© 2013 ieee.le.xie/papers/early detection and...curity in an enhanced look-ahead dispatch...

12
© 2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Digital Object Identifier: 10.1109/TPWRS.2012.2210252

Upload: others

Post on 27-Jul-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: © 2013 IEEE.le.xie/papers/Early Detection and...curity in an enhanced look-ahead dispatch framework. By intro-ducingshort-termdispatchablecapacity(STDC)intotheproposed look-ahead

© 2013 IEEE.

Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works.

Digital Object Identifier: 10.1109/TPWRS.2012.2210252

Page 2: © 2013 IEEE.le.xie/papers/Early Detection and...curity in an enhanced look-ahead dispatch framework. By intro-ducingshort-termdispatchablecapacity(STDC)intotheproposed look-ahead

IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 28, NO. 2, MAY 2013 1297

Early Detection and Optimal Corrective Measuresof Power System Insecurity in Enhanced

Look-Ahead DispatchYingzhong Gu, Student Member, IEEE, and Le Xie, Member, IEEE

Abstract—This paper presents a novel algorithm for the earlydetection and optimal corrective measures of power system inse-curity in an enhanced look-ahead dispatch framework. By intro-ducing short-term dispatchable capacity (STDC) into the proposedlook-ahead security management (LSM) scheme, the algorithm iscapable of predicting and identifying future infeasibilities that posesecurity risks to the system under both normal conditions and as-sumed contingency conditions. An optimal recovery plan can becomputed to prevent system insecurity at a minimal cost. Earlyawareness of such information is of vital importance to system op-erators for taking timely actions with more flexible and cost-effec-tive measures. This, in addition to the economic benefits studiedin the literature, demonstrates the advantage of security improve-ment of the look-ahead dispatch framework. The performance ofthe proposed algorithms is illustrated in a revised 24-bus IEEERe-liability Test System as well as in a practical 5889-bus system.

Index Terms—Infeasibility identification, look-ahead securityconstrained economic dispatch, model predictive control, optimalcorrective solution, relaxing variable, security management.

I. INTRODUCTION

T HIS paper is motivated by the need for a more advanceddispatch algorithm with enhanced capability to manage

the security risks due to the high variation and uncertainty in-troduced by intermittent resources and contingencies in electricpower systems. In recent years, as an alternative to conventionalstatic security constrained economic dispatch (SCED), look-ahead SCED has become a new industry standard in real-timeenergy market operations [1], [2]. In contrast with the single-stage optimization of static SCED, look-ahead SCED works outa scheduling plan for a future period (e.g., the next 2 hours). By1) utilizing the accurate most recently updated load and inter-mittent generation forecasts (e.g., 10-min ahead forecast) and2) incorporating the inter-temporal constraints (e.g., ramp rate),look-ahead SCED exhibits an improved economic performanceover static SCED [3].

Manuscript received January 28, 2012; revised April 19, 2012 and June 12,2012; accepted July 16, 2012. Date of publication September 19, 2012; dateof current version April 18, 2013. The work was supported in part by NationalScience Foundation ECCS Grant #1029873 and in part by Power Systems En-gineering Research Center (PSERC). Paper no. TPWRS-00084-2012.The authors are with the Department of Electrical and Computer Engineering,

Texas A&M University, College Station, TX 77843 USA (e-mail: [email protected]).Color versions of one or more of the figures in this paper are available online

at http://ieeexplore.ieee.org.Digital Object Identifier 10.1109/TPWRS.2012.2210252

The concept of the look-ahead (dynamic) dispatch originatedin the 1980s [4]–[6]. The major motivation behind conductinglook-ahead (dynamic) economic dispatch was to incorporate thenear-term variable load forecast and schedule the system re-sources cost-effectively. Our recent work extends and justifiesthe joint benefits when taking into account the environmentalimpacts (emission costs, primarily), intermittent resources, andresponsive demand resources [7]–[10].While the industry practice and literature have shown the

economic benefits of look-ahead dispatch [3]–[6], [8]–[11], thepotential added value of look-ahead dispatch in system secu-rity enhancement has not been well studied. This paper aims atbridging this gap.Power system security refers to the capability of a system to

withstand sudden disturbances or an unexpected loss of compo-nents [12]. In conventional power system operations, due to thelimited time framework allowed for analyzing and respondingto security problems, maintaining system security in real-time isa significant challenge [13]. Violations of system security con-straints due to high variability in both demand and generationcan cause severe consequences in real-time operations [14]. Bytaking advantage of the look-ahead SCED framework, the pro-posed look-ahead security management (LSM) can, at an earlierstage, detect and identify the violated security constraints whichcan cause potential security problems to the system. The vio-lation of the constraints can furthermore be quantified. In addi-tion, an optimal corrective plan can be worked out with minimalrecovery costs for the system.1 With LSM in the look-aheadSCED framework, it is possible to reduce the impacts of anemergency ramp event2 [e.g., February 26, 2008 in the Elec-tric Reliability Council of Texas (ERCOT)3] and enable a morerobust and cost-effective system operation.The contributions of this paper are listed as follows:• A look-ahead security management model is proposed topredict and quantify in advance potential infeasibility inthe system, and to work out an optimal corrective solutionfor protecting the system against insecurity conditions.

• The concept of short-term dispatchable capacity (STDC) isintroduced to characterize the system’s overall capability

1Recovery cost is the cost of the deployed corrective measures to recover thesystem from infeasibility, namely, to protect the system against insecurity.2A ramp event refers to the situation in which demands or intermittent genera-

tions (e.g., wind) increase/decrease in a short-term period, which poses difficultyfor the system to balance the demand with the available generation resources.3On Feb. 26, 2008, the wind generation dropped by about 1400 MW over

10 min, while the demand increased by 4412 MW at the same time due to theweather conditions, which caused ERCOT to cut the demand by 1100MW [15].

