Transmission-security constrained optimal dispatch scheduling using generalized Benders decomposition

K. Chung, Balho H. Kim, Jeong-Ho Lee, T. Oh, Jinsu Lee
{"title":"Transmission-security constrained optimal dispatch scheduling using generalized Benders decomposition","authors":"K. Chung, Balho H. Kim, Jeong-Ho Lee, T. Oh, Jinsu Lee","doi":"10.1109/TD-ASIA.2009.5356864","DOIUrl":null,"url":null,"abstract":"For the secure power system operation, we introduce a decomposition technique that separates a transmission-security constrained dispatch scheduling problem into a master problem (MP) and several subproblems (SPs) using Benders decomposition. The MP solves a general optimal power flow (OPF) problem while the SPs inspect the feasibility of OPF solution under respective transmission line contingencies. If a dispatch scheduling solution given by the MP violates transmission-security constraints, then additional constraints corresponding to the violations are imposed to the MP. Through this iterative process between the MP and SPs, we derive an optimal dispatch schedule incorporating the post-contingency corrective rescheduling. Numerical example demonstrates efficiency of the proposed approach.","PeriodicalId":131589,"journal":{"name":"2009 Transmission & Distribution Conference & Exposition: Asia and Pacific","volume":"44 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Transmission & Distribution Conference & Exposition: Asia and Pacific","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TD-ASIA.2009.5356864","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

For the secure power system operation, we introduce a decomposition technique that separates a transmission-security constrained dispatch scheduling problem into a master problem (MP) and several subproblems (SPs) using Benders decomposition. The MP solves a general optimal power flow (OPF) problem while the SPs inspect the feasibility of OPF solution under respective transmission line contingencies. If a dispatch scheduling solution given by the MP violates transmission-security constraints, then additional constraints corresponding to the violations are imposed to the MP. Through this iterative process between the MP and SPs, we derive an optimal dispatch schedule incorporating the post-contingency corrective rescheduling. Numerical example demonstrates efficiency of the proposed approach.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于广义Benders分解的传输安全约束最优调度调度
为了保证电力系统的安全运行,提出了一种利用Benders分解将输电安全约束调度问题分解为一个主问题(MP)和若干子问题(SPs)的分解技术。最优潮流算法求解一般最优潮流问题,而最优潮流算法在各自的输电线路突发事件下检验最优潮流解的可行性。如果MP给出的调度调度解决方案违反了传输安全约束,则对MP施加与该违反相对应的附加约束。通过MP和sp之间的迭代过程,我们得到了一个包含事后纠偏重新调度的最优调度计划。数值算例验证了该方法的有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Operational analysis of DC micro-grid using detailed model of distributed generation Real time digital simulator based test system for microgrid management system Case study of customer baseline(CBL) load determination in Korea based on statistical method Assessment of Conditional Value at Risk (CVaR) in transmission investment using Cross Entropy method Governor-response power flow (GRPF) based long-term voltage stability simulation
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1