A New Iterative Approach to the Corrective Security-Constrained Optimal Power Flow Problem

被引:88
作者
Capitanescu, Florin [1 ]
Wehenkel, Louis [1 ]
机构
[1] Univ Liege, Inst Montefiore, Dept Elect Engn & Comp Sci, B-4000 Liege, Belgium
关键词
Benders decomposition; contingency filtering; optimal power flow; security-constrained optimal power flow;
D O I
10.1109/TPWRS.2008.2002175
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper deals with techniques to solve the corrective security-constrained optimal power flow (CSCOPF) problem. To this end, we propose a new iterative approach that comprises four modules: a CSCOPF which considers only a subset of potentially binding contingencies among the postulated contingencies, a (steady-state) security analysis (SSSA), a contingency filtering (CF) technique, and an OPF variant to check post-contingency state feasibility when taking into account post-contingency corrective actions. We compare performances of our approach and its possible variants with classical CSCOPF approaches such as the direct approach and Benders decomposition (BD), on three systems of 60, 118, and 1203 buses.
引用
收藏
页码:1533 / 1541
页数:9
相关论文
共 20 条
[11]  
*IEEE, 1996, IEEE118
[12]   Available transfer capability calculation with static security constraints [J].
Li, WX ;
Shaaban, M ;
Yan, Z ;
Ni, YX ;
Wu, FF .
2003 IEEE POWER ENGINEERING SOCIETY GENERAL MEETING, VOLS 1-4, CONFERENCE PROCEEDINGS, 2003, :306-310
[13]  
MARTIN FP, 1906, ARCH WISS PRAKT TIER, V32, P1
[14]   Challenges to optimal power flow [J].
Momoh, JA ;
Koessler, RJ ;
Bond, MS ;
Stott, B ;
Sun, D ;
Papalexopoulos, A ;
Ristanovic, P .
IEEE TRANSACTIONS ON POWER SYSTEMS, 1997, 12 (01) :444-454
[15]   SECURITY-CONSTRAINED OPTIMAL POWER FLOW WITH POST-CONTINGENCY CORRECTIVE RESCHEDULING [J].
MONTICELLI, A ;
PEREIRA, MVF ;
GRANVILLE, S .
IEEE TRANSACTIONS ON POWER SYSTEMS, 1987, 2 (01) :175-182
[16]   Preventive and corrective open access system dispatch based on the voltage stability security assessment and diagnosis [J].
Schlueter, RA ;
Liu, S ;
Alemadi, N .
ELECTRIC POWER SYSTEMS RESEARCH, 2001, 60 (01) :17-28
[17]  
Shahidehopour M., 2005, IEEE Power & Energy Magazine, V3, P20, DOI 10.1109/MPAE.2005.1405865
[18]  
Shahidehpour S.M., 1996, IEEE TUTORIAL OPTIMA
[19]   SECURITY ANALYSIS AND OPTIMIZATION [J].
STOTT, B ;
ALSAC, O ;
MONTICELLI, AJ .
PROCEEDINGS OF THE IEEE, 1987, 75 (12) :1623-1644
[20]   A method for computing the value of corrective security [J].
Strbac, G ;
Ahmed, S ;
Kirschen, D ;
Allan, R .
IEEE TRANSACTIONS ON POWER SYSTEMS, 1998, 13 (03) :1096-1102