Presentation is loading. Please wait.

Presentation is loading. Please wait.

IEEE AI - BASED POWER SYSTEM TRANSIENT SECURITY ASSESSMENT Dr. Hossam Talaat Dept. of Electrical Power & Machines Faculty of Engineering - Ain Shams.

Similar presentations


Presentation on theme: "IEEE AI - BASED POWER SYSTEM TRANSIENT SECURITY ASSESSMENT Dr. Hossam Talaat Dept. of Electrical Power & Machines Faculty of Engineering - Ain Shams."— Presentation transcript:

1

2 IEEE

3 AI - BASED POWER SYSTEM TRANSIENT SECURITY ASSESSMENT Dr. Hossam Talaat Dept. of Electrical Power & Machines Faculty of Engineering - Ain Shams University

4 Presentation Outlines b 1. Basic Definitions b 2. Methods for Transient Security Assessment b 3. AI - Based Approaches b 4. Performance Evaluation b 5. Conclusions

5 b Power System Operating States Restorative Secure Insecure Emergency preventive corrective Emergency Restorative Control State 1. Basic Definitions

6 Power System Security ( IEEE definition ) b An instantaneous time-varying condition reflecting the robustness of the system relative to imminent disturbances. b The concept was Introduced by Dy Liacco in 1967 as a result of the 1965 northeast blackout.

7 Modes of Power System Security b Steady State Security Assessment: Checking overloads of components (OPF) b Dynamic Security Assessment: Examining the eigenvalues of a linearized model. b Transient Security Assessment: Checking transient stability subjected to a large disturbance.

8 Domains of PS Security b Planning Stage: response to a set of contingencies. b Operation Stage: Response to a given configuration and load condition.

9 2 METHODS OF TRANSIENT SECURITY ASSESSMENT b OFF-LINE: Time Domain Simulation (Runge- Kutta, Predictor Corrector,…) b ON-LINE: b 1. Direct methods b 2. Probability methods b 3. Parallel processing simulation b 4. AI - based methods

10 2.1 Lyapunov’s Direct Method b Description: The value of Energy function V is calculated at the instant of last switching, if V<V cr stable. b Drawbacks: 1. Conservative (V>V cr may happen for stable cases) --> Many false alarms1. Conservative (V>V cr may happen for stable cases) --> Many false alarms 2. Time consuming2. Time consuming

11 2.2 Probabilistic Methods b Probability distributions for fault type, fault location, and fault clearing time are determined. b Stability indices are then calculated for each component and for overall system. b Drawbacks: Classification (secure/insecure) accuracy is moderate (Suitable for planning rather than operation)Classification (secure/insecure) accuracy is moderate (Suitable for planning rather than operation)

12 2.3 Parallel Processing b Needs algorithms applying “pipelining”. b Pipelining means the division of each sequential task into a sequence of elementary sequential independent sub- tasks (e.g. system equations) b Applicable for small systems. b A promising method for near future (rate of growth of VLSI is much greater than rate of growth of power systems.

13 3AI - BASED APPROACHES b Learning Concept: Use Extensive off-line calculations (training set) relating key variables to calculated stability condition to design a classifier. b On-line classification: Use the available data of key variables (features) to detect stability condition.

14 3.1 K-means Clustering Pattern Recognition b It uses distance functions as a classification tool. b Parameters: no. of features = n, no. of samples = N, no. of cluster domains = k.

15 Algorithm of k-means 1. Set initial cluster centers. 2. Calculate N*k distances between sample i and cluster j using

16 Algorithm of k-means b 3. Distribute the samples among k clusters b 4. Compute the new cluster centers b 5. Continue until convergence

17 Detection of Stability Condition b 1. Each cluster should be marked as Stable or Unstable depending on the majority of samples belonging to this cluster. b 2. For on-line applications, the values of features are calculated then distances to all cluster distances are calculated. b 3. The stability condition of the sample is determined from the cluster to which it belongs.

18 3.2Artificial Neural Network b multi-Perceptron b (back-propagation) Output Layer Hidden Layer Input Layer

19 Characteristics of ANN b Training Algorithm: Back-Propagation b 3 input neurons / 1 output neuron b Activation Function: Sigmoid

20 Back-Propagation Procedure b At each iteration the input pattern flows through the Network to find the output. b The current output is compared to desired output to evaluate the error. b The error is propagated backward through the network to modify the weights.

21 3.3 Fuzzy Rule-Based Classification b Objective: generate fuzzy rules dividing the pattern space into two decision areas.

22 Constitution of Fuzzy subspaces

23 Induction of Fuzzy If-then Rules b 1. Find memberships to subspaces b 2. If subspace A ij is stable (CL ij = 1) otherwise it is unstable. b 3. Determine Certainty Factors

24 Classification of a New Pattern b Given the new pattern (x n, y n ), find b If the pattern is stable,otherwise it is unstable

25 Selected Features   1 =(po-p1)/M   2 =(po-p2)/M   =(  1 -  2 )   av  =(  1 +  2 )/2

26 Real-Time Considerations

27 4. Performance Evaluation b Generation of 162 training samples and 384 test samples by changing fault location and loading condition. b Time domain simulation is performed for all samples. b The sample is considered unstable if the rotor angle reaches 180 o within 2 sec.

28 System Under Study

29 Summary of Results

30 5 CONCLUSIONS b Simulation using parallel algorithms presents a promising approach for near future. b Best approaches for present application are those based on AI. b Fuzzy classification offers fast assessment with simple structure.

31 REFERENCES b A. El-Arabaty, H. Talaat, M. Mansour & A. Abd-Elaziz, “ Out-of-step Detection Based on Pattern Recognition”, Int. J. Electr. Power & Energy Systems, Vol.16, No.4, 1994. b A. Abdelaziz, M. Irving, A. El-Arabaty, M. Mansour, ”Out- of-step Prediction Based on Artificial Neural Networks”, Electric Power systems Research, Vol.34, No.1, 1995. b H. Talaat, “ Predictive Out-of-step Relaying Using Fuzzy Rule-based Classification”, Electric Power systems Research, Vol.48, No.3, 1999, To appear.

32 ON-LINE SECURITY ANALYSIS b Security Monitoring: measurements b Security Assessment: evaluation of data (secure / insecure) b Preventive Control: transition from insecure state to secure state b Emergency/Corrective Control: transition from emergency state to normal state b Restorative Control: restore all loads


Download ppt "IEEE AI - BASED POWER SYSTEM TRANSIENT SECURITY ASSESSMENT Dr. Hossam Talaat Dept. of Electrical Power & Machines Faculty of Engineering - Ain Shams."

Similar presentations


Ads by Google