Professional Documents
Culture Documents
I. I NTRODUCTION
With deregulation of the power industry currently taking
place worldwide, Power System State Estimation (PSSE) has
gained an even greater importance as a real-time monitoring
tool. PSSE is widely recognized as the basic monitoring tool of
the Independent System Operator (ISO) in the new decentralized and competitive environment. A relevant factor for PSSE
success is its inherent ability for detecting and identifying bad
data, which imparts robustness and reliability to the real-time
modeling process. In order to perform both state estimation
and bad data processing, PSSE traditionally relies on power
system models in which the network is represented at the busbranch level [1].
Assuming that the network parameters are known, there
are two main sources of bad data that may occur in power
system real-time modeling: a) Errors on analog measurements,
and b) Errors on digital data reporting the status of switches
and circuit-breakers. The bus-branch model has proved to be
adequate in the former case, since it allows the computation of
estimation residuals for the measured quantities. Residuals are
oating-point quantities easily characterized from the statistical standpoint. Therefore, they naturally qualify for statistical
tests that are usually effective for analog bad data processing
[1], [2].
In the case of digital bad data, however, the bus-branch
model does not provide means for the explicit representation
E. M. Loureno is with Federal University of Paran, Curitiba, Brazil. Email: elizete@eletrica.ufpr.br
A. Simes Costa is with Federal University of Santa Catarina, Florianpolis,
Brazil. E-mail: simoes@labspot.ufsc.br
K. A. Clements is with Worcester Polytechnic Institute, MA, USA. E-mail:
clements@ece.wpi.edu
is dramatically reduced.
In addition to enhancing hypothesis testing, topology error
identi cation is also improved by partitioning the modeled
switching devices into suspect and true subsets. To ensure
that all devices with wrong status are included in the suspect
set, we propose a geometric test similar to the one proposed
in [13] which provides conclusive results with a very low
computational cost. Finally, to avoid observability traps during
the hypothesis testing of the various circuit breaker con gurations, we resort to two strategies: a priori information on
the states are used to get around observability problems in the
preliminary steps, and criticality analysis [11] is included as
an aiding tool to avoid matrix singularity due to the abovementioned switching branch partition.
This paper is organized as follows. The required background
to introduce the proposed topology error identi cation method
is reviewed in Section II. The formulation of Generalized State
Estimation as a constrained least-squares problem with a priori
information is presented in Section III, along with the de nition of normalized Lagrange multipliers. Section IV describes
the proposed tools to enhance topology error identi cation
via hypothesis testing. Bayesian-based hypothesis testing and
the basic algorithm of the proposed method are described in
Section V. Section VI discusses some practical issues related
to the method's implementation. Finally, simulation results
illustrating the application of the proposed approach and the
concluding remarks are presented in Section VII and VIII.
x)T P
(^
x
(1)
x)
where x
^ is the extended state variable vector and P is the
covariance matrix of the a priori states. In the absence of
better information about a priori values for bus voltage angles
, one can assume that they are equal to zero radian, i.e.
x i = 0 rad: To de ne the corresponding covariance values
in matrix P , we assume that the x i 's are uncorrelated and
uniformly distributed in the interval [ lim ; lim ], where lim
establishes an upper bound for values under steady-state
stable conditions (for instance, lim = =2 rad): A similar
procedure can be adopted for the remaining state variables.
Another important consequence of employing a priori information is that it circumvents the need of de ning multiple
reference angles when islanding occurs during topology error
processing, as discussed in Section VI-A.
II. BACKGROUND
A. Embedding Switching Branches in State Estimation
The representation of switching branches in the network
model and its impact on state estimation [8], [9] leads to the
extension of power system modeling down to the substation
level. In this approach, the switching branches are represented
in the network model by extending the state vector so as to
include the power ows through these devices as new state
variables, in addition to the conventional states given by the
vector of nodal voltages. Available switching branch status
information are included in the estimation problem as pseudomeasurements or equality constraints. If a switching branch
between nodes i and j is closed, then the voltage drop and
the voltage angle difference across this device are zero, i.e.
vi vj = 0 and i
j = 0: On the other hand, if the
circuit breaker is open then the active and reactive power ows
through it are zero, i.e. pij = 0 and qij = 0.
