El Hombre y la Máquina ISSN: 0121-0777 maquina@uao.edu.co Universidad Autónoma de Occidente Colombia

Similar documents
Dyna ISSN: Universidad Nacional de Colombia Colombia

INGENIERíA. Scada System for a Power Electronics Laboratory. Sistema SCADA para un laboratorio de electrónica de potencia Y D E S A R R O L L O

Didactic training using a CNC lathe designed in a virtual environment

DIFFERENTIATIONS OF OBJECTS IN DIFFUSE DATABASES DIFERENCIACIONES DE OBJETOS EN BASES DE DATOS DIFUSAS

Chapter 5. System security and ancillary services

El Hombre y la Máquina ISSN: maquina@uao.edu.co Universidad Autónoma de Occidente Colombia

EE 1130 Freshman Eng. Design for Electrical and Computer Eng.

Wind Turbine Operation in Power Systems and Grid Connection Requirements

Curriculum Reform in Computing in Spain

FRCC Standards Handbook. FRCC Automatic Underfrequency Load Shedding Program. Revision Date: July 2003

Información Importante

Nuclear Power Plant Electrical Power Supply System Requirements

REVISTA INVESTIGACION OPERACIONAL VOL. 35, NO. 2, , 2014

School of Electrical, Electronic and Telecommunication Engineering, Universidad Industrial de Santander, Colombia.

A comparative study of two models for the seismic analysis of buildings

Generalised strategy for implementing the minimum fault reactance based fault location algorithm in real power distribution systems

FULL ELECTRICAL LNG PLANTS: HIGHEST AVAILABILITY AND ENERGY EFFICIENCY THROUGH OVERALL SYSTEM DESIGN

Susana Sanduvete-Chaves, Salvador Chacón-Moscoso, Milagrosa Sánchez- Martín y José Antonio Pérez-Gil ( )

Time Coordination by Time Adaptive Function Coordinación de Relevadores de Sobrecorriente con Funciones Adaptativas de Tiempo

A METHODOLOGY FOR KNOWLEDGE MODELING OF FAULT DIAGNOSIS BASED ON PETRI NETS

Inteligencia Artificial Representación del conocimiento a través de restricciones (continuación)

System Protection Schemes in Eastern Denmark

ISSN: ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 3, May 2013

UNIVERSIDAD FRANCISCO DE PAULA SANTANDER DOMINIOS DE COLISION, SEGMENTACION Y VLAN. Academia Local. Ing. José Martín Calixto Cely

REQUIREMENTS FOR A REAL-TIME RISK MONITORING TOOL TO REDUCE TRANSMISSION GRID NUCLEAR PLANT VULNERABILITIES

Práctica 1: PL 1a: Entorno de programación MathWorks: Simulink

Application of GA for Optimal Location of FACTS Devices for Steady State Voltage Stability Enhancement of Power System

Context: significant penetration of DG = increased risks for system security

Propiedades del esquema del Documento XML de envío:

Advanced Protection of Distribution Networks with Distributed Generators

Memory Allocation Technique for Segregated Free List Based on Genetic Algorithm

ORIGINAL REPRODUCTIBILIDAD DEL INSTRUMENTO HC THE HC INSTRUMENT REPRODUCIBILITY

KANBAN allocation in a serial suply chain

Test effort: A pre-conceptual-schema-based representation

Analysis of the Effect of Tap Changing Transformer on Performance of SVC

Heuristic algorithm for a flexible flow shop problem minimizing total weighted completion time (w j. ) constrains with proportional machines (q m

Dyna ISSN: Universidad Nacional de Colombia Colombia

Algoritmo de PRIM para la implementación de laberintos aleatorios en videojuegos

ENERGY LANDSCAPES IN CASTILLA Y LEON. Abstract: The development of renewable energy is a key factor in the changing landscape of Castilla y Leon

Analysis of Load Frequency Control Performance Assessment Criteria

Adaptación de MoProSoft para la producción de software en instituciones académicas

