Abstract

Since the increasing integration of inverter-based resources leads to a transition to inverter-interfaced power systems, the additional physical limits of inverters raise concerns for secure operation, which needs to be not only ensured but also enhanced. This study, therefore, investigates how to geometrically ensure and enlarge the security region of single-inverter-interfaced power systems, followed by establishing the inverter-security-constrained optimal power flow for multi-inverter-interfaced power systems. Therein, the inverter over-current and over-modulation/over-voltage limits are visualized by projecting cones into circles, ellipses, and a quadratic curve in different control variable spaces. First, for single-inverter-interfaced power systems, this study proposes a closed-form sufficient condition that guarantees the security region existence under different control modes. Then, this study quantifies and enlarges the security region size by leveraging the counter-intuitive complementary impacts of inverter parameters and the opposite impacts of system parameters. As an extension, an inverter-security-constrained optimal power flow using second-order cone programming relaxation is formulated for multi-inverter-interfaced power systems, in which this study proposes a closed-form sufficient condition to ensure a non-empty and non-decreasing security region. Numerical results of a single-inverter-interfaced power system and a modified IEEE 14 bus multi-inverter-interfaced power system verify the proposed security region properties.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.