Next Article in Journal / Special Issue
A Static Voltage Security Region for Centralized Wind Power Integration—Part II: Applications
Previous Article in Journal
Modeling and Design Optimization of Variable-Speed Wind Turbine Systems
Previous Article in Special Issue
Effect of Tower Shadow and Wind Shear in a Wind Farm on AC Tie-Line Power Oscillations of Interconnected Power Systems
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Static Voltage Security Region for Centralized Wind Power Integration—Part I: Concept and Method

1
State Key Lab of Power Systems, Department of Electrical Engineering , Tsinghua University, Beijing 100084, China
2
Midwest Independent Transmission System Operator (Midwest ISO), St. Paul, MN 55108, USA
*
Author to whom correspondence should be addressed.
Energies 2014, 7(1), 420-443; https://doi.org/10.3390/en7010420
Submission received: 26 November 2013 / Revised: 4 January 2014 / Accepted: 17 January 2014 / Published: 22 January 2014
(This article belongs to the Special Issue Wind Turbines 2014)

Abstract

: When large wind farms are centrally integrated in a power grid, cascading tripping faults induced by voltage issues are becoming a great challenge. This paper therefore proposes a concept of static voltage security region to guarantee that the voltage will remain within operation limits under both base conditions and N-1 contingencies. For large wind farms, significant computational effort is required to calculate the exact boundary of the proposed security region. To reduce this computational burden and facilitate the overall analysis, the characteristics of the security region are first analyzed, and its boundary components are shown to be strictly convex. Approximate security regions are then proposed, which are formed by a set of linear cutting planes based on special operating points known as near points and inner points. The security region encompassed by cutting planes is a good approximation to the actual security region. The proposed procedures are demonstrated on a modified nine-bus system with two wind farms. The simulation confirmed that the cutting plane technique can provide a very good approximation to the actual security region.

1. Introduction

In recent years, increasing electricity demands and the need for more environmentally benign electric power systems have become critical concerns to governments and various stakeholders [1,2]. Wind power is one of the most important and readily available renewable resources, and its development has been unprecedentedly rapid.

In China, however, wind resources are mainly distributed in the north and northwest parts of the country, which are far from the major load centers in the eastern and coastal areas. Therefore, wind power is centrally collected and integrated into the power grid and long-distance transmission is necessary to transport the generated wind power to these load centers. The Chinese National Energy Administration (NEA) has set a goal of creating six 10 GW-level wind power bases in wind-rich areas, including Inner Mongolia, Gansu, Xinjiang, Hebei, and Jiangsu, by the end of 2020. These large wind power bases will have to be connected to the power grid via centralized integration.

Due to the intermittent and stochastic characteristics of wind energy, centralized integration of large wind farms introduces new challenges to power system operation. There has been a considerable amount of research on wind power forecasting [3], accommodation [4,5], and economic dispatch [6,7], focusing mainly on active power problems. Probabilistic analysis of small-signal stability was introduced in [8,9] and further enhanced in [10,11], wherein the stochastic density of system-critical eigenvalues (which govern system stability) was determined.

Voltage issues related to wind farm integration have become more significant in recent years. The voltage security of individual wind farms was studied in [12,13] to ensure that bus voltages remained within a specified range, and to improve voltage performance. In [14], a steady-state voltage stability analysis utilizing historical time-series data was proposed for power systems with high penetration of wind power. [15] pointed out that the voltage stability of the regional network might be a main limitation with respect to maximum rating and operation of the wind power plant, and viable measures to enable secure and acceptable operation of large wind farms in remote areas were proposed. Reference [16] presented the voltage stability in a weak connection wind farm and discussed some techniques to improve the transient response of voltage. Furthermore, [17] studied the low voltage ride-through (LVRT) characteristic and the effect that voltage dips had on the operation of the different wind generator topologies. Furthermore, [18] proposed a method to find the steady-state voltage stability region with the consideration of the wind power generation so that it could operate with the voltage within the limits. However, there has been little research on reactive power coordination of wind farms and voltage security in the context of centralized integration of wind farms. Among the centrally integrated wind farms of the northwestern and northern China power grids, several cascading tripping incidents occurred during 2011, causing severe operational problems for the power systems involved. Using synchronized measurements from deployed phasor measurement units (PMUs), these cascading events were recorded. Here, we consider only four wind farms for illustrative purposes. Figure 1 shows the voltage changes in these wind farms, which were connected to the power grid through a 220-kV system.

After a fault occurred at the 35-kV bus of wind farm WDS, the voltage of WDS dropped from 220 kV to 198 kV in 0.22 s, and WDS was tripped first. Afterwards, there were voltage increases at all of the other wind farms. As the voltages continued to rise to about 260 kV, the remaining wind farms started to trip during the time interval from 0.3 s to 2.0 s; most of the wind farms were tripped within 2 s. Some of the wind farms, such as WDS, had all wind units tripped, while others, such as HD, only had some wind units tripped, leading to reduced wind power output. Following the incident, investigators found that such cascading tripping events normally happen during high-wind periods, when wind farm outputs are near the maximum level. The voltages are initially on the lower side, and thus capacitor banks are switched on to provide reactive power compensation. After the fault caused the first wind farm to be tripped, the voltages exceeded the upper operational limit due to lower loading on the transmission lines and slow switch-off of the capacitance banks. The spiked voltages led to further tripping of other wind farms by the overvoltage protection system. This type of cascading tripping event reveals the strong voltage interdependence among centrally integrated wind farms. In the absence of a coordinated voltage control system, voltage security can be at risk. More importantly, in view of the rapid process of a cascading trip incident (barely 2 s, as shown in Figure 1), an effective response is hardly possible once an incident has begun. Hence, preventive control is much more important for maintaining the operational status of closely coupled wind farms, not only under normal operating conditions, but also within acceptable voltage limitations when an N-1 contingency occurs. Therefore, it would be of great value to determine a static voltage security region for typical centralized integrated wind farms, which may be adopted as a set of constraints for automatic voltage control. Note that in this work, an N-1 contingency refers to a single wind farm trip for the sake of convenience.

However, traditional voltage stability region was usually concentrated on the load margin to voltage collapse boundary and prevented the voltage instability by load shedding [1922]. Whereas centralized wind farms have enough reactive reservation, what we are mainly concerned about is how to adjust the reactive power of each wind farm to mitigate the violation of voltage security constraints. This problem is similar to community activity room (CAR) proposed in [23], but the difference is that CAR is mainly concerned on the transmission capacity constraints by active power adjustment while our work puts emphasis on the correlation of reactive power and voltage.