DYNA

2Azerbaijan Shahid Madani University. This paper is extracted from the M.Sc. Thesis

Numerical Research on Distributed Genetic Algorithm with Redundant

Red de Revistas Científicas de América Latina y el Caribe, España y Portugal. Universidad Autónoma del Estado de México

TRANSIENT STABILITY ANALYSIS AND ENHANCEMENT OF IEEE- 9 BUS SYSTEM

Secure Architectures for a Three-Stage Polling Place Electronic Voting System

Currículum. Lilia Mercedes Ladino Martínez. Date: Page 1 of 5

CHAPTER 3 SECURITY CONSTRAINED OPTIMAL SHORT-TERM HYDROTHERMAL SCHEDULING

Roberto Alcalde-Delgado, Miguel Á. Manzanedo-Del Campo, Lourdes Sáiz Bárcena, María Alonso-Manzanedo and Ricardo del Olmo-Martínez

A Parallel Processor for Distributed Genetic Algorithm with Redundant Binary Number

Alberta Reliability Standard Cyber Security Configuration Change Management and Vulnerability Assessments CIP-010-AB-1

A FIRST COURSE IN SOFTWARE ENGINEERING METHODS AND THEORY UN CURSO INICIAL SOBRE TEORÍA Y MÉTODOS DE LA INGENIERÍA DE SOFTWARE

Security Policy Review: Credible Event Management. Scope and Methodology Draft for Industry 2014

Monitoring, Management and Topological Display Device using wireless network managed clients

International Journal of Software and Web Sciences (IJSWS)

Optimizing the Cellular Network Planning Process for In-Building Coverage using Simulation

DIGITAL SIMULATION USED TO EVALUATE SELF-LEARNING APPLICATIONS AND ITS USERS José Maclovio Sautto Vallejo 1, Universidad Autóma de Guerrero

Distributed Generation and Power Quality Case Study

A Fast Computational Genetic Algorithm for Economic Load Dispatch

Encuesta de Expectativas Económicas al Panel de Analistas Privados

Phase Balancing of Distribution Systems Using a Heuristic Search Approach

Distribution Operations with High-penetration of Beyond the Meter Intermittent Renewables. Bob Yinger Southern California Edison April 15, 2014

Re-broadcasting of bibliographic catalogues in MARC-XML format

OPTIMAL DG PLACEMENT BASED ON STATIC SECURITY ASSESSMENT

Data Mining to Characterize Signatures of Impending System Events or Performance from PMU Measurements

Strategies to Reduce Defects in Floor and Wall Tiles; Application of Continuous Improvement Processes

Comparison of Major Domination Schemes for Diploid Binary Genetic Algorithms in Dynamic Environments

UNIVERSIDAD TÉCNICA DEL NORTE ARTÍCULO CIENTÍFICO (INGLÉS)

Article received on February 28, 2007; accepted on September 04, 2007

Agenda do Mini-Curso. Sérgio Yoshio Fujii. Ethan Boardman.

How To Write A Report On A Drug Company

APPLICATION OF ADVANCED SEARCH- METHODS FOR AUTOMOTIVE DATA-BUS SYSTEM SIGNAL INTEGRITY OPTIMIZATION

How To Write A Book On The Digital Age Of Science

Load Frequency Control in Three Area Network with Intelligent Controllers

A comparison of two parallel algorithms using predictive load balancing for video compression

A New Extension of the Exponential Distribution

A Fuzzy Based Solution for Improving Power Quality in Electric Railway Networks

Open Access Research on Application of Neural Network in Computer Network Security Evaluation. Shujuan Jin *

THE BALANCED SCORECARD AS AN ASSESSMENT TOOL FOR ADMINISTRATIVE MANAGEMENT

ISSCC 2003 / SESSION 13 / 40Gb/s COMMUNICATION ICS / PAPER 13.7

Hybrid processing of SCADA and synchronized phasor measurements for tracking network state

