{"title":"存在关联不确定性的概率安全约束预防性再调度","authors":"A. Pitto, D. Cirio, E. Ciapessoni","doi":"10.23919/AEIT50178.2020.9241188","DOIUrl":null,"url":null,"abstract":"The large penetration of renewable energy sources, characterized by correlated forecast uncertainty, calls for suitable tools to help power system operators manage security. This paper proposes a probabilistic preventive redispatching algorithm for conventional generators aimed at assuring N-1 security in presence of correlated uncertainties of renewable sources and loads. The algorithm combines Third Order Polynomial Normal Transformation, Point Estimate Method and Cornish Fisher expansion to characterize the chance constraints in a linear programming optimization problem. Simulations performed on an IEEE test system demonstrate the effectiveness of the proposed security control method in limiting the probability of violating branch power limits in N and N-1 state.","PeriodicalId":6689,"journal":{"name":"2020 AEIT International Annual Conference (AEIT)","volume":"12 1","pages":"1-6"},"PeriodicalIF":0.0000,"publicationDate":"2020-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Probabilistic security-constrained preventive redispatching in presence of correlated uncertainties\",\"authors\":\"A. Pitto, D. Cirio, E. Ciapessoni\",\"doi\":\"10.23919/AEIT50178.2020.9241188\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The large penetration of renewable energy sources, characterized by correlated forecast uncertainty, calls for suitable tools to help power system operators manage security. This paper proposes a probabilistic preventive redispatching algorithm for conventional generators aimed at assuring N-1 security in presence of correlated uncertainties of renewable sources and loads. The algorithm combines Third Order Polynomial Normal Transformation, Point Estimate Method and Cornish Fisher expansion to characterize the chance constraints in a linear programming optimization problem. Simulations performed on an IEEE test system demonstrate the effectiveness of the proposed security control method in limiting the probability of violating branch power limits in N and N-1 state.\",\"PeriodicalId\":6689,\"journal\":{\"name\":\"2020 AEIT International Annual Conference (AEIT)\",\"volume\":\"12 1\",\"pages\":\"1-6\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-09-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 AEIT International Annual Conference (AEIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.23919/AEIT50178.2020.9241188\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 AEIT International Annual Conference (AEIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/AEIT50178.2020.9241188","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Probabilistic security-constrained preventive redispatching in presence of correlated uncertainties
The large penetration of renewable energy sources, characterized by correlated forecast uncertainty, calls for suitable tools to help power system operators manage security. This paper proposes a probabilistic preventive redispatching algorithm for conventional generators aimed at assuring N-1 security in presence of correlated uncertainties of renewable sources and loads. The algorithm combines Third Order Polynomial Normal Transformation, Point Estimate Method and Cornish Fisher expansion to characterize the chance constraints in a linear programming optimization problem. Simulations performed on an IEEE test system demonstrate the effectiveness of the proposed security control method in limiting the probability of violating branch power limits in N and N-1 state.