Two-step spectral clustering controlled islanding algorithm

Lei Ding, Francisco M. Gonzalez-Longatt, Peter Wall, Vladimir Terzija

Research output: Contribution to journalArticlepeer-review

233 Citations (Scopus)

Abstract

Controlled islanding is an active and effective way of avoiding catastrophic wide area blackouts. It is usually considered as a constrained combinatorial optimization problem. However, the combinatorial explosion of the solution space that occurs for large power systems increases the complexity of solving it. This paper proposes a two-step controlled islanding algorithm that uses spectral clustering to find a suitable islanding solution for preventing the initiation of wide area blackouts by un-damped electromechanical oscillations. The objective function used in this controlled islanding algorithm is the minimal power-flow disruption. The sole constraint applied to this solution is related to generator coherency. In the first step of the algorithm, the generator nodes are grouped using normalized spectral clustering, based on their dynamic models, to produce groups of coherent generators. In the second step of the algorithm, the islanding solution that provides the minimum power-flow disruption while satisfying the constraint of coherent generator groups is determined by grouping all nodes using constrained spectral clustering. Simulation results, obtained using the IEEE 9-, 39-, and 118-bus test systems, show that the proposed algorithm is computationally efficient when solving the controlled islanding problem, particularly in the case of a large power system.

Original languageEnglish
Article number6213172
Pages (from-to)75-84
Number of pages10
JournalIEEE Transactions on Power Systems
Volume28
Issue number1
DOIs
Publication statusPublished - 2013
Externally publishedYes

Keywords

  • Constrained spectral clustering
  • Controlled islanding
  • Graph theory
  • Normalized spectral clustering

Fingerprint

Dive into the research topics of 'Two-step spectral clustering controlled islanding algorithm'. Together they form a unique fingerprint.

Cite this