A Static Voltage Security Region for Centralized Wind Power Integration—part I: Concept and Method

When large wind farms are centrally integrated in a power grid, cascading tripping faults induced by voltage issues are becoming a great challenge. This paper therefore proposes a concept of static voltage security region to guarantee that the voltage will remain within operation limits under both base conditions and N-1 contingencies. For large wind farms, significant computational effort is required to calculate the exact boundary of the proposed security region. To reduce this computational burden and facilitate the overall analysis, the characteristics of the security region are first analyzed, and its boundary components are shown to be strictly convex. Approximate security regions are then proposed, which are formed by a set of linear cutting planes based on special operating points known as near points and inner points. The security region encompassed by cutting planes is a good approximation to the actual security region. The proposed procedures are demonstrated on a modified nine-bus system with two wind farms. The simulation confirmed that the cutting plane technique can provide a very good approximation to the actual security region. W Set of wind farms U, θ Bus voltage magnitude and angle lim w Q , l w Q , h w Q Reactive limit, lower bound, and upper bound of wind farm w m Number of wind farms Linearity index ε i Bus type of wind farm i; ε i ∈ {−1,0,1}. ξ Bus type of a wind farm ξ + , ξ − Near points where all wind farm bus types are +1 and −1, respectively η i Reactive power operating point of wind farm i η Reactive power operating point of a wind farm  η Inner point ∇ Tangent plane at a near point Δ Cutting plane across an inner point and a near point


Introduction
In recent years, increasing electricity demands and the need for more environmentally benign electric power systems have become critical concerns to governments and various stakeholders [1,2].Wind power is one of the most important and readily available renewable resources, and its development has been unprecedentedly rapid.
In China, however, wind resources are mainly distributed in the north and northwest parts of the country, which are far from the major load centers in the eastern and coastal areas.Therefore, wind power is centrally collected and integrated into the power grid and long-distance transmission is necessary to transport the generated wind power to these load centers.The Chinese National Energy Administration (NEA) has set a goal of creating six 10 GW-level wind power bases in wind-rich areas, including Inner Mongolia, Gansu, Xinjiang, Hebei, and Jiangsu, by the end of 2020.These large wind power bases will have to be connected to the power grid via centralized integration.
Due to the intermittent and stochastic characteristics of wind energy, centralized integration of large wind farms introduces new challenges to power system operation.There has been a considerable amount of research on wind power forecasting [3], accommodation [4,5], and economic dispatch [6,7], focusing mainly on active power problems.Probabilistic analysis of small-signal stability was introduced in [8,9] and further enhanced in [10,11], wherein the stochastic density of system-critical eigenvalues (which govern system stability) was determined.
Voltage issues related to wind farm integration have become more significant in recent years.The voltage security of individual wind farms was studied in [12,13] to ensure that bus voltages remained within a specified range, and to improve voltage performance.In [14], a steady-state voltage stability analysis utilizing historical time-series data was proposed for power systems with high penetration of wind power.