Next Article in Journal
Analysis of Organic and Inorganic Contaminants in Dried Sewage Sludge and By-Products of Dried Sewage Sludge Gasification
Next Article in Special Issue
Low Voltage Ride-through in DFIG Wind Generators by Controlling the Rotor Current without Crowbars
Previous Article in Journal / Special Issue
A Static Voltage Security Region for Centralized Wind Power Integration—Part I: Concept and Method
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Static Voltage Security Region for Centralized Wind Power Integration—Part II: Applications

1
State Key Lab of Power Systems, Department of Electrical Engineering , Tsinghua University, Beijing 100084, China
2
Midwest Independent Transmission System Operator (Midwest ISO), St. Paul, MN 55108, USA
*
Author to whom correspondence should be addressed.
Energies 2014, 7(1), 444-461; https://doi.org/10.3390/en7010444
Submission received: 26 November 2013 / Revised: 12 January 2014 / Accepted: 13 January 2014 / Published: 22 January 2014
(This article belongs to the Special Issue Wind Turbines 2014)

Abstract

: In Part I of this work, a static voltage security region was introduced to guarantee the safety of wind farm reactive power outputs under both base conditions and N-1 contingency. In this paper, a mathematical representation of the approximate N-1 security region has further studied to provide better coordination among wind farms and help prevent cascading tripping following a single wind farm trip. Besides, the influence of active power on the security region is studied. The proposed methods are demonstrated for N-1 contingency cases in a nine-bus system. The simulations verify that the N-1 security region is a small subset of the security region under base conditions. They also illustrate the fact that if the system is simply operated below the reactive power limits, without coordination among the wind farms, the static voltage is likely to exceed its limit. A two-step optimal adjustment strategy is introduced to shift insecure operating points into the security region under N-1 contingency. Through extensive numerical studies, the effectiveness of the proposed technique is confirmed.

1. Introduction

Centralized wind power integration in China has been beset by cascading tripping incidents involving wind farms. One of the major reasons for this is the lack of coordinated voltage/reactive power control [19]. A number of techniques have been investigated to maintain the voltage within a specified range and improve the system stability for a single wind farm [1017]. However, in centralized integration of wind power, interdependency among wind farms and cascading tripping events further complicate the voltage control problem. The methods developed for a single wind farm are not applicable, and may even have an adverse effect. A static voltage security region under normal conditions and an online method for describing it were proposed in the first part of this work [1]. Furthermore, in order to guarantee that the voltage will remain within limits under both normal operating conditions and wind farm N-1 tripping conditions, N-1 security region is studied in detail in this work.

Besides, it was pointed out in [1] that cascading trips tend to happen very quickly (usually in less than 2 s), rendering an effective response virtually impossible once an incident has begun. Thus, it is much more important to establish preventive control to maintain a reasonable operating status for all the closely coupled wind farms under normal operating conditions, and also to ensure that the wind farms will still be working within acceptable voltage limitations when an N-1 contingency occurs. Note that in this work, an N-1 contingency refers to a single wind farm trip for the sake of convenience.

Therefore, for any wind farm whose reactive power output is within this security region, the corresponding voltage will be within limits. If the operating point is outside the N-1 security region, a preventive adjustment is supposed to be carried out by the automatic voltage control (AVC) system, which necessitates a set of constraints on the wind farm voltages [1820]. The problem of how to present such voltage constraints is also considered in this paper.

However, the security region is determined with a specified active power output from the wind farms. In other words, different levels of wind power penetration create different voltage security regions, and thus it is of interest to determine how the security region varies with respect to the active power. In practice, nearly all cascading trip faults have occurred when wind power generation at the wind farms was at a high level. Hence, an analysis of the relationship between the security region and wind power penetration will be of great value.

The remainder of the paper is organized as follows: in Section 2, the security region under N-1 contingency conditions is studied, and an optimal adjustment strategy is proposed to shift insecure operating points into the security region under N-1 contingency. In Section 3, the impact of wind penetration on the security region is examined. A nine-bus system with three wind farms is studied in Section 4, and the security region under N-1 contingency is derived. Numerical results for the optimal adjustment strategy are also presented; these provide an intuitive prospective adjustable voltage range for the AVC with minimum adjustment of the wind farm reactive power outputs. Finally, observations and conclusions are stated in Section 5.

2. The N-1 Voltage Security Region and Its Application

2.1. Summary of the First Part of Work [1]

In the first part of work, the concept of voltage security region of wind farms could be expressed as a set of constraints limiting the reactive power of each wind farm to maintain its static nodal voltage in the secure range, given the active power generation of each wind farm, which was compared with a sampling-based approach and several different linear approximation techniques. The results showed that the proposed method expected to produce an approximate security region that was very close to the actual one, and could be easily represented in closed mathematical form, while greatly reducing the required computations.

At the same time, it was pointed out in the first part of this work [1] that in order to mitigate the cascading trips, the region should ensure secure operation both under normal operating conditions and N-1 contingencies. It was obvious that normal voltage security region was the basis for N-1 voltage security region to provide better coordination among wind farms and help prevent cascading tripping when a single wind farm was tripped. If an operating point was in the normal security region, but out of the N-1 region, this meant that cascading was probably triggered by the first tripping event. Thus, even if the current operating status was normal, it was not secure enough, and preventive control measures should be carried out according to the proposed N-1 voltage security region. Therefore, we put emphasis on the calculation of normal voltage security region in Part I [1].

