期刊文献+
共找到19篇文章
< 1 >
每页显示 20 50 100
Theory and Method of Power System Integrated Security Region Irrelevant to Operation States:An Introduction 被引量:12
1
作者 Yixin Yu Yanli Liu +1 位作者 Chao Qin Tiankai Yang 《Engineering》 SCIE EI 2020年第7期754-777,共24页
How to comprehensively consider the power flow constraints and various stability constraints in a series of power system optimization problems without affecting the calculation speed is always a problem.The computatio... How to comprehensively consider the power flow constraints and various stability constraints in a series of power system optimization problems without affecting the calculation speed is always a problem.The computational burden of probabilistic security assessment is even more unimaginable.In order to solve such problems,a security region(SR)methodology is proposed,which is a brand-new methodology developed on the basis of the classical point-wise method.Tianjin University has been studying the SR methodology since the 1980s,and has achieved a series of original breakthroughs that are described in this paper.The integrated SR introduced in this paper is mainly defined in the power injection space,and includes SRs to ensure steady-state security,transient stability,static voltage stability,and smalldisturbance stability.These SRs are uniquely determined for a given network topology(as well as location and clearing process for transient faults)and given system component parameters,and are irrelevant to operation states.This paper presents 11 facts and related remarks to introduce the basic concepts,composition,dynamics nature,and topological and geometric characteristics of SRs.It also provides a practical mathematical description of SR boundaries and fast calculation methods to determine them in a concise and systematic way.Thus,this article provides support for the systematic understanding,future research,and applications of SRs.The most critical finding on the topological and geometric characteristics of SRs is that,within the scope of engineering concern,the practical boundaries of SRs in the power injection space can be approximated by one or a few hyperplanes.Based on this finding,the calculation time for power system probabilistic security assessment(i.e.,risk analysis)and power system optimization with security constraints can be decreased by orders of magnitude. 展开更多
关键词 security region Composition power flow security Static voltage stability small-disturbance stability Transient stability Dynamics nature Topological and geometric characteristics HYPERPLANE
下载PDF
Security Risk Assessment of Cyber Physical Power System Based on Rough Set and Gene Expression Programming 被引量:3
2
作者 Song Deng Dong Yue +1 位作者 Xiong Fu Aihua Zhou 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI 2015年第4期431-439,共9页
Risk assessment is essential for the safe and reliable operation of cyber physical power system. Traditional security risk assessment methods do not take integration of cyber system and physical system of power grid i... Risk assessment is essential for the safe and reliable operation of cyber physical power system. Traditional security risk assessment methods do not take integration of cyber system and physical system of power grid into account. In order to solve this problem, security risk assessment algorithm of cyber physical power system based on rough set and gene expression programming is proposed. Firstly, fast attribution reduction based on binary search algorithm is presented. Secondly, security risk assessment function for cyber physical power system is mined based on gene expression programming. Lastly, security risk levels of cyber physical power system are predicted and analyzed by the above function model. Experimental results show that security risk assessment function model based on the proposed algorithm has high efficiency of function mining, accuracy of security risk level prediction and strong practicality. © 2014 Chinese Association of Automation. 展开更多
关键词 Algorithms Electric power system security Gene expression GENES Rough set theory
下载PDF
Comparison of Economic Dispatch, OPF and Security Constrained-OPF in Power System Studies RN
3
作者 Etete Obio Siddique Ali +5 位作者 Idowu Oyebanjo Daniel Abara Farouk Suleiman Peter Ohiero Daniel Oku Vincent Ogar 《Journal of Power and Energy Engineering》 2022年第8期54-74,共21页
Electricity network is a very complex entity that comprises several components like generators, transmission lines, loads among others. As technologies continue to evolve, the complexity of the electricity network has... Electricity network is a very complex entity that comprises several components like generators, transmission lines, loads among others. As technologies continue to evolve, the complexity of the electricity network has also increased as more devices are being connected to the network. To understand the physical laws governing the operation of the network, techniques such as optimal power flow (OPF), Economic dispatch (ED) and Security constrained optimal power flow (SCOPF) were developed. These techniques have been used extensively in network operation, planning and so on. However, an in-depth presentation showcasing the merits and demerits of these techniques is still lacking in the literature. Hence, this paper intends to fill this gap. In this paper, Economic dispatch, optimal power flow and security-constrained optimal power flow are applied to a 3-bus test system using a linear programming approach. The results of the ED, OPF and SC-OPF are compared and presented. 展开更多
