Transmission Network Investment With Probabilistic Security and Corrective Control
Author
dc.contributor.author
Moreno, Rodrigo
Author
dc.contributor.author
Pudjianto, Danny
es_CL
Author
dc.contributor.author
Strbac, Goran
es_CL
Admission date
dc.date.accessioned
2014-01-13T14:57:49Z
Available date
dc.date.available
2014-01-13T14:57:49Z
Publication date
dc.date.issued
2013
Cita de ítem
dc.identifier.citation
IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 28, NO. 4, NOVEMBER 2013
en_US
Identifier
dc.identifier.other
DOI: 10.1109/TPWRS.2013.2257885
Identifier
dc.identifier.uri
https://repositorio.uchile.cl/handle/2250/126214
General note
dc.description
Artículo de publicación ISI
en_US
Abstract
dc.description.abstract
This paper demonstrates that the growth in application
of corrective actions to enhance network utilization will
require a probabilistic treatment of network security for determining
efficient levels of investment in network reinforcement. A
Benders decomposition based two-stage probabilistic optimization
model for the operational and investment problems is proposed.
For selecting relevant contingencies (beyond N-1 criteria), a novel
filtering technique for efficient elimination of redundant outages
is presented and successfully tested. In 2 numerical examples
we compare efficiency of network reinforcement propositions
under both deterministic and probabilistic frameworks, while
optimizing available preventive and corrective control actions,
and in particular focusing on the application of generation reserve
in combination with special protection schemes (SPS) for network
congestion management purposes. We highlight the inadequacies
of the deterministic approach with respect to its inherent inability
to optimize accurately the portfolio of pre-fault post-fault actions
since the impacts of corrective actions (in the form of SPS, demand
response) and occurrence of “non-credible” events require explicit
consideration of the likelihood of various outages. We conclude
that deterministic approach drives less efficient and potentially
more risky system operation that ultimately leads to inefficient
network investment.