2.2. N-1 Static Voltage Security Region

Based on the concepts introduced in [1], the static voltage security region when wind farm w is tripped is bounded by the 2m planes L 1 w +, …, L i w +, …, L m w +, L 1 w , …, L i w , …, L m w , where L i w + denotes the ith plane through the near point ξ+ when wind farm w is tripped, and L i w denotes the ith plane through the near point ξ when wind farm w is tripped. Therefore, the matrices Energies 07 00444i1 w+ and Energies 07 00444i1 w of Equations (2) and (3) are valid, and the overall N-1 security region can be expressed in terms of 2m(m + 1), such as matrices w = 0 m { A w , A w + }. The matrices will vary in real time according to active wind power generation. Note that w = 0 denotes normal operating conditions.

{ L i w + : k = 1 m α i k w + Q k = 1 L i w : k = 1 m α i k w Q k = 1

Here, Θ ξ w + = { L 1 w + , L i w + , , L m w + } is the set of m planes belonging to w+ and Θ ξ w = { L 1 w , L i w , , L m w } is the set of m planes belonging to w. In other words:

A w + ( Q 1 Q m ) = ( 1 1 )
A w ( Q 1 Q m ) = ( 1 1 )

The linear approximation method (6a) of [1] can be used to determine the center of the security region. Let [ η ξ w , η ξ + w ] be the security region when wind farm w is tripped. Then, the N-1 security region can be expressed as [ max w = 0 m ( η ξ w ) , min w = 0 m ( η ξ + w ) ]. If Oa is the center of the security region, it can be written as follows:

O a = ( max ( w = 0 m η ξ w ) + min ( w = 0 m η ξ + w ) ) / 2

Here, <max/min>(a,b,c) denotes the operator that extracts a new vector from the vectors (a,b,c), such that each component of the new vector is the maximum/minimum from among the corresponding components of the original vectors. For example, <max>((3,2,1), (1,7,6), (2,5,4)) = (3,7,6).

Similarly, each N-1 contingency can also be assessed according to its area of intersection with normal conditions. The smaller this area, the more insecure the wind farm is. Three proposed assessment indices for each scenario, including both normal conditions and a contingency, are given in Equations (5)(7), where min(a) in Equation (6) returns the minimum component of vector a. I t w represents the area of the approximate security region for each scenario, while I u w and I s w represent the approximate areas of each N-1 contingency and normal conditions, respectively. If the index Equation (6) is negative, the voltage security region does not exist. Otherwise, the index Equation (7) lies within the interval [0, 1], and the contingency is more severe when this index is close to 0:

I t w = η ξ + w η ξ w 2
I u w = min ( min ( η ξ + w , η ξ + 0 ) max ( η ξ w , η ξ 0 ) )
I s w = min ( η ξ + w , η ξ + 0 ) max ( η ξ w , η ξ 0 ) 2 min ( η ξ + 0 , η ξ + 0 ) max ( η ξ 0 , η ξ 0 ) 2

2.3. Minimum-Adjustment Correction Method

When the current operating point is in the normal security region, but not in the N-1 security region, it is desirable to shift the operating point into the N-1 security region with minimum reactive power adjustment. An optimization model is constructed to achieve this goal. If the number of wind farms is m, the optimization model can be written as:

min i = 1 m ( η i η i 0 ) 2
s . t . η ( Ω VSR N 1 = i = 0 m Ω VSR i )
where Ω SVD N 1 can be further expanded as follows, using TCs:
i = 1 m α i w + η i 1 , i = 1 , , m , w = 0 , , m
i = 1 m α i w η i 1 , i = 1 , , m , w = 0 , , m
Q i l η i Q i h , i = 1 , , m

In this optimization model, linear approximation of the security regions is employed. Note that the number of constraints increases quadratically with m.

2.4. Two-Step Optimal Adjustment Strategy

Evidently, having the operating point at the center of the N-1 security region may be the best arrangement. After an insecure operating point has been shifted as far as the security region boundary, it can be moved further into the security region, so that the greatest possible margin is maintained between it and the boundary. Figure 1 illustrates a two-step adjustment strategy that will shift an insecure operating point to somewhere inside the N-1 security region.

The first step is the minimum-adjustment correction method. Denote the result of this procedure by Ol, which is on the boundary of the security region. In the second step, this new operating point is moved further toward the center of the security region. It is intuitively clear that the nearer the point is to the center of the security region, the greater the aforementioned margin. Accordingly, the operating point is moved from Ol to Oa, and the area between the two points (defined as the “safe operating range”) remains inside the security region because of its convexity.

Figure 2 shows the distribution of voltage in the proposed security region. We know that equipotential lines never intersect one another. For this reason, when the operating point is moved from Ol to Oa, the corresponding voltage varies monotonically. This provides an intuitive prospective adjustable voltage range for each wind farm, given by:

U i , min * U i U i , max * , i = 1 , , m
where U i , min * and U i , max * denote the minimum and maximum voltages of wind farm i in the adjustable region. U i , min * and U i , max * could be used as voltage constraints in future AVC applications.

3. Impact of Wind Penetration on the Voltage Security Region

The security region is determined with a specified active power output from the wind farms. Therefore, different levels of wind power penetration create different voltage security regions. However, the initial security region is the basis of normal/N-1 security region, so we will put more emphasis on it in the following work.

