Bilevel programming applied to power system vulnerability analysis under multiple contingencies

被引:191
作者
Arroyo, J. M. [1 ]
机构
[1] Univ Castilla La Mancha, Dept Ingn Elect Elect Automat & Comunicac, ETS Ingenieros Ind, Ciudad Real 13071, Spain
关键词
ELECTRIC GRID SECURITY; INTERDICTION; STRATEGIES;
D O I
10.1049/iet-gtd.2009.0098
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This study examines the use of bilevel programming to analyse the vulnerability of power systems under multiple contingencies. One of the main purposes of this study is to explain the state of the art of the subject matter. A minimum vulnerability model and a maximum vulnerability model are presented and discussed. In both models, the upper-level optimisation determines a set of simultaneous outages in the transmission network whereas the lower-level optimisation models the reaction of the system operator against the outages identified in the upper level. The system operator reacts by minimising the system load shed through an optimal operation of the power system. Two solution approaches for the resulting mixed-integer non-linear bilevel programs are analysed and compared. Both methodologies are based on the equivalent transformation of the lower-level problem into a set of constraints, so that the original bilevel programs, respectively, become a single-level optimisation problem. The first approach is based on the application of Karush-Kuhn-Tucker optimality conditions whereas the second procedure relies on duality theory. This study shows that both approaches are essentially equivalent from a rigorous mathematical viewpoint; however, the second method is more suitable for off-the-shell branch-and-cut software as corroborated by numerical simulations.
引用
收藏
页码:178 / 190
页数:13
相关论文
共 35 条
[1]  
ALVAREZ R, 2004, THESIS NAVAL POSTGRA
[2]  
[Anonymous], 1998, Practical bi-level optimization
[3]  
[Anonymous], 2013, Power generation, operation, and control
[4]  
[Anonymous], THESIS NAVAL POSTGRA
[5]   On the solution of the bilevel programming formulation of the terrorist threat problem [J].
Arroyo, JM ;
Galiana, FD .
IEEE TRANSACTIONS ON POWER SYSTEMS, 2005, 20 (02) :789-797
[6]  
Baldick R, 2008, IEEE POW ENER SOC GE, P52
[7]   Shortest path network interdiction with asymmetric information [J].
Bayrak, Halil ;
Bailey, Matthew D. .
NETWORKS, 2008, 52 (03) :133-140
[8]  
Berizzi A, 2004, 2004 IEEE POWER ENGINEERING SOCIETY GENERAL MEETING, VOLS 1 AND 2, P1673
[9]   Methodology for identifying near-optimal interdiction strategies for a power transmission system [J].
Bier, Vicki M. ;
Gratz, Ell R. ;
Haphuriwat, Naraphorn J. ;
Magua, Wairimu ;
Wierzblcki, Kevin R. .
RELIABILITY ENGINEERING & SYSTEM SAFETY, 2007, 92 (09) :1155-1161
[10]   The deregulated electricity market viewed as a bilevel programming problem [J].
Bjondal, M ;
Jornsten, K .
JOURNAL OF GLOBAL OPTIMIZATION, 2005, 33 (03) :465-475