In this paper, the extended state estimation is treated as an
optimization problem as proposed in [12] and the switching
branches status information are included into the problem
as equality constraints, which will be referred to as operational constraints (ho ( )): Another group of information or
constraints considered in the extended state estimation are
the structural constraints (hs ( )), which are related to zero
injections at bus sections and to reference bus angles.
M inimize
Subject to
1
1 T
1
x
2 rm Rm rm + 2 (^
rm = zm hm (^
x)
(^
x
x)
(2)
hs (^
x) = 0
ho (^
x) = 0
x)T P
R
H
z + h(^
x) = 0
(3)
(4)
(^
x
x) = 0
where:
z=
zm
H=
@h(^
x)
=
@x
^
(5)
hTm (^
x) hTs (^
x) hTo (^
x)
h(^
x) =
=
T
m
T
s
@hm (^
x)
@x
^
T
o
T
(6)
@hs (^
x)
@x
^
(7)
T
@ho (^
x)
@x
^
(8)
HT
R
x
^
P 1 (x
x
^k )
k
z h(^
x )
(10)
. Let x
~ be the state estimate error
x
~=x
^
(12)
CT
V
P
H
HT
R
(14)
=p
vii
(16)
where vii is the i-th diagonal element of the Lagrange multiplier covariance matrix, V:
In the generalized topological analysis [11], existing graphtheoretic observability algorithms are extended to deal with
networks modeled at the substation level. The extended approach seeks an observable spanning tree in a generalized
measurement graph. This graph is built taking into account
the switching branch ows as new state variables. A feature
of this topological method is its ability to simultaneously
analyze system observability and measurement/constraint criticality. The latter provides subsidies for bad data and topology
error identi cation in generalized state estimation, which are
exploited in this paper.
The following extended de nitions [11] will be used in
further sections of this paper:
critical data: a measurement/constraint is said to be
critical if its suppression from the data set makes the
system unobservable;
critical k-tuple set
: data subset composed by k
measurements or constraints such that the elimination of
any of its members makes all remaining k 1 elements
critical. For k = 2; we have the familiar case of critical
pairs [2].
If a single member of a critical set is contaminated by
a gross error, then all Lagrange multipliers corresponding to
the members of are affected by the error. In particular, the
corresponding normalized Lagrange multipliers will have the
same absolute value [11].
C. Geometric Approach
To ensure topology error detectability, we will stick to our
previous assumption that the network under study has been
enlarged to avoid the occurrence of critical constraints. As a
consequence, covariance matrix V contains no null columns
[13]. For the time being, we also consider that no critical sets
occur (this assumption will be re-examined at the end of this
subsection). Let us partition V into columns corresponding to
suspect (S) and true (T ) switching branches:
V =
VS
(17)
VT
If all data are perfect except for those in set S; the error
vector is partitioned according to V as:
=
T
S
(18)
=V
By substituting Eqs. (17) and (18) into (19), we obtain:
= VS
(20)
Equation (20) shows that if all erroneously modeled information are included in the suspect set S, then the Lagrange
multiplier vector will lie on the column space of VS . Therefore,
it is possible to check if set S in fact contains the erroneous
information by testing whether lies on the column space of
VS or not: For computational reasons, we choose to perform
the test on R1=2 and R1=2 VS , instead of and VS :
Vector R1=2
vectors:
(21)
(23)
where:
S
= VST R
; VS S = VST RVS
(24)
VS
VC
T
S
T
S
+ VC
T
C
(25)
as
C
(26)
+ VS A
= VS (
+A
C)
= VS ~
(28)
(29)
where P (Hi ) is the a priori probability of hypothesis i, provided as input data, and f (zjHi ) is the conditional probability
density function. Assuming that the measurement error and
the state vector x; are normally distributed, then f (zjHi ) is
also normal and given by [14], [15]:
f (zjHi ) = 2
m
2
jVi j
1
2
ef
1
2 (z
H x)T Vi
(z H x)g
(30)
The topology error process is nally concluded by identifying the alternative hypothesis corresponding to the largest
conditional probability as the correct con guration for the
suspect set of switching branches.