From the perspective of continuation power flow (CPF), the voltage may initially rise slightly, and then decline to the point of collapse, which is perhaps a different result from the traditional CPF for a load bus. When the nine-bus system is used as an example, the CPF is shown in Figure 3. Since a wind power injection bus can be regarded as a negative load bus, the reverse horizontal coordinate axis is used. If the Thevenin equivalent is used for the point of common coupling (PCC) (Figure 4), when the penetration is low, the impact on the system side is slight, and Eth can be regarded as a constant. Thus, an expression for the voltage drop is easily obtained from Equation (14), and indicates that the voltage rises slightly with increasing penetration. However, Eth cannot remain constant when the penetration is high, since more reactive power is consumed on Xth with the transfer of more active power, and more reactive power must be provided to keep the original voltage profile. This is why the security region moves toward the top and right with increasing wind penetration, as shown Figure 5, where initial voltage security regions are plotted for several different levels of wind penetration.

The security voltage region is obtained by the method proposed in [1] based on a modified nine-bus test system from [21]. Table 1 lists the PCC voltage and linearity index for different wind penetration levels. With increased wind penetration, the PCC voltage decreases due to increased reactive power losses. The linearity index La increases as well, indicating increased nonlinearity of the boundaries:

E th = U ( P w R th + Q w X th ) / U
where Pw and Qw are the active and reactive power of the wind farm; Rth and Xth are the Thevenin equivalent parameters, and Eth is the equivalent voltage.

It is also of interest to know how the area of the security region changes with increased wind penetration. To quantify this, linear approximation of the boundaries is adopted to calculate the area enclosed by ΩS, using the following equation:

A s = 1 / 2 | T 1 T 3 | | T 2 T 4 | sin φ
where φ is the angle between T 1 T 3 and T 2 T 4 obtained from:
cos φ = T 1 T 3 T 2 T 4 | T 1 T 3 | | T 2 T 4 |

Not only does the initial security region move toward the top and right with increasing wind penetration, but its area (calculated via Equations (15) and (16), using the coordinates of the four corner points given in Table 2) also shrinks. This is because the voltage tends toward the point of collapse with higher wind power penetration, as Figure 1 indicates. If the voltage collapses, the security region disappears. Therefore, the area of the security region decreases steadily toward the vanishing point with increasing wind power penetration.

4. Case Studies

4.1. N-1 Voltage Security Region Analysis

The system tested in [1] is also used in this section. Three wind farms are considered. Assume that under normal operating conditions, the active power outputs of the wind farms are 140, 130, and 120 MW, respectively. When one wind farm is tripped, the system is lightly loaded, and the charging capacity of the branch between the PCC and the tripped wind farm is still active. Consequently, the bus voltages subsequently increase.

Suppose each wind farm total generation is given as Pw1 = [120, 140], Pw2 = [100, 120] and Pw3 = [80, 100]. It can be observed from Figure 6a–c that the voltage magnitude of each wind farm will exceeded the upper operational limit after N-1 contingency due to lower loading on the transmission lines and slow switch-off of the capacitance banks. The spiked voltages led to further tripping of other wind farms by the overvoltage protection system. Although the wind power output is still random after N-1 contingency, it is institutive that lower load will lead to higher spiked voltage magnitude. Therefore, we can choose that the worst case for further consideration, shown in Figure 6d, such that when one wind farm is tripped, the other wind farms' generation reach to their lowest possible generation.

For instance, if Pw1 is tripped, i.e., Pw1 = 0, the worst case is that Pw2 = 100 and Pw3 = 80. Note that the voltages at buses 1 and 3 do not change because bus 1 is a slack bus and bus 3 is a PV bus. It should be pointed out that the reactive power of PV bus should be also limited to its upper and lower bound, and the bus type is desired to be converted from PV type to PQ type if the reactive power reaches its bound. But in this study, the reactive power doesn't reach the bound so that it leads to a constant value both at normal condition and N-1 contingencies.

Table 3 further compares the wind farm voltages in the case where the connecting capacitance is cut off and the case where the connecting capacitance remains in service. It is clear that when the capacitance is not cut off, the voltage magnitudes at the wind farms will increase sharply.

The voltage security region under N-1 contingency conditions will be calculated in the followed steps. Note that in the following calculations, capacitances are not cut off when a wind farm is tripped to represent a worst-case scenario.

  • Step 1: Normal conditions

    Under normal conditions, the two near points are calculated as ηξ+ = (14.04, 14.92, 15.88) and ηξ = (−5.66, −5.28, −4.78). The inner points associated with ηξ+ are (0, 20.83, 21.80), (20.28, 0, 22.14), and (20.66, 21.55, 0), and those associated with ηξ are (0, −7.88, −7.39), (−8.07, 0, −7.19), and (−7.28, −7.44, 0). The security region boundary can then be represented by:

    A 0 + = [ 0.0277 0.0199 0.0198 0.0198 0.0274 0.0197 0.0197 0.0196 0.0272 ] , A 0 + [ Q w 1 Q w 2 Q w 3 ] [ 1 1 1 ] A 0 = [ 0.0713 0.0595 0.0591 0.0601 0.0712 0.0593 0.0605 0.0601 0.0712 ] , A 0 [ Q w 1 Q w 2 Q w 3 ] [ 1 1 1 ]

    With three wind farms, the voltage security region is a three-dimensional space. For illustrative purposes, only the projection of this three-dimensional space on the (Qw1, Qw2)-plane is shown in Figure 7. In this figure, the normal condition voltage security region obtained via method (6d) is indicated by the bold dotted line, and is the closure of twelve planes (dotted lines). The security region obtained via method (6c) is indicated by the bold solid line, and a comparison of the two regions shows that method (6d) outperforms method (6c) in boundary approximation.

