How to comprehensively consider the power flow constraints and various stability constraints in a series of power system optimization problems without affecting the calculation speed is always a problem.The computatio...How to comprehensively consider the power flow constraints and various stability constraints in a series of power system optimization problems without affecting the calculation speed is always a problem.The computational burden of probabilistic security assessment is even more unimaginable.In order to solve such problems,a security region(SR)methodology is proposed,which is a brand-new methodology developed on the basis of the classical point-wise method.Tianjin University has been studying the SR methodology since the 1980s,and has achieved a series of original breakthroughs that are described in this paper.The integrated SR introduced in this paper is mainly defined in the power injection space,and includes SRs to ensure steady-state security,transient stability,static voltage stability,and smalldisturbance stability.These SRs are uniquely determined for a given network topology(as well as location and clearing process for transient faults)and given system component parameters,and are irrelevant to operation states.This paper presents 11 facts and related remarks to introduce the basic concepts,composition,dynamics nature,and topological and geometric characteristics of SRs.It also provides a practical mathematical description of SR boundaries and fast calculation methods to determine them in a concise and systematic way.Thus,this article provides support for the systematic understanding,future research,and applications of SRs.The most critical finding on the topological and geometric characteristics of SRs is that,within the scope of engineering concern,the practical boundaries of SRs in the power injection space can be approximated by one or a few hyperplanes.Based on this finding,the calculation time for power system probabilistic security assessment(i.e.,risk analysis)and power system optimization with security constraints can be decreased by orders of magnitude.展开更多
Electricity network is a very complex entity that comprises several components like generators, transmission lines, loads among others. As technologies continue to evolve, the complexity of the electricity network has...Electricity network is a very complex entity that comprises several components like generators, transmission lines, loads among others. As technologies continue to evolve, the complexity of the electricity network has also increased as more devices are being connected to the network. To understand the physical laws governing the operation of the network, techniques such as optimal power flow (OPF), Economic dispatch (ED) and Security constrained optimal power flow (SCOPF) were developed. These techniques have been used extensively in network operation, planning and so on. However, an in-depth presentation showcasing the merits and demerits of these techniques is still lacking in the literature. Hence, this paper intends to fill this gap. In this paper, Economic dispatch, optimal power flow and security-constrained optimal power flow are applied to a 3-bus test system using a linear programming approach. The results of the ED, OPF and SC-OPF are compared and presented.展开更多
With the development of information networks, the problem of power security has increasingly caused many attention of people, but the simple power security defense system has been difficult to meet the current complex...With the development of information networks, the problem of power security has increasingly caused many attention of people, but the simple power security defense system has been difficult to meet the current complex network environment. Aiming at this situation, by using the method of T-S fuzzy neural network model to analyze the characteristics of the data transmission in network, it has obtained corresponding threat information. By processing these threat information, it completes the construction of three-dimensional power security defense system. The paper carries on the corresponding data training methods by using T-shirt model fuzzy neural network, which has certain reference significance for the data analysis of other similar fields. At the same time, the study of building on the three-dimensional power security defense system aims to provide a theoretical reference for solving the security defense of the current complex network environment.展开更多
In this paper,a series of major policy decisions used to improve the power grid reliability,reduce the risk and losses of major power outages,and realize the modernization of 21st century power grid are discussed. The...In this paper,a series of major policy decisions used to improve the power grid reliability,reduce the risk and losses of major power outages,and realize the modernization of 21st century power grid are discussed. These decisions were adopted by American government and would also be helpful for the strategic development of Chinese power grid. It is proposed that China should take precaution,carry out security research on the overall dynamic behaviour characteristics of the UHV grid using the complexity theory,and finally provide safeguard for the Chinese UHV grid. It is also pointed out that,due to the lack of matured approaches to controll a cascading failure,the primary duty of a system operator is to work as a "watchdog" for the grid operation security,eliminate the cumulative effect and reduce the risk and losses of major cascading outages with the help of EMS and WAMS.展开更多