[15] pointed out that the voltage stability of the regional network might be a main limitation with respect to maximum rating and operation of the wind power plant, and viable measures to enable secure and acceptable operation of large wind farms in remote areas were proposed.Reference [16] presented the voltage stability in a weak connection wind farm and discussed some techniques to improve the transient response of voltage.Furthermore, [17] studied the low voltage ride-through (LVRT) characteristic and the effect that voltage dips had on the operation of the different wind generator topologies.Furthermore, [18] proposed a method to find the steady-state voltage stability region with the consideration of the wind power generation so that it could operate with the voltage within the limits.However, there has been little research on reactive power coordination of wind farms and voltage security in the context of centralized integration of wind farms.Among the centrally integrated wind farms of the northwestern and northern China power grids, several cascading tripping incidents occurred during 2011, causing severe operational problems for the power systems involved.Using synchronized measurements from deployed phasor measurement units (PMUs), these cascading events were recorded.Here, we consider only four wind farms for illustrative purposes.Figure 1 shows the voltage changes in these wind farms, which were connected to the power grid through a 220-kV system.After a fault occurred at the 35-kV bus of wind farm WDS, the voltage of WDS dropped from 220 kV to 198 kV in 0.22 s, and WDS was tripped first.Afterwards, there were voltage increases at all of the other wind farms.As the voltages continued to rise to about 260 kV, the remaining wind farms started to trip during the time interval from 0.3 s to 2.0 s; most of the wind farms were tripped within 2 s.Some of the wind farms, such as WDS, had all wind units tripped, while others, such as HD, only had some wind units tripped, leading to reduced wind power output.Following the incident, investigators found that such cascading tripping events normally happen during high-wind periods, when wind farm outputs are near the maximum level.The voltages are initially on the lower side, and thus capacitor banks are switched on to provide reactive power compensation.After the fault caused the first wind farm to be tripped, the voltages exceeded the upper operational limit due to lower loading on the transmission lines and slow switch-off of the capacitance banks.The spiked voltages led to further tripping of other wind farms by the overvoltage protection system.This type of cascading tripping event reveals the strong voltage interdependence among centrally integrated wind farms.In the absence of a coordinated voltage control system, voltage security can be at risk.More importantly, in view of the rapid process of a cascading trip incident (barely 2 s, as shown in Figure 1), an effective response is hardly possible once an incident has begun.Hence, preventive control is much more important for maintaining the operational status of closely coupled wind farms, not only under normal operating conditions, but also within acceptable voltage limitations when an N-1 contingency occurs.Therefore, it would be of great value to determine a static voltage security region for typical centralized integrated wind farms, which may be adopted as a set of constraints for automatic voltage control.Note that in this work, an N-1 contingency refers to a single wind farm trip for the sake of convenience.
However, traditional voltage stability region was usually concentrated on the load margin to voltage collapse boundary and prevented the voltage instability by load shedding [19][20][21][22].Whereas centralized wind farms have enough reactive reservation, what we are mainly concerned about is how to adjust the reactive power of each wind farm to mitigate the violation of voltage security constraints.This problem is similar to community activity room (CAR) proposed in [23], but the difference is that CAR is mainly concerned on the transmission capacity constraints by active power adjustment while our work puts emphasis on the correlation of reactive power and voltage.
The remainder of the paper is organized as follows: Section 2 presents the definition of a security region and the associated method for obtaining the exact security region.The characteristics of the security region are then examined, and different techniques are proposed for obtaining a linear approximation of the actual security region, in order to reduce the computational burden.In Section 3, case studies of a nine-bus system with two wind farms are presented.The security region under normal conditions is derived using a sampling-based approach.Approximate security regions are obtained using tangent-plane and cutting-plane methods, and are compared with the actual security region.Our conclusions are stated in Section 4.