0885-8950/$31.00 © 2012 IEEE

Page 3: © 2013 IEEE.le.xie/papers/Early Detection and...curity in an enhanced look-ahead dispatch framework. By intro-ducingshort-termdispatchablecapacity(STDC)intotheproposed look-ahead

1298 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 28, NO. 2, MAY 2013

Fig. 1. Illustrative example of look-ahead SCED feasibility improvement.

TABLE ISTATIC DISPATCH (INFEASIBLE)

to handle net-load uncertainty and contingency atone dispatch interval along the time scale. And by incorpo-rating STDC constraints into look-ahead security manage-ment, the system is capable of identifying and quantifyingpotential risks under both normal conditions andcontingency and net-load ramping contingency conditions.

• An enumeration tree approach is proposed to search out allthe potential factors that can cause system insecurity in theorder of the system operators’ prioritized concerns.

The rest of this paper is organized as follows. In Section II, themathematical model of security enhanced look-ahead economicdispatch is formulated. In Section III, the relaxing variables areintroduced. The infeasibility identification model is presentedand the optimal corrective solution model is described. Numer-ical experiments of a modified 24-bus IEEE RTS system as wellas a 5889-bus practical system are presented in Section IV. Con-cluding remarks and future work are discussed in Section V.

II. SECURITY ENHANCED LOOK-AHEAD DISPATCH

SCED, as an essential part of power system operation, sched-ules the outputs of online generators to balance the system de-mand at minimal cost while observing the security limits. Con-ventional SCED is conducted with only one snapshot every 5to 15 min [16]. Look-ahead SCED expands the one-snapshotSCED into a multi-snapshot SCED. Inter-temporal constraints(constraint terms) and inter-temporal benefits (objective terms)can be implemented in the optimization; this improves not onlythe optimality but also the feasibility of the dispatch problem.

A. Security Advantages: An Illustrative Example

In previous literature [3], [4], [11], [17], the major advantageof look-ahead SCED is the economic benefits. In this paper, theauthors intend to demonstrate that besides the improvement inthe economic benefits, another major advantage of look-aheadSCED is the improvement in feasibility to the dispatch problem.An illustrative example is presented in this subsection in Fig. 1.There are two power sources in the illustrative example: a

wind farm with 40 MW capacity and a coal power plant with 80MW capacity and a 10 MW/15 min ramping capability. In theillustrative example, both static SCED and look-ahead SCEDare applied to the same scenario, as shown in Tables I and II,respectively.

TABLE IILOOK-AHEAD DISPATCH (FEASIBLE)

With static dispatch, when the wind generation drops from 35MW to 25MW and demand increases from 95 MW to 105 MW,the coal power plant cannot ramp up in such a short period andtherefore a loss of load of 10 MW occurs.With look-ahead SCED, this situation can be avoided. The

change in wind resources and demand will be considered be-forehand; although more coal capacity is used instead of inex-pensive wind generation in the first interval, the demand canbe satisfied by the total generation in the second interval. Thisexample illustrates that, due to the fact that multi-stage is con-sidered within look-ahead SCED, the feasibility of the dispatchproblem with look-ahead SCED improves upon the conven-tional dispatch approach.

B. Formulation of the Enhanced Look-Ahead Dispatch

Extended from our previous work [7]–[10], [18], the secu-rity enhanced look-ahead SCED model presented in this paperincorporates contingency security constraints with the introduc-tion of short-term dispatchable capacity (STDC).The look-ahead SCED discussed in this paper is formulated

as a model predictive control (MPC) problem:

(1)

subject to

(2)

(3)

(4)

(5)

(6)

(7)

(8)

(9)

(10)

(11)

where is the set of all available generators; is the set ofgenerators in bus is the marginal generation costof generator is the output level of generator at time step, with and as its upper and lower bounds;is the load level of bus at time step is the nodalpower injection in bus at time step and are the

Page 4: © 2013 IEEE.le.xie/papers/Early Detection and...curity in an enhanced look-ahead dispatch framework. By intro-ducingshort-termdispatchablecapacity(STDC)intotheproposed look-ahead

GU AND XIE: EARLY DETECTION AND OPTIMAL CORRECTIVE MEASURES OF POWER SYSTEM INSECURITY 1299

Fig. 2. Power system security management diagram [20].

proposed STDC of generator at time step is the vectorof the branch flow at time step and is the vector of thebranches’ capacity.The objective function (1) is to minimize the total genera-

tion cost. Equality constraints (2) are the nodal energy balancingequations. Inequality constraints (3) and (4) are the constraintsof upward/downward STDC requirement constraints. The in-equality constraints from (5) to (11) are transmission capacityconstraints, ramping capability constraints, mixed generator ca-pacity constraints, and the upper and lower bounds of the deci-sion variables.By considering network losses, the nodal injection is

given by

(12)

where is the set of branches, is the voltage phase angleat bus , and is the susceptance of branch . The nodalnetwork loss can be approximated by its piecewiselinear expression [19]. By using a second-order approximationof , (12) can be formulated as (13) subject to constraints(14):

(13)

where is the conductance of branch and denotethe slope and value of the th block of voltage phase angle:

(14)

Due to the operational uncertainties and potential contin-gencies in an electric power grid, only satisfying securityconstraints under current normal condition is not enough to en-sure the system security. Therefore, power engineers introducethe concept of the “Alert” state, as shown in Fig. 2. An “Alert”state is defined that all the components of a system are workingwithin their operating limits only under non-contingency sce-nario. The “Normal” state requires all components functioningwell even under assumed contingencies (e.g., ). There-fore, in order to operate the system in the “normal” state, extrareserve capacity is required.In many areas, determination of reserve capacity is within

the day-ahead unit commitment decision making layer. We in-troduce the concept of STDC which can handle the uncertaintyand variations at the real-time economic dispatch layer. This canprovide extra margin for the power system operational security,and work as indicators for inadequacy of spinning/nonspinningreserves.

Fig. 3. Illustrative diagram of short-term dispatchable capacity.

