DC-based security constraints formulation: A perspective of primal-dual interior point method

被引:0
作者
Bao, Zhiyuan [1 ]
Wan, Yujian [2 ]
Hu, Zechun [1 ]
Mujeeb, Asad [1 ]
机构
[1] Tsinghua Univ, Dept Elect Engn, Beijing 100084, Peoples R China
[2] Guangdong Power Grid Co Ltd, Shantou Power Supply Bur, Shantou 515000, Peoples R China
关键词
Security constraints; Primal-dual interior point method; Power transfer distribution factors; Sparsity structure; Economic dispatch; ALGORITHM; DISPATCH; ENERGY; SCUC;
D O I
10.1016/j.epsr.2023.110058
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The DC network security constraints have been extensively studied in numerous power system problems, such as optimal power flow (OPF), security-constrained economic dispatch (SCED), and security-constrained unit commitment (SCUC). Power transfer distribution factors (PTDFs) are widely applied in DC network constraints. However, the PTDF matrix is extremely dense, making it difficult to solve security-constraint optimization problems. This paper investigates the computational inefficiency of PTDF-based security constraints from the perspective of matrix sparsity of primal-dual interior point method (IPM), and proposes a matrix transformation to restore sparsity during IPM iterations. It turns out that the transformation method is equivalent to solving the original optimization problem expressed in pure voltage angle. The regular B-theta formulation is also a variant of the proposed transformation. Numerical studies show that sparsity rather than the size of variables and constraints is the key factor impacting the speed of solving convex quadratic problems, i.e., OPF and SCED problems. The proposed transformation significantly outperforms the PTDF-based approach, achieving a 100x reduction in non-zero elements of the coefficient matrix and a 40x speed increase in barrier processes in a 25,000-bus network.
引用
收藏
页数:9
相关论文
共 30 条
[1]  
Bao Z., 2023, Github repository: Security constraints IPM
[2]   Grid Structural Characteristics as Validation Criteria for Synthetic Networks [J].
Birchfield, Adam B. ;
Xu, Ti ;
Gegner, Kathleen M. ;
Shetye, Komal S. ;
Overbye, Thomas J. .
IEEE TRANSACTIONS ON POWER SYSTEMS, 2017, 32 (04) :3258-3265
[3]   Resilience of hydrogen fuel station-integrated power systems with high penetration of photovoltaics [J].
Cai, Wenqing ;
Mansouri, Seyed Amir ;
Jordehi, Ahmad Rezaee ;
Tostado-Veliz, Marcos ;
Ahmarinejad, Amir ;
Jurado, Francisco .
JOURNAL OF ENERGY STORAGE, 2023, 73
[4]   Learning optimization proxies for large-scale Security-Constrained Economic [J].
Chen, Wenbo ;
Park, Seonho ;
Tanneau, Mathieu ;
Van Hentenryck, Pascal .
ELECTRIC POWER SYSTEMS RESEARCH, 2022, 213
[5]   A multi-level multi-objective strategy for eco-environmental management of electricity market among micro-grids under high penetration of smart homes, plug-in electric vehicles and energy storage devices [J].
Fatemi, Saeid ;
Ketabi, Abbas ;
Mansouri, Seyed Amir .
JOURNAL OF ENERGY STORAGE, 2023, 67
[6]   A four-stage stochastic framework for managing electricity market by participating smart buildings and electric vehicles: Towards smart cities with active end-users [J].
Fatemi, Saeid ;
Ketabi, Abbas ;
Mansouri, Seyed Amir .
SUSTAINABLE CITIES AND SOCIETY, 2023, 93
[7]   Contingency Ranking With Respect to Overloads in Very Large Power Systems Taking Into Account Uncertainty, Preventive, and Corrective Actions [J].
Fliscounakis, Stephane ;
Panciatici, Patrick ;
Capitanescu, Florin ;
Wehenkel, Louis .
IEEE TRANSACTIONS ON POWER SYSTEMS, 2013, 28 (04) :4909-4917
[8]   Fast SCUC for large-scale power systems [J].
Fu, Yong ;
Shahidehpour, Mohammad .
IEEE TRANSACTIONS ON POWER SYSTEMS, 2007, 22 (04) :2144-2151
[9]   A computational comparison of 2 mathematical formulations to handle transmission network constraints in the unit commitment problem [J].
Hinojosa, Victor H. ;
Gutierrez-Alcaraz, Guillermo .
INTERNATIONAL TRANSACTIONS ON ELECTRICAL ENERGY SYSTEMS, 2017, 27 (08)
[10]  
IBM, 2021, What are user cuts and lazy constraints