  • Step 2: When wind farm 1 is tripped

    When wind farm 1 is tripped, the two near points are ηξ+ = (15.60, 8.13, 6.18) and ηξ = (−12.58, −26.09, −25.60). The inner points associated with ηξ+ are (0, 4.95, 5.90), (15.14, 0, −0.64), and (15.52, −1.21, 0), and those associated with ηξ are (0, −31.10, −30.62), (−23.79, 0, −36.65), and (−23.50, −36.84, 0). The security region boundary under wind farm 1 tripping conditions can be written as:

    A 1 + = [ 0.0683 0.0490 0.0521 0.0728 0.1069 0.0798 0.0706 0.0729 0.1084 ] , A 1 + [ Q w 1 Q w 2 Q w 3 ] [ 1 1 1 ] A 1 = [ 0.0197 0.0146 0.0145 0.0129 0.0189 0.0134 0.0129 0.0136 0.0189 ] , A 1 [ Q w 1 Q w 2 Q w 3 ] [ 1 1 1 ]

  • Step 3: When wind farm 2 is tripped

    When wind farm 2 is tripped, the two near points are ηξ+ = (5.97, 16.65, 5.86) and ηξ= (−25.10, −11.20, −24.24). The inner points associated with ηξ+ are (0, 16.26, 0.46), (5.54, 0, 7.37), and (−0.62, 17.00, 0), and those associated with ηξ are (0, −22.13, −35.02), (−29.58, 0, −28.73), and (−35.33, −21.59, 0). The security region boundary when wind farm 2 is tripped is therefore represented by:

    A 2 + = [ 0.0952 0.0623 0.0641 0.0413 0.0603 0.0414 0.0608 0.0590 0.0900 ] , A 2 + [ Q w 1 Q w 2 Q w 3 ] [ 1 1 1 ] A 2 = [ 0.0202 0.0133 0.0142 0.0157 0.0207 0.0155 0.0145 0.0138 0.0199 ] , A 2 [ Q w 1 Q w 2 Q w 3 ] [ 1 1 1 ]

  • Step 4: When wind farm 3 is tripped

    When wind farm 3 is tripped, the two near points are ηξ+ = (5.10, 5.98, 17.74) and ηξ = (−23.71, −23.34, −9.79). The inner points associated with ηξ+ are (0, 1.02, 17.78), (0.50, 0, 18.14), and (7.05, 7.92, 0), and those associated with ηξ are (0, −33.56, −20.16), (−33.68, 0, −19.92), and (−27.65, −27.28, 0). The security region under this N-1 contingency is then given by:

    A 3 + = [ 0.0806 0.0545 0.0529 0.0525 0.0795 0.0517 0.0364 0.0370 0.0541 ] , A 3 + [ Q w 1 Q w 2 Q w 3 ] [ 1 1 1 ] A 3 = [ 0.0210 0.0153 0.0146 0.0155 0.0210 0.0147 0.0167 0.0167 0.0219 ] , A 3 [ Q w 1 Q w 2 Q w 3 ] [ 1 1 1 ]

  • Step 5: N-1 voltage security region

    The N-1 voltage security region can be expressed as w = 0 3 { A w , A w + }. It is bounded by 24 planes, of which 12 are associated with w+ and the other 12 are associated with w, as shown in Figure 8. With reactive power limits taken into account, the final N-1 voltage security region is w = 0 3 { A w , A w + } Q w lim, where:

    Q w lim = { 67.8051 Q w 1 lim 67.8051 62.9619 Q w 2 lim 62.9619 58.1187 Q w 3 lim 58.1187

    It should be noted that although the N-1 security region shown in Figure 8 is similar in shape to the normal condition security region shown in Figure 7, it is actually a subset of the normal condition security region, and therefore significantly smaller. Coincidentally, in this case, the N-1 security region is entirely within the reactive power limits, whereas the normal condition security region is not. In Figure 8, there are 12 planes belonging to w+ and 12 planes belonging to w. Each type of line represents a different contingency, and the intersection of these planes constitutes the N-1 security region; i.e., the reactive power within this region under normal conditions could guarantee security under both normal operation and an N-1 contingency.

Last but not least, the N-1 voltage security region may not exist when wind penetration increases radically. Intuitively, the higher the penetration is, the greater the reactive power required to maintain the voltage in the safety region. If one wind farm is tripped at such a time, the voltage at each wind farm is certain to rise because of the slow switch-off of the capacitance banks, and may not remain inside the N-1 security region. In terms of the voltage security region, the area of the normal security region will decrease steadily with increasing penetration (see Table 2 and Figure 3). A comparison of Figures 7, and 9 also implies that the N-1 voltage security region may shrink, so that high penetration will shift the normal voltage security region further and further from the N-1 conditions (see Figure 9). Thus, if Pw increases from 0 MW, the area of the intersection decreases. The three indices defined in Equations (5)(7) were calculated for different levels of wind power penetration, and the results are listed in Table 4. The following conclusions may be drawn.

