ASU Electronic Theses and Dissertations
This collection includes most of the ASU Theses and Dissertations from 2011 to present. ASU Theses and Dissertations are available in downloadable PDF format; however, a small percentage of items are under embargo. Information about the dissertations/theses includes degree information, committee members, an abstract, supporting data or media.
In addition to the electronic theses found in the ASU Digital Repository, ASU Theses and Dissertations can be found in the ASU Library Catalog.
Dissertations and Theses granted by Arizona State University are archived and made available through a joint effort of the ASU Graduate College and the ASU Libraries. For more information or questions about this collection contact or visit the Digital Repository ETD Library Guide or contact the ASU Graduate College at gradformat@asu.edu.
Filtering by
- Creators: Vittal, Vijay
For developing the performance-based model, modulations are performed on the supply side of the full drive system to procure magnitude and phase responses of active and reactive powers with respect to the supply voltage and frequency for a range of discrete frequency points. The prediction error minimization (PEM) technique is utilized to generate the curve-fitted transfer functions and corresponding bode plots. For developing the complete drive model in the PSTS simulation program, a positive-sequence voltage source is defined properly as the interface of the model to the external system. The dc-link of the drive converter is implemented by employing the average model of the PWM converter, and is utilized to integrate the line-side rectifier and machine-side inverter.
Numerical simulation is then conducted on sample test systems, synthesized with suitable characteristics to examine performance of the developed models. The simulation results reveal that with growing amount of drive loads being distributed in the system, the small-signal stability of the system is improved in terms of the desirable damping effects on the low-frequency system oscillations of voltage and frequency. The transient stability of the system is also enhanced with regard to the stable active power and reactive power controls of the loads, and the appropriate VAr support capability provided by the drive loads during a contingency.
1. Analysis of load model parameter uncertainty and sensitivity based pa-rameter estimation for power system studies
2. A systematic approach to n-1-1 analysis for power system security as-sessment
To assess the effect of load model parameter uncertainty, a trajectory sensitivity based approach is proposed in this work. Trajectory sensitivity analysis provides a sys-tematic approach to study the impact of parameter uncertainty on power system re-sponse to disturbances. Furthermore, the non-smooth nature of the composite load model presents some additional challenges to sensitivity analysis in a realistic power system. Accordingly, the impact of the non-smooth nature of load models on the sensitivity analysis is addressed in this work. The study was performed using the Western Electrici-ty Coordinating Council (WECC) system model. To address the issue of load model pa-rameter estimation, a sensitivity based load model parameter estimation technique is presented in this work. A detailed discussion on utilizing sensitivities to improve the ac-curacy and efficiency of the parameter estimation process is also presented in this work.
Cascading outages can have a catastrophic impact on power systems. As such, the NERC transmission planning (TPL) standards requires utilities to plan for n¬-1-1 out-ages. However, such analyses can be computationally burdensome for any realistic pow-er system owing to the staggering number of possible n-1-1 contingencies. To address this problem, the report proposes a systematic approach to analyze n-1-1 contingencies in a computationally tractable manner for power system security assessment. The pro-posed approach addresses both static and dynamic security assessment. The proposed methods have been tested on the WECC system.
In the future, along with an increase in the percentage of converter interfaced renewable energy sources connected to the transmission network, there exists a possibility of even connecting synchronous machines to the grid through converters. Thus, all sources of energy can be expected to be coupled to the grid through converters. The control and operation of such a grid will be unlike anything that has been encountered till now. In this dissertation, the operation and behavior of such a grid will be investigated. The first step in such an analysis will be to build an accurate and simple mathematical model to represent the corresponding components in commercial software. Once this bridge has been crossed, conventional machines will be replaced with their solid state interfaced counterparts in a phased manner. At each stage, attention will be devoted to the control of these sources and also on the stability performance of the large power system.
This dissertation addresses various concerns regarding the control and operation of a futuristic power grid. In addition, this dissertation also aims to address the issue of whether a requirement may arise to redefine operational reliability criteria based on the results obtained.