C. Topology Error Identi cation Algorithm
The proposed methodology considers that topology error
identi cation is performed through generalized state estimation carried out for the current status con guration of the
anomaly zone. Prior to the state estimation itself, system observability and data criticality are investigated by performing
generalized topological observability/criticality analysis.
The proposed identi cation process comprises two main
steps: suspect switching branch selection and hypothesis testing identi cation. The following algorithm describes the topology error identi cation steps.
0. Perform generalized criticality analysis and determine
critical data and critical sets.
1. De ne a initial threshold t and the tolerance cos ;
2. Compute Lagrange multipliers for operational constraints, o ; and the corresponding normalized values,
N
N
N
o : Let o_ max = max
o;i ;
N
3. If o_ max
t ; stop. Otherwise, a topology error has
occurred. Proceed to Step 4;
4. (Suspect switching branch selection) Select as suspect
all switching branches for which N
o;i > t ;
5. Form VS from the linearly independent columns of V
associated to the suspect switching branches by using
the criticality analysis results;
6. Compute cos using Eq. (23) and apply the cosine test:
If cos > (1
cos ) ; then all devices with wrong
status are included in the suspect set, proceed to
Step 7.
If cos < (1
cos ), decrease t and return to Step
4.
7. (Identi cation step) Compute a posteriori conditional
probabilities using Eq. (29) and identify the status
combination associated to the hypothesis of largest probability as the correct con guration. (END)
VI. P RACTICAL I SSUES
In this section, we address some practical issues that must
be dealt with when topology error identi cation is performed
at the bus section level.
is formally shown that, for the single bad data case, the
maximum normalized Lagrange multiplier points out the gross
measurement, exactly as the maximum normalized residual
also does.
Preliminary tests applying the proposed problem formulation to process only gross analog measurements indicate that,
assuming adequate redundancy levels, the entries of m are the
most affected by the errors (recall that, in the case of topology
errors, that conclusion applies to subvector o ). Therefore, it is
feasible to extend the remaining steps of the method to allow
the identi cation of multiple gross measurements. However,
more research effort is needed to investigate the simultaneous
occurrence of topology errors and gross measurements. The
same applies to multiple bad data involving leverage points
[21].
VII. S IMULATION R ESULTS
The IEEE 24-bus test-system has been used to assess the
performance of the proposed topology error identi cation
method, which has been implemented considering a linear
model for the network. The test system data and the description of its substations are given in reference [22]. As
discussed in Section VI-B, topology error identi cation is
conducted at the substation level, that is, only the zoomed
area is considered. Therefore, in what follows attention will
be focussed on substations (STs) corresponding to buses 14,
15, 16 and 24 of the original system presented in [22].
Different types of tests have been performed on the selected
substations, considering the various forms of topology error:
Exclusion Error, when a transmission line which is actually in service is inadvertently excluded in the system
model. (Notice that this kind of error may be due to
incorrectly reported status of either a single or two or
more switching branches);
Inclusion Error, when a transmission line is erroneously
included in the state estimation model;
By-Pass Error, when an incorrect by-pass of the substation is reported to the system model.
The simulation results are separated into two groups, A and
B. Figures 1 and 2 show the substation level model of the
anomaly region, i.e. the zoomed area for Cases A and B,
respectively. It is assumed that the ow at both ends of all
transmission lines and the injection at each bus are monitored.
