Font Size: a A A

Research On Adjustment Strategy Of Power Grid Security Based On Sensitivity Method

Posted on:2012-10-25Degree:MasterType:Thesis
Country:ChinaCandidate:X ChenFull Text:PDF
GTID:2212330338968786Subject:Power system and its automation
Abstract/Summary:PDF Full Text Request
When node voltage limits violation or branch flow limits violation, it will endanger the static security of the power system. If security corrections are not taken in time, it is possible to make the operating conditions of the system continue to deteriorate, the most serious consequences are the emergence of wide spread of the trip and the whole system collapses. Therefore, timely and effective security correction strategy is necessary to eliminate the limited phenomenon in the enlightenment state. In this paper, sensitivity analysis method is used to analysis the strategy of active power security correction of the limited power security.Sensitivity analysis has been widely used in the power system. By constructing the different sensitivity indicators, it can analyze the interactions between some elements of the power system. There are many factors affecting the load node voltages and branch active power flow. This paper selects the most commonly used transformer reactive power compensation and transformer voltage ratio as correction strategies of load nodes voltage to develop the sensitivity relationship of reactive compensation and transformer ratio to the voltage of load nodes, and selects the generator active output and the load shedding method as correction strategies of sliping active power flow to develop the sensitivity relationship of the active node input to branch active power flow. Then the power grid security control method is given.This paper selects VC++6.0 to complete the procedures for the preparation of the sensitivity matrix. Then takes 14 nodes for example, checks the validity and correctness of the proposed algorithm by the sensitivity calculation and flow calculation function of the software POWERWORLD, and also make the security correction strategies to eliminate the phenomenon of power limited violation and provide a timely and effective decision support based on the data of the sensitivity.
Keywords/Search Tags:flow calculation, voltage limit violation, flow limit violation, sensitivity matrix, adjustment strategy of power security
PDF Full Text Request
Related items