The idea of STDC is illustrated in Fig. 3. Due to the uncer-tainty in demand, intermittent resources and the potential con-tingency of the units, sudden changes may lead to imbalancesbetween the generation and the demand. The rest of the systemunits (not affected by the contingency) should respond in a shorttime and compensate for the system imbalances. Every gener-ator has its dispatchable region, which is the distance from thecurrent dispatch point (CDP) to its maximum output level. Dueto the ramping constraint of each generator, the actual dispatch-able capacity within a short period is generally less than the totalcapacity. We define the STDC as the maximum capacity whichcan be dispatched up (or down) within one dispatch interval.As shown in Fig. 3, given the ramping constraint, the dis-

patchable capacity within one dispatch interval is the STDC.The capacity required by minimum output constraint is thenon-dispatchable capacity (NC). The capacity which is limitedby the ramping constraint and cannot be dispatched within onedispatch interval is the short-term non-dispatchable capacity(STNC). STDC, NC, and STNC compose a complete portfolioof the installed capacity. The cumulative STDC indicates theoverall ramping capability of the entire system to cope withvariations in net load (demand generation of intermittentresources) or generation inadequacy caused by a contingency.We formulate (3) and (4) as short-term responsive con-

tingency constraints. If (3) and (4) are satisfied, it can guaranteethat the power system will have enough ramping capability tocope with the uncertainties and variations given the requiredconfidence interval (e.g., 95%).We consider the following contingency events in evaluating

the STDC requirements.• The system does not have any generators failure while anunexpected change in intermittent resources and demandexceeds the total ramping capability of the system.

• The system has one generator failure, while an unexpectedchange in intermittent resources and demand exceeds theramping capability of the rest system (unaffected by thecontingency).

The requirements of upward/downward STDC can be evalu-ated by (15) and (16), respectively:

(15)

Page 5: © 2013 IEEE.le.xie/papers/Early Detection and...curity in an enhanced look-ahead dispatch framework. By intro-ducingshort-termdispatchablecapacity(STDC)intotheproposed look-ahead

1300 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 28, NO. 2, MAY 2013

(16)

In (15) and (16), are the probability of short-term dis-patchable alert (upward/downward), which indicates whetherthe system-wide ramping capability is enough for handing thepotential contingency scenarios, is the probability of failureof the unit is the variance of net load,4 and is the cu-mulative distribution function of a standard normal distribution.Given the confidence interval, the requirement of STDC can bedetermined by equation solver in the optimization toolbox ofMatlab.By incorporating the short-term responsive contingency con-

straints into the proposed look-ahead security management, itenables look-ahead dispatch predicting and quantifying not onlythe risks to the current status but also the risks under various po-tential contingency scenarios. The utilization of the short-termdispatchable resources will be maximized and the shortage ofthe ramping capability will be minimized and reported to thesystem operator in advance. The valuable information providedcould be used to check the adequacy of the system reserve or asa reference for further deployment of other resources.

III. ALGORITHM FOR EARLY DETECTIONAND CORRECTIVE MEASURES

A major advantage of look-ahead economic dispatch is tobetter utilize available resources to enable a larger feasibilityregion, as discussed in the previous section. However, due tothe uncertainty of the renewable resources and potential con-tingencies, there is always the chance that a feasible dispatchplan which satisfies all security constraints does not exist. Wedefine these situations as infeasibility in look-ahead SCED. Theinfeasibility is related with insecurity of system operation. It ispossible to improve the robustness and security of schedulingoperation by handle infeasibility issues appropriately.For MPC-based optimization problems, there exist tech-

niques to handle infeasibility issues. In [22]–[25], a feasibleMPC problem is recovered from infeasibility by dropping theviolated constraints. Rawlings et al. propose and justify theminimal time approach, which removes the state constraintsin the early stages of the infinite horizon problem to make itfeasible [24], [25]. However, these approaches are not able todistinguish the relative importance of the various constraintviolations. In power system operations, it is important to con-sider the priority level of different constraints. In [23] and [26],Adersa et al. propose a method of recovering from infeasibili-ties that involves a prioritization of the constraints. The lowestprioritized constraints are dropped if the online optimizationproblem becomes infeasible. However, this method cannot

4The demand uncertainty and the wind uncertainty are assumed to followthe Normal Distribution [21]. The variance of net load can be calculated by

.

Fig. 4. Conceptual illustration of relaxing variables.

quantify how much the constraint gets violated. Also, directlyignoring the infeasible constraints is sometimes unacceptablein practical power system operations. Another approach tosolving infeasible MPC problems in which the constraintshave different priorities is proposed by Tyler et al. [27]. Intheir approach, integer variables are introduced to handle theprioritization in an optimal problem. By solving a sequence ofmixed-integer optimization problems, the size of the violationof the constraints is minimized in terms of the prioritization. In[28], Vada et al. propose a method which utilizes a single-ob-jective linear problem to handle infeasibility.Starting from the previous work [29], [30] on handling the

infeasibility of MPC problems, we propose the LSM technique.With the proposed LSM technique, look-ahead economic dis-patch not only improves the system feasibility but also predictsand identifies the infeasibility which may occur in the future.The violation of infeasible constraints, which is of great con-cern (or interest) to the system operators, can be quantified. Fur-thermore, the LSM technique can help in developing an optimalsolution to recover the system from infeasibility with minimalrecovery costs. To the best knowledge of the authors, this kindof functionality is not available in conventional power systemeconomic dispatch.

A. Relaxing Variables

Relaxing variables are introduced to handle infeasibilities.They are deployed to relax the constraints and make theproblem feasible. High penalty terms associated with the re-laxing variables are added in the objective function to eliminatethe chances that the relaxing variables become alternatives tothe original decision variables when the problem is feasible.Fig. 4 illustrates the relaxing variables by distinguishing it

with slack variables. A slack variable characterizes the distancefrom the current operating point to the boundary of the fea-sible region, which can ensure that the current operating point iswithin its feasible region. The relaxing variable at optimalityindicates the minimal distance from the current status to thestatus which gives a feasible solution.