After the digital revolution, the power system security becomes an important issue and it urges the power producers to maintain a well secured system in order to supply a quality power to the end users. This paper pre...After the digital revolution, the power system security becomes an important issue and it urges the power producers to maintain a well secured system in order to supply a quality power to the end users. This paper presents an integrated Corrective Security Constrained Optimal Power Flow (CSCOPF) with Flexible Transmission Line Impedance (FTLI) to enhance the power system security. The corrective approach of SCOPF is chosen, because it allows the corrective equipment to bring back the system to a stable operating point and hence, it offers high flexibility and better economics. The concept of FTLI arises from the ability of FACTS devices such as Thyristor Controlled Series Capacitor (TCSC), which can vary the line reactance to a certain extent. An enhanced security can be achieved by incorporating FTLI into the CSCOPF problem, since the power flow in a system is highly dependent on the line reactance. FTLI based CSCOPF can reduce the amount of rescheduling of generators, but it will result in an increased number of variables and thus, the complexity to the optimization process is increased. This highly complex problem is solved by using nonlinear programming. The AC based OPF model is preferred, since the corrective security actions require highly accurate solutions. IEEE 30 bus system is used to test the proposed scheme and the results are compared with the traditional CSCOPF. It can be seen that the proposed idea provides a notable improvement in the reduction of cost incurred for restoring the system security.展开更多
An analysis of the recent major security incidents related to industrial control systems,revealed that most had been caused by company employees.Therefore,enterprise security management systems have been developed to ...An analysis of the recent major security incidents related to industrial control systems,revealed that most had been caused by company employees.Therefore,enterprise security management systems have been developed to focus on companies’personnel.Nonetheless,several hacking incidents,involving major companies and public/financial institutions,were actually attempted by the cooperative firms or the outsourced manpower undertaking maintenance work.Specifically,institutions that operate industrial control systems(ICSs)associated with critical national infrastructures,such as traffic or energy,have contracted several cooperative firms.Nonetheless,ICT’s importance is gradually increasing,due to outsourcing,and is the most vulnerable factor in security.This paper proposes a virtualized security management scheme for the resident cooperative firms in the industrial control infrastructure.Since such companies often cannot afford adequate investment in security,the scheme is to let an ICS company provide the virtualized system.One of its merits is the convenience of controlling a VDI server at the center.The cooperative firms were classified,based on their respective security levels,and statistics were collected throughout a four-year period for the results.This paper analyzes the policies and virtualization systems that have been applied to the security of the partner companies,which engaged in ICS security.A suitable model for ICS security was then proposed by analyzing their effects on the system efficiencies,based on the comparisons of the security inspection results obtained before and after virtualization.The proposed system is expected to contribute to industrial safety.展开更多
Based on the measured data of geomagnetically induced currents (GIC) in Guangdong Ling' ao 500 kV power networks during several magnetic storms at the peak years of 23rd Solar Cycle, the GIC calculation results of ...Based on the measured data of geomagnetically induced currents (GIC) in Guangdong Ling' ao 500 kV power networks during several magnetic storms at the peak years of 23rd Solar Cycle, the GIC calculation results of 750 kV planning power grid in Shartxi, Gansu, Qinghai and Ningxia, the structure and characteristics of power networks from 500 kV to 1 000 kV, and super magnetic storm in 1859 are analyzed in this paper. Through the analysis, the possible impacts of extreme space weather on the future ultra-high voltage (UHV) grid, the security of large-scale power system in China are expounded, and the research suggestions coping with the strong solar storms are proposed.展开更多
The National Electricity Market(NEM)in Australia was suspended during June 15-23,2022,with a primary attribution to the lack of available generation capacity.This incident is noteworthy because it was the first market...The National Electricity Market(NEM)in Australia was suspended during June 15-23,2022,with a primary attribution to the lack of available generation capacity.This incident is noteworthy because it was the first market suspension in NEM’s history and took place in a major energy exporting country.In this letter,we review the outline and impacts of the incident.From the perspectives of market regulation,electricity supply,and electricity demand,we identify three underlying causes of the market suspension and offer four recommendations for the market mechanism evolution to ensure power supply security.展开更多
In developing power grids,setting standards is critical to its success.The development of China’s power industry has proposed new requirements for power systems to ensure secure and stable operations.The principal st...In developing power grids,setting standards is critical to its success.The development of China’s power industry has proposed new requirements for power systems to ensure secure and stable operations.The principal standards for the security and stability of China’s current power systems are analyzed in terms of operational control,generator-grid coordination and simulation.The shortcomings are pointed out and the directions of future development are discussed.In the end,the study highlighted the following key areas that require further research and improvement:the evaluation criteria of power system security and stability should be improved to ensure the secure and stable operation of China’s power systems;the operational control standards should be constantly enhanced to increase the reliability and flexibility of operational control strategies;generatorgrid coordination standards should be upgraded to improve the coordination between the generator control protection system and the grid;and the simulation methodology should be standardized in future power system security and stability research.展开更多