Apéndice C: Esquemas de la base de datos

INCREASING TOP ROLL SHAFTS RELIABILITY. J.J. Coronado*, S.A. Rodriguez*, A.L. Gómez*, J.S. Rivas*, C.A. Velez**

School of Electrical Engineering and Computer Science

An approach on the climate effects due to biomass burning aerosols

A Pragmatic Introduction to Chaos Theory for Engineers

Evolutionary SAT Solver (ESS)

SOFTWARE FOR THE OPTIMAL ALLOCATION OF EV CHARGERS INTO THE POWER DISTRIBUTION GRID

Una interfaz touch-screen de bajo costo para collage de imágenes

Neural Network and Genetic Algorithm Based Trading Systems. Donn S. Fishbein, MD, PhD Neuroquant.com

Programming Real-Time Motion Control Robot Prototype

ROLLING HORIZON PROCEDURES FOR THE SOLUTION OF AN OPTIMAL REPLACEMENT

ENTSO-E Network Code on Emergency and Restoration

data integration/exchange part 2: future technical and business opportunities

Requirements for Offshore Grid Connections. in the. Grid of TenneT TSO GmbH

EXPANSION OF THE ENERGY TRANSMISSION SYSTEM IN ARGENTINA IMPACT ON THE DISTRIBUTION BUSINESS NEED FOR REGULATORY CHANGES

The Stekloff Problem for Rotationally Invariant Metrics on the Ball

Genetic Algorithm Based Interconnection Network Topology Optimization Analysis

Transcription:

El Hombre y la Máquina ISSN: 0121-0777 maquina@uao.edu.co Universidad Autónoma de Occidente Colombia Díaz, F. F.; Caicedo, N. G.; Murcia, F. J.; Candelo, J. E. El Hombre y la Máquina, núm. 28, enero-junio, 2007, pp. 78-87 Universidad Autónoma de Occidente Cali, Colombia Available in: http://www.redalyc.org/articulo.oa?id=47802810 How to cite Complete issue More information about this article Journal's homepage in redalyc.org Scientific Information System Network of Scientific Journals from Latin America, the Caribbean, Spain and Portugal Non-profit academic project, developed under the open access initiative

Security System for High-Frequency Oscillations in Isolated Power Systems F. F. DÍAZ 1 N. G. CAICEDO 2 F. J. MURCIA 3 J. E. CANDELO 4 Resumen Este artículo presenta el diseño de un sistema de seguridad para oscilaciones bruscas de frecuencia para un sistema de potencia débilmente interconectado y que ocasionalmente opera aislado de un sistema de potencia fuertemente interconectado. Este sistema de seguridad debe operar en tiempo real y se basa en algoritmos de decisión que tienen como objetivo evaluar el riesgo de pérdida de estabilidad y determinar una combinación de disparo de unidades de generación y/o circuitos de carga. Para determinar las combinaciones de disparo, se considera la topología y punto de operación del sistema de potencia débilmente interconectado. Los algoritmos de decisión se desarrollaron combinando técnicas de inteligencia artificial con algoritmos secuenciales. La efectividad de las combinaciones de disparo obtenidas a través de los algoritmos de decisión, se 1 Electrical Engineer of Universidad del Valle, Cali, faferdi@gmail.com; 2 PhD, Professor of Universidad del Valle, GRALTA, glacadel@univalle.edu.co; 3 M.Sc, Technical Department Manager EPSA E.S.P Cali, Colombia. fjmurcia@epsa.com.co 4 Electrical Engineer and PhD Student of Universidad del Valle, johncandle@email.com. Fecha de recepción: Enero de 2007 Fecha de aceptación: Marzo de 2007

