Severity Heat Mapping for Power System Security Assessment with N-2 Contingency Analysis

Authors

  • Chaisit Wannoi Department of Computer Technology, Faculty of Agricultural and Industrial Technology, Phetchabun Rajabhat University, Phetchabun 67000, Thailand
  • Narumon Wannoi Department of Electrical Industrial Technology, Faculty of Agricultural and Industrial Technology, Phetchabun Rajabhat University, Phetchabun 67000, Thailand
  • Chai Chompoo-inwai Department of Electrical Engineering, Faculty of Engineering, King Mongkut’s Institute of Technology Ladkrabang, Bangkok 10550, Thailand

Keywords:

N-2 contingency, Power flow congestion, Power system security, Severity heat map

Abstract

This research presents severity heat mapping for a power system security assessment with N-2 contingency analysis. The severity heat map considered the number of devices that exceeded the violation limit for power systems. This study used Thailand's power system in 2019 as the research base, while the Powerworld program was used to simulate and analyze the results. The study considered four cases. The first was the number of devices that exceeded the violation limit, while the second case was the percentage of the maximum branch. The third case was the voltage drops below the controlled value and the last case was the voltage greater than the controlled value. This research focused on studying the stability of the power system in the central region of Thailand, which has the largest difference in load and generation capacity. The results of the N-2 contingency analysis considered the cases of two generators that experienced outages in the system. The results showed that a severity heat map could indicate the devices that could cause an impact or severity on power system stability in each case. Power flow congestion management may then be used to enhance power system stability.

Downloads

Published

2023-06-14

How to Cite

Chaisit Wannoi, Narumon Wannoi, & Chai Chompoo-inwai. (2023). Severity Heat Mapping for Power System Security Assessment with N-2 Contingency Analysis. Science & Technology Asia, 28(2), 164–173. Retrieved from https://ph02.tci-thaijo.org/index.php/SciTechAsia/article/view/249879

Issue

Section

Engineering