The traditional“three defense lines”for power systems are based on local information and static protection&control strategy,which are not suitable to modern large-scale power systems.In order to improve the secu...The traditional“three defense lines”for power systems are based on local information and static protection&control strategy,which are not suitable to modern large-scale power systems.In order to improve the security of UHV hybrid power grids,the Integrated Wide Area Protection&Control(IWAPC)is proposed in this paper by applying the new technologies of synchronized high-speed communication,which integrates“three defense lines”and promotes existing wide area protection only for security control.The IWAPC is the hierarchical protection and control system which provides the protection and control for wide area power networks to improve their reliability and security.It is divided into three levels,the local bay level,the substation integrated protection level and the wide area protection level.The wide area real-time protection and control information platform is the most important part of the IWAPC,which is based on a synchronized wide area communication network.The key technologies and new development trends include network topology analysis,wide area backup protection,wide area intelligent reclosing,wide area load shedding,wide area auto-switching,overload cutoff and transfer,transmission section protection,intelligent system splitting and dynamic stability control.It cannot only integrate three lines of defense for power system protection and control,but also improve security of the power grid.展开更多
Climate change threatens the sustainable development and survival of the small Caribbean island nations. The continual rise in the demand and cost of the earth's finite hydrocarbon energy reservoir drives these count...Climate change threatens the sustainable development and survival of the small Caribbean island nations. The continual rise in the demand and cost of the earth's finite hydrocarbon energy reservoir drives these countries to examine the integration of renewable energy to reduce green house gas emissions whilst meeting their electrical energy demands. One possible renewable energy source is wind. Trinidad and Tobago, through its renewable energy policy, is seeking to reliably and economically integrate wind power with its conventional power generation sources. This paper assesses the adequacy of wind power generation at potential sites through the use of auto-regressive modeling and the use of Monte Carlo Simulation to evaluate the well-being indices for the combination of wind and conventional power generation. Two sites in the twin island Republic of Trinidad and Tobago were identified as case studies for the proposed methodology. Analysis of the results indicated that the methodology should be applied to sites with conditions encouraging economic feasibility of wind power generation.展开更多
Primary energy has the potential to bring challenges to the reliability,economic,and eco-friendliness of global electric power systems.The concept of electric power security are proposed,including many factors that ar...Primary energy has the potential to bring challenges to the reliability,economic,and eco-friendliness of global electric power systems.The concept of electric power security are proposed,including many factors that are not considered in power system reliability analysis,such as coal supply for power system,fuel price for electricity power market,carbon emissions of power generation,and so on.It is broader than power system reliability and security,which means that providing energy in the form of reliable,economical,and eco-friendly electric power.Following an account of existing blackout defence methods and systems,the processes of transforming various kinds of primary energy into electric power and the interactions between them are described,particularly with regard to flows of energy,capital,and information.Factors that limit the liquidity of these flows are defined as“generalized congestion”,and the challenges presented by primary energy are named“primary energy congestion”.China’s dilemma on coal supply for power generation is presented in some detail as an example of primary energy congestion.To cope with impacts of the primary energy on electric power systems,an idea is introduced to extend the scope of existing coordinated blackout defence systems to account for primary energy,which would lead to an integrated tool to provide decision support to power system operators accounting for primary energy congestion.展开更多
In order to overcome the shortages of diagnostic method for distribution networks considering the reliability assessment,this paper proposed a method based on power supply safety standards.It profoundly analyzed the s...In order to overcome the shortages of diagnostic method for distribution networks considering the reliability assessment,this paper proposed a method based on power supply safety standards.It profoundly analyzed the security standard of supply for urban power networks,and established quantitative indicators of load groups based on different fault conditions.Then a method suitable for diagnostic evaluation of urban distribution networks in China was given.In the method,“N-1”calibration analysis of the distribution network was conducted.Then the results are compared with quantitative indicators of load groups on different conditions deriving the diagnostic conclusions and the standard revision is discussed.The feasibility and accuracy of the method is finally verified in the case study.展开更多