determinó con simulaciones en Dig Silent, donde se modeló un sistema de potencia débilmente interconectado cuando opera fortuitamente aislado de un sistema de transmisión regional. Palabras clave: Frecuencia, algoritmos de decisión, seguridad, operación aislada, potencia crítica de transmisión. Abstract This article presents the design of a security system for highfrequency oscillations in isolated and weakly interconnected power systems. The security system operates online and is based on two decision algorithms, which evaluate the system instability risk and determine the generating units and load circuits to be opened after a disturbance. In order to determine the generator tripping and load shedding combinations, the topology and the operating point of the weakly interconnected power system is considered. The decision algorithms were developed combining artificial intelligence and sequential algorithms techniques. The obtained tripping and shedding combination were simulated in DIG SILENT, where an isolated and weakly interconnected power system was modeled. Key words: Frequency oscillations, decision algorithm, security system, isolated operation, critical power transfer. 1. Introduction A sudden active power imbalance in a power system can be produced as a result of a topology change, for example, a line or generation outage [1]. This power imbalance affects the system frequency. In weakly interconnected power systems, the frequency stability is a first order problem due to the interconnected line outage produces high-frequency variations and being able to conduct the power system to a collapse when the frequency is over limited [2]. When a high-frequency deviation exists, the system can be conducted to an emergency condition, therefore is necessary to take corrective actions using the security scheme, which allows restarting the normal operating condition of the power system. The security scheme is implemented in the power system to avoid the instability, to minimize the risk of damage to generating plants, to diminish the possibility of cascade events as a consequence of the generation unit outage due to the high-frequency oscillations and to restore the system frequency close to a normal value. The security system presented in this article is based on two types of disconnections: Under-frequency load shedding UFLS: its function is to avoid under-frequency instability when the generation is reduced after a disturbance [3], [4], [5]. Over-frequency generation tripping OFGT: its function is to avoid over-frequency instability when the generation exceeds the load after a disturbance [6], [7], [8]. This centralized scheme allows tripping generation and shedding loads to maintain the power system stability of weakly interconnected power systems after an interconnected line outage. In this case is necessary: Monitoring the generation unit status, the interconnected line status and the load power, in order to evaluate the risk of reaching system instability, selecting the best shedding or tripping combination and sending the opening signals to the breakers for an emergency condition. In order to maintain system stability, frequency variation must be inside a secure operating range when an emergency condition is presented. 2. Critical power transfer The system frequency variation df/dt depends on the operating frequency, the power imbalance P T and the system inertia H [9], as shown in Equation (1). df f 0 P T (1) dt = 2H In Fig 1, a weakly interconnected power system is illustrated, the power imbalance between the generation and the load is reflected in the power transfer though the interconnected line, therefore the critical power transfer is the maximum power imbalance that a power system can support before reaching instability. It is considered that a system is unstable if the frequency varies in a divergent form outside of the operating limits. It means that the system cannot operate over the frequency limit fl over for an overfrequency condition and under the frequency limit fl under for an underfrequency condition. Figure 1. Simplified diagram of a weakly interconnected power system. In order to calculate the critical power transfer though the interconnected lines, the generating power is increased maintaining a constant load and the interconnected line is opened. This procedure is repeated until finding a power imbalance in

