An Optimal Power Flow Formulation Including Risk of Cascading Events
An Optimal Power Flow Formulation Including Risk of Cascading Events
net/publication/280035199
CITATION READS
1 41
4 authors, including:
Göran Andersson
ETH Zurich
436 PUBLICATIONS 15,918 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
BPES - Optimal sizing and control of balancing power in the future EU power system considering transmission constraints View project
All content following this page was uploaded by Line Roald on 14 July 2015.
KEYWORDS
Risk-based OPF, cascading events, security constrained OPF, Monte Carlo based security assessment
. (1)
We assume that the probability of each initial contingency can be estimated based on historical data
(e.g., from [8]), and be updated according to seasonal variations and weather effects. In particular, we
assume that it is independent of operational variables such as the generation dispatch or the line flows.
2
secondary trip as a function of the power flow on line in normal operation, the post-
contingency power flow on line and the threshold , which is the power flow leading to a
certain trip of line . Assuming that the line flow jumps to a higher value, is expressed as [3]
(2)
.
By construction, (2) fulfils the assumptions on the probability of secondary trip, as increases
when either the post-contingency flow or the power flow change increase. Eq. (2)
can be interpreted as the ratio between the change in power flow, , and the initial
distance to the threshold of certain trip, , for a positive change in line flow.
However, the line flow can also “jump” in negative direction. In this case, the initial distance to the
threshold is given by | | as illustrated in Fig. 1. To account for both cases, we
formulate as
(3)
( )
⏟ ⏟
Finally, we assume that if is below 90% of the capacity limit , and set
if exceeds . The final expression for is thus given by
| |
( ) | | (4)
{ | |
Fig. 2 illustrates for positive post-contingency line flows and different values of .
1 1
Probability of secondary trip Prl,k
P0L(1)=0.7 Pmax
0.6 0.6 L(1)
P0L(1)=0.8 Pmax
L(1)
0.4 0.4
P0L(1)=0.9 Pmax
L(1)
0.2 0.2
P0L(1)=Pmax
L(1)
distance to lower limit distance to upper limit 0
0 0.9 Pmax Ptrip
0 0
0.9 Pmax
L L Ptrip
L L
k
Post-contingency
Post-contingency powerpower
flow flow
PkL(l) P[% of P] max
[% max
L(l)of P L(l)
]
L(l)
Figure 1: The power flow can change in either positive or Figure 2: Probability of secondary trip as a
negative direction. Dependent on the the power flow change, we function of the post-contingency flow , plotted for
consider either the distance to or as the line flow different values of .
change in the denominator of (3).
3
3. Formulation of the risk-based optimal power flow
In this section, the risk measure introduced above is incorporated in an OPF formulation to form a
risk-based security constrained OPF (RB-SCOPF). Starting from a standard SCOPF, we replace the
standard security constraints limiting the post-contingency line flow with risk-based constraints that
account for the risk of cascade initiation. The reformulation of the RB-SCOPF to a tractable
optimization problem is explained, and a method to define reasonable risk limits is proposed.
, (5)
where the matrix models how the lost generation is balanced by the remaining
generators. Assuming that all generators contribute based on their nominal maximum output, we set
⁄∑ for and . Further, we choose . The
post-contingency line flow on line after the outage of a generator or a line are given by (6) and (7).
(6) (7)
The Generalized Generation Distribution Factors describe how a change in
generation at generator changes the line flow on line [11], given that the power mismatch is
balanced according to . The Line Outage Distribution Factors describe how the
outage of line influences the flow on line [12]. The resulting SCOPF problem considering
outages is given by
(8)
subject to
, (9) , (11)
, (10) , (12)
for , (13)
for , (14)
, for . (15)
The cost function is given by (8), with being the cost coefficients of the generators. Eq. (9) is
the nodal power balance constraint, with being the nodal admittance matrix and
a matrix relating the generators to the buses. Eq. (10) sets the angle of the slack bus to
zero. The remaining constraints refer to the limits on line flows and generators in normal operation
(Eq. (11) and (12)) and in post-contingency conditions. Eq. (13) and (14) limits the post-contingency
line flow after line and generator outages, and (15) limits the post-contingency generator output.
4
, (16)
where is the largest acceptable risk. Assuming that the outage probability of the initial
outage is known a-priori, (16) can be reformulated as a constraint on the probability of secondary trip
, (17)
where ⁄ is a contingency specific limit on . To include (17) in the OPF problem, we
need to reformulate (17) as a limit on the post-contingency flow . Since is a piecewise
affine function of (as given by (4) and shown in Fig. 2) and is not known a-priori, the
reformulation is a quite difficult task. We therefore use an iterative approach which is explained in
Section 3.3. However, before we explain the iterative process, we will analyse how constraint (17) is
expressed for the three different cases in (4), i.e., for post-contingency flows in the range | |
, | | or | |.
