Abstract
This paper presents a new method to automatically generate system protection schemes in real-time, where contingencies are filtered using a method providing N– 1 system snapshots. With future power systems consisting largely of renewable distributed generation with time-varying production, highly fluctuating conditions throughout the day will be the result. This makes off-line design of extensive defense plans for power systems infeasible, forming the motivation for the presented method. It relies on the real-time identification of which disturbances that threatens a power systems integrity. The method is based on a recently proposed method of calculating post-contingency Thevenin equivalents, which are used to assess the security of the post-contingency condition. The contingencies that violate the emergency limits are contained by pre-determining event-based remedial actions. The instability mechanisms threatening the system are individually treated, such that appropriate controls are allocated. The procedure is illustrated through a case study using the Nordic32 benchmark system.
| Original language | English |
|---|---|
| Title of host publication | Proceedings of the 10th Electric Power Quality and Supply Reliability Conference |
| Publisher | IEEE |
| Publication date | 2016 |
| Pages | 277-281 |
| ISBN (Print) | 978-1-5090-1564-1 |
| DOIs | |
| Publication status | Published - 2016 |
| Event | 10th Electric Power Quality and Supply Reliability Conference - Tallin, Estonia Duration: 24 Aug 2016 → 26 Aug 2016 Conference number: 10 |
Conference
| Conference | 10th Electric Power Quality and Supply Reliability Conference |
|---|---|
| Number | 10 |
| Country/Territory | Estonia |
| City | Tallin |
| Period | 24/08/2016 → 26/08/2016 |
UN SDGs
This output contributes to the following UN Sustainable Development Goals (SDGs)
-
SDG 7 Affordable and Clean Energy
Keywords
- Power System Security
- Power System Stability
- Special Protection Schemes
Fingerprint
Dive into the research topics of 'On-Line Generation and Arming of System Protection Schemes'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver