4.7 Article

Coordination Strategies for Securing AC/DC Flexible Transmission Networks With Renewables

Journal

IEEE TRANSACTIONS ON POWER SYSTEMS
Volume 33, Issue 6, Pages 6309-6320

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TPWRS.2018.2851214

Keywords

Transmission network operation; FACTS; HVDC; preventive security; corrective network security; power system economics

Funding

  1. Complex Engineering Systems Institute [CONICYT-PIA-FB0816, ICM P-05-004-F]
  2. Conicyt-Chile [Fondecyt/1181928, Newton-Picarte/MR/N026721/1]
  3. SERC [Fondap/15110019]
  4. Conicyt [PFCHA/MagisterNacional/2017-22171423]
  5. EPSRC [ACCEPT EP/K036173/1]

Ask authors/readers for more resources

This paper studies key aspects of preventive and corrective security strategies to coordinate flexible transmission network infrastructure. To do so, we propose a two-stage stochastic optimization model that can efficiently coordinate available preventive and corrective control actions (pre- and post-contingency) from flexible network technologies, generation, and demand, while explicitly considering the likelihood of postcontingency events and wind/solar uncertainty. This stochastic/probabilistic model constitutes the counterfactual against which current deterministic, preventive operational practices are compared. Flexible network equipment such as HVDC and FACTS devices are efficiently modeled through a tight MILP representation and network losses are also included through a linear representation. Through several case studies, we demonstrate the advantages of probabilistic, corrective security to improve coordination of HVDC and FACTS setpoints and thus reduce network congestion and reserve holding levels, improving the overall efficiency of the system operation. We also quantify the value loss associated with current deterministic, preventive control operational practices when coordinating setpoints of flexible network equipment, demonstrating that adding flexible network technology could even increase system costs under a preventive security approach.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available