We first formulate constraint (17) for post-contingency line flows | | . For this
case, is given as the point-wise maximum of two functions in (4). Since (17) represents an upper
bound on , we can avoid the max function by including both constraints in the optimization
problem. For a line outage , we express the power flow change on line as
, and replace (17) by (18) and (19).
(18) (19)
With some manipulations, (18) and (19) can be expressed as the risk-based N-1 constraint
. (20)
For a generator outage , we express the line flow change on line as ,
and get a similar risk-based constraint
. (21)
Comparing (20) to (13) and (21) to (14) reveals a very similar structure. However, when the
probability of secondary trip is , the power flow change has a higher weight compared
with the SCOPF formulation. On the other hand, since we assume that in most cases,
the risk-based constraints (20), (21) will often be less tight than (13), (14).
For the case with high or low post-contingency line flows (i.e., | | or | | ),
the probability of secondary trip is constant, and do not depend on the line flow. For the case of
a high post-contingency line flow | | , . This means that the outage will lead to
a trip of line independent of how much exceeds . If we choose , we allow
and thus allow to become arbitrarily large, i.e., | | . Thus, we can just delete constraint
(17) for contingencies with . For the case with low post-contingency line flow
| | , independent of the value of . This means that we do not need to
constrain the post-contingency flow to a value lower than , and thus the tightest possible
constraint on the line flow of line after outage is given by
(22)
(23)
To determine whether the constraints (20), (21) or the constraints (22), (23) should be enforced, we
use the iterative optimization approach described below.
5
3.3. Iterative optimization
In a first step, we ensure that all constraints (17) with are deleted, since the post-contingency
flow is unbounded in this case. With for all contingencies , the iterative optimization can
start. The starting point is the OPF problem given by (8) - (15), with (13), (14) replaced by (20), (21).
We run the following iterative optimization:
1. Formulate the optimization with the risk-based constraints (20), (21).
2. Run the OPF
3. Check if any of the active constraints result in post-contingency line flows that are lower than
.
4. If yes: Relax the particular constraint by replacing it with (22) or (23) → move to step 1.
5. If no: The optimal solution is found.
Since the optimization problem is a linear program, a constraint will never need to be changed back if
it has been replaced once. The maximum number of iterations is thus finite and limited by the number
of constraints which can be replaced. In practice, only a few iterations are needed. For small values of
, more iterations are needed.
If is sufficiently small, the initial OPF problem becomes infeasible. In this case, all the risk-based
constraints (20), (21) are replaced by (22), (23), and the OPF is rerun. We then check whether any of
active constraints can be relaxed if (22), (23) is replaced by (20) or (21). If yes, the optimization is run
again, and if no, the optimal solution is found.
( ) (24) ( ) (25)
. (27)
] ∑ ̅ ) (28)
(
5. Case study
We demonstrate the proposed method on the IEEE 118 bus system [14]. The system has
transmission lines and generators. The load level is set to 110% of the base case load, and we
assume that the generator capacity is 125% higher than the values listed in [14]. The line outage
probabilities were calculated based on the line length (estimated from the line reactance) and the
average outage probability for transmission lines in Germany [8]. Due to lack of reliable data for the
generator outage probabilities, we only consider line outages in the calculation of the risk in this paper.
In the RB-SCOPF, we thus consider the optimization problem (8)-(15), with (13) replaced by (20). For
the Monte Carlo-based risk assessment, we compute the total expected load shed based on the
expected load shed for the line outages .
7
5.1. Comparison of and for the SCOPF and the RB-SCOPF
We first compare and for the standard SCOPF and the RB-SCOPF. For the SCOPF
solution, and are evaluated a-posteriori based on (1) and (4). The risk limits for the
RB-SCOPF are calculated from (26), based on the SCOPF solution. We run the RB-SCOPF with two
different risk limits, computed with parameters and , and evaluate all
and for both solutions. We then compare the values for and obtained
with the SCOPF and the RB-SCOPF.
Fig. 3 shows all non-zero for the SCOPF and the RB-SCOPF with and . The
highest probability of secondary trip in the SCOPF solution is (denoting the
probability of secondary trip of line 37 following an outage of line 8). Comparing the results, we see
that the RB-SCOPF increases in some cases (e.g., for ), and decreases in other
cases (e.g., for the RB-SCOPF with ).
Fig. 4 shows the risk of cascade initiation , i. e., weighted by . Comparing the
with , we see that some of the outages leading to a high have a low risk .
This is because is low. The highest in the SCOPF is . For the
RB-SCOPF with , is the same as for the SCOPF. For the RB-SCOPF with ,
and the highest risk is .