(i)

Under normal conditions, Iu decreases with increasing wind power penetration. In particular, Iu would decrease further after an N-1 contingency. Thus, if Iu < 0, the area of the intersection would vanish, as in No. 3. This index can therefore be used to assess the existence of the voltage security region.

(ii)

Under normal conditions, It decreases with increasing wind power penetration. However, Iu would increase after an N-1 contingency. This index describes the approximate size of the voltage security region.

(iii)

It decreases with increasing wind power penetration, and would further decrease after an N-1 contingency. This index describes the approximate size of the intersection between normal conditions and the contingency.

(iv)

A wind farm with higher It has a higher risk of insecurity after tripping. Observe that when the three wind farms have distinct penetration levels (bottom section of Table 4), Iu is positive and It is far from 0 under each condition, so that the voltage security region exists. However, the minimum of Is occurs when w1 is tripped, and the maximum occurs when w3 is tripped. Therefore, the insecurity risk of a w1 trip is greater than that of w3.

Curtailment is an effective method for restoring the N-1 security region. Accordingly, it should be implemented, and will be studied in future work.

4.2. Two-Step Optimal Adjustment Strategy

Assume that the voltage security region exists, and at a given operating point, the reactive power outputs of the three wind farms are (20, 20, 10) MVar. From Figure 7, the operating point is secure under normal conditions because it is within the voltage security region. However, when a single wind farm is tripped and the connecting capacitance is still in service, the operating point will be outside the N-1 security region, as Figure 8 shows. The wind farm voltages increase beyond their upper bounds, and thus the operating point moves into the insecure region. An adjustment strategy must be employed to return the operating point to the secure region.

The proposed two-step adjustment strategy is as follows: in the first step, shift the insecure operating point to the N-1 security boundary with minimum reactive power regulation. Then, in the second step, move the operating point toward the center of the security region, so that a security margin is maintained. Of course, minimum adjustment is only one of a number of effective strategies for adjusting an insecure operating point. Depending on the N-1 security region, various adjustments with various objectives could be employed.

Step 1:

Shift the insecure operating point to the security region boundary

The optimization model of Section 2 is:

min ( Q w 1 20 ) 2 + ( Q w 2 20 ) 2 + ( Q w 3 10 ) 2 s . t . α i + ( Q w 1 Q w 2 Q w 3 ) 1 α i ( Q w 1 Q w 2 Q w 3 ) 1 i = 0 , 1 , 2 , 3 67.8051 Q w 1 lim 67.8051 62.9619 Q w 2 lim 62.9619 58.1187 Q w 3 lim 58.1187
where α0+, α1+, α2+, and α3+ were calculated in Section III. This quadratic programming problem can easily be solved, yielding an optimal objective value of 499.1831.

Step 2:

Shift the operating point from the boundary to the interior of the security region

Using the two near points calculated in Section III, we can obtain the reactive power range for determining the center of the security region. This range is different for each N-1 contingency condition. The intersection of the ranges is { 5.66 Q w 1 5.10 5.28 Q w 2 5.98 4.78 Q w 3 5.86. Then, using Equation (28) of [1], the center of the security region can be calculated as Oa = (−0.28, −0.35, −0.5).

The voltage magnitudes at the wind farms before/after adjustment are compared in Table 5. Under normal conditions, the voltage magnitudes are within limits. However, when one of the wind farms is tripped, the voltage magnitudes at some wind farms exceed their upper bounds, indicating that the original operating point is not within the N-1 voltage security region. After the first optimal adjustment step has been taken, the operating point moves to the N-1 voltage security boundary. For instance, when wind farm w1 is tripped, Uw2 reaches 1.101 p.u., slightly exceeding the upper bound of 1.1 p.u., due to the error introduced by using linear security region boundary components to approximate the actual nonlinear boundary components. Nevertheless, the corresponding reactive power remains quite close to the security region boundary.

Moreover, thanks to the larger security margin obtained in the second step of the center-adjustment strategy, Uw2 is lowered to 1.080 p.u. when wind farm w1 is tripped, which is well under the upper bound 1.1 p.u. Hence, the corrected operating point is completely within the N-1 voltage security region.

At the same time, the adjustable voltage range under normal conditions lies between the results of step 1 and step 2; i.e., Uw1 = [0.954, 0.985], Uw2 = [0.963, 0.994], and Uw3 = [0.954, 0.985]. To further illustrate the effectiveness of the adjustable voltage range in the minimum-adjustment and center-adjustment models, 10,000 operating point samples (in the form of reactive power) from the center to the minimum-adjustment point were randomly generated by Monte Carlo simulation and tested. The voltage magnitude distribution was easily obtained from the power flow, and is shown in Figure 10 before and after wind farm tripping. As an interesting example, note that when wind farm i was tripped, the voltage magnitudes of all wind farms increased, but the voltage Ui varied less than that of the other wind farms.

5. Conclusions

Based on the concepts and technique proposed in [1], a number of observations were made. First, simply operating below the reactive power limits does not guarantee that voltages will remain within limits, and hence a voltage security region is a must. Second, higher wind penetration leads to a higher degree of nonlinearity of the security region boundary components. Third, the size of the security region diminishes with increasing wind penetration.

