Power system transient stability design using reachability based stability-region computation

Jin Licheng, Liu Haifeng, Ratnesh Kumar, James D. McCalley, Nicola Elia, Venkataramana Ajjarapu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Scopus citations

Abstract

This paper presents a reachability based method to compute the stability region of a stable equilibrium point and uses it to design controls for transient stability of power systems. First, a Hamilton-Jacobi-Isaacs (HJI) partial differential equation (PDE) is obtained for the propagation of the backward reachability set of a nonlinear system. This computation when used to obtain the backward reachable set of a stable equilibrium point yields its stability region. Using the stability regions of various discrete controls (also called modes) transient stability design is performed. For example the effectiveness of a control can be verified by checking whether a post-fault initial state is in the stability region of the system with that control switched on. We illustrate our method by applying it to a single-machine infinite-bus system equipped with series and shunt capacitive compensation.

Original languageEnglish (US)
Title of host publicationProceedings - Thirteenth International Symposium on Temporal Representation and Reasoning, TIME 2006
Pages338-343
Number of pages6
DOIs
StatePublished - 2005
Externally publishedYes
Event37th Annual North American Power Symposium, 2005 - Ames, IA, United States
Duration: Oct 23 2005Oct 25 2005

Publication series

NameProceedings of the 37th Annual North American Power Symposium, 2005
Volume2005

Other

Other37th Annual North American Power Symposium, 2005
Country/TerritoryUnited States
CityAmes, IA
Period10/23/0510/25/05

Keywords

  • Backward reachable set
  • Level set method
  • Stability region
  • Transient stability design

Fingerprint

Dive into the research topics of 'Power system transient stability design using reachability based stability-region computation'. Together they form a unique fingerprint.

Cite this