Typical Structure of Centralized Wind Farm Integration
A typical power grid structure for centralized integrated wind farms is shown in Figure 2. First, each wind farm can be regarded as an active distribution network, in which the power injection at each bus is adjustable.Second, each wind farm is usually remote from the load and connected to the grid via long-distance transmission lines, which may result in high charging power.Third, several large-scale wind farms are connected to the same MV busbars of a HV/MV substation (220 kV/500 kV), referred to as the point of common coupling (PCC) in Figure 2.This type of structure is also utilized with other renewable resources (e.g., solar power) to facilitate high penetration, and is very similar to contemplated future distribution grids with high distributed-generator (DG) penetration.Accordingly, this is the typical grid topology considered in the present paper, and may be generalized to applications other than wind farm integration.

Definition of the Static Voltage Security Region
In choosing the scheduled operating points of wind farms, not only must the network constraints be considered, but also the voltage security of each wind farm.Systems are deployed to protect wind turbine generators against serious over-voltage and low-voltage problems.To avoid triggering these protection systems, the voltage magnitude of each wind farm must be within a certain range centered around a nominal value; i.e., a constraint U ∈ [U min , U max ] must be satisfied.
Bearing in mind that voltage is an algebraic state variable and reactive power is a control variable, to guarantee that the voltage remains within the safety region, the reactive power must be restricted.Therefore, the static voltage security region of wind farms can be expressed as a set of constraints limiting the reactive power of each wind farm to maintain its static nodal voltage in the secure range, given the active power generation of each wind farm.Of course, the static voltage security region of wind farms will vary with the level of active power generation.In addition, the reactive capacity limit of each wind farm must be examined in detail, based on the following considerations: (i) The designed power factor, which for a DIFG wind turbine, normally ranges from capacitive 0.95 to inductive 0.95.For example, the reactive power should vary from −500 kVar to +500 kVar for one 1.5-MWDFIG wind turbine.For a wind farm with several wind turbines, the total reactive power output range is the combined reactive power output range for all wind turbines on the farm; (ii) Operating requirements (quality, economy, and security); (iii) Reactive power compensation for each wind farm.
The reactive power constraints for the wind farms can be expressed as: Let x = [U,θ], y = [P g , Q g , P l , Q l , P w ], and z = Q w .According to the definition of the static voltage security region, the following requirements must be satisfied for any secure operating point: ( ) Equation ( 2) represents the active and reactive energy balance equations.Equations ( 3) and (4) represent the transmission capacity limit, the reactive power limits of the wind farms, and the safe voltage range, respectively.We let Ω S denote the initial static voltage security region, which does not incorporate the reactive power limits, and Ω VSR denote the final static voltage security region.The two regions can be written as follows: where In fact, Ω VSR is the static voltage security region under normal condition (also called N-0).Based on it, we can further define the N-1 security region and N-k security region, to guarantee the security under N-1 contingency and even N-k contingency.
Suppose wind farm i is tripped.Then the active power drops to zero, while the reactive power only excludes the generation from the wind units and the others should remain unchanged to simulate the slow switch-off of the capacitance banks and shunt capacitance of long-distance transmission lines (i.e., the capacitance banks and shunt capacitance of long-distance transmission lines remain unchanged) Hence, the dimension of the N-1 static voltage security region is still m, and the desired region is given by: ( ) where VSR i Ω denotes the security region when wind farm i is tripped (i = 1, …, m).The N-1 security region is actually bounded by 2m(m+1) planes before reactive limits are imposed.It is simply the intersection of m+1 security region planes, and is also a convex set.
Similarly, if any k wind farms are tripped, that is ∀{N 1 , …, N k } ⊆ {1, …, m}, then the N-k security region can be formed as Equation (6).Obviously, this region is an intersection of k m C security regions: However, in this work, for convenience and in order to mitigate the cascading trips, the region should ensure secure operation both under normal operating conditions and N-1 contingencies.If an operating point is in the normal security region, but out of the N-1 region, this means that cascading is probably triggered by the first trip.Thus, even if the current operating status is normal, it is not secure enough, and preventive control measures should be carried out according to the proposed N-1 voltage security region.
It is of course obvious that normal voltage security region is the basis for N-1 voltage security region.Therefore, we will put emphasis on the calculation of normal voltage security region in the following work, and the N-1 security region will be fully studied in part II [24].

Characteristics of the Static Voltage Security Region
A sampling-based approach can be employed to identify the static voltage security region.For a single wind farm, the security region can easily be expressed as an interval.For two or more wind farms, a sampling-based approach can be effective for determining the security region.For the sake of simplicity, the process is illustrated for two wind farms, which involves two independent variables.The procedure can be found in Appendix I.The security region constructed by this method (shown in Figure 3) can be expressed as follows: , , , , , where S denotes the area enclosed by the curves L 1 , L 2 , L 3 , and L 4 , and lim w Q denotes the area obtained from the reactive power constraints of (1).
In Figure 3, both wind farms reach the upper bounds of their respective voltage magnitudes at point T 1 , and lower bounds at point T 3 .At points T 2 and T 4 , one wind farm reaches the upper bound while the other reaches the lower bound.In this paper, T 1 and T 3 are termed near points, since they are near the center of the security region, whereas T 2 and T 4 are called remote points, since they are relatively distant from the center of the security region.
A number of characteristics of the security region from the sampling-based approach have been observed, and are summarized as follows: (C-1) The boundary of the security region approximate to a linear form but not strictly equivalent to it, and the security region is bounded by a closed set.(C-2) All elements of the Q-U sensitivity matrix are positive, and the diagonal elements are greater than the off-diagonal elements.(C-3) Each remote point is either above and to the left or below and to the right of a near point, which means the slope of each boundary curve is negative.
Actually, the wind farms are usually taken as PQ buses, so the boundaries of security region are actually the case where the voltage magnitude of some PQ buses exceed their limits, so that these PQ bus should be converted to PV bus.Note that, it is different from the limit induced bifurcation (LIB) which is related to the PV bus whose reactive power exceeds its limits, so that the PV bus should be converted to PQ bus [25].