B. Early Identification of Infeasibility

Infeasibility in economic dispatch is usually related to secu-rity problems in the physical power system, which refers to cer-

Page 6: © 2013 IEEE.le.xie/papers/Early Detection and...curity in an enhanced look-ahead dispatch framework. By intro-ducingshort-termdispatchablecapacity(STDC)intotheproposed look-ahead

GU AND XIE: EARLY DETECTION AND OPTIMAL CORRECTIVE MEASURES OF POWER SYSTEM INSECURITY 1301

tain violations of the operating constraints (e.g., the overloadingof transmission lines, generators’ ramping constraints and so on)or to regional or system-wide imbalances between the energysupply and demand. Any of these violations may cause contin-gencies or blackouts in the power system, and lead to severeconsequences.In power system real-time operations, it is very important to

identify potential security problems in advance. The availablemeasures for handling security problems depend on how muchtime remains for taking the measures. If the security issue is de-tected one to two hours ahead, a much broader set of correctivemeasures can be deployed. On the other hand, if the security vio-lation is detected only 10–15 min prior to real-time, the numberof corrective measures available will be much fewer.The proposed approach implemented in a look-ahead sched-

uling framework will enable the scheduling framework to iden-tify future security risks.Relaxing variables can be introduced into security constraints

(2), (5), (6), (9)–(11) and the problem can be formulated asfollows:

(17)

(18)

(19)

(20)

(21)

(22)

where are the relaxing variables of the nodal energy bal-ance equations, are the relaxing variables of the transmissionconstraints, are the relaxing variables of the ramping con-straints, are the relaxing variables of the generator capacityconstraints, and are the relaxing variables of the up-ward/downward short-term dispatchable capacity constraints,respectively.By incorporating the relaxing variables, the objective func-

tion of the look-ahead SCED can be formulated as (23):

(23)

is defined as the identification function of the violatedconstraints. is suggested to be modeled as a linear or aquadratic function.5 The coefficients of the relaxing variablesin indicate the sensitivity of the detection of constraintsfrom various categories (e.g., ramping, transmission capacity).Because infeasibility may be caused by a violation of multipleconstraints, the sensitivity of the different constraints must bespecified according to the interest of detection. For example, ifthe system operator is more concerned with (or more interested

5If is a linear function, the relaxing variables should be non-negativeand then the relaxing variables of bidirectional constraints such as ramping con-straints, capacity constraints can be split into two parts which indicate the vio-lations of upward and downward constraints, respectively.

in) the violation of the energy balance constraint than of theother constraints, the sensitivity of the constraintsin that category should be higher than the sensitivity of theconstraints in the other categories . A later section willdiscuss how to find out all the potential factors causing the sameinfeasible scenario:

(24)

The coefficients of relaxing variable are given by (24). In(24), is the discrimination degree among the constraintsover different time steps. is the function of time stepis the coefficient of the th decision variable in the original

objective function, and is the parameter to differentiate the re-laxing variable terms from the original decision variable terms.Therefore, is suggested to be a large number (e.g., ).For a conservative look-ahead strategy, it is preferred to iden-

tify the potential risks in an earlier rather than a later stage. Thesensitivity of function subject to constraints at differentstages is suggested to be monotonically decreasing as time stepincreases. This is implemented by the discrimination degree, which is a function of time step in a look-ahead plan, as

described in (25). In addition, the choice of coefficient needsto obey (25) in order to guarantee the priority relationship ofthe various constraint categories at all time steps (e.g., rampingconstraints versus transmission capacity constraints):

(25)

The linear form of is presented in (26), where the re-laxing variables and the corresponding coefficients are in vectorform:

(26)

In look-ahead SCED real-time operations, if the whole planis feasible, all the relaxing variables are equal to zero and theoptimal solution is the same as for the look-ahead SCED in (1).However, if infeasibility exists, the corresponding relaxing vari-able will become positive. The value of the relaxing variableindicates how much the violation of that constraint is. With theappropriate configuration of the relaxing variables in (26), thesolution of the relaxed problem identifies and quantifies the po-tential insecurity in the system.Due to the sophistication of power system operations, some-

times infeasibility can be caused by the violation of multipleconstraints belonging to different categories (e.g., ramping ratesversus transmission constraints). It is helpful to identify all ofthe potential factors causing the security issues and report theinformation by category in terms of system operators’ priori-tized concerns. We propose an enumeration tree approach in theLSM to accomplish this.The sets of security constraint categories

aredefined in terms of their priority to the operators’ concerns (orinterests): has a higher priority to the system operator than, where . The algorithm doing the enumeration

is described as follows.

Page 7: © 2013 IEEE.le.xie/papers/Early Detection and...curity in an enhanced look-ahead dispatch framework. By intro-ducingshort-termdispatchablecapacity(STDC)intotheproposed look-ahead

1302 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 28, NO. 2, MAY 2013

Fig. 5. Enumeration tree approach to the identification of multiple factors.

Step 1) (Initialization): Generate the initial full constraintset , configure the co-efficients of relaxing variable based on (24). Goto Step 2.

Step 2) (Optimization): Solve the infeasibility identificationproblem (23) subject to (17)–(22). Go to Step 3.

Step 3) (Termination test): If the feasibility region of therelaxed problem is empty, namely , theidentification process is terminated. It is reportedthat the constraints of the category at the currentlevel of concern do not cause the infeasibility andany constraints with lower priority donot cause the infeasibility either. End the program;otherwise go to Step 4.

Step 4) (Extension): If the feasibility region of the relaxedproblem is not empty, namely , however,all the non-zero relaxing variables do not belong tothe category of the current level of concern . Thesystem operator is to be informed that the constraintsof the category at the current level of concerndo not cause the infeasibility and the infeasibility iscaused by some lower prioritized constraints. Go to Step 6; otherwise, go to Step 5.

Step 5) (Selection): The system operator is going to be re-ported the constraints with non-zero relaxing vari-ables which are responsible for the infeasibility. Goto Step 6.