The effect of wind farm tripping was also examined. Wind farm voltages will increase significantly when a wind farm is tripped if the connecting capacitance is not cut off. An optimal adjustment strategy was demonstrated on an insecure operating point outside the N-1 security region. The minimum-adjustment correction model was used to shift the point to the boundary of N-1 security region, and ultimately the adjustable voltage range of each wind farm was obtained under normal conditions.

The proposed voltage security region and adjustment strategy can be used to achieve better coordination among wind farm reactive power controls, and help prevent cascading tripping following a single wind farm trip. However, the N-1 voltage security region shrinks to the vanishing point when wind penetration increases radically. Curtailment is an effective method of restoring the security region, and will be studied in future work.

Acknowledgments

This work was supported in part by Key Technologies R&D Program of China (2013BAA02B01), the National Science Fund for Distinguished Young Scholars (51025725), National Science Foundation of China (51277105, 51321005) and Beijing Higher Education Young Elite Teacher Project (YETP0096).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Ding, T.; Guo, Q.; Bo, R.; Sun, H.; Zhang, B. A static voltage security region for centralized wind power integration—Part I: Concept and method. Energies 2014, 7, 420–443. [Google Scholar]
  2. Ding, T.; Guo, Q.; Sun, H.; Wang, B.; Xu, F. A Quadratic Robust Optimization Model for Automatic Voltage Control on Wind Farm Side. Proceedings of the IEEE Power and Energy Society General Meeting (PES), Vancouver, BC, Canada, 21–25 July 2013; pp. 1–5.
  3. Bracale, A.; Carpinelli, G.; Proto, D.; Russo, A.; Varilone, P. New approaches for very short-term steady-state analysis of an electrical distribution system with wind farms. Energies 2010, 3, 650–670. [Google Scholar]
  4. Pierik, J.; Axelsson, U.; Eriksson, E.; Salomonsson, D.; Bauer, P.; Czech, B. A wind farm electrical systems evaluation with EeFarm-II. Energies 2010, 3, 619–633. [Google Scholar]
  5. Torchyan, K.; Elmoursi, M.S.; Xiao, W. Adaptive Secondary Voltage Control for Grid Interface of Large Scale Wind Park. Proceedings of the 2013 IEEE Grenoble PowerTech (POWERTECH), Grenoble, France, 16–20 June 2013.
  6. Liu, Y.; Chen, Z. Voltage Sensitivity Based Reactive Power Control on VSC-HVDC in a Wind Farm Connected Hybrid Multi-Infeed HVDC System. Proceedings of the 2013 IEEE Grenoble PowerTech (POWERTECH), Grenoble, France, 16–20 June 2013.
  7. Heredia, E.; Kosterev, D.; Donnelly, M. Wind Hub Reactive Resource Coordination and Voltage Control Study by Sequence Power Flow. Proceedings of the IEEE Power and Energy Society General Meeting, Vancouver, BC, Canada, 21–25 July 2013; pp. 1–5.
  8. Zheng, T.Y.; Jiao, S.H.; Ding, K.; Lin, L. A Coordinated Voltage Control Strategy of Wind Farms Based on Sensitivity Method. Proceedings of the 2013 IEEE Grenoble PowerTech (POWERTECH), Grenoble, France, 16–20 June 2013.
  9. Kabouris, J.; Kanellos, F.D. Impacts of large scale wind penetration on energy supply industry. Energies 2009, 2, 1031–1041. [Google Scholar]
  10. Akhmatov, V.; Eriksen, P.B. A large wind power system in almost island operation—A Danish case study. IEEE Trans. Power Syst. 2007, 22, 937–943. [Google Scholar]
  11. Tapia, G.; Tapia, A.; Ostolaza, J.X. Proportional—Integral regulator-based approach to wind farm reactive power management for secondary voltage control. IEEE Trans. Power Syst. 2007, 22, 488–498. [Google Scholar]
  12. Cezar Rabelo, B.; Hofmann, W.; da Silva, J.L.; de Oliveira, R.G.; Silva, S.R. Reactive power control design in doubly fed induction generators for wind turbines. IEEE Trans. Ind. Electron. 2009, 56, 4154–4162. [Google Scholar]
  13. Diaz-Dorado, E.; Carrillo, C.; Cidras, J. Control algorithm for coordinated reactive power compensation in a wind park. IEEE Trans. Energy Convers. 2008, 23, 1064–1072. [Google Scholar]
  14. Qiao, W.; Venayagamoorthy, G.K.; Harley, R.G. Coordinated reactive power control of a large wind farm and a STATCOM using heuristic dynamic programming. IEEE Trans. Energy Convers. 2009, 24, 493–503. [Google Scholar]
  15. Martinez, J.; Kjær, P.C.; Rodriguez, P.; Teodorescu, R. Design and analysis of a slope voltage control for a DFIG wind power plant. IEEE Trans. Energy Convers. 2012, 27, 11–20. [Google Scholar]
  16. Hu, J.B.; He, Y.K. Reinforced control and operation of DFIG-based wind-power-generation system under unbalanced grid voltage conditions. IEEE Trans. Energy Convers. 2009, 24, 905–915. [Google Scholar]
  17. Konopinski, R.J.; Vijayan, P.; Ajjarapu, V. Extended reactive capability of DFIG wind parks for enhanced system performance. IEEE Trans. Power Syst. 2009, 24, 1346–1355. [Google Scholar]
  18. Sun, H.; Guo, Q.; Zhang, B.; Wu, W.; Wang, B. An adaptive zone-division-based automatic voltage control system with applications in China. IEEE Trans. Power Syst. 2013, 28, 1816–1828. [Google Scholar]
  19. Guo, Q.L.; Sun, H.; Zhang, M.; Tong, J.; Zhang, B.; Wang, B. Optimal voltage control of PJM smart transmission grid: Study, implementation, and evaluation. IEEE Trans. Smart Grid 2013, 4, 1665–1674. [Google Scholar]
  20. Guo, Q.L.; Sun, H.; Liu, Y.; Chen, R.; Wang, B.; Zhang, B. Distributed Automatic Voltage Control Framework for Large-scale Wind Integration in China. Proceedings of the 2012 IEEE Power and Energy Society General Meeting, San Diego, CA, USA, 22–26 July 2012; pp. 1–5.
  21. MATPOWER. Available online: http://www.pserc.cornell.edu/matpower/ (accessed on 26 November 2013).