Security Region Boundary and Linear Approximation
For large-scale integration of m wind farms, m-dimensional variables appear in the reactive power constraints.Although the number of near points is still two, the number of remote points becomes 2 m -2.When m is a large number, it is computationally expensive to calculate the security region Ω S and its boundary using the sampling-based approach.Monte Carlo simulation is perhaps a feasible method for achieving the same goal, but no mathematical expression can be derived to facilitate an in-depth analytical study.Therefore, it is of great interest to approximate Ω S by regions having convenient mathematical representations.
The final security region Ω VSR is simply the intersection of the initial security region Ω S and the reactive power limits Q lim ; only the initial security region Ω S involves nonlinearity.Therefore, we will concentrate on approximating Ω S .Since the security region is a space enclosed by nonlinear boundary curves, a good approximation to the boundary will naturally produce a good approximation to the security region itself.
The voltage drop due to the reactance between the PCC and the wind farms causes nonlinearity in the security region boundary curves, and thus makes it difficult to represent these curves mathematically.However, it is possible to approximate the nonlinear boundary curves with linear counterparts across the near points when the voltage drop is small.Figure 4 illustrates the process of obtaining a linear approximation for the security region Ω S in a two-dimensional case.The dashed lines represent the boundary of the actual security region Ω S , and the solid lines represent linear approximations of the boundary curves.The shaded area represents the reactive power limits lim w Q .
The details of the linear approximation procedures will be discussed in the next subsection.
By the Newton-Raphson method, we obtain the following system of linear equations: If the effect of real power changes is neglected (i.e., 0 Δ = P ), this leads to: , the following equation represents the net active and reactive power flow for the wind farms only: However, the sensitivity matrix approximates to ( ) with respect to the P-Q decompled power flow, which reflects the electrical distance.Hence, the diagonal elements are greater than the off-diagonal elements.Take the boundary curve L 1 for example.When T 1 moves to T 4 , the voltage magnitude of wind farm w 2 drops from 2 w U to 2 w U , whereas U w1 remains constant (i.e., ΔU w1 = 0).In other words, the first line of matrix H ww in Equation ( 10) is zero, and we can conclude that if Q w2 decreases, Q w1 increases (i.e., ∂Q 2 /∂Q 1 > 0), since the elements of H ww are positive according to (C-2).Intuitively speaking, the relationship between ΔQ w1 and ΔQ w2 should be linear in accordance with (10), but the loss change is nonlinear with the system power change, and hence the boundary of Ω VSR is more or less convex.
In order to measure how well the nonlinear boundary components of the security region can be approximated by linear counterparts, the following linearity index is defined to represent the degree of linearity of the components: where m is the total number of wind farms, and i U near point and U PCC are the respective voltages of wind farm i and the PCC bus at the near point.The smaller the value of the index, the closer a nonlinear boundary component is to its linear counterpart.