Due to the increasing implementation of high voltage direct current(HVDC)and the integration of renewable resources,frequency stability problems in power systems are drawing greater attention in recent years.It has be...Due to the increasing implementation of high voltage direct current(HVDC)and the integration of renewable resources,frequency stability problems in power systems are drawing greater attention in recent years.It has become necessary to carry out online frequency security assessments to ensure the safe operation of power systems.Considering the low time-efficiency of simulation-based methods,analytical models,such as the frequency nadir prediction(FNP)model,are more suitable for online assessment,which requires calculating the worst frequency deviation under various contingencies.Based on the FNP model,the FNP-L model for online frequency security assessment is proposed in this paper.The proposed model implements security assessment by calculating and checking the frequency features,including the nadir time and frequency,followed by contingencies.The effect of the governor,including nonlinear constraints,is approximated into polynomial functions so that the results are obtained by solving multiple polynomial equations.Case studies are carried out using the New-England 39-bus system and a regional power grid,which shows that the proposed model could achieve both high speed and high accuracy,and can therefore be applied in online security assessment.展开更多
A power balance static random-access memory(SRAM) for resistance to differential power analysis(DPA) is proposed. In the proposed design, the switch power consumption and short-circuit power consumption are balanc...A power balance static random-access memory(SRAM) for resistance to differential power analysis(DPA) is proposed. In the proposed design, the switch power consumption and short-circuit power consumption are balanced by discharging and pre-charging the key nodes of the output circuit and adding an additional shortcircuit current path. Thus, the power consumption is constant in every read cycle. As a result, the DPA-resistant ability of the SRAM is improved. In 65 nm CMOS technology, the power balance SRAM is fully custom designed with a layout area of 5863.6 μm^2.The post-simulation results show that the normalized energy deviation(NED) and normalized standard deviation(NSD) are 0.099% and 0.04%, respectively. Compared to existing power balance circuits, the power balance ability of the proposed SRAM has improved 53%.展开更多
In a smart grid,state estimation(SE)is a very important component of energy management system.Its main functions include system SE and detection of cyber anomalies.Recently,it has been shown that conventional SE techn...In a smart grid,state estimation(SE)is a very important component of energy management system.Its main functions include system SE and detection of cyber anomalies.Recently,it has been shown that conventional SE techniques are vulnerable to false data injection(FDI)attack,which is a sophisticated new class of attacks on data integrity in smart grid.The main contribution of this paper is to propose a new FDI attack detection technique using a new data-driven SE model,which is different from the traditional weighted least square based SE model.This SE model has a number of unique advantages compared with traditional SE models.First,the prediction technique can better maintain the inherent temporal correlations among consecutive measurement vectors.Second,the proposed SE model can learn the actual power system states.Finally,this paper shows that this SE model can be effectively used to detect FDI attacks that otherwise remain stealthy to traditional SE-based bad data detectors.The proposed FDI attack detection technique is evaluated on a number of standard bus systems.The performance of state prediction and the accuracy of FDI attack detection are benchmarked against the state-ofthe-art techniques.Experimental results show that the proposed FDI attack detection technique has a higher detection rate compared with the existing techniques while reducing the false alarms significantly.展开更多
Auxiliary frequency control of a wind turbine generator(WTG) has been widely used to enhance the frequencysecurity of power systems with high penetration of renewableenergy. Previous studies recommend two types of con...Auxiliary frequency control of a wind turbine generator(WTG) has been widely used to enhance the frequencysecurity of power systems with high penetration of renewableenergy. Previous studies recommend two types of control schemes,including frequency droop control and emulated inertia control,which simulate the response characteristics of the synchronousgenerator (SG). This paper plans to further explore the optimalauxiliary frequency control of the wind turbine based on previousresearch. First, it is determined that the virtual inertia control haslittle effect on the maximum rate of change of frequency (MaxROCOF)if the time delay of the control link of WTG is taken intoconsideration. Secondly, if a WTG operates in maximum powerpoint tracking (MPPT) mode and uses the rotor deceleration forfrequency modulation, its optimal auxiliary frequency control willcontain only droop control. Furthermore, if the droop control isproperly delayed, better system frequency response (SFR) willbe obtained. The reason is that coordination between the WTGand SG is important for SFR when the frequency modulationcapability of the WTG is limited. The frequency modulationcapability of the WTG is required to be released more properly.Therefore, when designing optimal auxiliary frequency controlfor the WTG, a better control scheme is worth further study.展开更多