Nomenclature

Q w lim, Q w l, Q w h

Reactive limit, lower bound and upper bound of wind farm w

La

Linearity index

εi

Bus type of wind farm i; εi ∈ {−1, 0, +1}

ξ

Bus types of the wind farms; ξ = (ε1, ε2,…,εm) ∈ ℜm

ξ+, ξ−,

Near points where all wind farm bus types are 1, −1, respectively

ηi

Reactive power operating point of wind farm i

η

Reactive power operating points of the wind farms

η̆

Inner point

Tangent plane at a near point

Δ

Cutting plane through an inner point and a near point

Ω

Initial static voltage security region

ΩVSR

Final static voltage security region

Ω VSR N 1

N-1 static voltage security region

Figure 1. A two-step optimal adjustment strategy for correction.
Figure 1. A two-step optimal adjustment strategy for correction.
Energies 07 00444f1 1024
Figure 2. Voltage distribution in the proposed voltage security region.
Figure 2. Voltage distribution in the proposed voltage security region.
Energies 07 00444f2 1024
Figure 3. CPF of the PCC in a nine-bus system.
Figure 3. CPF of the PCC in a nine-bus system.
Energies 07 00444f3 1024
Figure 4. Thevenin equivalent of a wind farm.
Figure 4. Thevenin equivalent of a wind farm.
Energies 07 00444f4 1024
Figure 5. Initial voltage security region ΩS for different wind penetration levels.
Figure 5. Initial voltage security region ΩS for different wind penetration levels.
Energies 07 00444f5 1024
Figure 6. Bus voltage magnitude under normal condition and N-1 contingencies (a) wind farm 1 is tripped and the other wind power generation is stochastic; (b) wind farm 2 is tripped and the other wind power generation is stochastic; (c) wind farm 3 is tripped and the other wind power generation is stochastic and (d) the worst case of N-1 contingencies.
Figure 6. Bus voltage magnitude under normal condition and N-1 contingencies (a) wind farm 1 is tripped and the other wind power generation is stochastic; (b) wind farm 2 is tripped and the other wind power generation is stochastic; (c) wind farm 3 is tripped and the other wind power generation is stochastic and (d) the worst case of N-1 contingencies.
Energies 07 00444f6 1024
Figure 7. Projection of the normal condition security region on the (Qw1, Qw2)-plane.
Figure 7. Projection of the normal condition security region on the (Qw1, Qw2)-plane.
Energies 07 00444f7 1024
Figure 8. Projection of the N-1 voltage security region on the (Qw1, Qw2)-plane. α0, α1, α2, and α3 represents the planes belonging to Energies 07 00444i10, Energies 07 00444i11, Energies 07 00444i12, and Energies 07 00444i13.
Figure 8. Projection of the N-1 voltage security region on the (Qw1, Qw2)-plane. α0, α1, α2, and α3 represents the planes belonging to Energies 07 00444i10, Energies 07 00444i11, Energies 07 00444i12, and Energies 07 00444i13.
Energies 07 00444f8 1024
Figure 9. Projection of the N-1 voltage security region on the (Qw1, Qw2)-plane (with higher penetration).
Figure 9. Projection of the N-1 voltage security region on the (Qw1, Qw2)-plane (with higher penetration).
Energies 07 00444f9 1024
Figure 10. Voltage magnitude before/after tripping.
Figure 10. Voltage magnitude before/after tripping.
Energies 07 00444f10 1024
Table 1. PCC voltage and linearity index for different wind penetration levels.
Table 1. PCC voltage and linearity index for different wind penetration levels.
No.Pw1 (MW)Pw2 (MW)PCC Voltage (p.u.)Index La
1601201.0722.55%
(0.913)(1.44%)

2801601.0653.12%
(0.902)(0.22%)