Step 6) (Configuration): Set the coefficients of all the con-straints which belong to the category of the currentlevel of concern to zero, namely .Move to the next level . Go back to Step 2.

The whole process is depicted in Fig. 5. By means of thisprocess, the system operators will be informed of not only thefactors about which they care the most but also of all the otherpotential factors causing this infeasibility, ranked in the order oftheir prioritized concerns.

C. Optimal Corrective Solution

With the concept of relaxing variable, the optimal correctivesolution can be worked out at a minimal operating cost whensystem operations are infeasible:

(27)

There are various corrective measures which can help thesystem recover from infeasibility (e.g., spinning reserve, non-spinning reserve, responsive demand, the fast-response unit, andtie-line support). Different corrective measures have differentresponse speeds and operating costs. Generally, fast resourcesare more valuable (and expensive) than slow resources. Eachcorrective measure can be represented by a relaxing variable

. The set of all the available measures for system recoveryis represented by in (27):

(28)

The objective function of the optimal corrective solution canbe modified from the original objective function (1) to the objec-tive function of (28). is the recovery cost function, whichcan be defined as a linear function of the relaxing variables .Sometimes, there might be a non-linear relationship between thecost and capacity of the corrective measures. It is suggested touse a linear step-wise model to formulate this relationship forthe sake of algorithm efficiency and simplicity. The coefficientsof are given by the marginal operating cost of the variouscorrective measures:

(29)

In the relaxed problem, the security constraints are formulatedas (29). The original constraints may be impacted by somecorrective measures and thus get relaxed. are the relaxingvariables of the corrective measures. By solving this problem(28) to (29), an optimal corrective plan is worked out, whichcan recover the system from infeasibility at the lowest operatingcost.It should be noted that the mathematical model should be

modified according to the practical circumstances of the powersystem. The introduction of relaxing variables is suggested totake into account the results of the infeasibility identification interms of the time steps and areas impacted by the infeasibilityas well as by the degree of the violation. According to (28) and(29), a general formulation for an optimal corrective solution isprovided in (30)–(38):

(30)

(31)

(32)

(33)

(34)

(35)

(36)

(37)

(38)

The objective function (30) is to minimize the total operatingcost, which includes the ordinary cost ofmaintaining energy bal-ancing in the system and the additional cost of corrective mea-sures to recover the system from infeasibility. represents

Page 8: © 2013 IEEE.le.xie/papers/Early Detection and...curity in an enhanced look-ahead dispatch framework. By intro-ducingshort-termdispatchablecapacity(STDC)intotheproposed look-ahead

GU AND XIE: EARLY DETECTION AND OPTIMAL CORRECTIVE MEASURES OF POWER SYSTEM INSECURITY 1303

Fig. 6. IEEE RTS-24 system (modified).

the capacity of tie-line support. represents the amount of re-sponsive demand to be used. represents the capacity of spin-ning reserve to be used. represents the capacity of non-spin-ning reserve to be used. , as the last resort, is the amount ofload which has to be cut to ensure the system security. The cor-rectivemeasures discussed heremainly help to relieve the energybalancing constraint by providing additional capacity or by re-ducing the demand level (31). The additional corrective capacitymay also affect the branch flow. Therefore, the transmission ca-pacity constraints are updated to (32), where the vector of branchflow is calculated by the distribution factor matrix and thenodal injections of both the original injections and also the ad-ditional corrective injections. The corrective measures in thisexample do not impact the generators’ capacity and rampingconstraints. Hence, (33)–(34) remain the same.

IV. NUMERICAL EXPERIMENT

The proposed approach is applied to a 24-bus system anda practical 5889-bus system.6 Details of the system setup ofthe 24-bus system are presented in Section IV-A, and the re-sults and analysis are provided in Section IV-B. The systemdescription and simulation results of the practical system aregiven in Section IV-C. The simulations for the two systems areconducted on a Intel i7-990X 3.47 GHz desktop computer withMatlab 2011a, IBM ILOG CPLEX v12.2, and Windows 7 op-erating system.

A. Simulation Platform Setup of 24-Bus System

The numerical example is modified from the IEEE ReliabilityTest System (RTS-24) [31]. The system diagram is presented inFig. 6. The simulation duration is 24 hours with 5-min intervals.The look-ahead horizon ranges from 5 min to 4 hours (4 hoursby default). Load and wind profiles for 48 hours are collectedfrom ERCOT [32]. Wind generation forecast errors are intro-duced with a linearly-increasing pattern from 1% to 15% of theactual wind generation potential. Loads are scaled and factoredout according to the portions of the different buses [33].The generator parameters are modified according to [31].

Table III provides the generators’ configuration information.The response features and costs of various corrective measuresunder the contingency scenario are, as presented in Table IV,configured according to [32], [34], and [35].

6For this particular simulation, network loss is neglected. It will be includedin the simulation in our future works.7The wind generation curve and the demand curve in Fig. 7 are shown in the

per unit system, namely, the ratio of the actual amount to the peak level.

TABLE IIIGENERATION RESOURCES PARAMETERS

TABLE IVCORRECTIVE MEASURES UNDER CONTINGENCY

B. Results and Analysis of 24-Bus System

For the system security experiment, a ramping emergencyevent7 is assumed as shown in Fig. 7. At time step 63 (about5:15 am), the system demand increases by 16% (about 321MW)and the overall wind generation drops by 55% (about 274MW).Simulations are conducted for both static SCED and look-

ahead SCED with LSM. Under static SCED, the emergencysituation is detected at 5:10 am, 5 min before real-time oper-ation. Due to the large capacity mismatch and the limited re-sponse time, all the available STDC are out of use, resulting ina loss of load of 547.76 MW, which causes economic loss of$568 570.38. However, under look-ahead SCED with LSM, theinsecurity is detected at about 1:30 am, almost 4 h before thereal-time operation. The violation of energy balancing is quan-tified. Non-spinning reserve of 26.90 MW at 4.35 $/MW is de-ployed in advance to solve this security problem. The total re-covery cost is $2806.56, which illustrates the advantage of LSMin the look-ahead SCED framework.The aggregated generation profiles (classified by fuel type) in