The remainder of the paper is organized as follows: Section 2 presents the definition of a security region and the associated method for obtaining the exact security region. The characteristics of the security region are then examined, and different techniques are proposed for obtaining a linear approximation of the actual security region, in order to reduce the computational burden. In Section 3, case studies of a nine-bus system with two wind farms are presented. The security region under normal conditions is derived using a sampling-based approach. Approximate security regions are obtained using tangent-plane and cutting-plane methods, and are compared with the actual security region. Our conclusions are stated in Section 4.

2. Static Voltage Security Region and Its Linear Approximation

2.1. Typical Structure of Centralized Wind Farm Integration

A typical power grid structure for centralized integrated wind farms is shown in Figure 2. First, each wind farm can be regarded as an active distribution network, in which the power injection at each bus is adjustable. Second, each wind farm is usually remote from the load and connected to the grid via long-distance transmission lines, which may result in high charging power. Third, several large-scale wind farms are connected to the same MV busbars of a HV/MV substation (220 kV/500 kV), referred to as the point of common coupling (PCC) in Figure 2. This type of structure is also utilized with other renewable resources (e.g., solar power) to facilitate high penetration, and is very similar to contemplated future distribution grids with high distributed-generator (DG) penetration. Accordingly, this is the typical grid topology considered in the present paper, and may be generalized to applications other than wind farm integration.

2.2. Definition of the Static Voltage Security Region

In choosing the scheduled operating points of wind farms, not only must the network constraints be considered, but also the voltage security of each wind farm. Systems are deployed to protect wind turbine generators against serious over-voltage and low-voltage problems. To avoid triggering these protection systems, the voltage magnitude of each wind farm must be within a certain range centered around a nominal value; i.e., a constraint U ∈ [Umin, Umax] must be satisfied.

Bearing in mind that voltage is an algebraic state variable and reactive power is a control variable, to guarantee that the voltage remains within the safety region, the reactive power must be restricted. Therefore, the static voltage security region of wind farms can be expressed as a set of constraints limiting the reactive power of each wind farm to maintain its static nodal voltage in the secure range, given the active power generation of each wind farm. Of course, the static voltage security region of wind farms will vary with the level of active power generation. In addition, the reactive capacity limit of each wind farm must be examined in detail, based on the following considerations:

(i)

The designed power factor, which for a DIFG wind turbine, normally ranges from capacitive 0.95 to inductive 0.95. For example, the reactive power should vary from −500 kVar to +500 kVar for one 1.5-MW DFIG wind turbine. For a wind farm with several wind turbines, the total reactive power output range is the combined reactive power output range for all wind turbines on the farm;

(ii)

Operating requirements (quality, economy, and security);

(iii)

Reactive power compensation for each wind farm.

The reactive power constraints for the wind farms can be expressed as:

Q i _ Q i Q i ¯ , i w

Let x = [U,θ], y = [Pg, Qg, Pl, Ql, Pw], and z = Qw. According to the definition of the static voltage security region, the following requirements must be satisfied for any secure operating point:

f ( x , y , z ) = 0
g ( x , y , z ) 0
x w _ x w x w ¯ z _ z z ¯

Equation (2) represents the active and reactive energy balance equations. Equations (3) and (4) represent the transmission capacity limit, the reactive power limits of the wind farms, and the safe voltage range, respectively. We let ΩS denote the initial static voltage security region, which does not incorporate the reactive power limits, and ΩVSR denote the final static voltage security region. The two regions can be written as follows:

Ω S = { z R m | f ( x , y , z ) = 0 , g ( x , y , z ) 0 , X D }
Ω VSR = Ω S z w _ z w z w ¯
where X D : x w _ x w x w ¯.

In fact, ΩVSR is the static voltage security region under normal condition (also called N-0). Based on it, we can further define the N-1 security region and N-k security region, to guarantee the security under N-1 contingency and even N-k contingency.

Suppose wind farm i is tripped. Then the active power drops to zero, while the reactive power only excludes the generation from the wind units and the others should remain unchanged to simulate the slow switch-off of the capacitance banks and shunt capacitance of long-distance transmission lines (i.e., the capacitance banks and shunt capacitance of long-distance transmission lines remain unchanged) Hence, the dimension of the N-1 static voltage security region is still m, and the desired region is given by:

Ω VSR N - 1 = i = 0 m ( Ω VSR i | P w i = 0 )
where Ω VSR i denotes the security region when wind farm i is tripped (i = 1, …, m). The N-1 security region is actually bounded by 2m(m+1) planes before reactive limits are imposed. It is simply the intersection of m+1 security region planes, and is also a convex set.

Similarly, if any k wind farms are tripped, that is ∀{N1, …, Nk} ⊆ {1, …, m}, then the N-k security region can be formed as Equation (6). Obviously, this region is an intersection of C m k security regions:

Ω VSR N - k = i = 0 C m k Ω VSR i | { P w N 1 = 0 , , P w N k = 0 }

However, in this work, for convenience and in order to mitigate the cascading trips, the region should ensure secure operation both under normal operating conditions and N-1 contingencies. If an operating point is in the normal security region, but out of the N-1 region, this means that cascading is probably triggered by the first trip. Thus, even if the current operating status is normal, it is not secure enough, and preventive control measures should be carried out according to the proposed N-1 voltage security region.

It is of course obvious that normal voltage security region is the basis for N-1 voltage security region. Therefore, we will put emphasis on the calculation of normal voltage security region in the following work, and the N-1 security region will be fully studied in part II [24].

2.3. Characteristics of the Static Voltage Security Region

A sampling-based approach can be employed to identify the static voltage security region. For a single wind farm, the security region can easily be expressed as an interval. For two or more wind farms, a sampling-based approach can be effective for determining the security region. For the sake of simplicity, the process is illustrated for two wind farms, which involves two independent variables. The procedure can be found in Appendix I. The security region constructed by this method (shown in Figure 3) can be expressed as follows:

Ω S = { ( Q w 1 , Q w 2 ) | ( Q w 1 , Q w 2 ) S ( L 1 , L 2 , L 3 , L 4 ) } , Ω VSR = Ω S Q w lim .
where S denotes the area enclosed by the curves L1, L2, L3, and L4, and Q w lim denotes the area obtained from the reactive power constraints of (1).

In Figure 3, both wind farms reach the upper bounds of their respective voltage magnitudes at point T1, and lower bounds at point T3. At points T2 and T4, one wind farm reaches the upper bound while the other reaches the lower bound. In this paper, T1 and T3 are termed near points, since they are near the center of the security region, whereas T2 and T4 are called remote points, since they are relatively distant from the center of the security region.