Adding the auxiliary frequency control function to the wind turbine generator(WTG)is a solution to the frequency security problem of the power system caused by the replacement of the synchronous generator(SG)by the WT...Adding the auxiliary frequency control function to the wind turbine generator(WTG)is a solution to the frequency security problem of the power system caused by the replacement of the synchronous generator(SG)by the WTG.The auxiliary frequency control using rotor kinetic energy is an economical scheme because the WTG still runs at the maximum power point during normal operation.In this paper,the functional optimization model of the auxiliary frequency control strategy of WTG is established.The optimal auxiliary frequency control strategy is obtained by solving the model numerically.As for the practical realization of the control strategy,the coordination of the auxiliary frequency control with the maximum power point tracking(MPPT)control is studied.The practical auxiliary frequency control strategy is modified to adapt to different power disturbances in the system,and the parameter setting method is also proposed.The sensitivity of system frequency to control parameters is studied.Finally,the simulation results verify the effectiveness and practicability of the proposed control strategy.展开更多
文摘How to comprehensively consider the power flow constraints and various stability constraints in a series of power system optimization problems without affecting the calculation speed is always a problem.The computational burden of probabilistic security assessment is even more unimaginable.In order to solve such problems,a security region(SR)methodology is proposed,which is a brand-new methodology developed on the basis of the classical point-wise method.Tianjin University has been studying the SR methodology since the 1980s,and has achieved a series of original breakthroughs that are described in this paper.The integrated SR introduced in this paper is mainly defined in the power injection space,and includes SRs to ensure steady-state security,transient stability,static voltage stability,and smalldisturbance stability.These SRs are uniquely determined for a given network topology(as well as location and clearing process for transient faults)and given system component parameters,and are irrelevant to operation states.This paper presents 11 facts and related remarks to introduce the basic concepts,composition,dynamics nature,and topological and geometric characteristics of SRs.It also provides a practical mathematical description of SR boundaries and fast calculation methods to determine them in a concise and systematic way.Thus,this article provides support for the systematic understanding,future research,and applications of SRs.The most critical finding on the topological and geometric characteristics of SRs is that,within the scope of engineering concern,the practical boundaries of SRs in the power injection space can be approximated by one or a few hyperplanes.Based on this finding,the calculation time for power system probabilistic security assessment(i.e.,risk analysis)and power system optimization with security constraints can be decreased by orders of magnitude.
基金support by National Natural Science Foundation of China(61202354,51507084)Nanjing University of Post and Telecommunications Science Foundation(NUPTSF)(NT214203)
文摘Electricity network is a very complex entity that comprises several components like generators, transmission lines, loads among others. As technologies continue to evolve, the complexity of the electricity network has also increased as more devices are being connected to the network. To understand the physical laws governing the operation of the network, techniques such as optimal power flow (OPF), Economic dispatch (ED) and Security constrained optimal power flow (SCOPF) were developed. These techniques have been used extensively in network operation, planning and so on. However, an in-depth presentation showcasing the merits and demerits of these techniques is still lacking in the literature. Hence, this paper intends to fill this gap. In this paper, Economic dispatch, optimal power flow and security-constrained optimal power flow are applied to a 3-bus test system using a linear programming approach. The results of the ED, OPF and SC-OPF are compared and presented.
文摘With the development of information networks, the problem of power security has increasingly caused many attention of people, but the simple power security defense system has been difficult to meet the current complex network environment. Aiming at this situation, by using the method of T-S fuzzy neural network model to analyze the characteristics of the data transmission in network, it has obtained corresponding threat information. By processing these threat information, it completes the construction of three-dimensional power security defense system. The paper carries on the corresponding data training methods by using T-shirt model fuzzy neural network, which has certain reference significance for the data analysis of other similar fields. At the same time, the study of building on the three-dimensional power security defense system aims to provide a theoretical reference for solving the security defense of the current complex network environment.
文摘In this paper,a series of major policy decisions used to improve the power grid reliability,reduce the risk and losses of major power outages,and realize the modernization of 21st century power grid are discussed. These decisions were adopted by American government and would also be helpful for the strategic development of Chinese power grid. It is proposed that China should take precaution,carry out security research on the overall dynamic behaviour characteristics of the UHV grid using the complexity theory,and finally provide safeguard for the Chinese UHV grid. It is also pointed out that,due to the lack of matured approaches to controll a cascading failure,the primary duty of a system operator is to work as a "watchdog" for the grid operation security,eliminate the cumulative effect and reduce the risk and losses of major cascading outages with the help of EMS and WAMS.