Measurements have been simulated as noisy, with covariances
around 2% of the true values. Structural and operational
constraints are modeled as described in subsection II-A, and
a priori values are considered as described in subsection II-B.
The actual status of the switching branches and those among
them for which the power ow is monitored are represented
in Figures 1 and 2.
The simulated topology errors for Cases A and B are
described in Table I. The second and third columns of the
table show the error type and the switching branches (SBs)
involved in each test. The correct and simulated status for
those devices are presented in the two remaining columns of
Table I, where 0 and 1 represents open and closed status,
respectively.
ST 15
ST 24
TL
B11
B10
B1
B4
B7
B2
B5
B8
B3
B6
B9
24
Closed switching
branch
15
Load
to bus 16
to bus 21
to bus 3
Fig. 1.
Open switching
branch
ST 16
ST 14
B8
B5
B2
B11
TL
B1
B3
to bus 15
B4
14
B6
B9
B12
B77
B10
B13
Open switching
branch
Closed switching
branch
16
to bus 11
Flow measurement
to bus 17
Load
to bus 19
Fig. 2.
Case
A1
Error
Type
Exclusion (Single)
A2
Inclusion
B1
By-Pass
B2
Exclusion (Multiple)
SB
Correct
B6
B1
B7
B10
B8
B9
B10
B1
B5
1
0
0
0
1
0
1
1
1
AND
Status
Simulated
0
1
1
1
0
1
0
0
0
TABLE II
TABLE V
Critical Sets:
i = f:g
= 0g; 2 =fP8 =0; fB2 = 0g;
3 =fP11 =0; fB6 = 0g
1 =fzP6 ; fB7
TABLE III
S USPECT S ET S ELECTION R ESULTS FOR C ASE A1
Suspect Op. Constr.
cos
t = 3:0
fB6 = 0
0.99999
Suspect
Set
B6
P (H1 jz)
1.00000
H1
f1g
Critical Sets:
1 =fzP4 ; P18 =0;
B7 =0;
B1 =0;
= f:g
B3 =0;
B8 =0;
B10 =0g
= 0; fB5 = 0g; 3 =fzf
B11
; fB11 = 0g
Suspect
Set
B10 B1
B7
B3
B9
B6
B8
P (Hi jz)
0,99996
0,00001
0,00001
0,00001
B. Case B
This subsection presents the results for Cases B1 and B2,
related to Figure 2.
1) By-Pass Error: In Case B1 the status of switching
branches B8 ; B9 and B10 are erroneously modeled as described in Table I. As a consequence, a wrong by-pass is
considered in substation 16. Critical operational constraints
are avoided by extending the zoomed area, as previously
discussed.
Table VII shows the results regarding the selection of
suspect switching branches. The cosine value, also shown in
the table, again con rms that all erroneous constraints have
been selected.
TABLE VII
S USPECT S ET S ELECTION R ESULTS FOR C ASE B1
Suspect Operational Constraints
cos
t = 3:0
fB10 = 0
f B8 = 0
0.99999
B9 = 0
fB12 = 0
f B6 = 0
Suspect
Set
B10
B8
B9
B12
B6
The results obtained with the application of hypothesis testing indicate that conditional probability values are practically
zero for all alternative hypothesis except for hypothesis H6 :{1
1 0 0 0}, whose probability value is found to be 1.0. Following
the algorithm, the suspect status combination associated to
hypothesis H6 is assumed as the correct con guration. This
leads to the identi cation of the by-pass error involving B8 ;
B9 and B10 .
