Show-Kang Chang, C. Teoh, Ye Tao, Peng Peng, Han Li, J. Dyer, S. Barnett
{"title":"利用国家电网电力平衡系统最大限度地提高传输效率","authors":"Show-Kang Chang, C. Teoh, Ye Tao, Peng Peng, Han Li, J. Dyer, S. Barnett","doi":"10.1109/PESGM.2015.7285821","DOIUrl":null,"url":null,"abstract":"Security constrained scheduling has been widely implemented in various power system operations and electricity markets. The practice of securing post-contingency flows preventively to long-term ratings has resulted in transmission network under-utilization. This paper presents a security constrained scheduling process that has been implemented in the National Grid Electricity Balancing System. The process is designed to exploit short-term ratings when determining pre-contingency and post-contingency actions thereby maximizing transmission efficiency. A functional overview is provided. The security criteria adopted, the actions used to secure contingencies, and the logic used to determine corrective time are described. Computational efficiency and results of the implementation are presented.","PeriodicalId":423639,"journal":{"name":"2015 IEEE Power & Energy Society General Meeting","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Maximizing transmission efficiency using the National Grid Electricity Balancing System\",\"authors\":\"Show-Kang Chang, C. Teoh, Ye Tao, Peng Peng, Han Li, J. Dyer, S. Barnett\",\"doi\":\"10.1109/PESGM.2015.7285821\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security constrained scheduling has been widely implemented in various power system operations and electricity markets. The practice of securing post-contingency flows preventively to long-term ratings has resulted in transmission network under-utilization. This paper presents a security constrained scheduling process that has been implemented in the National Grid Electricity Balancing System. The process is designed to exploit short-term ratings when determining pre-contingency and post-contingency actions thereby maximizing transmission efficiency. A functional overview is provided. The security criteria adopted, the actions used to secure contingencies, and the logic used to determine corrective time are described. Computational efficiency and results of the implementation are presented.\",\"PeriodicalId\":423639,\"journal\":{\"name\":\"2015 IEEE Power & Energy Society General Meeting\",\"volume\":\"5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-10-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 IEEE Power & Energy Society General Meeting\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PESGM.2015.7285821\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE Power & Energy Society General Meeting","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PESGM.2015.7285821","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Maximizing transmission efficiency using the National Grid Electricity Balancing System
Security constrained scheduling has been widely implemented in various power system operations and electricity markets. The practice of securing post-contingency flows preventively to long-term ratings has resulted in transmission network under-utilization. This paper presents a security constrained scheduling process that has been implemented in the National Grid Electricity Balancing System. The process is designed to exploit short-term ratings when determining pre-contingency and post-contingency actions thereby maximizing transmission efficiency. A functional overview is provided. The security criteria adopted, the actions used to secure contingencies, and the logic used to determine corrective time are described. Computational efficiency and results of the implementation are presented.