From Fig. 3 and 4, we see that there are very few outages that can lead to secondary trips, i.e., only 16
out of totally 186 possible line outages. Further, we recognize which of the lines that are influenced by
each other. We see that there are several outages that might lead to an outage of line 129 (connecting
bus 82 and 83), helping us to recognize line 129 as a vulnerable point in the system.
132
Affected Line (l)
-5
131 1 131 x 10
129 129
103 103
78 0.9 78
54 54 3
41 41
37 SCOPF SCOPF
0.8 37
8 33 38 51 97 130 131 132 135 144 145 146147 150 153 158 8 33 38 51 97 130 131132 135144 145 146147 150 153158
Outaged Line (k) Outaged Line (k) 2.5
0.7
159 159
132 132
Affected Line (l)
Figure 3: All outages that lead to a non-zero probability of Figure 4: All outages that lead to a non-zero probability of
secondary trip are shown on the horizontal axis, and secondary trip are shown on the horizontal axis, and
the affected lines are listed on the vertical axis. The color of the affected lines are listed on the vertical axis. The color of
the corresponding dots encodes the value of . Only 16 the corresponding dots encodes the value of . Only
outages that are listed, because all other outages have 16 outages that are listed, because all other outages have
From the top: SCOPF, RB-SCOPF with From the top: SCOPF, RB-SCOPF with
and RB-SCOPF with . and RB-SCOPF with .
8
5.2. Comparison of the generation cost and the expected load shed for the SCOPF
and the RB-SCOPF
Above, we demonstrated how and can be controlled with the RB-SCOPF. Now, we
investigate how the cost of the generation dispatch is influenced by the choice of the risk limit
parameter , and compare the obtained generation cost with the expected load shed for each of the
solutions. We then analyse the outages that lead to a non-zero load shed in more detail to understand
how the cascade evolves. Again, we use the standard SCOPF as a benchmark, and consider risk limits
given by and for the RB-SCOPF.
The generation cost decreases with increasing , as shown in Fig. 5. This is because a higher value for
leads to higher values of , which leads to a relaxation of (20). For high risk limits, the cost
decrease saturates. In this case, the of all the active constraints are bounded by the max. probability
of secondary trip from the SCOPF, . For (i.e., when the risk limit in the RB-
SCOPF is equal to the maximum risk of the SCOPF), the cost of the RB-SCOPF is lower than the cost
of the SCOPF. Fig. 6 shows the generation cost plotted against the expected load shed of the SCOPF
and each of the RB-SCOPF solutions. In most cases, a higher generation cost (meaning a lower value
of ) leads to a lower load shed. This decrease is however not monotonous. There is one case with an
unexpected high load shed, the case where . To explain this high load shed, we investigate
how the cascade evolves in more detail.
Fig. 7 shows the expected load shed for the line outages with non-zero . For some of the outages,
the cascade stops before it leads to any load shed. For outages of the lines 97 and 144-150, the
expected load shed is relatively similar, and the differences are due to different values for . For
outage 153, the differences in expected load shed are however quite large, and the expected load shed
is high particularly for low values of , e.g., for . When analysing the situation after the outage
of line 153 in more detail, we see that there are two lines with and thus four possible outage
combinations that can occur.
480 480 480 480
=0.5 =0.5
=0.6 =0.6
479.5 479.5 479.5 479.5
Generation Cost [$/h]
Figure 5: Generation cost from the RB-SCOPF plotted Figure 6: Generation cost for the RB-SCOPF plotted
against the value of the risk limit parameter .The red star against the expected load shed (evaluated by Monte Carlo
denotes the cost of the SCOPF solution. simulation). The red star denotes the cost and expected load
shed of the SCOPF solution.
-4
x 10
8 RB-SCOPF:
=0.6
E(Ltot)=PrkLk [MW]
6 =0.8
=1.0
4
=1.2
2 =1.4
0 SCOPF
8 33 38 51 97 130 131 132 135 144 145 146 147 150 153 158
Outaged Line No. [-]
Figure 7: Expected load shed per contingency for the SCOPF and the RB-SCOPF with different values of .
9
The four combinations and their corresponding load shed are listed in Table I. Notably, case II with
secondary trip of line 129 leads to 37.4 MW load shed, while case IV with a secondary trip of both
129 and 159 leads to 0 MW of shed load. Assuming that the secondary outage of line 129 and line 159
are independent events, the probability of case II is given by ( ).
A high value for decreases , and thus decreases the expected load shed of the
initial outage 153. From Fig. 3, we see that when . The high expected load
shed is due to a high probability of case II.
This analysis illustrates that it is not possible to control the expected amount of load shed only by
controlling the risk of cascade initiation. A lower risk limit might increase the expected load shed in
some cases, in particular when there are several possible secondary outages involved.
Table 1 Possible developments of the cascade after the outage of line 153.