2) Exclusion Error - Multiple Breaker: In Case B2 the
status of switching branches B1 and B5 are reported as
open while they are actually closed, erroneously excluding
the transmission line TL represented in Figure 2. The operational constraints selected as suspect with the rst criterion
( t = 3:0) are shown in the rst column of Table VIII. The
corresponding cosine value is shown in the second column
of the table. The cosine test (cos < 1
cos ) is clearly not
satis ed, which means that not all erroneous constraints have
been properly selected. Following the algorithm in subsection
V-C, threshold t is reduced and the process is repeated until
the cosine-test is satis ed. This is achieved when t =0:5:
The third and fourth column of Table VIII show the suspect
operational constraints and the cosine value in this case. The
corresponding suspect switching branches are shown in the
last column of the table.
TABLE VIII
S USPECT S ET S ELECTION R ESULTS FOR C ASE B2
Suspect Operational Constraints
cos
t =0:5
fB12 = 0
fB12 = 0
f B9 = 0
0.63752
fB9 = 0
f B5 = 0
f B1 = 0
t =3:0
cos
0.99999
Suspect
SB
B12
B9
B5
B1
Error Type
By-Pass
Exclusion
Hypotheses
H6 :{1 1 0 0 0}
H8 :{0 0 1 1}
P (Hi jz)
1.0000
1.0000
nsb
1
4
5
7
tBayes = tre
0:542
0:190
0:139
0:120
est
VIII. C ONCLUSIONS
This paper presents a methodology for detecting and identifying topology errors in generalized state estimation. It is
centered on the use of Bayesian-based hypothesis testing,
which provides conditional probabilities for hypothesis made
about the status of suspect devices. To enhance both the
performance and the ef ciency of the proposed approach, two
additional procedures are incorporated in the identi cation
process. A geometric test ensures that all devices with wrong
status are included in the suspect set. In addition, criticality
analysis allows that topology error identi cation proceeds even
when the error involves members of critical sets.
The proposed methodology has been tested by using the
IEEE 24-bus test system. Different types of topology errors
involving substations with different layouts have been considered. The results con rm the ef ciency of the suspect set
determination and the robustness of the hypothesis testing
identi cation. The method has been able to provide correct
answers even when measurement redundancy is low. In those
cases, critical constraints and critical sets tend to degrade the
normalized Lagrange multipliers sensitivity, and consequently
the identi cation process is subject to more severe conditions.
ACKNOWLEDGMENTS
Kevin A. Clements acknowledges the support from National Science
Foundation, under Grant ECS-9810288. Antonio Simes Costa thanks the
support of the Brazilian National Research Council (CNPq). Elizete Loureno
acknowledges the nancial support of the Brazilian Agency for the Improvement of High Education (CAPES).
R EFERENCES
[1] A. Bose and K. A. Clements. Real Time Modeling of Power Networks.
Proceedings of the IEEE, 75(12):16071622, Dec. 1986.
[2] L. Mili, T. Van Cutsem, and M. Ribbens-Pavella. Hypothesis Testing
Identi cation : A New Method for Bad Data Analysis in Power System
State Estimation. IEEE Trans. on Power Apparatus and Systems,
103(11):32393252, Nov. 1984.
10
Brazil. Her research interests are in the area of computer methods for
power systems operations.
Antonio Simes Costa (Senior Member, IEEE) received his degree
in Electrical Engineering from Federal University of Par, Brazil, in
1973, and M.Sc. and Ph.D. degrees in Electrical Engineering from
Federal University of Santa Catarina (UFSC), Brazil, in 1975, and
University of Waterloo, Canada, in 1981, respectively. Since 1975 he
is with UFSC's Department of Electrical Engineering . His research
interests are concerned with computer methods for power systems
operation and control.
Kevin A. Clements (Fellow, IEEE) received the B.S. degree in
Electrical Engineering from Manhattan College, Bronx, NY, in 1963,
and the M.S. and Ph.D. degrees from the Polytechnic Institute of
Brooklyn, NY, in 1967 and 1970, respectively. In 1970 he joined
the Electrical and Computer Engineering Department at Worcester
Polytechnic Institute, Worcester, MA, where he is presently a Professor. His research interests include monitoring and control of electric
power systems, power system stability, and methods for large-scale
systems.