A number of characteristics of the security region from the sampling-based approach have been observed, and are summarized as follows:

  • (C-1) The boundary of the security region approximate to a linear form but not strictly equivalent to it, and the security region is bounded by a closed set.

  • (C-2) All elements of the QU sensitivity matrix are positive, and the diagonal elements are greater than the off-diagonal elements.

  • (C-3) Each remote point is either above and to the left or below and to the right of a near point, which means the slope of each boundary curve is negative.

Actually, the wind farms are usually taken as PQ buses, so the boundaries of security region are actually the case where the voltage magnitude of some PQ buses exceed their limits, so that these PQ bus should be converted to PV bus. Note that, it is different from the limit induced bifurcation (LIB) which is related to the PV bus whose reactive power exceeds its limits, so that the PV bus should be converted to PQ bus [25].

2.4. Security Region Boundary and Linear Approximation

For large-scale integration of m wind farms, m-dimensional variables appear in the reactive power constraints. Although the number of near points is still two, the number of remote points becomes 2m − 2. When m is a large number, it is computationally expensive to calculate the security region ΩS and its boundary using the sampling-based approach. Monte Carlo simulation is perhaps a feasible method for achieving the same goal, but no mathematical expression can be derived to facilitate an in-depth analytical study. Therefore, it is of great interest to approximate ΩS by regions having convenient mathematical representations.

The final security region ΩVSR is simply the intersection of the initial security region ΩS and the reactive power limits Qlim; only the initial security region ΩS involves nonlinearity. Therefore, we will concentrate on approximating ΩS. Since the security region is a space enclosed by nonlinear boundary curves, a good approximation to the boundary will naturally produce a good approximation to the security region itself.

The voltage drop due to the reactance between the PCC and the wind farms causes nonlinearity in the security region boundary curves, and thus makes it difficult to represent these curves mathematically. However, it is possible to approximate the nonlinear boundary curves with linear counterparts across the near points when the voltage drop is small. Figure 4 illustrates the process of obtaining a linear approximation for the security region ΩS in a two-dimensional case. The dashed lines represent the boundary of the actual security region ΩS, and the solid lines represent linear approximations of the boundary curves. The shaded area represents the reactive power limits Q w lim. The details of the linear approximation procedures will be discussed in the next subsection.

By the Newton–Raphson method, we obtain the following system of linear equations:

[ Δ P Δ Q ] = - [ J P θ J PU J Q θ J QU ] [ Δ θ Δ U ]

If the effect of real power changes is neglected (i.e., ΔP = 0), this leads to:

Δ Q = [ J QU - J Q θ J P θ - 1 J PU ] Δ U
Δ Q = [ J QU - J Q θ J P θ - 1 J PU ] - 1 Δ U

If H = [JQUJJ–1JPU]–1, the following equation represents the net active and reactive power flow for the wind farms only:

Δ U w = H ww Δ Q w w w

However, the sensitivity matrix approximates to Δ U Δ Q ( B ) - 1 with respect to the P-Q decompled power flow, which reflects the electrical distance. Hence, the diagonal elements are greater than the off-diagonal elements.

Take the boundary curve L1 for example. When T1 moves to T4, the voltage magnitude of wind farm w2 drops from U w 2 ¯ to U w 2 _, whereas Uw1 remains constant (i.e., ΔUw1 = 0). In other words, the first line of matrix Hww in Equation (10) is zero, and we can conclude that if Qw2 decreases, Qw1 increases (i.e., ∂Q2/∂Q1 > 0), since the elements of Hww are positive according to (C-2). Intuitively speaking, the relationship between ΔQw1 and ΔQw2 should be linear in accordance with (10), but the loss change is nonlinear with the system power change, and hence the boundary of ΩVSR is more or less convex.

In order to measure how well the nonlinear boundary components of the security region can be approximated by linear counterparts, the following linearity index is defined to represent the degree of linearity of the components:

L a = 1 m i = 1 m ( U i | near point - U PCC ) 2 1 m i = 1 m U i 2 | near point × 100 %
where m is the total number of wind farms, and Ui|nearpoint and UPCC are the respective voltages of wind farm i and the PCC bus at the near point. The smaller the value of the index, the closer a nonlinear boundary component is to its linear counterpart.

2.5. Linear Approximation Procedures

On the boundary of the security region, the voltage magnitudes at some wind buses tend to reach their upper bounds U w ¯ or lower bounds U w _; these buses will be changed to the PV type.

Suppose ξ = (ε1, ε2, …, εm)T ∈ ℜm, where εi =0 or ±1, i = 1, …, m. The value 0 indicates PQ type; +1 indicates PV type with a voltage magnitude equal to the upper bound and −1 indicates PV type with a voltage magnitude equal to the lower bound. The set containing the two near points ξ = (−1, −1, …, −1)T and ξ+ = (−1, −1, …, −1)T is denoted by Np, while the set of 2m – 2 remote points (±1, ±1, …, ±1)T/Np is denoted by Rp.

The boundary of ΩS is comprised of nonlinear hypersurfaces in multi-dimensional space. If we want to approximate the boundary with hyperplanes, we are confronted with problems such as how many hyperplanes are needed and how to select them. At the very least, the 2m – 2 remote points must be dealt with, and this involves formidable computations. It is of great interest to develop a technique for approximating the voltage security region using only the two near points and none of the numerous remote points.

In order to develop a linear approximation method using only the near points, we first define two additional concepts: the inner point and outer point. These two types of special operating points are illustrated in Figure 5, together with near points and remote points. Let η = (η1, η2, …, ηm)T ∈ ℜm be a point. Then, the inner point η̆ is the point such that one component ηi equals 0 when it varies from η i _ to η i ¯; that is:

{ η = ( η 1 , , η m ) T | ɛ i = 0 , ɛ k , k i 0 , η i = 0 , η k , k i 0 }

The outer point is the point such that any other component except ηi equals 0 when the component ηi varies from η i _ to η i ¯; that is:

{ η = ( η 1 , , η m ) T | ɛ i = 0 , ɛ k , k i 0 , η i 0 , η k , k i = 0 }

Inner points and outer points are special operating points. An inner point represents an operating point where one wind generator bus is a PQ bus with 0 Mvar injection, and all other wind generator buses are PV buses. An outer point represents an operating point where one wind generator bus is a PQ bus and all other wind generator buses are PV buses, one of which has 0 Mvar injection. Therefore, an inner point can be determined by a single power flow calculation, while an outer point requires a sampling approach. Thus, inner points are easier to calculate than outer points.