response to the ramping emergency are shown in Fig. 8 (staticSCED) and Fig. 9 (look-ahead SCED). In Fig. 8 the pink curverepresents the loss of load capacity. Due to the low marginalcost, the wind generation keeps at the maximum level beforethe ramp event begins. During the ramp event, due to the lowshort-term dispatchable capacity of other generators (especially,the low ramp rate coal units), the overall energy supply cannotfollow the net load increase and thus leads to the loss of load.In contrast, under look-ahead SCED, depicted in Fig. 9, the

wind generation reduces its output about 1 h before the rampevent happens. This can pre-reserve the room for other highcapacity but slow units (e.g., coal units) to ramp up in advance inorder to cope with the coming ramp event. By gradually increasethe generation output of those units, energy imbalance resultsfrom the ramp event is mitigated. With the deployment of non-

Page 9: © 2013 IEEE.le.xie/papers/Early Detection and...curity in an enhanced look-ahead dispatch framework. By intro-ducingshort-termdispatchablecapacity(STDC)intotheproposed look-ahead

1304 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 28, NO. 2, MAY 2013

Fig. 7. Contingency scenario for infeasibility study.

Fig. 8. Operation of different types of generation (static SCED).

spinning reserve ahead of time, loss of load can be avoided.The pink curve in Fig. 9 depicts the additional reserve capacityrequired to avoid any load shedding. In the optimal recoveryplan generated by LSM, the capacity required to avoid a loss ofload is significantly lower (by 95%) than without LSM.The relaxing variables for the energy balancing constraints

are presented in Fig. 10. At each time step, a scheduling planover 48 intervals is solved. Each relaxing variable, depictedalong the depth axis is associated with the energy balancingequation at that interval. The vertical axis indicates the valuesof relaxing variables, namely, the violation of energy balancingequations. As we can see, the first non-zero relaxing variable islocated at the 47th interval at the scheduling plan of time step16. This indicates that the infeasibility at time step 63 (5:15 am)is detected at time step 16 (1:30 am). Therefore, the alerts ofthe ramping emergency reaches the system operators almost 4hours in advance. Due to the wind generation forecast errors,the violation of the energy balancing equation varies around thetrue values.As we discussed in Section III-B, infeasibility may be caused

by multiple factors. Using the enumeration tree approach, theviolation of security constraints can be further identified. InFig. 11, the relaxing variables for the ramping constraints of unit8 are presented. Starting from step 16, the relaxing variables for

Fig. 9. Operation of different types of generation (look-ahead SCED).

Fig. 10. Relaxing variables to energy balancing constraints.

Fig. 11. Relaxing variables to ramping constraints.

the ramping constraints of generator 8 at step 63 are positiveuntil the real-time operation of step 63. This indicates that, giventhe ramp event, the ramping capability is not enough to ensureenergy balance in the system. If a certain number of rampingconstraints could be relaxed, the issue could be solved. As wecan see, the violation of the ramping constraints has a very sim-ilar pattern as the violation of the energy balancing equation inFig. 10.

Page 10: © 2013 IEEE.le.xie/papers/Early Detection and...curity in an enhanced look-ahead dispatch framework. By intro-ducingshort-termdispatchablecapacity(STDC)intotheproposed look-ahead

GU AND XIE: EARLY DETECTION AND OPTIMAL CORRECTIVE MEASURES OF POWER SYSTEM INSECURITY 1305

Fig. 12. Required capacity over look-ahead horizons.

Fig. 13. Recovery cost over look-ahead horizons.

The performance of look-ahead SCED with LSM is furtherstudied in terms of the performance responses over differentlevels of look-ahead horizons.In Fig. 12, the required capacity for system recovery under the

ramp event is presented. As the look-ahead horizon increases,the required reserve capacity decreases significantly. It saturatesat the level of 26.90 MW, which is 95% lower than with staticSCED (when the horizon is equal to 1). Saturation indicatesthat the look-ahead horizon is long enough and that no furtherimprovements to the infeasibility can be achieved.The corresponding recovery costs over the various

look-ahead horizons are shown in Fig. 13. The verticalaxis indicates the cost of system recovery, using a logarithmicscale with a base of 10. Note that for the first data point of1-step look-ahead, the only corrective measure available to thesystem operator when the ramping emergency occurs is loadshedding. Therefore, the first data point reflects the cost ofthe load shedding (or loss of load). As the available responsetime decreases, the available measures for system recoverybecome fewer and more costly. Hence, to detect security risksin advance is of vital importance. With the LSM in look-aheadSCED, the total system recovery cost for the ramp event can bereduced by 99.51% compared with the static SCED.

C. 5889-Bus System

The proposed look-ahead dispatch with security managementis applied to a practical power system. The typology of the

Fig. 14. Computation time and recovery cost in the practical system test.

system is an equivalent typology of the ERCOT system, whichcovers about 85% of the Texas demand [33]. In that system,there are 5889 buses, 7220 transmission lines, and 523 powerplants (including 76 aggregated wind farms with a total installedwind capacity of 9710.4 MW).In the simulation, the demand and wind production poten-

tial are configured according to the historical data of July 11,2009. We intentionally introduce a net-load ramp event into thatday. Starting from 1 am, the available wind generation suddenlydrops by 25%. On the other hand, the system demand increasesby 15% from 1 am to 2 am. The proposed look-ahead dispatchwith security management is tested under this scenario.The average computation time and the optimal recovery cost

in the practical test system over different look-ahead horizons isshown in Fig. 14. As we can see, the average computation timetaken to perform look-ahead dispatch at one interval increasesas the look-ahead horizon increases. This is because the sizeof the optimization problem is enlarged by considering moresnapshots. Using the same simulation platform, it takes about1 s to run a static dispatch and about 1 min to run a 12-step look-ahead dispatch. Although the computation time increases as thelength of the horizon extends further, the absolute computationtime is still less than 20% of the dispatch interval by using adesktop PC.We believe this computational performance is acceptable

and can be improved greatly in practical implementation withpopular fast-MPC techniques [36]. The benefit of the proposedlook-ahead dispatch is also attractive. By running the staticdispatch, the system has to curtail the load of 3797.29 MWat 1 am to cope with the ramp event and the total loss ofload is up to $3.94 million. By running 12-step look-aheaddispatch, the contingency is detected at 12 am (1 hour ago),and the insecurity is identified as the violation of the energybalancing equation at time step 12 (1 am). The generatedoptimal corrective solution suggests deploying non-spinningreserve of 1186.15 MW at 1 am with a total recovery costof $12.38 thousand, a total security cost savings of up to96.86%. Considering performance in terms of computationtime and recovery cost, we believe the proposed approach isimplementable in a practical system and has attractive systemsecurity value, especially in preventing and handling unexpectedramp or contingency events.