关键词 Economic Dispatch Linear Programming Network Operation Optimal power Flow security Constrained power Flow
下载PDF
Construction of Three-dimensional power security Defense System Based on T-S Model Fuzzy Neural Network
4
作者 Zeyu SUN 《International Journal of Technology Management》 2015年第5期105-108,共4页
With the development of information networks, the problem of power security has increasingly caused many attention of people, but the simple power security defense system has been difficult to meet the current complex... With the development of information networks, the problem of power security has increasingly caused many attention of people, but the simple power security defense system has been difficult to meet the current complex network environment. Aiming at this situation, by using the method of T-S fuzzy neural network model to analyze the characteristics of the data transmission in network, it has obtained corresponding threat information. By processing these threat information, it completes the construction of three-dimensional power security defense system. The paper carries on the corresponding data training methods by using T-shirt model fuzzy neural network, which has certain reference significance for the data analysis of other similar fields. At the same time, the study of building on the three-dimensional power security defense system aims to provide a theoretical reference for solving the security defense of the current complex network environment. 展开更多
关键词 Information network power security Neural network Network environment Data FEATURE Threat information
下载PDF
An In-Depth Study of Complex Power System Dynamic Behavior Characteristics for Chinese UHV Power Grid Security
5
作者 Ding Daoqi State Grid Information & Telecommunication Co.,Ltd.Zhao Fang 《Electricity》 2009年第2期45-51,共7页
In this paper,a series of major policy decisions used to improve the power grid reliability,reduce the risk and losses of major power outages,and realize the modernization of 21st century power grid are discussed. The... In this paper,a series of major policy decisions used to improve the power grid reliability,reduce the risk and losses of major power outages,and realize the modernization of 21st century power grid are discussed. These decisions were adopted by American government and would also be helpful for the strategic development of Chinese power grid. It is proposed that China should take precaution,carry out security research on the overall dynamic behaviour characteristics of the UHV grid using the complexity theory,and finally provide safeguard for the Chinese UHV grid. It is also pointed out that,due to the lack of matured approaches to controll a cascading failure,the primary duty of a system operator is to work as a "watchdog" for the grid operation security,eliminate the cumulative effect and reduce the risk and losses of major cascading outages with the help of EMS and WAMS. 展开更多
关键词 EMS 2003 WAMS An In-Depth Study of Complex power System Dynamic Behavior Characteristics for Chinese UHV power Grid security
下载PDF
The Effective Enhancement of Power System Security by Flexible Transmission Line Impedance with Minimal Rescheduling of Generators
6
作者 Karuppasamy Muthulakshmi R.M. Sasiraja Selvarajan Mukesh Muthu 《Circuits and Systems》 2016年第4期381-389,共9页
After the digital revolution, the power system security becomes an important issue and it urges the power producers to maintain a well secured system in order to supply a quality power to the end users. This paper pre... After the digital revolution, the power system security becomes an important issue and it urges the power producers to maintain a well secured system in order to supply a quality power to the end users. This paper presents an integrated Corrective Security Constrained Optimal Power Flow (CSCOPF) with Flexible Transmission Line Impedance (FTLI) to enhance the power system security. The corrective approach of SCOPF is chosen, because it allows the corrective equipment to bring back the system to a stable operating point and hence, it offers high flexibility and better economics. The concept of FTLI arises from the ability of FACTS devices such as Thyristor Controlled Series Capacitor (TCSC), which can vary the line reactance to a certain extent. An enhanced security can be achieved by incorporating FTLI into the CSCOPF problem, since the power flow in a system is highly dependent on the line reactance. FTLI based CSCOPF can reduce the amount of rescheduling of generators, but it will result in an increased number of variables and thus, the complexity to the optimization process is increased. This highly complex problem is solved by using nonlinear programming. The AC based OPF model is preferred, since the corrective security actions require highly accurate solutions. IEEE 30 bus system is used to test the proposed scheme and the results are compared with the traditional CSCOPF. It can be seen that the proposed idea provides a notable improvement in the reduction of cost incurred for restoring the system security. 展开更多
关键词 Flexible Transmission Line Impedance power System security security Constrained Optimal
下载PDF
Management of Schemes and Threat Prevention in ICS Partner Companies Security
7
作者 Sangdo Lee Jun-Ho Huh 《Computers, Materials & Continua》 SCIE EI 2021年第12期3659-3684,共26页