At different levels of computational difficulty, four distinct techniques are proposed to approximate the boundary components of ΩS, using near points and/or inner points. The approximate boundary is the union of 2m hyper-planes in m-dimensional space. Figure 6 illustrates the four techniques in a two-dimensional case. Figure 6a depicts a technique using only near points. It requires the fewest computations, but the resulting security region is the most conservative. By devoting additional computations to calculating the tangent hyperplanes at one of the near points ξ+, the technique illustrated in Figure 6b achieves a security region that covers more of the actual region. However, the portion of the actual security region near the remote points is still neglected. Figure 6c utilizes tangent hyperplanes at both near points, so that the approximate security region covers much more of the actual region. However, due to the convexity of the boundary components, the tangent hyper-planes near point ξ will create an “overspill” effect, where part of the approximate security region is outside the actual security region. Figure 6d uses near points and inner points to construct cutting planes, and the resulting approximate security region spans most of the actual region, with limited “overspill”. The technique of Figure 6d is the one recommended in this paper. It should also be noted that the higher the linearity of the actual security region, the better the approximations of Figure 6c,d become. The four different linear approximations of the security region can be expressed as follows:

  • ( 6 a ) : Ω S 0 = { ( Q w 1 , , Q w m ) T | Q w i ( 3 ) Q w i Q w i ( 1 ) , i = 1 , , m } ;

  • ( 6 b ) : Ω S 0 = { ( Q w 1 , , Q w m ) T | Q w i ( 3 ) Q w i ( η ξ + ) 0 , i = 1 , , m } ;

  • ( 6 c ) : Ω S 0 = { ( Q w 1 , , Q w m ) T | ( η ξ - ) 0 ( η ξ + ) 0 } ;

  • ( 6 d ) : Ω S 0 = { ( Q w 1 , , Q w m ) T | Δ ( η ξ - , η ) 0 Δ ( η ξ + η ) 0 } .

where “0” denotes the normal working point, ∇ denotes the tangent plane at the near point, which can easily be obtained from the QU matrix Hww at the near point using Equation (10), and Δ denotes the cutting plane through the near point and the inner points.

The details of the technique shown in Figure 6d are as follows. There are m planes across the near points ξ+ and ξ, respectively denoted by Θξ− = {L1+, …, Li+, …, Lm+} and Θξ− = {L1, …, Li, …, Lm}. Li+ and Li represent the ith planes across the near points ξ+ and ξ, respectively. Let plane Li+ and plane Li be represented by k = 1 m α i , k + Q k = 1 and k = 1 m α i , k - Q k = - 1, respectively, where αi,k+ and αi,k represent the coefficients of planes Li+ and Li. Let the m inner points associated with the near point ξ+ be denoted by η 1 + , η i + , η m +. Each plane is uniquely determined by m – 1 inner points and one near point. For instance, utilizing the near point and all the inner points except η i +, we have ( η 1 + , , η i - 1 + , η ξ + , η i + 1 + , , η m + ), where:

( η 1 + , , η i - 1 + , η ξ + , η i + 1 + , , η m + ) = ( Q 11 Q 1 m Q m 1 Q m m ) T

These points can be used to uniquely determine the coefficients α i + = ( α i , 1 + , , α i , m + ) T of plane L i +. Since the total number of inner points associated with each near point is m, a total of Cmm – 1 = m planes will be determined by a near point and the m inner points. Thus, Θξ+ can be determined using the near point ξ+ and the inner pointsbe. Similarly, Θξ− can be determined using the near point ξ and the inner points η 1 - , , η m -, with the coefficients α i - = ( α i , 1 - , , α i , m - ) T of each plane L i -. Then, Θξ+ and Θξ− can be represented as:

Θ ξ + A + [ Q 1 Q m ] = [ 1 1 ] , Θ ξ - A - [ Q 1 Q m ] = [ - 1 - 1 ]
where:
A + = ( α 1 + , , α m + ) T = ( α 11 + α 1 m + α m 1 + α m m + ) , A - = ( α 1 - , , α m - ) T = ( α 11 - α 1 m - α m 1 - α m m - )

Therefore, the voltage security region Ω S 0 is the area enclosed by Θξ+ and Θξ+. Considering the reactive limits, the security region can be finally expressed as: Ω VSR 0 = Ω S 0 Q lim

3. Simulation

The nine-bus test system of [26] was chosen for the numeric studies. The system was modified by adding two new buses for connecting additional wind farms. Thus, there were eleven buses altogether. The two new buses, as well as Bus 2, were connected to Bus 8, which was utilized as the PCC of the wind farms. The parameters and the topology can be observed in Appendix II.

We assumed that the feasible voltage range of each wind farm was [0.9 p.u., 1.1 p.u.]; i.e., U w ¯ = 1.1 and U w _ = 0.9. The power flow was determined using the MATPOWER toolbox [26]. The voltage security region under normal conditions was illustrated for a case in which two wind farms were connected to the PCC.

3.1. Initial Voltage Security Region (ΩS)

In this section, two wind farms were connected to the PCC at Bus 8. The active powers of the two wind farms were Pw1 = 80 MW and Pw2 = 160 MW, respectively. After the power flow was determined, the two near points and two remote points were obtained. As in Figure 3, near point T1 was ηξ+ = (12.30, 19.69) Mvar and near point T3 was ηξ = (−22.90, −19.45) Mvar. The two remote points T2 and T4 were (−101.50, 115.87) Mvar and (106.03, −99.85) Mvar, respectively. The computed boundary curves could be verified by Monte Carlo simulation. Figure 7 shows the boundary curves obtained via the sampling-based approach and those obtained via Monte Carlo simulation. The boundary curves coincided precisely with those of the actual security region ΩS.

In the previous section, a linearity index was proposed to measure how well nonlinear boundary curves can be approximated by linear counterparts. Table 1 lists the values of the linearity index for different sets of resistances and reactances between the wind farms and the PCC, while Figure 8 shows the corresponding nonlinear boundary curves, obtained using the sampling-based approach. Both Table 1 and Figure 8 indicate that the linearity near point T1 (i.e., ξ+) deteriorates with increasing line resistance and reactance, while the linearity near point T3 (i.e., ξ) exhibits a similar pattern. We use line parameter set No. 3 in the following simulation to represent a worst-case scenario.

3.2. Linear Approximation of ΩS

In Section II, four approximation techniques were introduced. Among these, the techniques of Figure 6c,d are the most promising because they yield approximate security regions that span most of the actual security regions, and require only a limited number of additional computations. These two techniques are compared in the present section.