Page 11: © 2013 IEEE.le.xie/papers/Early Detection and...curity in an enhanced look-ahead dispatch framework. By intro-ducingshort-termdispatchablecapacity(STDC)intotheproposed look-ahead

1306 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 28, NO. 2, MAY 2013

V. CONCLUSION

In this paper, a look-ahead security constrained economic dis-patch for enhanced security management is presented. By intro-ducing the STDC and the contingency constraints, the proposedalgorithm can consider circumstances under both normal op-erational conditions and contingency conditions. The proposedLSM can assist system operators to identify and quantify vio-lations of the security constraints and work out an optimal re-covery plan at a minimized recovery cost. The proposed enu-meration tree approach can help to identify all of the potentialfactors that can cause system insecurity. The simulation is con-ducted on a modified IEEE RTS 24-bus system and on a prac-tical 5889-bus system. The numerical performance suggests thatthe proposed approach is implementable in practical systemsand has very attractive economic and operational value for en-hancing power system security.Future work will investigate the computation performance

improvement of the proposed LSM in large-scale power sys-tems. The trade-off between security enhancement and the com-putational costs of look-ahead dispatch will be investigated aswell.

REFERENCES

[1] J. E. Price and M. Rothleder, “Recognition of extended dispatch hori-zons in California’s energy markets,” in Proc. IEEE Power and EnergySociety General Meeting, 2011, pp. 1–5.

[2] J. Tong and H. Ni, “Look-ahead multi-time frame generator control anddispatch method in PJM real time operations,” in Proc. IEEE Powerand Energy Society General Meeting, 2011, p. 1.

[3] L. Xie, P. M. S. Carvalho, L. A. F. M. Ferreira, J. Liu, B. H. Krogh,N. Popli, and M. D. Ilic, “Wind integration in power systems: Opera-tional challenges and possible solutions,” Proc. IEEE, vol. 99, no. 1,pp. 214–232, Jan. 2011.

[4] D. W. Ross and K. Sungkook, “Dynamic economic dispatch ofgeneration,” IEEE Trans. Power App. Syst., vol. PAS-99, no. 6, pp.2060–2068, 1980.

[5] J. Carpentier, “A link between short term scheduling and dispatching:Separability of dynamic dispatch,” in Proc. 8th Power System Compu-tation Conf., Helsinki, Finland, 1984.

[6] R. Raithel, S. Virmani, S. Kim, and D. Ross, “Improved allocation ofgeneration through dynamic economic dispatch,” in Proc. 7th PowerSystems Computation Conf., Lausanne, Switzerland, 1981.

[7] L. Xie and M. D. Ilic, “Model predictive economic/environmental dis-patch of power systems with intermittent resources,” in Proc. IEEEPower and Energy Society General Meeting, 2009, pp. 1–6.

[8] L. Xie, J.-Y. Joo, and M. D. Ilic, “Integration of intermittent resourceswith price-responsive loads,” in Proc. North American Power Symp.,2009, pp. 1–6.

[9] M. D. Ilic, L. Xie, and J. Jhi-Young, “Efficient coordinationof wind power and price-responsive demand Part I: Theoreticalfoundations,” IEEE Trans. Power Syst., vol. 26, no. 4, pp.1875–1884, Nov. 2011.

[10] M. D. Ilic, L. Xie, and J. Jhi-Young, “Efficient coordination of windpower and price-responsive demand Part II: Case studies,” IEEE Trans.Power Syst., vol. 26, no. 4, pp. 1885–1893, Nov. 2011.

[11] Y. Gu and L. Xie, “Look-ahead coordination of wind energy andelectric vehicles: A market-based approach,” in Proc. North AmericanPower Symp., 2010, The University of Texas at Arlington.

[12] P. Kundur, J. Paserba, V. Ajjarapu, G. Andersson, A. Bose, C.Canizares, N. Hatziargyriou, D. Hill, A. Stankovic, C. Taylor,T. Van Cutsem, and V. Vittal, “Definition and classification ofpower system stability IEEE/cigre joint task force on stabilityterms and definitions,” IEEE Trans. Power Syst., vol. 19, no.3, pp. 1387–1401, Aug. 2004.

[13] X. Luo and O. Obadina, “Security assessment and enhancement in real-time operations of ERCOT nodal electricity market,” in Proc. IEEEPower and Energy Society General Meeting, 2010, pp. 1–7.

[14] T. Konrad, Drawing the Right Lessons From the Texas Wind Emer-gency, 2009. [Online]. Available: http://www.altenergystocks.com.

[15] E. Ela and B. Kirby, ERCOT Event on February 26, 2008: LessonsLearned, National Renewable Energy Laboratory, Golden, CO, Tech.Rep. NREL/TP-500-43373, Jul. 2008.

[16] ERCOT Overview. ERCOT 2009 Annual Report. [Online]. Available:http://www.ercot.com/news/presentations/2010/index.

[17] Y. Gu and L. Xie, “Look-ahead dispatch with forecast uncertainty andinfeasibility management,” in Proc. IEEE Power and Energy SocietyGeneral Meeting, San Diego, CA, 2012.

