A Comparative Study of Preventive Security-Constrained Optimal Power Flow

被引:0
|
作者
Che, Liang [1 ]
Zhang, Xiaping [2 ]
Li, Zhiyi [3 ]
机构
[1] Siemems, Minnetonka, MN 55305 USA
[2] Peak Reliabil, Loveland, CO USA
[3] IIT, Chicago, IL 60616 USA
来源
2016 IEEE POWER AND ENERGY SOCIETY GENERAL MEETING (PESGM) | 2016年
关键词
Security-constrained optimal power flow; optimal power flow; contingency analysis; successive linear programming; nonlinear programming; PowerWorld;
D O I
暂无
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
Security-constrained optimal power flow (SCOPF) is a vital analysis tool in power system operations and electricity markets. This paper presents a comparative study for OPF and SCOPF between two packages: a nonlinear programming algorithm in MATLAB and a successive linear programming in PowerWorld Simulator. Different OPF/SCOPF cases are implemented in the two packages and the results are compared. The reasons for the different results between the two packages are identified and PowerWorld's application in OPF is also discussed.
引用
收藏
页数:5
相关论文
共 50 条
  • [21] Optimizing Multi-Timestep Security-Constrained Optimal Power Flow for Large Power Grids
    Sharadga, Hussein
    Mohammadi, Javad
    Crozier, Constance
    Baker, Kyri
    2024 IEEE TEXAS POWER AND ENERGY CONFERENCE, TPEC, 2024, : 548 - 553
  • [22] Security Constrained Optimal Power Flow Incorporating Preventive and Corrective Control
    Wibowo, Rony Seto
    Fathurrodli, Tri Prasetya
    Penangsang, Ontoseno
    Soeprijanto, Adi
    2014 ELECTRICAL POWER, ELECTRONICS, COMMUNICATIONS, CONTROLS AND INFORMATICS SEMINAR (EECCIS), 2014, : 29 - 34
  • [23] Some Efficient Optimization Methods for Solving the Security-Constrained Optimal Power Flow Problem
    Phan, Dzung
    Kalagnanam, Jayant
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2014, 29 (02) : 863 - 872
  • [24] Identification of Umbrella Constraints in DC-Based Security-Constrained Optimal Power Flow
    Ardakani, Ali Jahanbani
    Bouffard, Francois
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2013, 28 (04) : 3924 - 3934
  • [25] A Surrogate-Based Asynchronous Decomposition Technique for Realistic Security-Constrained Optimal Power Flow Problems
    Petra, Cosmin G.
    Aravena, Ignacio
    OPERATIONS RESEARCH, 2023, 71 (06) : 2015 - 2030
  • [26] DeepOPF: A Deep Neural Network Approach for Security-Constrained DC Optimal Power Flow
    Pan, Xiang
    Zhao, Tianyu
    Chen, Minghua
    Zhang, Shengyu
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2021, 36 (03) : 1725 - 1735
  • [27] Assessment of N-k Contingencies in a Probabilistic Security-Constrained Optimal Power Flow
    Ortega-Vazquez, Miguel A.
    2016 IEEE POWER AND ENERGY SOCIETY GENERAL MEETING (PESGM), 2016,
  • [28] Stochastic Preventive Security-Constrained Economic Dispatch
    Mariano Paniagua-Contreras, J.
    Gutierrez, G.
    Tovar Hernandez, J. H.
    Hinojosa, Victor H.
    IEEE LATIN AMERICA TRANSACTIONS, 2022, 20 (01) : 171 - 179
  • [29] Security-constrained optimal power flow: A parallel self-adaptive differential evolution approach
    Thitithamrongchai, C.
    Eua-Arporn, B.
    ELECTRIC POWER COMPONENTS AND SYSTEMS, 2008, 36 (03) : 280 - 298
  • [30] Minimal Impact Corrective Actions in Security-Constrained Optimal Power Flow Via Sparsity Regularization
    Phan, Dzung T.
    Sun, Xu Andy
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2015, 30 (04) : 1947 - 1956