For the linear approximation technique of Figure 6c, tangent planes at the near points are required. To calculate these, the Jacobian matrices at the two respective near points were calculated first as follows. Thus, the tangent planes (denoted by ∇) can be written as:

= { 0.0401 Q w 1 + 0.0257 Q w 2 = 1 0.0242 Q w 1 + 0.0357 Q w 2 = 1 0.0270 Q w 1 + 0.0196 Q w 2 = - 1 0.0212 Q w 1 + 0.0265 Q w 2 = - 1

For the linear approximation technique of Figure 6d, inner points are required to construct the cutting planes. The calculated inner points near ξ+ (i.e., T1) were (25.25, 0) and (0, 28.19). The inner points near ξ (i.e., T3) were (−36.43, 0) and (0, −36.72). Utilizing the inner points and near points, the coefficients of the cutting planes were calculated as follows:

Δ = { 0.0396 Q w 1 + 0.0260 Q w 2 = 1 0.0245 Q w 1 + 0.0355 Q w 2 = 1 0.0274 Q w 1 + 0.0191 Q w 2 = - 1 0.0205 Q w 1 + 0.0272 Q w 2 = - 1

The linear boundary components formed by the tangent planes and the cutting planes, together with the actual boundary, are shown in Figure 9, which suggest that the technique of Figure 6d provides a better linear approximation to the actual boundary of the security region than that of Figure 6c. The drawback of the technique of Figure 6d is that it employs two inner points, and thus requires the calculation of m2 (= m × m) additional power flows and the inverses of m m × m matrices in order to construct the cutting planes. In this example, m = 2.

3.3. Final Voltage Security Region (ΩVSR)

Assume that the power factor of each wind farm ranges from capacitive 0.90 to inductive 0.90. The corresponding reactive power limits are:

{ - 38.7458 Q w 1 38.7458 - 77.4916 Q w 2 77.4916

With these reactive power limits, the initial security region of Figure 3 changes to the final security region, represented by the shaded area in Figure 10.

Note that both near points remain in the final voltage security region ΩVSR, while both remote points are outside ΩVSR. In addition, the final bounds on w1 are determined by its reactive power limits, whereas the original reactive power limits of wind farm w2 lie completely outside the final voltage security region. This indicates that simply operating under the reactive power limits cannot guarantee voltage security. It should be noted that the shape of the final voltage security region can change with the power factors. With higher power factors, more stringent reactive power limits are imposed, and hence more boundary components of the final security region can be determined by the reactive power limits.

3.4. A Practical Large System Simulation

Furthermore, we take a practical 12-wind-farm system in Zhangbei wind base in Northeast China. The wind farm parameters are given as Table 1, where the external grid is chosen as the standard IEEE 118-bus system and the PCC bus is #114. The topology of wind farms are shown in Figure 11, and the parameters can be found in Appendix III.

According to the proposed method, the cutting planes can be calculated using the inner points and near points, as follows:

Δ : ( 0.1139 0.0632 0.0630 0.0632 0.0633 0.0632 0.0631 0.0633 0.0632 0.0632 0.0632 0.0632 0.0624 0.1279 0.0622 0.0624 0.0624 0.0623 0.0622 0.0624 0.0623 0.0623 0.0623 0.0623 0.0468 0.0468 0.3421 0.0468 0.0469 0.0468 0.0467 0.0469 0.0468 0.0468 0.0468 0.0468 0.0630 0.0630 0.0628 0.1135 0.0630 0.0630 0.0629 0.0630 0.0630 0.0630 0.0630 0.0630 0.0649 0.0649 0.0647 0.0649 0.0837 0.0648 0.0649 0.0649 0.0649 0.0648 0.0649 0.0649 0.0612 0.0612 0.0610 0.0612 0.0612 0.1537 0.0611 0.0612 0.0612 0.1462 0.0623 0.0624 0.0499 0.0499 0.0497 0.0499 0.0499 0.0498 0.2997 0.0499 0.0499 0.0498 0.0498 0.0498 0.0649 0.0649 0.0647 0.0649 0.0649 0.0649 0.0648 0.0837 0.0649 0.0649 0.0648 0.0649 0.0630 0.0630 0.0628 0.0630 0.0630 0.0630 0.0629 0.0630 0.1135 0.0630 0.0630 0.0630 0.0624 0.0624 0.0622 0.0624 0.0624 0.0624 0.0623 0.0624 0.0624 0.1462 0.0623 0.0624 0.0603 0.0603 0.0601 0.0603 0.0603 0.0603 0.0602 0.0603 0.0603 0.0603 0.1513 0.0603 0.0598 0.0598 0.0596 0.0598 0.0598 0.0598 0.0597 0.0598 0.0598 0.0598 0.0598 0.1584 ) ( Q w , 1 Q w , 2 Q w , 3 Q w , 4 Q w , 5 Q w , 6 Q w , 7 Q w , 8 Q w , 9 Q w , 10 Q w , 11 Q w , 12 ) = ( 1 1 1 1 1 1 1 1 1 1 1 1 )
Δ : ( 0.1229 0.0658 0.0648 0.0658 0.0659 0.0656 0.0651 0.0660 0.0658 0.0657 0.0655 0.0656 0.0648 0.1344 0.0638 0.0648 0.0649 0.0646 0.0641 0.0650 0.0649 0.0647 0.0645 0.0646 0.0484 0.0484 0.3568 0.0484 0.0485 0.0482 0.0478 0.0485 0.0484 0.0483 0.0482 0.0482 0.0660 0.0660 0.0650 0.1233 0.0662 0.0658 0.0653 0.0662 0.0661 0.0660 0.0657 0.0658 0.0688 0.0689 0.0678 0.0689 0.0891 0.0687 0.0681 0.0690 0.0689 0.0688 0.0685 0.0687 0.0621 0.0622 0.0612 0.0622 0.0623 0.1598 0.0615 0.0623 0.0622 0.0621 0.0619 0.0620 0.0519 0.0519 0.0511 0.0519 0.0520 0.0517 0.3097 0.0520 0.0519 0.0518 0.0516 0.0517 0.0688 0.0689 0.0678 0.0689 0.0690 0.0687 0.0681 0.0891 0.0689 0.0688 0.0685 0.0687 0.0660 0.0660 0.0650 0.0660 0.0662 0.0658 0.0653 0.0662 0.1234 0.0660 0.0657 0.0658 0.0622 0.0622 0.0613 0.0622 0.0623 0.0620 0.0615 0.0623 0.0623 0.1513 0.0619 0.0620 0.0615 0.0615 0.0606 0.0615 0.0617 0.0613 0.0608 0.0617 0.0616 0.0615 0.1832 0.0613 0.0623 0.0623 0.0614 0.0623 0.0624 0.0621 0.0616 0.0624 0.0623 0.0622 0.0620 0.1729 ) ( Q w , 1 Q w , 2 Q w , 3 Q w , 4 Q w , 5 Q w , 6 Q w , 7 Q w , 8 Q w , 9 Q w , 10 Q w , 11 Q w , 12 ) = ( 1 1 1 1 1 1 1 1 1 1 1 1 )

