 08-29
文摘Microgrids are local power systems that may or may not be connected to the distribution system and are typically controlled by the local operator.Interest in microgrids is rising and it is likely that the number of microgrids connected to distribution networks will increase.Currently,there is no consensus on how microgrids will interact with the distribution system―they have the potential to threaten stability,or to assist.However microgrids,with their emphasis on sophisticated control in order to manage their particular challenges,address many of the problems that will be required to overcome in realizing the smart grid.This paper examines some of the issues involved in connecting microgrids to the distribution networks,and illustrates how microgrids have a key role to play in the development of the smart grid.
基金jointly supported by the National Natural Science Foundation of China (Grant No.42075153)the Young Scientists Fund of the Earth System Modeling and Prediction Centre (Grant No. CEMC-QNJJ-2022014)。
文摘If an explicit time scheme is used in a numerical model, the size of the integration time step is typically limited by the spatial resolution. This study develops a regular latitude–longitude grid-based global three-dimensional tracer transport model that is computationally stable at large time-step sizes. The tracer model employs a finite-volume flux-form semiLagrangian transport scheme in the horizontal and an adaptively implicit algorithm in the vertical. The horizontal and vertical solvers are coupled via a straightforward operator-splitting technique. Both the finite-volume scheme's onedimensional slope-limiter and the adaptively implicit vertical solver's first-order upwind scheme enforce monotonicity. The tracer model permits a large time-step size and is inherently conservative and monotonic. Idealized advection test cases demonstrate that the three-dimensional transport model performs very well in terms of accuracy, stability, and efficiency. It is possible to use this robust transport model in a global atmospheric dynamical core.
基金The financial support from the Program for Science and Technology of Henan Province of China(Grant No.242102210148)Henan Center for Outstanding Overseas Scientists(Grant No.GZS2022011)Songshan Laboratory Pre-Research Project(Grant No.YYJC032022022).
文摘Intelligent electronic devices(IEDs)are interconnected via communication networks and play pivotal roles in transmitting grid-related operational data and executing control instructions.In the context of the heightened security challenges within smart grids,IEDs pose significant risks due to inherent hardware and software vulner-abilities,as well as the openness and vulnerability of communication protocols.Smart grid security,distinct from traditional internet security,mainly relies on monitoring network security events at the platform layer,lacking an effective assessment mechanism for IEDs.Hence,we incorporate considerations for both cyber-attacks and physical faults,presenting security assessment indicators and methods specifically tailored for IEDs.Initially,we outline the security monitoring technology for IEDs,considering the necessary data sources for their security assessment.Subsequently,we classify IEDs and establish a comprehensive security monitoring index system,incorporating factors such as running states,network traffic,and abnormal behaviors.This index system contains 18 indicators in 3 categories.Additionally,we elucidate quantitative methods for various indicators and propose a hybrid security assessment method known as GRCW-hybrid,combining grey relational analysis(GRA),analytic hierarchy process(AHP),and entropy weight method(EWM).According to the proposed assessment method,the security risk level of IEDs can be graded into 6 levels,namely 0,1,2,3,4,and 5.The higher the level,the greater the security risk.Finally,we assess and simulate 15 scenarios in 3 categories,which are based on monitoring indicators and real-world situations encountered by IEDs.The results show that calculated security risk level based on the proposed assessment method are consistent with actual simulation.Thus,the reasonableness and effectiveness of the proposed index system and assessment method are validated.