An analysis of the recent major security incidents related to industrial control systems,revealed that most had been caused by company employees.Therefore,enterprise security management systems have been developed to ... An analysis of the recent major security incidents related to industrial control systems,revealed that most had been caused by company employees.Therefore,enterprise security management systems have been developed to focus on companies’personnel.Nonetheless,several hacking incidents,involving major companies and public/financial institutions,were actually attempted by the cooperative firms or the outsourced manpower undertaking maintenance work.Specifically,institutions that operate industrial control systems(ICSs)associated with critical national infrastructures,such as traffic or energy,have contracted several cooperative firms.Nonetheless,ICT’s importance is gradually increasing,due to outsourcing,and is the most vulnerable factor in security.This paper proposes a virtualized security management scheme for the resident cooperative firms in the industrial control infrastructure.Since such companies often cannot afford adequate investment in security,the scheme is to let an ICS company provide the virtualized system.One of its merits is the convenience of controlling a VDI server at the center.The cooperative firms were classified,based on their respective security levels,and statistics were collected throughout a four-year period for the results.This paper analyzes the policies and virtualization systems that have been applied to the security of the partner companies,which engaged in ICS security.A suitable model for ICS security was then proposed by analyzing their effects on the system efficiencies,based on the comparisons of the security inspection results obtained before and after virtualization.The proposed system is expected to contribute to industrial safety. 展开更多
关键词 Nuclear power plant nuclear power plant security virtual machine SCADA ICS ISO27001 VDI based security software engineering
下载PDF
Influence and hazard of disastrous space weather on power grid in China
8
作者 Liu Lianguang Zheng Kuan Liu Chunming 《Engineering Sciences》 EI 2011年第4期83-87,共5页
Based on the measured data of geomagnetically induced currents (GIC) in Guangdong Ling' ao 500 kV power networks during several magnetic storms at the peak years of 23rd Solar Cycle, the GIC calculation results of ... Based on the measured data of geomagnetically induced currents (GIC) in Guangdong Ling' ao 500 kV power networks during several magnetic storms at the peak years of 23rd Solar Cycle, the GIC calculation results of 750 kV planning power grid in Shartxi, Gansu, Qinghai and Ningxia, the structure and characteristics of power networks from 500 kV to 1 000 kV, and super magnetic storm in 1859 are analyzed in this paper. Through the analysis, the possible impacts of extreme space weather on the future ultra-high voltage (UHV) grid, the security of large-scale power system in China are expounded, and the research suggestions coping with the strong solar storms are proposed. 展开更多
关键词 space weather magnetic storm GIC UHV power grid security
下载PDF
Suspension of Australian National Electricity Market in 2022 Necessitates Mechanism Evolution Ensuring Power Supply Security
9
作者 Zhenfei Tan Hua Geng +2 位作者 Xiaoyuan Xu Sijie Chen Zheng Yan 《Journal of Modern Power Systems and Clean Energy》 SCIE EI CSCD 2023年第2期674-679,共6页
The National Electricity Market(NEM)in Australia was suspended during June 15-23,2022,with a primary attribution to the lack of available generation capacity.This incident is noteworthy because it was the first market... The National Electricity Market(NEM)in Australia was suspended during June 15-23,2022,with a primary attribution to the lack of available generation capacity.This incident is noteworthy because it was the first market suspension in NEM’s history and took place in a major energy exporting country.In this letter,we review the outline and impacts of the incident.From the perspectives of market regulation,electricity supply,and electricity demand,we identify three underlying causes of the market suspension and offer four recommendations for the market mechanism evolution to ensure power supply security. 展开更多
关键词 Electricity market administered pricing power system security energy crisis demand response
原文传递
Analysis and Recommendations for the Adaptability of China’s Power System Security and Stability Relevant Standards 被引量:16
10
作者 Yinbiao Shu Yong Tang 《CSEE Journal of Power and Energy Systems》 SCIE 2017年第4期334-339,共6页
In developing power grids,setting standards is critical to its success.The development of China’s power industry has proposed new requirements for power systems to ensure secure and stable operations.The principal st... In developing power grids,setting standards is critical to its success.The development of China’s power industry has proposed new requirements for power systems to ensure secure and stable operations.The principal standards for the security and stability of China’s current power systems are analyzed in terms of operational control,generator-grid coordination and simulation.The shortcomings are pointed out and the directions of future development are discussed.In the end,the study highlighted the following key areas that require further research and improvement:the evaluation criteria of power system security and stability should be improved to ensure the secure and stable operation of China’s power systems;the operational control standards should be constantly enhanced to increase the reliability and flexibility of operational control strategies;generatorgrid coordination standards should be upgraded to improve the coordination between the generator control protection system and the grid;and the simulation methodology should be standardized in future power system security and stability research. 展开更多