With twelve wind farms, the initial voltage security region is a high-dimensional space. For illustrative purposes, the projection of this twelve-dimensional space on the (Qw1, Qw2) and (Qw5, Qw8)-plane are shown in Figure 12a,c which are represented by the shaded area respectively. Similarly, the final voltage security region with the consideration of the reactive power limits are shown in Figure 12b,d. The comparison between initial and final voltage security region shows that the remote points may be cut off due to the reactive power limit.

4. Conclusions

This paper has proposed for the first time the concept of a voltage security region, and described a sampling-based approach for obtaining it and its nonlinear boundary components. Several different linear approximation techniques were presented and compared. One of these is expected to produce an approximate security region that is very close to the actual one, and can be easily represented in closed mathematical form, while greatly reducing the required computations. The simulation results verified the effectiveness of the proposed method. The proposed voltage security region is the basis for an N-1 voltage security region to provide better coordination among wind farms and help prevent cascading tripping when a single wind farm is tripped. Further analysis on the voltage security region under N-1 contingencies will be presented in Part II [24].

Acknowledgments

This work was supported in part by National Key Basic Research Program of China (973 Program) (2013CB228201), the National Science Fund for Distinguished Young Scholars (51025725), National Science Foundation of China (51277105, 51321005) and Beijing Higher Education Young Elite Teacher Project (YETP0096).

Conflicts of Interest

The authors declare no conflict of interest.

Appendix

I.

The procedure of sampling based method for two wind farms

The procedure of sampling based method with two wind farms consists of the following steps:

(i)

Set the buses of the two wind farms w1 and w2 as PV, and determine the power flow for the reactive power output. The reactive power ( Q w 1 1 , Q w 2 1) at vertex T1 can be obtained by determining the power flow when the voltage magnitudes are U w 1 = U w 1 ¯ and U w 2 = U w 2 ¯. The reactive power ( Q w 1 2 , Q w 2 2) at vertex T2 can be obtained by determining the power flow when the voltage magnitudes are U w 1 = U w 1 _ and U w 2 = U w 2 ¯. The reactive power ( Q w 1 3 , Q w 2 3) at vertex T3 can be obtained by determining the power flow when the voltage magnitudes are U w 1 = U w 1 ¯ and U w 2 = U w 2 _. The reactive power ( Q w 1 4 , Q w 2 4) at vertex T4 can be obtained by determining the power flow when the voltage magnitudes are U w 1 = U w 1 _ and U w 2 = U w 2 _.

(ii)

Change the bus type of w2 from PV to PQ, while the bus type of w1 remains PV. The security region boundary curve L1 can be obtained by continuation power flow (CPF) when the voltage magnitude of w1 is U w 1 = U w 1 ¯ and the reactive power of w2 varies from Q w 2 1 to Q w 2 4. The security region boundary curve L3 can be obtained by CPF when the voltage magnitude of w1 is U w 1 = U w 1 _ and the reactive power of w2 varies from Q w 2 3 to Q w 2 2.

(iii)

Change the bus type of w1 from PV to PQ, while the bus type of w2 remains PV. The security region boundary curve L4 can be obtained by CPF when the voltage magnitude of w2 is U w 2 = U w 2 ¯ and the reactive power of w1 varies from Q w 2 1 to Q w 2 2. The security region boundary curve L2 can be obtained by CPF when the voltage magnitude of w2 is U w 2 = U w 2 _ and the reactive power of w1 varies from Q w 2 2 to Q w 2 4.

(iv)

Estimate the reactive limits of the wind farms Q w 1 lim = [ Q w 1 l , Q w 1 h ] and Q w 2 lim = [ Q w 2 l , Q w 2 h ].

(v)

The security region can then be expressed as:

Ω SVD = { ( Q w 1 , Q w 2 ) | ( Q w 1 , Q w 2 ) Ω S ( L 1 , L 2 , L 3 , L 4 ) ( Q w 1 lim , Q w 2 lim ) }
where ΩS denotes the area enclosed by the curves.

II.

The Parameters and Topology of the Test System

In the simulation, we use a 9-bus system to simulate the “grid”, which is plotted in Figure A1. Bus 1 is the reference bus, bus 3 is PV bus representing a conventional thermal generator and the others are PQ bus. Furthermore, the parameters can be obtained from Figure A1 and Table A1A3.

Figure A1. The structure of the nine bus system.
Figure A1. The structure of the nine bus system.
Energies 07 00420f13 1024
Table A1. Bus parameters.
Table A1. Bus parameters.
Bus numberTypePd/MWQd/MVarGsBs
13--00
210000
320000
410000
51903000
610000
711003500
810000
911255000
1010000
1110000
Table A2. Generator parameters.
Table A2. Generator parameters.
Gen. numberPg/MWQg/MVarQmax/MVarQmin/MVarVg
1--300−3001.02
345-100−1001.00
2[120, 140][6,10]300-
10[100, 120][6,10]250-
11[80, 100][6,10]200-
Table A3. Branch parameters.
Table A3. Branch parameters.
From busTo busrxb
1400.05760
450.0170.0920.158
560.0390.170.358
3600.05860
670.01190.10080.209
780.00850.0720.149
8100.0170.0920.158
8110.0170.0920.158
820.0170.0920.158
890.0320.1610.306
940.010.0850.176

III.

The Parameters of the Practical Large Test System

The parameters of the 12-wind-farm system in Zhangbei wind base can be found in Tables A4 and A5, where #114 is the PCC bus and the information of standard IEEE 118-bus system can be found in [26].