the lines and the limit fl over at generation nodes, for over-frequency conditions. Similarly for under-frequency conditions, the generating power is decreased until finding the power imbalance in lines and the limit fl under at generation nodes. 3. Security system From the topology and the operating conditions of the power system, the different load shedding and generation tripping combinations are evaluated and the best combination is chosen in order to maintain the system stability. These operations allow maintaining the frequency response inside a secure operating range. The security system monitors: The generated active power and the breaker status for each generating unit, the active power demand of the automatic load shedding circuits, the active power flow and the breaker status of the interconnected lines. From these variables and the operating constraints of the weakly interconected power system, the security function determines a load shedding and generation tripping combination in order to maintain the system stability after the interconected line outage. The load shedding or generation tripping determined by the decision algorithms guarantees four technical operating criteria: 1. Operation of the generating units inside an allowed range, after the units are tripped. 2. System stability after the load shedding and generation tripping combination is carried out. 3. Selectivity of the provided service to the consumers, according to the economic-technical criteria considered by the electric power companies. 4. Minimum load shedding for each under-frequency condition. A. Over-frequency condition The first criterion implies two conditions: Condition 1: Maximum operating power PG max PD (2) Con: PG max = Pn i (3) PG max Pn n PD Pg P T PD = (4) Maximum generating power for all the system units. Nominal power for the online units. Number of generating units. Power system demand Power generation for each online unit before generation are tripped Power transfer through the interconnected line. Condition 2: Minimum power generation. PG max PD (5) With: PG min = Pr i (6) PG min : Minimum generating power for all the system units. Pr: Minimum operating power for the online unit i. The second criterion implies two conditions: Condition 1: This condition guarantees that the accelerating power after tripping generators does not conduct to overfrequency instability. P a P CRS (7) With: Pg i -P T

P a = P d P T P a : Accelerating power after tripping generators. P d : Total tripped power Critical power transfer P CRB : for over-frequency condition. (8) Condition 2: This condition guarantees that the accelerating power after tripping generators does not conduct to under-frequency instability. Pa P CRB (9) P a : Accelerating power after tripping generators. P CRB : Critical power transfer for under-frequency condition. The technical criteria 3 and 4 are not applied for over-frequency conditions. B. Under-frequency condition The first criterion implies two conditions: Condition 1: PG max PD (10) With: n PG = Pn max i=1 i n Pg i + P -P T (11) PD= i=1 e (12) P e Total power shedding for the considered load combination. Condition 2: This condition is similar to the over-frequency condition. The second criterion implies two conditions. Condition 1: This condition guarantees that after shedding the load circuits, the system reaches no over-frequency condition. P e P max (13) With: P max = P T + P max (14) P max Maximum tripped power. Condition 2: This condition guarantees that after shedding the load circuits, the system reaches no under-frequency condition. P e P min (15) With: P md = P T P min (16) P min Minimum tripped power. In the third criterion, the electric company must define the priority in providing the service to the power demand. This priority is represented by means of a vector P, whose elements contain the loads that are part of the automatic load shedding; the position of each element defines the priority in the provided service. For example, if the electric power company defines the vector P as Equation (17), then the load shedding circuits are C1, C2, C3, C4 and C5 and the load shedding orders in an emergency condition are C5, C4, C1 C3 and C2. P= [ C5 C4 C1 C3 C2] (17) In the fourth criterion, the algorithm searches for a load shedding combination, whose total power

is approximately equal to the load shed power, as defined in Equation (18) P shedding = P T - P CRB (18) 4. Determination of the tripping and shedding combinations The selection of a load shedding or generation tripping combination is carried out using criteria to conduct the searching among the possible solutions, which is determined by the topology and the operating point. Besides, the shedding or tripping combination must comply with the operating criteria. A Load shedding algorithm Due to the searching space size of a load shedding combination depends on the amount of the connected distribution circuits to the power system, a genetic algorithm is used as a technique oriented to the search of a shedding combination that complies with the established operating constraints in the technical operating criteria. The genetic algorithm is based on two basic ideas: The representation of the combination by means of binary strings and the execution of an operator created from the genetic laws. Using the representation by binary strings, the size of the searching space depends on the amount of bits used to represent the shedding combination., if a binary string of L bits is used, the size of the searching space is 2 L, it correspond geometrically to a hypercube of L dimensions. The convergence of the genetic algorithms for this representation has been tested in [10]. The representation of the shedding combination is carried out similar to the chromosomal information in biological systems. Therefore, each gene represents the breaker status of a load shedding circuit and each chromosome corresponds to the shedding combination. In general, the genetic algorithm consists of three stages. Determination of the population in a systematic form. Systematic crossover of genetic information Constraints verification. 1) Determination of the population in a systematic form: Searching for the load shedding combination that complies with the equation (19). P e P shedding (19) Where P e Total active power of the selected load shedding combination. P shedding Load shed active power 2) Systematic crossover of genetic information: This process allows to generate load shedding combinations for all the load breakers, therefore, two initial chromosomes are generated, Father 1 and Father 2, which are characterized by: Father 1: To characterize this chromosome, a binary number of n bits are generated, where n represents the size of the population and for each gene a bit of the binary number is assigned. Father 2: the genes of this chromosome are opposed to the genes of chromosome Father 1. Once the chromosomes are characterized, a systematic interchange with genetic information is carried out in order to form the chromosomes Son 1 and Son 2, which represent the possible load shedding combinations. Fig. 2 shows this process.