关键词 Generator-grid coordination operational control planning and design power system security and stability standards simulation
原文传递
Integrated Wide Area Protection and Control for Power Grid Security 被引量:5
11
作者 Qingping Wang Zhiqian Bo +4 位作者 Yingke Zhao Xiaowei Ma Ming Zhang Hao Zheng Lin Wang 《CSEE Journal of Power and Energy Systems》 SCIE CSCD 2019年第2期206-214,共9页
The traditional“three defense lines”for power systems are based on local information and static protection&control strategy,which are not suitable to modern large-scale power systems.In order to improve the secu... The traditional“three defense lines”for power systems are based on local information and static protection&control strategy,which are not suitable to modern large-scale power systems.In order to improve the security of UHV hybrid power grids,the Integrated Wide Area Protection&Control(IWAPC)is proposed in this paper by applying the new technologies of synchronized high-speed communication,which integrates“three defense lines”and promotes existing wide area protection only for security control.The IWAPC is the hierarchical protection and control system which provides the protection and control for wide area power networks to improve their reliability and security.It is divided into three levels,the local bay level,the substation integrated protection level and the wide area protection level.The wide area real-time protection and control information platform is the most important part of the IWAPC,which is based on a synchronized wide area communication network.The key technologies and new development trends include network topology analysis,wide area backup protection,wide area intelligent reclosing,wide area load shedding,wide area auto-switching,overload cutoff and transfer,transmission section protection,intelligent system splitting and dynamic stability control.It cannot only integrate three lines of defense for power system protection and control,but also improve security of the power grid. 展开更多
关键词 Digital substation power grid security control system protection wide area protection&control
原文传递
Wind Resource Potential in the Caribbean Archipelago
12
作者 Sanjay Bahadoorsingh Purdy Mohammed Vincent Ramesar Chandrabhan Sharma 《Journal of Energy and Power Engineering》 2013年第2期340-348,共9页
Climate change threatens the sustainable development and survival of the small Caribbean island nations. The continual rise in the demand and cost of the earth's finite hydrocarbon energy reservoir drives these count... Climate change threatens the sustainable development and survival of the small Caribbean island nations. The continual rise in the demand and cost of the earth's finite hydrocarbon energy reservoir drives these countries to examine the integration of renewable energy to reduce green house gas emissions whilst meeting their electrical energy demands. One possible renewable energy source is wind. Trinidad and Tobago, through its renewable energy policy, is seeking to reliably and economically integrate wind power with its conventional power generation sources. This paper assesses the adequacy of wind power generation at potential sites through the use of auto-regressive modeling and the use of Monte Carlo Simulation to evaluate the well-being indices for the combination of wind and conventional power generation. Two sites in the twin island Republic of Trinidad and Tobago were identified as case studies for the proposed methodology. Analysis of the results indicated that the methodology should be applied to sites with conditions encouraging economic feasibility of wind power generation. 展开更多
关键词 Wind energy wind power generation power generation reliability power system security.
下载PDF
Primary energy congestion of power systems 被引量:8
13
作者 Yusheng XUE Bin CAI +3 位作者 Geoffrey JAMES Zhaoyang DONG Fushuan WEN Feng XUE 《Journal of Modern Power Systems and Clean Energy》 SCIE EI 2014年第1期39-49,共11页
Primary energy has the potential to bring challenges to the reliability,economic,and eco-friendliness of global electric power systems.The concept of electric power security are proposed,including many factors that ar... Primary energy has the potential to bring challenges to the reliability,economic,and eco-friendliness of global electric power systems.The concept of electric power security are proposed,including many factors that are not considered in power system reliability analysis,such as coal supply for power system,fuel price for electricity power market,carbon emissions of power generation,and so on.It is broader than power system reliability and security,which means that providing energy in the form of reliable,economical,and eco-friendly electric power.Following an account of existing blackout defence methods and systems,the processes of transforming various kinds of primary energy into electric power and the interactions between them are described,particularly with regard to flows of energy,capital,and information.Factors that limit the liquidity of these flows are defined as“generalized congestion”,and the challenges presented by primary energy are named“primary energy congestion”.China’s dilemma on coal supply for power generation is presented in some detail as an example of primary energy congestion.To cope with impacts of the primary energy on electric power systems,an idea is introduced to extend the scope of existing coordinated blackout defence systems to account for primary energy,which would lead to an integrated tool to provide decision support to power system operators accounting for primary energy congestion. 展开更多