First, this dissertation focuses on transmission thermal constraint relaxation practices. Most system operators employ constraint relaxation practices, which allow certain constraints to be relaxed for penalty prices, in their market models. A proper selection of penalty prices is imperative due to the influence that penalty prices have on generation scheduling and market settlements. However, penalty prices are primarily decided today based on stakeholder negotiations or system operator’s judgments. There is little to no methodology or engineered approach around the determination of these penalty prices. This work proposes new methods that determine the penalty prices for thermal constraint relaxations based on the impact overloading can have on the residual life of the line. This study evaluates the effectiveness of the proposed methods in the short-term operational planning and long-term transmission expansion planning studies.
The second part of this dissertation investigates an advanced methodology to handle uncertainties associated with high penetration of renewable resources, which poses new challenges to power system reliability and calls attention to include stochastic modeling within resource scheduling applications. However, the inclusion of stochastic modeling within mathematical programs has been a challenge due to computational complexities. Moreover, market design issues due to the stochastic market environment make it more challenging. Given the importance of reliable and affordable electric power, such a challenge to advance existing deterministic resource scheduling applications is critical. This ongoing and joint research attempts to overcome these hurdles by developing a stochastic look-ahead commitment tool, which is a stand-alone advisory tool. This dissertation contributes to the derivation of a mathematical formulation for the extensive form two-stage stochastic programming model, the utilization of Progressive Hedging decomposition algorithm, and the initial implementation of the Progressive Hedging subproblem along with various heuristic strategies to enhance the computational performance.
To carefully examine the limitations of conventional power flow software packages in determining voltage stability limits, two lines of research are pursued in this study. The first line of the research is to investigate the capability of different power flow solution techniques, such as conventional power flow and non-iterative power flow techniques to obtain the voltage collapse point. The software packages used in this study include Newton-based methods contained in PSSE, PSLF, PSAT, PowerWorld, VSAT and a non-iterative technique known as the holomorphic embedding method (HEM).
The second line is to investigate the impact of the available control options and solution parameter settings that can be utilized to obtain solutions closer to the voltage collapse point. Such as the starting point, generator reactive power limits, shunt device control modes, area interchange control, and other such parameters.
RTCA is first conducted to identify critical contingencies that may cause violations. Then, for each critical contingency, CTS is performed to determine the beneficial switching actions that can reduce post-contingency violations. To reduce computational burden, fast heuristic algorithms are proposed to generate candidate switching lists. Numerical simulations performed on three large-scale realistic power systems (TVA, ERCOT, and PJM) demonstrate that CTS can significantly reduce post-contingency violations. Parallel computing can further reduce the solution time.
RT SCED is to eliminate the actual overloads and potential post-contingency overloads identified by RTCA. Procedure-A, which is consistent with existing industry practices, is proposed to connect RTCA and RT SCED. As CTS can reduce post-contingency violations, higher branch limits, referred to as pseudo limits, may be available for some contingency-case network constraints. Thus, Procedure-B is proposed to take advantage of the reliability benefits provided by CTS. With the proposed Procedure-B, CTS can be modeled in RT SCED implicitly through the proposed pseudo limits for contingency-case network constraints, which requires no change to existing RT SCED tools. Numerical simulations demonstrate that the proposed Procedure-A can effectively eliminate the flow violations reported by RTCA and that the proposed Procedure-B can reduce most of the congestion cost with consideration of CTS.
The system status may be inaccurately estimated due to false data injection (FDI) cyber-attacks, which may mislead operators to adjust the system improperly and cause network violations. Thus, a two-stage FDI detection (FDID) approach, along with several metrics and an alert system, is proposed in this dissertation to detect FDI attacks. The first stage is to determine whether the system is under attack and the second stage would identify the target branch. Numerical simulations demonstrate the effectiveness of the proposed two-stage FDID approach.