Neural-Network Security-Boundary Constrained Optimal Power Flow

被引:76
作者
Gutierrez-Martinez, Victor J. [1 ]
Canizares, Claudio A. [2 ]
Fuerte-Esquivel, Claudio R. [1 ]
Pizano-Martinez, Alejandro [1 ]
Gu, Xueping [3 ]
机构
[1] UMSNH, Fac Elect Engn, Morelia 58000, Michoacan, Mexico
[2] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
[3] N China Elect Power Univ, Sch Elect & Elect Engn, Baoding 071003, Peoples R China
基金
加拿大自然科学与工程研究理事会;
关键词
Neural network; optimal power flow; power system security; power system stability; STABILITY; OPTIMIZATION; SYSTEMS;
D O I
10.1109/TPWRS.2010.2050344
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper proposes a new approach to model stability and security constraints in optimal power flow (OPF) problems based on a neural network (NN) representation of the system security boundary (SB). The novelty of this proposal is that a closed form, differentiable function derived from the system's SB is used to represent security constraints in an OPF model. The procedure involves two main steps: First, an NN representation of the SB is obtained based on back-propagation neural network (BPNN) training. Second, a differentiable mapping function extracted from the BPNN is used to directly incorporate this function as a constraint in the OPF model. This approach ensures that the operating points resulting from the OPF solution process are within a feasible and secure region, whose limits are better represented using the proposed technique compared to typical security-constrained OPF models. The effectiveness and feasibility of the proposed approach is demonstrated through the implementation, as well as testing and comparison using the IEEE two-area and 118-bus benchmark systems, of an optimal dispatch technique that guarantees system security in the context of competitive electricity markets.
引用
收藏
页码:63 / 72
页数:10
相关论文
共 29 条
[1]  
AGGOUNE M, 1991, IEEE T POWER SYST, V6, P252
[2]  
[Anonymous], POWER SYSTEM DYNAMIC
[3]  
[Anonymous], 2003, AMPL: A Modeling Language for Mathematical Programming
[4]  
AVALOS RJ, 2008, P IEEE PES GEN M
[5]  
Bompard E, 2000, 2000 IEEE POWER ENGINEERING SOCIETY SUMMER MEETING, CONFERENCE PROCEEDINGS, VOLS 1-4, P2229, DOI 10.1109/PESS.2000.867338
[6]   Transient security dispatch for the concurrent optimization of plural postulated contingencies [J].
Bruno, S ;
De Tuglie, E ;
La Scala, M .
IEEE TRANSACTIONS ON POWER SYSTEMS, 2002, 17 (03) :707-714
[7]  
Canizares C, 2001, 2001 POWER ENGINEERING SOCIETY SUMMER MEETING, VOLS 1-3, CONFERENCE PROCEEDINGS, P1680, DOI 10.1109/PESS.2001.970328
[8]  
Canizares C. A., 2006, 2006 IEEE Power Engineering Society General Meeting
[9]  
DEMOTH H, NEURAL NETWORK TOOLB
[10]  
EDUARDS AR, 1996, P I EL ENG GEN TRANS, V143, P129