关键词 power system reliability Energy security Electric power security Primary energy congestion Blackout defence
原文传递
A diagnostic method for distribution networks based on power supply safety standards 被引量:8
14
作者 Junhui Huang Shaoyun Ge +5 位作者 Jun Han Hu Li Xiaomin Zhou Hong Liu Bo Wang Zhengfang Chen 《Protection and Control of Modern Power Systems》 2016年第1期63-70,共8页
In order to overcome the shortages of diagnostic method for distribution networks considering the reliability assessment,this paper proposed a method based on power supply safety standards.It profoundly analyzed the s... In order to overcome the shortages of diagnostic method for distribution networks considering the reliability assessment,this paper proposed a method based on power supply safety standards.It profoundly analyzed the security standard of supply for urban power networks,and established quantitative indicators of load groups based on different fault conditions.Then a method suitable for diagnostic evaluation of urban distribution networks in China was given.In the method,“N-1”calibration analysis of the distribution network was conducted.Then the results are compared with quantitative indicators of load groups on different conditions deriving the diagnostic conclusions and the standard revision is discussed.The feasibility and accuracy of the method is finally verified in the case study. 展开更多
关键词 Distribution network Diagnostic process N-1 calibration analysis power supply security
原文传递
Online Frequency Security Assessment Based on Analytical Model Considering Limiting Modules 被引量:2
15
作者 Yuqian Zhang Qinglai Guo +1 位作者 Yanzhen Zhou Hongbin Sun 《CSEE Journal of Power and Energy Systems》 SCIE EI CSCD 2022年第5期1363-1372,共10页
Due to the increasing implementation of high voltage direct current(HVDC)and the integration of renewable resources,frequency stability problems in power systems are drawing greater attention in recent years.It has be... Due to the increasing implementation of high voltage direct current(HVDC)and the integration of renewable resources,frequency stability problems in power systems are drawing greater attention in recent years.It has become necessary to carry out online frequency security assessments to ensure the safe operation of power systems.Considering the low time-efficiency of simulation-based methods,analytical models,such as the frequency nadir prediction(FNP)model,are more suitable for online assessment,which requires calculating the worst frequency deviation under various contingencies.Based on the FNP model,the FNP-L model for online frequency security assessment is proposed in this paper.The proposed model implements security assessment by calculating and checking the frequency features,including the nadir time and frequency,followed by contingencies.The effect of the governor,including nonlinear constraints,is approximated into polynomial functions so that the results are obtained by solving multiple polynomial equations.Case studies are carried out using the New-England 39-bus system and a regional power grid,which shows that the proposed model could achieve both high speed and high accuracy,and can therefore be applied in online security assessment. 展开更多
关键词 Frequency response frequency stability power system security
原文传递
Design of power balance SRAM for DPA-resistance 被引量:1
16
作者 周可基 汪鹏君 温亮 《Journal of Semiconductors》 EI CAS CSCD 2016年第4期106-112,共7页
A power balance static random-access memory(SRAM) for resistance to differential power analysis(DPA) is proposed. In the proposed design, the switch power consumption and short-circuit power consumption are balanc... A power balance static random-access memory(SRAM) for resistance to differential power analysis(DPA) is proposed. In the proposed design, the switch power consumption and short-circuit power consumption are balanced by discharging and pre-charging the key nodes of the output circuit and adding an additional shortcircuit current path. Thus, the power consumption is constant in every read cycle. As a result, the DPA-resistant ability of the SRAM is improved. In 65 nm CMOS technology, the power balance SRAM is fully custom designed with a layout area of 5863.6 μm^2.The post-simulation results show that the normalized energy deviation(NED) and normalized standard deviation(NSD) are 0.099% and 0.04%, respectively. Compared to existing power balance circuits, the power balance ability of the proposed SRAM has improved 53%. 展开更多
关键词 differential power analysis(DPA) static random access memory(SRAM) power balance information security
原文传递
Data-driven Approach for State Prediction and Detection of False Data Injection Attacks in Smart Grid 被引量:1
17
作者 Haftu Tasew Reda Adnan Anwar +1 位作者 Abdun Mahmood Naveen Chilamkurti 《Journal of Modern Power Systems and Clean Energy》 SCIE EI CSCD 2023年第2期455-467,共13页
