A Computational Strategy to Solve Preventive Risk-Based Security-Constrained OPF

被引:71
作者
Wang, Qin [1 ]
McCalley, James D. [1 ]
Zheng, Tongxin [2 ]
Litvinov, Eugene [2 ]
机构
[1] Iowa State Univ, Dept Elect & Comp Engn, Ames, IA 50010 USA
[2] ISO New England, Holyoke, MA 01040 USA
关键词
Benders decomposition; operation; optimal power flow; preventive; risk; security; OPTIMAL POWER-FLOW;
D O I
10.1109/TPWRS.2012.2219080
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The benefit of risk-based (RB) security-constrained optimal power flow (SCOPF) model lies in its ability to improve the economic performance of a power system while enhancing the system's overall security level. However, the RB-SCOPF model is difficult to solve due to the following two characteristics: 1) the overload severity of a circuit changes with the loading condition on it, thus is hard to express with a deterministic function, and 2) the risk index is a function of the state variables in both normal and contingency states, which greatly increases the scale of optimization. To handle the first issue, a new expression of severity function is proposed so that it is possible to decompose the model into a SCOPF subproblem and a risk subproblem. To deal with the second issue, a nested Benders decomposition with multi-layer linear programming method is proposed. Illustrations use the ISO New England bulk system is provided to demonstrate the feasibility of the proposed method. Analysis is presented to demonstrate the merits of the RB-SCOPF over the traditional SCOPF model.
引用
收藏
页码:1666 / 1675
页数:10
相关论文
共 34 条
[1]   OPTIMAL LOAD FLOW WITH STEADY-STATE SECURITY [J].
ALSAC, O ;
STOTT, B .
IEEE TRANSACTIONS ON POWER APPARATUS AND SYSTEMS, 1974, PA93 (03) :745-751
[2]  
Aoki K., 1982, IEEE T POWER APPARAT, VPAS-101, P3502
[3]  
Bazaraa M.S., 1990, LINEAR PROGRAMMING N, DOI DOI 10.1002/0471787779
[4]  
BENDERS JF, 2005, J NUMER MATH, V2, P3, DOI DOI 10.1007/S10287-004-0020-Y
[5]  
Billinton R., 1996, RELIABILITY EVALUATI, V2nd, P1
[6]   A New Iterative Approach to the Corrective Security-Constrained Optimal Power Flow Problem [J].
Capitanescu, Florin ;
Wehenkel, Louis .
IEEE TRANSACTIONS ON POWER SYSTEMS, 2008, 23 (04) :1533-1541
[7]   Contingency filtering techniques for preventive security-constrained optimal power flow [J].
Capitanescu, Florin ;
Glavic, Mevludin ;
Ernst, Damien ;
Wehenkel, Louis .
IEEE TRANSACTIONS ON POWER SYSTEMS, 2007, 22 (04) :1690-1697
[8]   Long-term benefits of online risk-based direct-current optimal power flow [J].
Dai, R-C ;
Pham, H. ;
Wang, Y. ;
McCalley, J. D. .
PROCEEDINGS OF THE INSTITUTION OF MECHANICAL ENGINEERS PART O-JOURNAL OF RISK AND RELIABILITY, 2012, 226 (O1) :65-74
[9]   AUTOMATIC CONTINGENCY SELECTION [J].
EJEBE, GC ;
WOLLENBERG, BF .
IEEE TRANSACTIONS ON POWER APPARATUS AND SYSTEMS, 1979, 98 (01) :97-109
[10]  
FERC Report, REC ISO SOFTW ENH FU