Linear Approximation Procedures
On the boundary of the security region, the voltage magnitudes at some wind buses tend to reach their upper bounds w U or lower bounds w U ; these buses will be changed to the PV type.The boundary of Ω S is comprised of nonlinear hypersurfaces in multi-dimensional space.If we want to approximate the boundary with hyperplanes, we are confronted with problems such as how many hyperplanes are needed and how to select them.At the very least, the 2 m -2 remote points must be dealt with, and this involves formidable computations.It is of great interest to develop a technique for approximating the voltage security region using only the two near points and none of the numerous remote points.
In order to develop a linear approximation method using only the near points, we first define two additional concepts: the inner point and outer point.These two types of special operating points are illustrated in Figure 5, together with near points and remote points.Let η = (η 1 , η 2 , …, η m ) T ∈ ℜ m be a point.Then, the inner point η  is the point such that one component η i equals 0 when it varies from η i to η i ; that is: The outer point is the point such that any other component except η i equals 0 when the component η i varies from η i to η i ; that is: ,..., 0, 0, 0, 0 Inner points and outer points are special operating points.An inner point represents an operating point where one wind generator bus is a PQ bus with 0 Mvar injection, and all other wind generator buses are PV buses.An outer point represents an operating point where one wind generator bus is a PQ bus and all other wind generator buses are PV buses, one of which has 0 Mvar injection.Therefore, an inner point can be determined by a single power flow calculation, while an outer point requires a sampling approach.Thus, inner points are easier to calculate than outer points. , , , , At different levels of computational difficulty, four distinct techniques are proposed to approximate the boundary components of Ω S , using near points and/or inner points.The approximate boundary is the union of 2m hyper-planes in m-dimensional space.Figure 6 illustrates the four techniques in a two-dimensional case.Figure 6a depicts a technique using only near points.It requires the fewest computations, but the resulting security region is the most conservative.By devoting additional computations to calculating the tangent hyperplanes at one of the near points ξ + , the technique illustrated in Figure 6b achieves a security region that covers more of the actual region.However, the portion of the actual security region near the remote points is still neglected.Figure 6c utilizes tangent hyperplanes at both near points, so that the approximate security region covers much more of the actual region.However, due to the convexity of the boundary components, the tangent hyper-planes near point ξ − will create an "overspill" effect, where part of the approximate security region is outside the actual security region.Figure 6d uses near points and inner points to construct cutting planes, and the resulting approximate security region spans most of the actual region, with limited "overspill".The technique of Figure 6d is the one recommended in this paper.It should also be noted that the higher the linearity of the actual security region, the better the approximations of Figure 6c,d become.The four different linear approximations of the security region can be expressed as follows: (6a): where "0" denotes the normal working point, ∇ denotes the tangent plane at the near point, which can easily be obtained from the Q − U matrix H ww at the near point using Equation (10), and Δ denotes the cutting plane through the near point and the inner points.
The details of the technique shown in Figure 6d are as follows.There are m planes across the near points ξ + and ξ − , respectively denoted by L i + and L i − represent the i th planes across the near points ξ + and ξ − , respectively.Let plane L i + and plane .Let the m inner points associated with the near point ξ + be denoted by , ... ..., Each plane is uniquely determined by m -1 inner points and one near point.For instance, utilizing the near point and all the inner points except i +  η , we have ( ) ,..., , , ,..., η , where: ( ) These points can be used to uniquely determine the coefficients + ,1 , ( ,..., ) Since the total number of inner points associated with each near point is m, a total of C m m -1 = m planes will be determined by a near point and the m inner points.Thus, + Θ ξ can be determined using the near point ξ + and the inner pointsbe.Similarly, − Θ ξ can be determined using the near point − ξ and the inner points 1 ,..., m of each plane i L − .Then, + Θ ξ and − Θ ξ can be represented as: where: Therefore, the voltage security region 0 S Ω is the area enclosed by + Θ ξ and − Θ ξ .Considering the reactive limits, the security region can be finally expressed as: 0 ) ) ) )

Simulation
The nine-bus test system of [26] was chosen for the numeric studies.The system was modified by adding two new buses for connecting additional wind farms.Thus, there were eleven buses altogether.
The two new buses, as well as Bus 2, were connected to Bus 8, which was utilized as the PCC of the wind farms.The parameters and the topology can be observed in Appendix II.
We assumed that the feasible voltage range of each wind farm was [0.9 p.u., 1.1 p.u.]; i.e., 1.1 w U = and 0.9 w U = .The power flow was determined using the MATPOWER toolbox [26].The voltage security region under normal conditions was illustrated for a case in which two wind farms were connected to the PCC.

