Shubo Zhang, Hongxing Ye, Fengyu Wang, Yonghong Chen, Steve Rose, Yaming Ma
{"title":"A Data-aided Security Constraint Prescreening Technique and Application to Real-world System","authors":"Shubo Zhang, Hongxing Ye, Fengyu Wang, Yonghong Chen, Steve Rose, Yaming Ma","doi":"10.1109/NAPS46351.2019.9000286","DOIUrl":null,"url":null,"abstract":"Security constraints are necessary in unit commitment problems to guarantee reliable commitments. However, only a small subset of security constraints can bind in the unit commitment problem. This paper presents a data-aided prescreening approach that could identify and remove non-dominating security constraints. This approach takes advantage of both deterministic and statistical methods, which leverages the historical data and linear programming (LP) solution. Lazy constraints are used in optimization solver to maintain solution integrity. Case studies presented here use Midcontinent Independent System Operator (MISO) data, and simulation results show that the proposed prescreening approach significantly improves computational performance.","PeriodicalId":175719,"journal":{"name":"2019 North American Power Symposium (NAPS)","volume":"228 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 North American Power Symposium (NAPS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NAPS46351.2019.9000286","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
Security constraints are necessary in unit commitment problems to guarantee reliable commitments. However, only a small subset of security constraints can bind in the unit commitment problem. This paper presents a data-aided prescreening approach that could identify and remove non-dominating security constraints. This approach takes advantage of both deterministic and statistical methods, which leverages the historical data and linear programming (LP) solution. Lazy constraints are used in optimization solver to maintain solution integrity. Case studies presented here use Midcontinent Independent System Operator (MISO) data, and simulation results show that the proposed prescreening approach significantly improves computational performance.