Table A4. Bus parameters.
Table A4. Bus parameters.
BusNamePw/MWQw/MVarQmax/MVarQmin/MVar
114 (PCC)GY-220----
119BF[60, 80][−3, 3]−1515
120JLQ[60, 80][−5, 5]−1525
121LHT[120, 140][15,25]−2530
122MC[60, 80][10,20]−1525
123LY[60, 80][10,20]−1515
124YYY[60, 80][10,20]−1515
125HD[60, 80][10,20]−1515
126BT[40, 60][10,15]−1015
127HJZ[60, 80][5,10]−1515
128WDS[60, 80][5,10]−1515
129JX[120, 140][15,20]−2530
130QLS[100, 120][15,25]−2535
Table A5. Branch parameters.
Table A5. Branch parameters.
From busTo busrxb
1191140.021400.05940.02356
1201140.033400.05440.03356
1211140.016400.04840.04356
1221140.010500.02880.03760
1231140.002300.01040.01276
1241140.039060.18130.04610
1251140.016400.05440.01356
1261140.002300.01040.00276
1271140.010500.02880.00760
1281140.060500.22900.06200
1291140.009940.03780.00986
1301140.010500.02880.00760

References

  1. Momoh, J.A. Electric Power Distribution, Automation, Protection and Control; CRC Press: Boca Raton, FL, USA, 2007; pp. 223–230. [Google Scholar]
  2. Wind Power. Available online: http://en.wikipedia.org/wiki/Wind_power (accessed on 26 November 2013).
  3. Sideratos, G.; Hatziargyriou, N.D. An advanced statistical method for wind power forecasting. IEEE Trans. Power Syst. 2007, 22, 258–265. [Google Scholar]
  4. Soder, L. Reserve margin planning in a wind-hydro-thermal power system. IEEE Trans. Power Syst. 1993, 8, 564–571. [Google Scholar]
  5. Doherty, R.; Denny, E.; O'Malley, M. System Operation with a Significant Wind Power Penetration. Proceedings of the IEEE Power Engineering Society General Meeting, Denver, CO, USA, 6–10 June 2004; Volume 1, pp. 1002–1007.
  6. Morales, J.M.; Conejo, A.J.; Perez-Ruiz, J. Economic valuation of reserve in power systems with high penetration of wind power. IEEE Trans. Power Syst. 2009, 24, 900–910. [Google Scholar]
  7. Ilic, M.D.; Xie, L.; Joo, J.Y. Efficient coordination of wind power and price-responsive demand—Part I: Theoretical foundations. IEEE Trans. Power Syst. 2011, 26, 1875–1884. [Google Scholar]
  8. Burchett, R.C.; Heydt, G.T. Probabilistic methods for power system dynamic stability studies. IEEE Trans. Power App. Syst. 1978, 97, 695–702. [Google Scholar]
  9. Chung, C.Y.; Wang, K.W.; Tse, C.T.; Bian, X.Y.; David, A.K. Probabilistic eigenvalue sensitivity analysis and PSS design in multi-machine systems. IEEE Trans. Power Syst. 2003, 18, 1439–1445. [Google Scholar]
  10. Yi, H.Q.; Hou, Y.H.; Cheng, S.J.; Zhou, H.; Chen, G.G. Power System Probabilistic Small Signal Stability Analysis Using Two Point Estimation Method. Proceedings of the 42nd International Universities Power Engineering Conference, Brighton, UK, 4–6 September 2007; pp. 402–407.
  11. Bu, S.Q.; Du, W.; Wang, H.F.; Chen, Z.; Xiao, L.Y.; Li, H.F. Probabilistic analysis of small-signal stability of large-scale power systems as affected by penetration of wind generation. IEEE Trans. Power Syst. 2012, 27, 762–770. [Google Scholar]
  12. Vittal, E.; Keane, A.; O'Malley, M. Varying Penetration Ratios of Wind Turbine Technology for Voltage and Frequency Stability. Proceedings of the IEEE Power and Energy Society General Meeting—Conversion and Deliver of Electrical Energy in the 21st Century, Pittsburgh, PA, USA, 20–24 July 2008; pp. 1–6.
  13. Vittal, E.; O'Malley, M.; Keane, A. Impact of Wind Turbine Control Strategies on Voltage Performance. Proceedings of the IEEE Power and Energy Society General Meeting (PES), Calgary, AB, Canada, 26–30 July 2009; pp. 1–7.
  14. Vittal, E.; O'Malley, M.; Keane, A. A steady-state voltage stability analysis of power systems with high penetrations of wind. IEEE Trans. Power Syst. 2010, 25, 433–442. [Google Scholar]
  15. Palsson, M.P.; Toftevaag, T.; Uhlen, K.; Tande, J.O.G. Large-Scale Wind Power Integration and Voltage Stability Limits in Regional Networks. Proceedings of the IEEE Power Engineering Society Summer Meeting, Chicago, IL, USA, 21–25 July 2002; pp. 762–769.
  16. Zhou, F.Q.; Joos, G.; Abbey, C. Voltage Stability in Weak Connection Wind Farms. Proceedings of the IEEE Power Engineering Society General Meeting, San Francisco, CA, USA, 12–16 June 2005; pp. 1483–1488.
  17. Abbey, C.; Joos, G. Effect of Low Voltage Ride Through (LVRT) Characteristic on Voltage Stability. Proceedings of the IEEE Power Engineering Society General Meeting, San Francisco, CA, USA, 12–16 June 2005; pp. 1901–1907.
  18. Linh, N.T. Voltage Stability Analysis of Grids Connected Wind Generators. Proceedings of the 4th IEEE Conference on Industrial Electronics and Applications (ICIEA), Xi'an, China, 25–27 May 2009; pp. 2657–2660.
  19. McCalley, J.D.; Wang, S.; Zhao, Q.-L.; Zhou, G.; Treinen, R.T.; Papalexopoulos, A.D. Security boundary visualization for systems operation. IEEE Trans. Power Syst. 1997, 12, 940–947. [Google Scholar]
  20. Su, J.F.; Yu, Y.X.; Jia, H.J.; Li, P.; He, N.Q.; Tang, Z.Y.; Fu, H.J. Visualization of Voltage Stability Region of Bulk Power System. Proceedings of the International Conference on Power System Technology, Kunming, China, 13–17 October 2002; pp. 1665–1668.
  21. Wei, W.; Zhang, P.; Min, L.; Graham, M.; Ramsay, D. Voltage Stability Margin Computation and Visualization for Tri-State South Colorado area Using EPRI Power System Voltage Stability Region (PSVSR) Program. Proceedings of the Asia-Pacific Power and Energy Engineering Conference, Wuhan, China, 27–31 March 2009; pp. 1–6.
  22. Dong, Z.Y.; Miao, W.W.; Jia, H.J. Minimum Load Shedding Calculation Based on Static Voltage Security Region in Load Injection Space. Proceedings of the Region 10 Conference (TENCON), Bali, Indonesia, 21–24 November 2011; pp. 959–963.
  23. Lee, S.T. Community Activity Room as a New Tool for Transmission Operation and Planning under a Competitive Power Market. Proceedings of the 2003 IEEE Bologna Power Tech Conference, Bologna, Italy, 23–26 June 2003.
  24. Ding, T.; Guo, Q.; Bo, R.; Sun, H.; Zhang, B.; Huang, T. A static voltage security region for centralized wind power integration—Part II: Applications. Energies 2014, 7, 444–461. [Google Scholar]
  25. Yue, X.N.; Venkatasubramanian, V. Complementary Limit Induced Bifurcation Theorem and Analysis of Q Limits in Power-Flow Studies. Proceedings of the Bulk Power System Dynamics and Control-VII. Revitalizing Operational Reliability (2007 IREP Symposium), Charleston, SC, USA, 19–24 August 2007; pp. 1–8.
  26. MATPOWER. Available online: http://www.pserc.cornell.edu/matpower/ (accessed on 26 November 2013).

