A Generic Approach for Solving Nonlinear-Discrete Security-Constrained Optimal Power Flow Problems in Large-Scale Systems

被引:69
作者
Platbrood, Ludovic [1 ]
Capitanescu, Florin [2 ]
Merckx, Christian [1 ]
Crisciu, Horia [1 ]
Wehenkel, Louis [3 ]
机构
[1] Power Syst Consulting, Tractebel Engn, B-1200 Brussels, Belgium
[2] Univ Luxembourg, Interdisciplinary Ctr Secur Reliabil & Trust SnT, L-1359 Luxembourg, Luxembourg
[3] Univ Liege, B-4000 Liege, Belgium
关键词
Contingency filtering; network compression; network equivalents; security-constrained optimal power flow;
D O I
10.1109/TPWRS.2013.2289990
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper proves the practicality of an iterative algorithm for solving realistic large-scale security-constrained optimal power flow (SCOPF) problems. This algorithm is based on the combination of a contingency filtering scheme, used to identify the binding contingencies at the optimum, and a network compression method, used to reduce the complexity of the post-contingency models included in the SCOPF formulation. We show that by combining these two complementary ideas, it is possible to solve in a reasonable time SCOPF problems on large power system models with a large number of contingencies. Unlike most results reported for large-scale SCOPF problems, our algorithm uses a nonlinear AC network model in both pre-contingency and post-contingency states, optimizes both active/reactive powers flows jointly, and treats the discrete variables. The proposed algorithm is implemented with state-of-the-art solvers and applied to two systems: a national grid with 2563 buses and 1297 contingencies, and a model of the European transmission network with 9241 buses and 12 000 contingencies.
引用
收藏
页码:1194 / 1203
页数:10
相关论文
共 26 条
[1]   OPTIMAL LOAD FLOW WITH STEADY-STATE SECURITY [J].
ALSAC, O ;
STOTT, B .
IEEE TRANSACTIONS ON POWER APPARATUS AND SYSTEMS, 1974, PA93 (03) :745-751
[2]   FURTHER DEVELOPMENTS IN LP-BASED OPTIMAL POWER FLOW [J].
ALSAC, O ;
BRIGHT, J ;
PRAIS, M ;
STOTT, B .
IEEE TRANSACTIONS ON POWER SYSTEMS, 1990, 5 (03) :697-711
[3]  
[Anonymous], P SEPOPE 12 S RIO JA
[4]   AN INTEGRATED PACKAGE FOR REAL-TIME SECURITY ENHANCEMENT [J].
BERTRAM, TJ ;
DEMAREE, KD ;
DANGELMAIER, LC .
IEEE TRANSACTIONS ON POWER SYSTEMS, 1990, 5 (02) :592-600
[5]  
Bouchez F.-X., 2012, P IEEE PES GEN M US
[6]   An interior point algorithm for large-scale nonlinear programming [J].
Byrd, RH ;
Hribar, ME ;
Nocedal, J .
SIAM JOURNAL ON OPTIMIZATION, 1999, 9 (04) :877-900
[7]   State-of-the-art, challenges, and future trends in security constrained optimal power flow [J].
Capitanescu, F. ;
Martinez Ramos, J. L. ;
Panciatici, P. ;
Kirschen, D. ;
Marano Marcolini, A. ;
Platbrood, L. ;
Wehenkel, L. .
ELECTRIC POWER SYSTEMS RESEARCH, 2011, 81 (08) :1731-1741
[8]   A New Iterative Approach to the Corrective Security-Constrained Optimal Power Flow Problem [J].
Capitanescu, Florin ;
Wehenkel, Louis .
IEEE TRANSACTIONS ON POWER SYSTEMS, 2008, 23 (04) :1533-1541
[9]   Contingency filtering techniques for preventive security-constrained optimal power flow [J].
Capitanescu, Florin ;
Glavic, Mevludin ;
Ernst, Damien ;
Wehenkel, Louis .
IEEE TRANSACTIONS ON POWER SYSTEMS, 2007, 22 (04) :1690-1697
[10]   Experiments with the interior-point method for solving large scale Optimal Power Flow problems [J].
Capitanescu, Florin ;
Wehenkel, Louis .
ELECTRIC POWER SYSTEMS RESEARCH, 2013, 95 :276-283