학술논문

Measuring and Enabling Transmission Systems Resiliency With Renewable Wind Energy Systems
Document Type
Periodical
Source
IEEE Transactions on Industry Applications IEEE Trans. on Ind. Applicat. Industry Applications, IEEE Transactions on. 60(2):2321-2331 Apr, 2024
Subject
Power, Energy and Industry Applications
Signal Processing and Analysis
Fields, Waves and Electromagnetics
Components, Circuits, Devices and Systems
Resilience
Measurement
Power system reliability
Computer architecture
Transmission line measurements
Power system stability
Redundancy
Cyber attack
cyber-physical systems
distributed computing
hardware-in-the-loop
resiliency metric
wind power
Language
ISSN
0093-9994
1939-9367
Abstract
This paper introduces a resiliency quantification approach for transmission power system, that incorporates a decentralized Remedial Action Scheme (RAS). RAS is designed to alleviate transmission line overloads under high wind conditions. A resiliency metric is computed to quantify the ability of the system to supply power to critical loads in the presence of RAS. First, a de-centralized RAS is designed to curtail excess wind optimally, in order to limit excess power flow on the transmission lines. Next, the effect of RAS operation on the transmission system is quantified using the proposed resiliency metric. The metric is based on system configuration and real-time measurements and incorporates a graph theory-based approach to quantify the redundancy and vulnerabilities of the transmission network. This makes the metric adaptive and flexible to changing grid conditions. The algorithm is fully implemented and validated on a hardware-in-the-loop testbed consisting of a Real-Time Digital Simulator (RTDS), Phasor Measurement Units (PMUs), and Cisco FOG routers with a real-time distributed computing platform for online implementation. The effectiveness of the proposed approach is validated through offline simulations on the IEEE 39 bus system and real-time simulations on an IEEE 14 bus system considering high wind and cyber attack scenarios.