Figure 2. Systematic crossover of genetic information 3) Constraints verification: It verifies that one of the chromosomes Son complies with the operating constraints. For example, if the population is characterized by the vector V= [X1 X2 X3 X4 X5] and the chromosome Son is characterized by the vector [0 1 1 0 1], it means that the load shedding combination is [X2 X3 X5]. If no Son complies with the criterion, the algorithm creates new Fathers and returns to the second stage. B Generation tripping algorithm As a searching strategy, the generation tripping combination is generated in a systematic form, according to the breaker status and active power of each generating unit, then a generation tripping combination is searched, which complies with the technical operating criteria; if a solution exists, the searching strategy is able to find it, but if the space is large enough, the required time to find it can be long enough. Therefore, the searching strategy has a fast time of response in small power systems. C Integrated Algorithm The security system for high-frequency oscillations requires an integrat- Figure 3. Flow chart of the load shedding algorithm

Figure 4. Flow chart of the generation tripping algorithm Figure 5. Flow chart of the integrated algorithm ed algorithm for the decision algorithm operation according to the power flow direction through the interconnected lines. Figure 5. shows the flow chart of the integrated algorithm. 5. Validation of the decision algorithms The validation of the decision algorithm was carried out in a small power system interconnected to a large power system in radial distribution. Therefore, this system is appropriated to validate the decision algorithms for the proposed security system. A simplified single-wire diagram representation of the system is shown in Figure 6. This power system has two 13 MW generators and two 24 MW

generators. Maximum load and generation were assumed in order to validate the decision algorithm. The effectiveness of the proposed security scheme is evaluated by means of comparing the power system frequency with and without load shedding and generation tripping operation. Table 1 shows the operating conditions of the power system before the interconnected lines outages. Fig. 7 shows the simulation results. Characteristic 1 shows how the system becomes unstable in a period less than 1.5 seconds, when no generators are tripped. Characteristic 2 shows the system stability when the determined generating units by the decision algorithm are tripped, for this operating condition units G1 and G4 are tripped, after the interconnected line outage. Tables 2 and 3 show other operating conditions before the interconnected line outages. Fig. 8 presents the simulation results. Characteristic 1 shows how the system becomes unstable during a period less than 2 seconds when no generators are tripped. Characteristic 2 shows how the system becomes unstable during a period less than 1 second when no load shedding is carried out. The decision algorithms for this condition obtained that units G1 and G3 must be tripped, besides loads C1, C2 and C3 must be shed in order to obtain the balance between the power generation and the power demand when an interconnected lines outage is presented. Due to the considered power system only has four generating units, there are a maximum number of 14 possible tripping combinations for an over-frequency condition and it means that there is not always possible to find a tripping combination to maintain system stability for an over-frequency condition, because it can be tripped more Figure 6. Simplified single-wire diagram of a weakly interconnected power system Table 1. Operating conditions for the case OFGT System conditions G1 G2 G3 G4 L1 L2 LC1 LC2 Initial State of the Breakers 1 1 1 1 1 1 1 1 Active power [MW] 12 11.5 23 23.4 18 18.2 16.2 17.5 Reactive power [MVAR] 0.4 0.4 0.5 0.5 0.1 0.2 1.35 0.11 Power flow direction (-) (-) (-) (-) (+) (+) (+) (+) Table 2. Operating conditions for the case UFLS-OFGT System conditions G1 G2 G3 G4 L1 L2 LC1 LC2 Initial State of the Breakers 1 1 0 1 1 1 1 1 Active power [MW] 10 10 0 20.3 7.4 7.6 11.65 13.65 Reactive power [MVAR] 0.13 0.12-0.11 0.09 0.11 0.3 0.25 Power flow direction (-) (-) - (-) (-) (-) (+) (+) Table 3. Operating conditions for the case UFLS-OFGT Circuit C1 C2 C3 C4 C5 C14 SP IND Active Power [MW] 1.61 2.58 0.80 2.68 0.89 0.19 2.66 1.57 Circuit C6 C7 C8 C9 C10 C11 C12 C13 Active power [MW] 2.5 0.25 2.78 0.19 0.74 2.72 0.82 2.3

