1. Online security assessment with load and renewable generation uncertainty: The iTesla project approach
- Author
-
Diego Cirio, M. H. Vasconcelos, P. Gambier-Morel, Ioannis Konstantelos, Goran Strbac, Geoffroy Jamgotchian, Emanuele Ciapessoni, Leonel M. Carvalho, Nicolas Omont, J. Meirinhos, M. Ferraro, Andrea Pitto, C. Biasuzzi, and Commission of the European Communities
- Subjects
Decision support system ,Computer science ,business.industry ,020209 energy ,Control (management) ,02 engineering and technology ,Supercomputer ,computer.software_genre ,Industrial engineering ,Renewable energy ,Dynamic simulation ,Electric power system ,Filter (video) ,0202 electrical engineering, electronic engineering, information engineering ,Data mining ,business ,Contingency ,computer - Abstract
The secure integration of renewable generation into modern power systems requires an appropriate assessment of the security of the system in real-time. The uncertainty associated with renewable power makes it impossible to tackle this problem via a brute-force approach, i.e. it is not possible to run detailed online static or dynamic simulations for all possible security problems and realizations of load and renewable power. Intelligent approaches for online security assessment with forecast uncertainty modeling are being sought to better handle contingency events. This paper reports the platform developed within the iTesla project for online static and dynamic security assessment. This innovative and open-source computational platform is composed of several modules such as detailed static and dynamic simulation, machine learning, forecast uncertainty representation and optimization tools to not only filter contingencies but also to provide the best control actions to avoid possible unsecure situations. Based on High Performance Computing (HPC), the iTesla platform was tested in the French network for a specific security problem: overload of transmission circuits. The results obtained show that forecast uncertainty representation is of the utmost importance, since from apparently secure forecast network states, it is possible to obtain unsecure situations that need to be tackled in advance by the system operator.
- Published
- 2016