Case Secondary outage Development of cascade Load shed
I - No further outages 0 MW
II 129 Cascading outage, system breaks into islands 37.4 MW
III 159 No further outages 0 MW
IV 129, 159 Loss of large generator at bus 99, no further outages 0 MW
6. Conclusion
This paper proposes a new, risk-based security measure, which aims at reflecting the risk of cascading
events in a risk-based optimal power flow (OPF) formulation. The risk-based security criterion is
based on the probability of cascade initiation, i.e., the risk that one initial N-1 contingency can lead to
secondary outages. The probability of secondary trips was modelled as a function of both the post-
contingency line flow and the change in line flow from the pre- to the post-contingency state. Based
on the proposed criterion, the RB-SCOPF was formulated, which allows us to control the risk of
cascade initiation through the use of risk-based N-1 constraints. Further, the risk-based security
criterion was implemented in a Monte Carlo-based simulation framework, which allows us to compute
the expected load shed for a given generation dispatch.
The RB-SCOPF and the Monte Carlo based assessment is applied to a case study for the IEEE 118 bus
system, and compared with the outcome of a standard SCOPF. We show that the RB-SCOPF can
effectively reduce the risk of cascade initiation, but that the reduction in risk comes at an increased
cost. Based on the Monte Carlo simulation, we see that we in most cases are able to reduce the
expected load shed by reducing the risk limit in the RB-SCOPF. However, dependent on how the
cascade actually evolves, a lower risk limit might in some cases increase the total expected load shed,
illustrating the fact that it is not possible to control the expected amount of load shed by only
controlling the risk of cascade initiation.
ACKNOWLEDGEMENT
This research work described in this paper has been carried out within the scope of the project ”Innovative tools
for future coordinated and stable operation of the pan-European electricity transmission system (UMBRELLA)”,
supported under the 7th Framework Programme of the European Union, grant agreement 282775.
BIBLIOGRAPHY
[1] D. Kirschen and D. Jayaweera, “Comparison of risk-based and deterministic security
assessments”, IET Generation, Transmission & Distribution, vol. 1, no. 4, pp. 527–533, 2007.
[2] K. Uhlen, G. H. Kjølle, G. G. Løvås and Ø. Breidablik, “A Probabilistic Security Criterion for
Determination of Power Transfer Limits in a Deregulated Environment”, 2000 Cigre Session,
Paris, France, 2000.
[3] F. Xiao and J. McCalley, “Power System Risk Assessment and Control in a Multiobjective
Framework”, IEEE Transactions on Power Systems, vol. 24, no. 1, pp. 78–85, 2009.
[4] W. Fu and J. D. McCalley, “Risk-based optimal power flow,” IEEE PowerTech Conference,
Porto, Portugal, 2001.
10
[5] G. Hug, “Generation cost and system risk trade-off with corrective power flow control”, 50th
Annual Allerton Conference on Communication, Control and Computing, Allerton, USA, 2012.
[6] M. Zima and G. Andersson, “On security criteria in power systems operation,” IEEE PES
General Meeting, San Francisco, USA, 2005.
[7] ENTSO-E, "Continental Europe Operation Handbook," European Network of Transmission
System Operators for Electricity, 2009.
[8] M. Obergünner et al, “Using the VDN Statistic on Incidents to Derive Component Reliability
Data for Probabilistic Reliability Analyses”, Verband der Netzbetreiber – VDN – e.V. beim
VDEW, Berlin, 2004.
[9] O. Alizadeh Mousavi, R. Cherkaoui, and M. Bozorg, “Blackouts risk evaluation by Monte Carlo
Simulation regarding cascading outages and system frequency deviation,” Electric Power
Systems Research, vol. 89, no. 0, pp. 157–164, 2012.
[10] Z. Jianfeng and F. Alvarado, “A heuristic model of cascading line trips,” Probabilistic Methods
Applied to Power Systems (PMAPS), Ames, Iowa, 2004.
[11] W. Ng, “Generalized generation distribution factors for power system security evaluations,” IEEE
Transactions on Power Apparatus and Systems, vol. PAS-100, no. 3, pp. 1001 –1005, 1981.
[12] R. Christie, B. F. Wollenberg, and I. Wangensteen, “Transmission management in the
deregulated environment,” Proceedings of the IEEE, Vol. 88, No. 2, pp. 170–195, 2000.
[13] C. Graham and D. Talay, “Stochastic Simulation and Monte Carlo Methods. Mathematical
Foundations of Stochastic Simulation ”, Springer Verlag, Berlin, 2013, p.41-47.
[14] Illinois Institute of Technology, ”IEEE 118-bus, 54-unit, 24-hour system: Unit and Network
Data”, Available: http://motor.ece.iit.edu/data/JEAS_IEEE118.doc, Date: 23.08.2013.
11