Computational Study of Security Constrained Economic Dispatch With Multi-Stage Rescheduling

被引:27
作者
Liu, Yanchao [1 ]
Ferris, Michael C. [2 ]
Zhao, Feng [3 ]
机构
[1] Univ Wisconsin, Dept Ind & Syst Engn, Madison, WI 53705 USA
[2] Univ Wisconsin, Dept Comp Sci, Madison, WI 53705 USA
[3] ISO New England Inc, Holyoke, MA 01040 USA
关键词
Contingency management; mathematical programming; optimization methods; power generation dispatch; power system reliability; OPTIMAL POWER-FLOW;
D O I
10.1109/TPWRS.2014.2336667
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We model post-contingency corrective actions in the security-constrained economic dispatch and consider multiple stages of rescheduling to meet different security constraints. The resulting linear program is not solvable by traditional LP methods due to its large size. We devise and implement a series of algorithmic enhancements based on the Benders' decomposition method to ameliorate the computational difficulty. These enhancements include reducing the number of subproblems, solving the LPs faster by using appropriate solver options, harnessing parallel computing and treating difficult contingencies separately by integrating an independent "feasibility checker" process in the algorithm. In addition, we propose a set of online measures to diagnose and correct infeasibility issues encountered in the solution process. The overall solution approach, coded directly in GAMS, is able to process the "N-1" contingency list in 10 min for all large network cases (e.g., the Polish 2383-bus case) available for experiments.
引用
收藏
页码:920 / 929
页数:10
相关论文
共 20 条
[1]   Partitioning procedures for solving mixed-variables programming problems [J].
Benders, J. F. .
COMPUTATIONAL MANAGEMENT SCIENCE, 2005, 2 (01) :3-19
[2]  
Bussieck MichaelR., GUSS SOLVING COLLECT
[3]   State-of-the-art, challenges, and future trends in security constrained optimal power flow [J].
Capitanescu, F. ;
Martinez Ramos, J. L. ;
Panciatici, P. ;
Kirschen, D. ;
Marano Marcolini, A. ;
Platbrood, L. ;
Wehenkel, L. .
ELECTRIC POWER SYSTEMS RESEARCH, 2011, 81 (08) :1731-1741
[4]   A New Iterative Approach to the Corrective Security-Constrained Optimal Power Flow Problem [J].
Capitanescu, Florin ;
Wehenkel, Louis .
IEEE TRANSACTIONS ON POWER SYSTEMS, 2008, 23 (04) :1533-1541
[5]   Contingency filtering techniques for preventive security-constrained optimal power flow [J].
Capitanescu, Florin ;
Glavic, Mevludin ;
Ernst, Damien ;
Wehenkel, Louis .
IEEE TRANSACTIONS ON POWER SYSTEMS, 2007, 22 (04) :1690-1697
[6]   Improving the statement of the corrective security-constrained optimal power-flow problem [J].
Capitanescu, Florin ;
Wehenkel, Louis .
IEEE TRANSACTIONS ON POWER SYSTEMS, 2007, 22 (02) :887-889
[7]   Interior-point based algorithms for the solution of optimal power flow problems [J].
Capitanescu, Florin ;
Glavic, Mevludin ;
Ernst, Damien ;
Wehenkel, Louis .
ELECTRIC POWER SYSTEMS RESEARCH, 2007, 77 (5-6) :508-517
[8]  
Conejo A. J., 2006, Decomposition Techniques in Mathematical Programming: Engineering and Science Applications
[9]   A note on the selection of Benders' cuts [J].
Fischetti, Matteo ;
Salvagnin, Domenico ;
Zanette, Arrigo .
MATHEMATICAL PROGRAMMING, 2010, 124 (1-2) :175-182
[10]   Contingency Ranking With Respect to Overloads in Very Large Power Systems Taking Into Account Uncertainty, Preventive, and Corrective Actions [J].
Fliscounakis, Stephane ;
Panciatici, Patrick ;
Capitanescu, Florin ;
Wehenkel, Louis .
IEEE TRANSACTIONS ON POWER SYSTEMS, 2013, 28 (04) :4909-4917