31002001.0554.09%
(0.887)(1.44%)
Table 2. Area of the security region for different wind penetration levels.
Table 2. Area of the security region for different wind penetration levels.
No.Near pointsRemote pointsAs
1(13.85,6.90)(−106.20, 99.30)8653.2
(−28.25, −32.86)(108.09, −109.40)
2(19.69, 12.30)(−99.85, 106.03)7858.0
(−19.45, −22.90)(115.87, 101.50)
3(29.07, 22.20)(−89.87, 118.05)6785.3
(−5.98, −6.84)(128.02, −88.60)
Table 3. Voltage magnitudes at wind farms under normal and N-1 contingency conditions (with/without capacitance cut-off).
Table 3. Voltage magnitudes at wind farms under normal and N-1 contingency conditions (with/without capacitance cut-off).
ConditionUw1Uw2Uw3ratioratioratio
Normal1.0321.0291.031---
C1-on1.0951.1261.1276.10%9.43%9.31%
C1-off1.0551.0951.0962.23%6.41%6.30%
C2-on1.1251.0921.1249.01%6.12%9.02%
C2-off1.0991.0591.0996.49%2.92%6.60%
C3-on1.1141.1121.0807.95%8.07%4.75%
C3-off1.0961.0941.0556.20%6.32%2.33%

Note: Ci-on (i = 1,2,3) indicates that wind farm i is tripped, but the capacitance at this wind farm remains in service, whereas Ci-off indicates that the capacitance is cut off when the wind farm is tripped. Bold and underlined entries indicate voltage violations. Each ratio entry is the ratio of the voltage variation after a wind farm trip to normal conditions.

Table 4. Three indices for different levels of wind power penetration.
Table 4. Three indices for different levels of wind power penetration.
PenetrationScenarioηξ+ηξ−IuItIs
normal(14.04, 14.92, 15.88)(−5.66, −5.28, −4.78)19.7034.97091.00
Pw1 = 140 MWw1 tripping(15.60, 8.13, 6.18)(−12.58, −26.09, −25.60)10.9654.54440.75
Pw2 = 130 MWw2 tripping(5.97, 16.65, 5.86)(−25.10, −11.20, −24.24)10.6451.44880.73
Pw3 = 120 MWw3 tripping(5.10, 5.98, 17.74)(−23.71, −23.34, −9.79)10.6452.20180.74

normal(17.30, 18.17, 19.14)(−0.66, −0.35, 0.09)17.9632.06951.00
Pw1 = 196 MWw1 tripping(17.06, −0.33, 0.62)(−10.67, −24.49, −24.06)0.0244.29180.54
Pw2 = 182 MWw2 tripping(0.01, 18.27, 1.81)(−23.24, −9.09, −22.50)0.6743.36020.58
Pw3 = 168 MWw3 tripping(1.23, 2.09, 19.51)(−21.65, −21.34, −7.47)1.8942.43090.62

normal(38.92, 39.65, 40.53)(34.08, 33.89, 33.91)4.8410.02141.00
Pw1 = 224 MWw1 tripping(25.71, 5.69, 6.55)(0.61, −13.90, −13.87)−28.2037.8253-
Pw2 = 208 MWw2 tripping(7.07, 27.83, 8.64)(−10.98, 3.41, −11.13)−27.0136.2352-
Pw3 = 192 MWw3 tripping(9.23, 9.94, 30.02)(−8.13, −8.32, 6.30)−24.8534.6040-

normal(6.42, 7.93, 15.60)(−15.00, −14.41, −9.11)21.4239.60401.00
Pw1 = 196 MWw1 tripping(11.17, −5.51, 2.08)(−18.43, −31.85, −26.66)8.9048.94840.64
Pw2 = 130 MWw2 tripping(−1.57, 12.62, 6.52)(−25.51, −16.48, −21.73)11.4347.09560.76
Pw3 = 60 MWw3 tripping(0.38, 1.88, 18.65)(−22.75, −22.16, −8.59)15.3843.06900.83
Table 5. Comparison of the voltage magnitudes at the wind farms under normal and N-1 contingency conditions before/after adjustment.
Table 5. Comparison of the voltage magnitudes at the wind farms under normal and N-1 contingency conditions before/after adjustment.
Adjustment StrategyConditionUw1 (p.u.)Uw2 (p.u.)Uw3 (p.u.)
Without adjustmentNormal1.0321.0291.031
w1 tripping1.0951.1261.127
w2 tripping1.1251.0921.124
w3 tripping1.1141.1121.080

Step 1 (minimum adjustment)Normal0.9850.9940.985
w1 tripping1.0791.1011.094
w2 tripping1.0881.0811.089
w3 tripping1.0891.0971.074

Step 2 (center adjustment)Normal0.9540.9630.954
w1 tripping1.0651.0801.078
w2 tripping1.0741.0591.075
w3 tripping1.0671.0681.054

Share and Cite

MDPI and ACS Style

Ding, T.; Guo, Q.; Bo, R.; Sun, H.; Zhang, B.; Huang, T.-e. A Static Voltage Security Region for Centralized Wind Power Integration—Part II: Applications. Energies 2014, 7, 444-461. https://doi.org/10.3390/en7010444

AMA Style

Ding T, Guo Q, Bo R, Sun H, Zhang B, Huang T-e. A Static Voltage Security Region for Centralized Wind Power Integration—Part II: Applications. Energies. 2014; 7(1):444-461. https://doi.org/10.3390/en7010444

Chicago/Turabian Style

Ding, Tao, Qinglai Guo, Rui Bo, Hongbin Sun, Boming Zhang, and Tian-en Huang. 2014. "A Static Voltage Security Region for Centralized Wind Power Integration—Part II: Applications" Energies 7, no. 1: 444-461. https://doi.org/10.3390/en7010444

Article Metrics

Back to TopTop