文摘After the digital revolution, the power system security becomes an important issue and it urges the power producers to maintain a well secured system in order to supply a quality power to the end users. This paper presents an integrated Corrective Security Constrained Optimal Power Flow (CSCOPF) with Flexible Transmission Line Impedance (FTLI) to enhance the power system security. The corrective approach of SCOPF is chosen, because it allows the corrective equipment to bring back the system to a stable operating point and hence, it offers high flexibility and better economics. The concept of FTLI arises from the ability of FACTS devices such as Thyristor Controlled Series Capacitor (TCSC), which can vary the line reactance to a certain extent. An enhanced security can be achieved by incorporating FTLI into the CSCOPF problem, since the power flow in a system is highly dependent on the line reactance. FTLI based CSCOPF can reduce the amount of rescheduling of generators, but it will result in an increased number of variables and thus, the complexity to the optimization process is increased. This highly complex problem is solved by using nonlinear programming. The AC based OPF model is preferred, since the corrective security actions require highly accurate solutions. IEEE 30 bus system is used to test the proposed scheme and the results are compared with the traditional CSCOPF. It can be seen that the proposed idea provides a notable improvement in the reduction of cost incurred for restoring the system security.
基金This research was supported by the Energy Cloud R&D Program through the National Research Foundation of Korea(NRF)funded by the Ministry of Science,ICT(NRF2019M3F2A1073385).
文摘An analysis of the recent major security incidents related to industrial control systems,revealed that most had been caused by company employees.Therefore,enterprise security management systems have been developed to focus on companies’personnel.Nonetheless,several hacking incidents,involving major companies and public/financial institutions,were actually attempted by the cooperative firms or the outsourced manpower undertaking maintenance work.Specifically,institutions that operate industrial control systems(ICSs)associated with critical national infrastructures,such as traffic or energy,have contracted several cooperative firms.Nonetheless,ICT’s importance is gradually increasing,due to outsourcing,and is the most vulnerable factor in security.This paper proposes a virtualized security management scheme for the resident cooperative firms in the industrial control infrastructure.Since such companies often cannot afford adequate investment in security,the scheme is to let an ICS company provide the virtualized system.One of its merits is the convenience of controlling a VDI server at the center.The cooperative firms were classified,based on their respective security levels,and statistics were collected throughout a four-year period for the results.This paper analyzes the policies and virtualization systems that have been applied to the security of the partner companies,which engaged in ICS security.A suitable model for ICS security was then proposed by analyzing their effects on the system efficiencies,based on the comparisons of the security inspection results obtained before and after virtualization.The proposed system is expected to contribute to industrial safety.
基金National Nature Science Foundation of China (No.50477039 No.50677020)National High Technology Research and Development Program of China("863"Program) (No.2007AA04Z425)
文摘Based on the measured data of geomagnetically induced currents (GIC) in Guangdong Ling' ao 500 kV power networks during several magnetic storms at the peak years of 23rd Solar Cycle, the GIC calculation results of 750 kV planning power grid in Shartxi, Gansu, Qinghai and Ningxia, the structure and characteristics of power networks from 500 kV to 1 000 kV, and super magnetic storm in 1859 are analyzed in this paper. Through the analysis, the possible impacts of extreme space weather on the future ultra-high voltage (UHV) grid, the security of large-scale power system in China are expounded, and the research suggestions coping with the strong solar storms are proposed.
基金supported by the National Natural Science Foundation of China (No.U2166201)China Postdoctoral Science Foundation (No.2022TQ0206)。
文摘The National Electricity Market(NEM)in Australia was suspended during June 15-23,2022,with a primary attribution to the lack of available generation capacity.This incident is noteworthy because it was the first market suspension in NEM’s history and took place in a major energy exporting country.In this letter,we review the outline and impacts of the incident.From the perspectives of market regulation,electricity supply,and electricity demand,we identify three underlying causes of the market suspension and offer four recommendations for the market mechanism evolution to ensure power supply security.
文摘In developing power grids,setting standards is critical to its success.The development of China’s power industry has proposed new requirements for power systems to ensure secure and stable operations.The principal standards for the security and stability of China’s current power systems are analyzed in terms of operational control,generator-grid coordination and simulation.The shortcomings are pointed out and the directions of future development are discussed.In the end,the study highlighted the following key areas that require further research and improvement:the evaluation criteria of power system security and stability should be improved to ensure the secure and stable operation of China’s power systems;the operational control standards should be constantly enhanced to increase the reliability and flexibility of operational control strategies;generatorgrid coordination standards should be upgraded to improve the coordination between the generator control protection system and the grid;and the simulation methodology should be standardized in future power system security and stability research.