Nomenclature

W

Set of wind farms

U, θ

Bus voltage magnitude and angle

Q w lim , Q w l , Q w h

Reactive limit, lower bound, and upper bound of wind farm w

m

Number of wind farms

J P θ , J PU J Q θ , J QU

Partitioned Jacobian matrices

La

Linearity index

εi

Bus type of wind farm i; εi ∈{−1,0,1}.

ξ

Bus type of a wind farm

ξ+, ξ

Near points where all wind farm bus types are +1 and −1, respectively

ηi

Reactive power operating point of wind farm i

η

Reactive power operating point of a wind farm

η̆

Inner point

Tangent plane at a near point

Δ

Cutting plane across an inner point and a near point

Figure 1. A cascading tripping incident involving centrally integrated wind farms in China: (a) voltage magnitudes of different wind farms; (b) active power outputs of different wind farms.
Figure 1. A cascading tripping incident involving centrally integrated wind farms in China: (a) voltage magnitudes of different wind farms; (b) active power outputs of different wind farms.
Energies 07 00420f1 1024
Figure 2. Centralized integration of wind farms in a power grid.
Figure 2. Centralized integration of wind farms in a power grid.
Energies 07 00420f2 1024
Figure 3. Security region for an example with two wind farms.
Figure 3. Security region for an example with two wind farms.
Energies 07 00420f3 1024
Figure 4. Linearization of the voltage security region ΩS.
Figure 4. Linearization of the voltage security region ΩS.
Energies 07 00420f4 1024
Figure 5. Definition of inner, outer, near, and remote points.
Figure 5. Definition of inner, outer, near, and remote points.
Energies 07 00420f5 1024
Figure 6. Four different linear approximations of ΩS: (a) Using two near points ξ and ξ+; (b) using near point ξ and the tangent planes at near point ξ+; (c) using the tangent planes near points ξ+ and ξ; (d) using the cutting planes formed by near and inner points.
Figure 6. Four different linear approximations of ΩS: (a) Using two near points ξ and ξ+; (b) using near point ξ and the tangent planes at near point ξ+; (c) using the tangent planes near points ξ+ and ξ; (d) using the cutting planes formed by near and inner points.
Energies 07 00420f6 1024
Figure 7. Initial voltage security region (ΩS) via Monte Carlo simulation and the sampling-based approach.
Figure 7. Initial voltage security region (ΩS) via Monte Carlo simulation and the sampling-based approach.
Energies 07 00420f7 1024
Figure 8. Approximate security boundary of ΩS for different values of the line parameters.
Figure 8. Approximate security boundary of ΩS for different values of the line parameters.
Energies 07 00420f8 1024
Figure 9. Comparison of the techniques of Figure 6c,d.
Figure 9. Comparison of the techniques of Figure 6c,d.
Energies 07 00420f9 1024
Figure 10. Final voltage security region (ΩVSR).
Figure 10. Final voltage security region (ΩVSR).
Energies 07 00420f10 1024
Figure 11. The topology of a practical wind farm base in Northeast China.
Figure 11. The topology of a practical wind farm base in Northeast China.
Energies 07 00420f11 1024
Figure 12. Projection of voltage security region on the two-dimensional plane: (a) Projection of initial voltage security region on (Qw1, Qw2) plane; (b) Projection of final voltage security region on (Qw1, Qw2) plane; (c) Projection of initial voltage security region on (Qw5, Qw8) plane; (d) Projection of final voltage security region on (Qw5, Qw8) plane.
Figure 12. Projection of voltage security region on the two-dimensional plane: (a) Projection of initial voltage security region on (Qw1, Qw2) plane; (b) Projection of final voltage security region on (Qw1, Qw2) plane; (c) Projection of initial voltage security region on (Qw5, Qw8) plane; (d) Projection of final voltage security region on (Qw5, Qw8) plane.
Energies 07 00420f12 1024
Table 1. Line parameters (p.u.) with corresponding PCC voltages and values of the linearity index
Table 1. Line parameters (p.u.) with corresponding PCC voltages and values of the linearity index
Parameter SetR (p.u.)X (p.u.)B (p.u.)PCC Voltage (p.u.)Index La
1w10.0030.0180.1261.091 (0.902)0.82% (0.22%)
w20.0050.0280.111
2w10.0100.0550.1421.078 (0.901)2.00% (0.11%)
w20.0120.0640.126
3w10.0170.0920.1581.065 (0.902)3.12% (0.22%)
w20.0170.0920.158

Note: Both the voltage magnitude and the linearity index have two values, one at each of the two near points. The value in parentheses is the value at near point T3 (i.e., ξ), and the other value is the value at near point T1 (i.e., ξ+).

Share and Cite

MDPI and ACS Style

Ding, T.; Guo, Q.; Bo, R.; Sun, H.; Zhang, B. A Static Voltage Security Region for Centralized Wind Power Integration—Part I: Concept and Method. Energies 2014, 7, 420-443. https://doi.org/10.3390/en7010420

AMA Style

Ding T, Guo Q, Bo R, Sun H, Zhang B. A Static Voltage Security Region for Centralized Wind Power Integration—Part I: Concept and Method. Energies. 2014; 7(1):420-443. https://doi.org/10.3390/en7010420

Chicago/Turabian Style

Ding, Tao, Qinglai Guo, Rui Bo, Hongbin Sun, and Boming Zhang. 2014. "A Static Voltage Security Region for Centralized Wind Power Integration—Part I: Concept and Method" Energies 7, no. 1: 420-443. https://doi.org/10.3390/en7010420

Article Metrics

Back to TopTop