
iii
l
Modern
Po
a
Thus
one can check
quickiy
by
precaiculating
'd'
factors ali the
lines for
overloading
for the outage
of a
particular
line.
This can be repeated fbr the
outage
of each
line one by one
and
overloads
can be found out
for corrective
action.
It
may be noted
that a line flow
can be
positive
or negative. Hence
we must
check
/
agarnst
-
Jt
^u*
as
well as
h **.
Llne tlows can be louncl out usmg
telemetry
systems or
with state estimation
techniques. If the network undergoes
any
significant
structural change,
the sensitivity factors must be updated.
Find
the
generation
shift
factors and the line outage
distribution factors for the
five-bus
sample network
discussed earlier.
Solution
Table
13.1
gives
the
[x]
matrix for the five bus sample
system,
together
with
the
generation
shift distribution factors
and the line outage
distribution
factors are
given
in Tables I3.2
and 13.3 respectively.
Table 13.1 X Matrix
for Five-bus Sample System
(Bus
1 as a reference)
0.05057 0.03772 0.04029 0.4714
0.03772 0.08914 0.07886 0.05143
0.04029 0.07886 0.09514
0.05857
0.04714
0.05143 0.05857 0.13095
Table 13.2 Generation Shift
Distribution Factor for Five-bus System
Bus I Bus 2
J
"srr
j=l j=2
j=3 j=4
j=5 j=6 j
=
7
(line
1-2)(line
l-3)(Iine
2-3)(line 2-4)(line
2-5)(line
3-4)(line
4-5)
(line
l-2)
0.0
1.0001
-0.3331
-0.2685
-0.2094
0.3735 0.2091
=
3
(line
2-3)
-0.4542
0.4545
0
0.4476 0.3488
-0.6226 -0.3488
-
J
\rr\rw
L-J)
-v
=
4
(hne
2-4)
-0.3634
0.3636
0.4443
0.0 0.4418
0.6642
-O.44r8
=
5
(line
2-5)
-0.1819
0.1818
0.2222
0.2835
0.0 0'3321
1.0
=
6
(line
3-4)
0.5451
-0.5451
-0.6662
0.7161
0.5580 0.0
-0.5580
=
7
(line
4-5)
0.18i6
-0.1818
-0.2222
-0.2835
1.0002
-0.3321
0'0
It
has been
found
that
if
we calculate
the line flows
by the sensitivity
methods,
they
come out
to be
reasonably
close
to the
values calculated by
the
full
AC load
flows.
However,
the
calculations
carried
out by sensitivity
methods
are
faster than
those
made
by full AC
load flow methods
and therefore
are used
for
real time
monitoring
and control
of
power
systems. However,
where
reactive
power flows
are mainly
required,
a full AC
load flow method
(NR/FDLF)
is
preferred for contingency
analysis.
The simplest
AC
security
analysis
procedure
merely
needs to run an AC
load
flow analysis
for
each
possible unit,
line and transformer
outage. One
normally
does ranking
or
shortlisting
of
most
likely bad
cases which are likely to
result
in an overload
or
voltage limit
violation
and other cases
need not be analysed.
Any
good
P1(performance
index
can
be selected)
is used for rankirig. One
such
P/
is
0
0
0
0
0.
(13.11)
For large
n, PI
will
be a small
number
if all line flows
are within limit,
and
will
be
large
if one or
more
lines are
overloaded.
For
rr
=
I exact
calculations
ciur
be done fbr
P1. P1 table can be ordered
from
largest
value
to least.
Suitable
number
of
candidates then can be
chosen for
further
analysis
[7].
If
voltages
are to
be included,
then
the
following
PI
can
be employed.
l=1(line1-2)
/=2(line1-3)
/=3(line2-3)
I=4(line2-4)
/=5(line2-5)
/=6(line3-4)
I=l
(line4-5)
-
0.8428
-
o.t572
o.0714
0.0571
0.0286
-
0.0857
-
0.0285
(13.12)
Here,
Alvil
is the difference
between
the
voltage magnitude as obtained
at the
end
of
the lPlQ
FDLF
algorithm
Alvl-u* it the
value fixed by the utility.
Largest
vaiue oi Pi
is
piaceci at the
top. The security
arraiysis trray rrow
-ue
started
for the
desired
numbel of
cases
down the
ranking list.
$ummary
and Further
Reading:
Reference
[25]
has
discussed
the
concept
for screening contingencies.
Such
contingency
selection/screening
techniques
fonn the foundation for many
real-
time
computer
security
analysis
algorithms.