文摘The traditional“three defense lines”for power systems are based on local information and static protection&control strategy,which are not suitable to modern large-scale power systems.In order to improve the security of UHV hybrid power grids,the Integrated Wide Area Protection&Control(IWAPC)is proposed in this paper by applying the new technologies of synchronized high-speed communication,which integrates“three defense lines”and promotes existing wide area protection only for security control.The IWAPC is the hierarchical protection and control system which provides the protection and control for wide area power networks to improve their reliability and security.It is divided into three levels,the local bay level,the substation integrated protection level and the wide area protection level.The wide area real-time protection and control information platform is the most important part of the IWAPC,which is based on a synchronized wide area communication network.The key technologies and new development trends include network topology analysis,wide area backup protection,wide area intelligent reclosing,wide area load shedding,wide area auto-switching,overload cutoff and transfer,transmission section protection,intelligent system splitting and dynamic stability control.It cannot only integrate three lines of defense for power system protection and control,but also improve security of the power grid.
文摘Climate change threatens the sustainable development and survival of the small Caribbean island nations. The continual rise in the demand and cost of the earth's finite hydrocarbon energy reservoir drives these countries to examine the integration of renewable energy to reduce green house gas emissions whilst meeting their electrical energy demands. One possible renewable energy source is wind. Trinidad and Tobago, through its renewable energy policy, is seeking to reliably and economically integrate wind power with its conventional power generation sources. This paper assesses the adequacy of wind power generation at potential sites through the use of auto-regressive modeling and the use of Monte Carlo Simulation to evaluate the well-being indices for the combination of wind and conventional power generation. Two sites in the twin island Republic of Trinidad and Tobago were identified as case studies for the proposed methodology. Analysis of the results indicated that the methodology should be applied to sites with conditions encouraging economic feasibility of wind power generation.
基金This work is jointly supported by Major Program of National Natural Science Foundation of China(No.91024028)National High Technology Research and Development Program of China(863 Program)(No.2011AA05A105)+1 种基金SGCC Projects SGCC-MPLG003-2012the Australian Research Council(DP120101345).
文摘Primary energy has the potential to bring challenges to the reliability,economic,and eco-friendliness of global electric power systems.The concept of electric power security are proposed,including many factors that are not considered in power system reliability analysis,such as coal supply for power system,fuel price for electricity power market,carbon emissions of power generation,and so on.It is broader than power system reliability and security,which means that providing energy in the form of reliable,economical,and eco-friendly electric power.Following an account of existing blackout defence methods and systems,the processes of transforming various kinds of primary energy into electric power and the interactions between them are described,particularly with regard to flows of energy,capital,and information.Factors that limit the liquidity of these flows are defined as“generalized congestion”,and the challenges presented by primary energy are named“primary energy congestion”.China’s dilemma on coal supply for power generation is presented in some detail as an example of primary energy congestion.To cope with impacts of the primary energy on electric power systems,an idea is introduced to extend the scope of existing coordinated blackout defence systems to account for primary energy,which would lead to an integrated tool to provide decision support to power system operators accounting for primary energy congestion.
文摘In order to overcome the shortages of diagnostic method for distribution networks considering the reliability assessment,this paper proposed a method based on power supply safety standards.It profoundly analyzed the security standard of supply for urban power networks,and established quantitative indicators of load groups based on different fault conditions.Then a method suitable for diagnostic evaluation of urban distribution networks in China was given.In the method,“N-1”calibration analysis of the distribution network was conducted.Then the results are compared with quantitative indicators of load groups on different conditions deriving the diagnostic conclusions and the standard revision is discussed.The feasibility and accuracy of the method is finally verified in the case study.
基金This work is supported by the National Key Research&Development Program of China(No.2018YFB0904500)the Science and Technology Foundation of the State Grid Corporation of China(SGLNDK00KJJS1800236).
文摘Due to the increasing implementation of high voltage direct current(HVDC)and the integration of renewable resources,frequency stability problems in power systems are drawing greater attention in recent years.It has become necessary to carry out online frequency security assessments to ensure the safe operation of power systems.Considering the low time-efficiency of simulation-based methods,analytical models,such as the frequency nadir prediction(FNP)model,are more suitable for online assessment,which requires calculating the worst frequency deviation under various contingencies.Based on the FNP model,the FNP-L model for online frequency security assessment is proposed in this paper.The proposed model implements security assessment by calculating and checking the frequency features,including the nadir time and frequency,followed by contingencies.The effect of the governor,including nonlinear constraints,is approximated into polynomial functions so that the results are obtained by solving multiple polynomial equations.Case studies are carried out using the New-England 39-bus system and a regional power grid,which shows that the proposed model could achieve both high speed and high accuracy,and can therefore be applied in online security assessment.
