A novel transient stability screening approach using prony analysis and SIME

Takato Hiraiwa, Takuya Omi, Kaoni Nakamura, Shinichi Iwamoto

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)

    Abstract

    As electric power systems become larger and more complex, they become increasingly difficult to control. The problem of transient stability has, accordingly, attracted much recent attention owing to the concerns over the possibility of multiswings occurring in longitudinal power systems such as the Japanese power grid. Although multiswings are becoming an important issue, it remains difficult to develop analytical solutions for modeling their constituent modes. One simplifying method involves using Prony analysis to resolve swings into less complex elements. In this paper, a method of stability screening is suggested in which Prony analysis and single machine equivalent (SIME) methods are used to evaluate the risk of step-out by calculating the area between the swing curve trajectory and the time axis by using a series of estimated values. The validity of this proposed method is verified by simulation on a 10-machine, 47-bus system.

    Original languageEnglish
    Title of host publicationAsia-Pacific Power and Energy Engineering Conference, APPEEC
    PublisherIEEE Computer Society
    Volume2015-March
    EditionMarch
    DOIs
    Publication statusPublished - 2015 Mar 23
    Event6th IEEE PES Asia-Pacific Power and Energy Engineering Conference, APPEEC 2014 - Kowloon, Hong Kong
    Duration: 2014 Dec 72014 Dec 10

    Other

    Other6th IEEE PES Asia-Pacific Power and Energy Engineering Conference, APPEEC 2014
    Country/TerritoryHong Kong
    CityKowloon
    Period14/12/714/12/10

    Keywords

    • Multiswings
    • Power System
    • Prony Analysis Method
    • Transient Stability

    ASJC Scopus subject areas

    • Energy Engineering and Power Technology

    Fingerprint

    Dive into the research topics of 'A novel transient stability screening approach using prony analysis and SIME'. Together they form a unique fingerprint.

    Cite this