[18] L. Xie and M. D. Ilic, “Model predictive dispatch in electric energysystems with intermittent resources,” in Proc. IEEE Int. Conf. Systems,Man and Cybernetics, 2008, pp. 42–47.

[19] A. L. Motto, F. D. Galiana, A. J. Conejo, and J. M. Arroyo,“Network-constrained multiperiod auction for a pool-based electricitymarket,” IEEE Trans. Power Syst., vol. 17, no. 3, pp. 646–653,Aug. 2002.

[20] T. E. Dy Liacco, “The adaptive reliability control system,” IEEE Trans.Power App. Syst., vol. PAS-86, no. 5, pp. 517–531, 1967.

[21] R. Doherty and M. O’Malley, “A new approach to quantify reserve de-mand in systems with significant installed wind capacity,” IEEE Trans.Power Syst., vol. 20, no. 2, pp. 587–595, May 2005.

[22] C. E. Garcia and A. Morshedi, “Quadratic programming solution ofdynamic matrix control (QDMC),” Chem. Eng. Commun., vol. 46, pp.73–87, 1986.

[23] S. J. Qin and T. A. Badgwell, “An overview of industrial model pre-dictive control technology,” in Proc. 5th Int. Conf. Chemical ProcessControl, 1997, pp. 232–256.

[24] J. B. Rawlings and K. R. Muske, “The stability of constrained recedinghorizon control,” IEEE Trans. Autom. Control, vol. 38, no. 10, pp.1512–1516, 1993.

[25] P. O. M. Scokaert and J. B. Rawlings, “Feasibility issues in linearmodel predictive control,” AIChE J., vol. 45, no. 8, pp. 1649–1659,1999.

[26] J. Vada, O. Slupphaug, and T. Johansen, “Optimal prioritized infea-sibility handling in model predictive control: Parametric preemptivemultiobjective linear programming approach,” J. Optimiz. TheoryAppl., vol. 109, no. 2, pp. 385–413, 2001.

[27] M. L. Tyler and M. Morari, “Propositional logic in control and moni-toring problems,” Automatica, vol. 35, no. 4, pp. 565–582, 1999.

[28] J. Vada, O. Slupphaug, T. Johansen, and B. Foss, “LinearMPC with optimal prioritized infeasibility handling: Application,computational issues and stability,” Automatica, vol. 37, no. 11,pp. 1835–1843, 2001.

[29] J. Vada, O. Slupphaug, and B. Foss, “Infeasibility handling in linearMPC subject to prioritized constraints,” in Proc. 14th IFAC WorldCongr., Beijing, China, 1999.

[30] A. Zheng and M. Morari, “Stability of model predictive control withmixed constraints,” IEEE Trans. Autom. Control, vol. 40, no. 10, pp.1818–1823, 1995.

[31] C. Grigg, P. Wong, P. Albrecht, R. Allan, M. Bhavaraju, R. Billinton,Q. Chen, C. Fong, S. Haddad, S. Kuruganty, W. Li, R. Mukerji, D.Patton, N. Rau, D. Reppen, A. Schneider, M. Shahidehpour, and C.Singh, “The IEEE reliability test system-1996. a report prepared bythe reliability test system task force of the application of probabilitymethods subcommittee,” IEEE Trans. Power Syst., vol. 14, no. 3, pp.1010–1020, Aug. 1999.

[32] ERCOT Balancing Energy Services Daily Reports Archives, Bal-ancing Energy Services Daily Reports, 2008. [Online]. Available:http://www.ercot.com/mktinfo/services/bal/2008/index.

[33] ERCOT Overview, ERCOT 2009 Annual Report. [Online]. Available:http://www.ercot.com/news/presentations/2010/index.

[34] C. Raish, “ERCOT emergency interruptible load service,” in Proc.AEIC Load Research Workshop, San Antonio, TX, Feb. 26, 2008,ERCOT.

[35] ERCOT Market Information, Feb. 2008 ERCOT Ancillary ServicesOffer Selected Daily Reports. [Online]. Available: http://www.ercot.com/content/mktinfo/prices/asoffer/2008/.

[36] L. Xie, Y. Gu, A. Eskandari, and M. Ehsani, “Fast MPC-based coordi-nation of wind power and battery energy storage systems,” J. EnergyEng., vol. 138, no. 2, pp. 43–53, 2012.

Page 12: © 2013 IEEE.le.xie/papers/Early Detection and...curity in an enhanced look-ahead dispatch framework. By intro-ducingshort-termdispatchablecapacity(STDC)intotheproposed look-ahead

GU AND XIE: EARLY DETECTION AND OPTIMAL CORRECTIVE MEASURES OF POWER SYSTEM INSECURITY 1307

Yingzhong (Gary) Gu (S’10) is from Shanghai,China. He received the B.S. degree in electricalengineering from Shanghai Jiao Tong University,Shanghai, China, in 2009. He is currently pursuingthe Ph.D. in electrical engineering at Texas A&MUniversity, College Station.He has interned as a power system engineer at Al-

stomGrid in Redmond,WA.His research interests in-clude the look-ahead approach to power system oper-ation, the assessment of wind generation curtailment,and spatial-temporal wind forecasts.

LeXie (S’05–M’10) received the B.E. degree in elec-trical engineering from Tsinghua University, Beijing,China, in 2004, the S.M. degree in engineering sci-ences from Harvard University, Cambridge, MA, in2005, and the Ph.D. degree from the Electric EnergySystems Group (EESG) in the Department of Elec-trical and Computer Engineering at Carnegie MellonUniversity, Pittsburgh, PA, in 2009.He is an Assistant Professor in the Department of

Electrical and Computer Engineering at Texas A&MUniversity, College Station, where he is affiliated

with the Electric Power and Power Electronics Group. His industry experienceincludes an internship in 2006 at ISO-New England and an internship atEdison Mission Energy Marketing and Trading in 2007. His research interestsinclude the modeling and control of large-scale complex systems, smart gridapplications in support of variable energy integration, and electricity markets.