scispace - formally typeset
Search or ask a question
Author

M. G. Lauby

Bio: M. G. Lauby is an academic researcher from Electric Power Research Institute. The author has an hindex of 1, co-authored 1 publications receiving 128 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: A new contingency analysis technique is described which overcomes the deficiencies of existing methods and has been implemented in a production-grade program designed for real-time applications.
Abstract: The analysis of the effects of hundreds of outages on line flows and bus voltages is required for the real-time security analysis and contingency enumeration. This increases the demands on the speed, accuracy and adaptability of the solution methods. Ideally, an ac power flow should be solved for each contingency, followed by a check for limit violations and major shifts from the initial system conditions. Such an approach is not feasible for practical systems consisting of hundreds of buses. To cope with this computational barrier, various approximate methods have been developed based on the idea that the vast majority of outages does not cause major shifts/violations. There are two classes of such methods, explicit and implicit techniques, which ease the computational burden by identifying cases with severe system limit violations. The explicit methods do not identify or solve for specific violations. Rather, they quantify the severity of each outage by a scalar index by which all the contingencies can be ranked. The explicit methods are not completely reliable since they are prone to masking errors. Specifically, a contingency with a few severe violations can be ranked equally with one with many minor violations or even worse, with one without violations. The implicit methods, though more demanding in CPU resources, permit the identification of actual violations/ major shifts and, therefore avoid masking errors. This paper describes a new contingency analysis technique which overcomes the deficiencies of existing methods. This technique has been implemented in a production-grade program designed for real-time applications.

131 citations


Cited by
More filters
Journal ArticleDOI
09 May 2005
TL;DR: The thesis of this paper is that the changing environment requires a new look at the operation of the power grid and a complete redesign of the control, communication and computation infrastructure.
Abstract: The power grid is not only a network interconnecting generators and loads through a transmission and distribution system, but is overlaid with a communication and control system that enables economic and secure operation. This multilayered infrastructure has evolved over many decades utilizing new technologies as they have appeared. This evolution has been slow and incremental, as the operation of the power system consisting of vertically integrated utilities has, until recently, changed very little. The monitoring of the grid is still done by a hierarchical design with polling for data at scanning rates in seconds that reflects the conceptual design of the 1960s. This design was adequate for vertically integrated utilities with limited feedback and wide-area controls; however, the thesis of this paper is that the changing environment, in both policy and technology, requires a new look at the operation of the power grid and a complete redesign of the control, communication and computation infrastructure. We provide several example novel control and communication regimes for such a new infrastructure.

337 citations

Journal ArticleDOI
TL;DR: In this article, an analysis of real-time pricing policies of reactive power using a modification of the OPF (optimal power flow) model is presented, followed by a case study illustrating the magnitudes and ranges that realtime prices might take on under different circumstances.
Abstract: An analysis is made of real-time pricing policies of reactive power using a modification of the OPF (optimal power flow) model. The theory of real-time pricing of reactive power is presented, followed by a case study illustrating the magnitudes and ranges that real-time prices of reactive power might take on under different circumstances. The efficiency implications of real-time pricing of reactive power are compared with traditional power factor penalties. It is concluded that real-time pricing of reactive power should develop simultaneously with that of active power for maximum economic efficiency and smooth operation of the electricity marketplace. >

291 citations

Journal ArticleDOI
01 Feb 1992
TL;DR: A broad overview of on-line power system security analysis is provided in this paper, with the intent of identifying areas needing additional research and development, such as external system modeling and external system analysis.
Abstract: A broad overview of on-line power system security analysis is provided, with the intent of identifying areas needing additional research and development. Current approaches to state estimation are reviewed and areas needing improvement, such as external system modeling, are discussed. On-line contingency selection has become practical, particularly for static security. Additional work is necessary to identify better indices of power system stress to be used in on-line screening filters for both static and dynamic security analysis. Use of optimal power flow schemes to recommend optimal preventive and corrective strategies is presented on a conceptual level. Techniques must be further developed to provide more practical contingency action plans, which include real-world operating considerations and use a reasonably small number of control actions. Techniques must be developed for costing operating variables which are not easily quantified in dollars. Soft or flexible constraints and time variables must be included in the preventive and corrective strategy formulation. Finally, the area of on-line transient and dynamic security analysis is presented. >

229 citations

Journal ArticleDOI
17 Oct 2005
TL;DR: The paper highlights issues and challenges for implementing security options in electricity markets and concludes that global analyses of security options could provide additional opportunities for seeking optimal and feasible schedules in various time scales.
Abstract: This paper reviews the status of security analyses in vertically integrated utilities and discusses the impact of system security on the operation and the planning of restructured power systems. The paper is focused on the static security rather than the dynamic security of power systems. The paper also discusses assumptions, functions, and calculation tools that are considered for satisfying power systems security requirements. In addition, the security coordination among time-based scheduling models is presented. In particular, real-time security analysis, short-term operation,midterm operation planning, and long-term planning are analyzed. The paper highlights issues and challenges for implementing security options in electricity markets and concludes that global analyses of security options could provide additional opportunities for seeking optimal and feasible schedules in various time scales.

141 citations

Journal ArticleDOI
TL;DR: It is shown that by removing superfluous constraints, the resulting sizes of SCOPF problems are much smaller and can be solved significantly faster.
Abstract: Security-constrained optimal power flow (SCOPF) problems are essential tools to transmission system operators for long-term and operational planning and real-time operation. The general goal of SCOPF problems is to optimize electricity network operation while ensuring that operational and planning decisions are consistent with technical limits under both pre- and post-contingency states. The solution of SCOPF problems is challenging because of the inherent size and scope of modern grids. As empirical evidence and longstanding operator experience show, relatively few of the constraints of SCOPF problems actually serve to enclose their feasible region. Hence, all those constraints not contributing directly to set up the SCOPF feasible space are superfluous and could be discarded. In light of this observation, this paper proposes an optimization-based approach for identifying so-called umbrella constraints in SCOPF problems where the network operation is approximated by the dc power flow. Umbrella constraints are constraints which are necessary and sufficient to the description of the feasible set of an SCOPF problem. The resulting umbrella constraint discovery problem (UCD) is a convex optimization problem with a linear objective function. For SCOPF problems of practical importance, the UCD is also quite large and requires the use of a decomposition technique. In this paper, we concentrate on an SCOPF formulation for preventive security generation dispatch. We show that by removing superfluous constraints, the resulting sizes of SCOPF problems are much smaller and can be solved significantly faster.

127 citations