Initial Voltage Security Region (Ω S )
In this section, two wind farms were connected to the PCC at Bus 8.The active powers of the two wind farms were P w1 = 80 MW and P w2 = 160 MW, respectively.After the power flow was determined, the two near points and two remote points were obtained.As in Figure 3  In the previous section, a linearity index was proposed to measure how well nonlinear boundary curves can be approximated by linear counterparts.Table 1 lists the values of the linearity index for different sets of resistances and reactances between the wind farms and the PCC, while Figure 8 shows the corresponding nonlinear boundary curves, obtained using the sampling-based approach.Both Table 1 and Figure 8 indicate that the linearity near point T 1 (i.e., ξ + ) deteriorates with increasing line resistance and reactance, while the linearity near point T 3 (i.e., ξ − ) exhibits a similar pattern.We use line parameter set No. 3 in the following simulation to represent a worst-case scenario.

Linear Approximation of Ω S
In Section II, four approximation techniques were introduced.Among these, the techniques of Figure 6c,d are the most promising because they yield approximate security regions that span most of the actual security regions, and require only a limited number of additional computations.These two techniques are compared in the present section.
For the linear approximation technique of Figure 6c, tangent planes at the near points are required.To calculate these, the Jacobian matrices at the two respective near points were calculated first as follows.Thus, the tangent planes (denoted by ∇) can be written as: For the linear approximation technique of Figure 6d, inner points are required to construct the cutting planes.The calculated inner points near ξ + (i.e., T 1 ) were (25.25, 0) and (0, 28.19).The inner points near ξ − (i.e., T 3 ) were (−36.43,0) and (0, −36.72).Utilizing the inner points and near points, the coefficients of the cutting planes were calculated as follows: The linear boundary components formed by the tangent planes and the cutting planes, together with the actual boundary, are shown in Figure 9, which suggest that the technique of Figure 6d provides a better linear approximation to the actual boundary of the security region than that of Figure 6c.The drawback of the technique of Figure 6d is that it employs two inner points, and thus requires the calculation of m 2 (= m × m) additional power flows and the inverses of m m × m matrices in order to construct the cutting planes.In this example, m = 2.  Assume that the power factor of each wind farm ranges from capacitive 0.90 to inductive 0.90.The corresponding reactive power limits are: With these reactive power limits, the initial security region of Figure 3 changes to the final security region, represented by the shaded area in Figure 10.
Note that both near points remain in the final voltage security region Ω VSR , while both remote points are outside Ω VSR .In addition, the final bounds on w 1 are determined by its reactive power limits, whereas the original reactive power limits of wind farm w 2 lie completely outside the final voltage security region.This indicates that simply operating under the reactive power limits cannot guarantee voltage security.It should be noted that the shape of the final voltage security region can change with the power factors.With higher power factors, more stringent reactive power limits are imposed, and hence more boundary components of the final security region can be determined by the reactive power limits.

A Practical Large System Simulation
Furthermore, we take a practical 12-wind-farm system in Zhangbei wind base in Northeast China.The wind farm parameters are given as Table 1, where the external grid is chosen as the standard IEEE 118-bus system and the PCC bus is #114.The topology of wind farms are shown in Figure 11, and the parameters can be found in Appendix III.
Similarly, the final voltage security region with the consideration of the reactive power limits are shown in Figure 12b,d.The comparison between initial and final voltage security region shows that the remote points may be cut off due to the reactive power limit.

Conclusions
This paper has proposed for the first time the concept of a voltage security region, and described a sampling-based approach for obtaining it and its nonlinear boundary components.Several different linear approximation techniques were presented and compared.One of these is expected to produce an approximate security region that is very close to the actual one, and can be easily represented in closed mathematical form, while greatly reducing the required computations.The simulation results verified the effectiveness of the proposed method.The proposed voltage security region is the basis for an N-1 voltage security region to provide better coordination among wind farms and help prevent cascading tripping when a single wind farm is tripped.Further analysis on the voltage security region under N-1 contingencies will be presented in Part II [24]., , , , , , where Ω S denotes the area enclosed by the curves.

II. The Parameters and Topology of the Test System
In the simulation, we use a 9-bus system to simulate the "grid", which is plotted in Figure A1.Bus 1 is the reference bus, bus 3 is PV bus representing a conventional thermal generator and the others are PQ bus.Furthermore, the parameters can be obtained from Figure A1 and Table A1-A3.