In a smart grid,state estimation(SE)is a very important component of energy management system.Its main functions include system SE and detection of cyber anomalies.Recently,it has been shown that conventional SE techn... In a smart grid,state estimation(SE)is a very important component of energy management system.Its main functions include system SE and detection of cyber anomalies.Recently,it has been shown that conventional SE techniques are vulnerable to false data injection(FDI)attack,which is a sophisticated new class of attacks on data integrity in smart grid.The main contribution of this paper is to propose a new FDI attack detection technique using a new data-driven SE model,which is different from the traditional weighted least square based SE model.This SE model has a number of unique advantages compared with traditional SE models.First,the prediction technique can better maintain the inherent temporal correlations among consecutive measurement vectors.Second,the proposed SE model can learn the actual power system states.Finally,this paper shows that this SE model can be effectively used to detect FDI attacks that otherwise remain stealthy to traditional SE-based bad data detectors.The proposed FDI attack detection technique is evaluated on a number of standard bus systems.The performance of state prediction and the accuracy of FDI attack detection are benchmarked against the state-ofthe-art techniques.Experimental results show that the proposed FDI attack detection technique has a higher detection rate compared with the existing techniques while reducing the false alarms significantly. 展开更多
关键词 DATA-DRIVEN false data injection machine learning power system security state estimation smart grid
原文传递
Optimal Auxiliary Frequency Control of Wind Turbine Generators and Coordination with Synchronous Generators 被引量:22
18
作者 Ming Sun Yong Min +3 位作者 Lei Chen Kaiyuan Hou Deming Xia Hangyin Mao 《CSEE Journal of Power and Energy Systems》 SCIE CSCD 2021年第1期78-85,共8页
Auxiliary frequency control of a wind turbine generator(WTG) has been widely used to enhance the frequencysecurity of power systems with high penetration of renewableenergy. Previous studies recommend two types of con... Auxiliary frequency control of a wind turbine generator(WTG) has been widely used to enhance the frequencysecurity of power systems with high penetration of renewableenergy. Previous studies recommend two types of control schemes,including frequency droop control and emulated inertia control,which simulate the response characteristics of the synchronousgenerator (SG). This paper plans to further explore the optimalauxiliary frequency control of the wind turbine based on previousresearch. First, it is determined that the virtual inertia control haslittle effect on the maximum rate of change of frequency (MaxROCOF)if the time delay of the control link of WTG is taken intoconsideration. Secondly, if a WTG operates in maximum powerpoint tracking (MPPT) mode and uses the rotor deceleration forfrequency modulation, its optimal auxiliary frequency control willcontain only droop control. Furthermore, if the droop control isproperly delayed, better system frequency response (SFR) willbe obtained. The reason is that coordination between the WTGand SG is important for SFR when the frequency modulationcapability of the WTG is limited. The frequency modulationcapability of the WTG is required to be released more properly.Therefore, when designing optimal auxiliary frequency controlfor the WTG, a better control scheme is worth further study. 展开更多
关键词 Frequency droop control power system frequency security rate of change of frequency(ROCOF) virtual inertia control wind turbine generator auxiliary frequency control
原文传递
Practical Realization of Optimal Auxiliary Frequency Control Strategy of Wind Turbine Generator 被引量:4
19
作者 Ming Sun Yong Min +4 位作者 Xuejun Xiong Lei Chen Le Zhao Yuyao Feng Bingran Wang 《Journal of Modern Power Systems and Clean Energy》 SCIE EI CSCD 2022年第3期617-626,共10页
Adding the auxiliary frequency control function to the wind turbine generator(WTG)is a solution to the frequency security problem of the power system caused by the replacement of the synchronous generator(SG)by the WT... Adding the auxiliary frequency control function to the wind turbine generator(WTG)is a solution to the frequency security problem of the power system caused by the replacement of the synchronous generator(SG)by the WTG.The auxiliary frequency control using rotor kinetic energy is an economical scheme because the WTG still runs at the maximum power point during normal operation.In this paper,the functional optimization model of the auxiliary frequency control strategy of WTG is established.The optimal auxiliary frequency control strategy is obtained by solving the model numerically.As for the practical realization of the control strategy,the coordination of the auxiliary frequency control with the maximum power point tracking(MPPT)control is studied.The practical auxiliary frequency control strategy is modified to adapt to different power disturbances in the system,and the parameter setting method is also proposed.The sensitivity of system frequency to control parameters is studied.Finally,the simulation results verify the effectiveness and practicability of the proposed control strategy. 展开更多
关键词 power system frequency security wind turbine generator auxiliary frequency control rotor kinetic energy energy constraint
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部