Figure 7. Frequency response on time for the isolated system case OFGT Figure 8. Frequency response on time for the isolated system case OFGT - UFLS than the required power and reaching under-frequency instability. Therefore it is not necessary to trip generating units to avoid over-fre- quency instability and to shed load circuits to avoid under-frequency instability. The load shedding and generation tripping obtained by the

decision algorithm are effective for an over-frequency condition. 6. Conclusions The security system for abrupt frequency oscillation in isolated power systems is characterized by: Online operation. Being adaptable for different operating conditions of the power system. Guarantying the frequency stability of the weakly interconnected power system. Using optimization criteria for load shedding. Recovering frequency of the weakly interconnected power system when it operates isolated from a stronger interconnected power. The methodology conception for the OFGT and UFLS function design is flexible, generic and includes the operating system constrains. The operating constraints are used independently of the searching process; therefore they can be eliminated or added. This allows the design to be adaptable to other weakly interconnected power systems. Bibliography [1] P. Kundur, Power System Stability and Control, Mc Graw-Hill, 1994. [2] J. Bucciero, and M. Terbrueggen Interconnected Power System Dynamics Tutorial: Dynamics of Interconnected Power Systems Tutorial, Electric Power Reasearch Institute, EPRI, 3rd Ed, Jan 1998. [3] Ch. Concordia; L.Fink.; G. Poullikkns. Load Shedding on an Isolated System.ʼʼ IEEE Trans. Power Systems.Vol. 10, No. 3. Aug. 1995. [4] A. Elices, L. Rouco, Análisis Fundamental del Impacto de la Reserva Primaria en Sistemas Eléctricos Aislados. Actas de las Séptimas Jornadas Hispano-Lusas de Ingeniería Eléctrica, Leganés, 4-6 Julio 2001, Volumen II, páginas 335-340. [5] Haibo Y., V. Vittal, and Z. Yang, Selfhealing in power systems: an approach using islanding and rate of frequency decline-based load shedding, IEEE Transactions on Power Systems, vol. 18, pp. 174-81, 2003. [6] Takahashi, K. Matsudawa, Fast generation shedding equipment based on the observation of swings of generators IEEE Transactions on Power Systems, Vol. 3, No. 2, May 1988. [7] Colombia. Esquema de Rechazo Automático de Generación - RAG para la subestación Chivor. Dirección Planeación De La Operación. Documento ISA UENCND 180-03. Medellín, Octubre 21 de 2003 [8] Jarquin, E. Mora, E. Godoy, J. León. Reliability Analysis for a Generation Shedding Scheme on the CFE Main Transmission Network. In 29th annual western protective relay conference spokane, washington october 22-24, 2002 [9] J. J. Grainger, W. D. Stevenson. Análisis de Sistemas de Potencia. Ed. McGraw-Hill. 1998. [10] M. Mitchell, An Introduction to Genetic Algorithms A Bradford Book,The MIT Press, 1998.