基金Project supported by the Zhejiang Provincial Natural Science Foundation of China(No.LQ14F040001)the National Natural Science Foundation of China(Nos.61274132,61234002)the K.C.Wong Magna Fund in Ningbo University,China
文摘A power balance static random-access memory(SRAM) for resistance to differential power analysis(DPA) is proposed. In the proposed design, the switch power consumption and short-circuit power consumption are balanced by discharging and pre-charging the key nodes of the output circuit and adding an additional shortcircuit current path. Thus, the power consumption is constant in every read cycle. As a result, the DPA-resistant ability of the SRAM is improved. In 65 nm CMOS technology, the power balance SRAM is fully custom designed with a layout area of 5863.6 μm^2.The post-simulation results show that the normalized energy deviation(NED) and normalized standard deviation(NSD) are 0.099% and 0.04%, respectively. Compared to existing power balance circuits, the power balance ability of the proposed SRAM has improved 53%.
文摘In a smart grid,state estimation(SE)is a very important component of energy management system.Its main functions include system SE and detection of cyber anomalies.Recently,it has been shown that conventional SE techniques are vulnerable to false data injection(FDI)attack,which is a sophisticated new class of attacks on data integrity in smart grid.The main contribution of this paper is to propose a new FDI attack detection technique using a new data-driven SE model,which is different from the traditional weighted least square based SE model.This SE model has a number of unique advantages compared with traditional SE models.First,the prediction technique can better maintain the inherent temporal correlations among consecutive measurement vectors.Second,the proposed SE model can learn the actual power system states.Finally,this paper shows that this SE model can be effectively used to detect FDI attacks that otherwise remain stealthy to traditional SE-based bad data detectors.The proposed FDI attack detection technique is evaluated on a number of standard bus systems.The performance of state prediction and the accuracy of FDI attack detection are benchmarked against the state-ofthe-art techniques.Experimental results show that the proposed FDI attack detection technique has a higher detection rate compared with the existing techniques while reducing the false alarms significantly.
基金the National Natural Science Foundation of China(51922061)the Science and Technology Project of State Grid Corporation of China(SGZJ0000KXJS1900418).
文摘Auxiliary frequency control of a wind turbine generator(WTG) has been widely used to enhance the frequencysecurity of power systems with high penetration of renewableenergy. Previous studies recommend two types of control schemes,including frequency droop control and emulated inertia control,which simulate the response characteristics of the synchronousgenerator (SG). This paper plans to further explore the optimalauxiliary frequency control of the wind turbine based on previousresearch. First, it is determined that the virtual inertia control haslittle effect on the maximum rate of change of frequency (MaxROCOF)if the time delay of the control link of WTG is taken intoconsideration. Secondly, if a WTG operates in maximum powerpoint tracking (MPPT) mode and uses the rotor deceleration forfrequency modulation, its optimal auxiliary frequency control willcontain only droop control. Furthermore, if the droop control isproperly delayed, better system frequency response (SFR) willbe obtained. The reason is that coordination between the WTGand SG is important for SFR when the frequency modulationcapability of the WTG is limited. The frequency modulationcapability of the WTG is required to be released more properly.Therefore, when designing optimal auxiliary frequency controlfor the WTG, a better control scheme is worth further study.
基金supported by State Grid Corporation of China(No.52094020006V)。
文摘Adding the auxiliary frequency control function to the wind turbine generator(WTG)is a solution to the frequency security problem of the power system caused by the replacement of the synchronous generator(SG)by the WTG.The auxiliary frequency control using rotor kinetic energy is an economical scheme because the WTG still runs at the maximum power point during normal operation.In this paper,the functional optimization model of the auxiliary frequency control strategy of WTG is established.The optimal auxiliary frequency control strategy is obtained by solving the model numerically.As for the practical realization of the control strategy,the coordination of the auxiliary frequency control with the maximum power point tracking(MPPT)control is studied.The practical auxiliary frequency control strategy is modified to adapt to different power disturbances in the system,and the parameter setting method is also proposed.The sensitivity of system frequency to control parameters is studied.Finally,the simulation results verify the effectiveness and practicability of the proposed control strategy.