III. The Parameters of the Practical Large Test System
The parameters of the 12-wind-farm system in Zhangbei wind base can be found in Tables A4 and A5, where #114 is the PCC bus and the information of standard IEEE 118-bus system can be found in [26].

Q
Reactive limit, lower bound, and upper bound of wind farm w m Number of wind farms J Pθ ,J PU Partitioned Jacobian matrices J Qθ ,J QU L a Linearity index ε i Bus type of wind farm i; ε i ∈ {−1,0,1}.ξ Bus type of a wind farm ξ + , ξ − Near points where all wind farm bus types are +1 and −1, respectively η i Reactive power operating point of wind farm i η Reactive power operating point of a wind farm  η Inner point ∇ Tangent plane at a near point Δ Cutting plane across an inner point and a near point

Figure 1 .
Figure 1.A cascading tripping incident involving centrally integrated wind farms in China: (a) voltage magnitudes of different wind farms; (b) active power outputs of different wind farms.

Figure 2 .
Figure 2. Centralized integration of wind farms in a power grid.

Figure 3 .
Figure 3. Security region for an example with two wind farms.

Figure 4 .
Figure 4. Linearization of the voltage security region Ω S .

Figure 5 .
Figure 5. Definition of inner, outer, near, and remote points.

Figure 6 .
Figure 6.Four different linear approximations of Ω S : (a) Using two near points ξ − and ξ + ; (b) using near point ξ − and the tangent planes at near point ξ + ; (c) using the tangent planes near points ξ + and ξ − ; (d) using the cutting planes formed by near and inner points.

1
, near point T 1 was η ξ + = (12.30,19.69) Mvar and near point T 3 was η ξ − = (−22.90,−19.45)Mvar.The two remote points T 2 and T 4 were (−101.50,115.87)Mvar and (106.03,−99.85)Mvar, respectively.The computed boundary curves could be verified by Monte Carlo simulation.Figure 7 shows the boundary curves obtained via the sampling-based approach and those obtained via Monte Carlo simulation.The boundary curves coincided precisely with those of the actual security region Ω S .

Figure 7 .
Figure 7. Initial voltage security region (Ω S ) via Monte Carlo simulation and the sampling-based approach.

Figure 8 .
Figure 8. Approximate security boundary of Ω S for different values of the line parameters.

(
No.1) with L a =0.82% (No.2) with L a =2.00% (No.3) with L a =3.12%Linearity is worse with the index L a increasing

Figure 9 .
Figure 9.Comparison of the techniques of Figure 6c,d.
from capacitive 0.90 to inductive 0.90

Figure 11 .
Figure 11.The topology of a practical wind farm base in Northeast China.

Figure 12 .
Figure 12.Projection of voltage security region on the two-dimensional plane: (a) Projection of initial voltage security region on (Q w1 , Q w2 ) plane; (b) Projection of final voltage security region on (Q w1 , Q w2 ) plane; (c) Projection of initial voltage security region on (Q w5 , Q w8 ) plane; (d) Projection of final voltage security region on (Q w5 , Q w8 ) plane.
Change the bus type of w2 from PV to PQ, while the bus type of w1 remains PV.The security region boundary curve L 1 can be obtained by continuation power flow (CPF) when the voltage magnitude of w security region boundary curve L 3 can be obtained by CPF when the voltage magnitude of w1 is Change the bus type of w1 from PV to PQ, while the bus type of w 2 remains PV.The security region boundary curve L 4 can be obtained by CPF when the voltage magnitude of w2 is security region boundary curve L 2 can be obtained by CPF when the voltage magnitude of w 2 The security region can then be expressed as:

Figure A1 .
Figure A1.The structure of the nine bus system.

Table 1 .
Line parameters (p.u.) with corresponding PCC voltages and values of the linearity index

(p.u.) X (p.u.) B (p.u.) PCC Voltage (p.u.) Index L a
Both the voltage magnitude and the linearity index have two values, one at each of the two near points.The value in parentheses is the value at near point T 3 (i.e., ξ − ), and the other value is the value at near point T 1 (i.e., ξ + ).