基于广义Benders分解的传输安全约束最优调度调度

K. Chung, Balho H. Kim, Jeong-Ho Lee, T. Oh, Jinsu Lee
{"title":"基于广义Benders分解的传输安全约束最优调度调度","authors":"K. Chung, Balho H. Kim, Jeong-Ho Lee, T. Oh, Jinsu Lee","doi":"10.1109/TD-ASIA.2009.5356864","DOIUrl":null,"url":null,"abstract":"For the secure power system operation, we introduce a decomposition technique that separates a transmission-security constrained dispatch scheduling problem into a master problem (MP) and several subproblems (SPs) using Benders decomposition. The MP solves a general optimal power flow (OPF) problem while the SPs inspect the feasibility of OPF solution under respective transmission line contingencies. If a dispatch scheduling solution given by the MP violates transmission-security constraints, then additional constraints corresponding to the violations are imposed to the MP. Through this iterative process between the MP and SPs, we derive an optimal dispatch schedule incorporating the post-contingency corrective rescheduling. Numerical example demonstrates efficiency of the proposed approach.","PeriodicalId":131589,"journal":{"name":"2009 Transmission & Distribution Conference & Exposition: Asia and Pacific","volume":"44 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Transmission-security constrained optimal dispatch scheduling using generalized Benders decomposition\",\"authors\":\"K. Chung, Balho H. Kim, Jeong-Ho Lee, T. Oh, Jinsu Lee\",\"doi\":\"10.1109/TD-ASIA.2009.5356864\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"For the secure power system operation, we introduce a decomposition technique that separates a transmission-security constrained dispatch scheduling problem into a master problem (MP) and several subproblems (SPs) using Benders decomposition. The MP solves a general optimal power flow (OPF) problem while the SPs inspect the feasibility of OPF solution under respective transmission line contingencies. If a dispatch scheduling solution given by the MP violates transmission-security constraints, then additional constraints corresponding to the violations are imposed to the MP. Through this iterative process between the MP and SPs, we derive an optimal dispatch schedule incorporating the post-contingency corrective rescheduling. Numerical example demonstrates efficiency of the proposed approach.\",\"PeriodicalId\":131589,\"journal\":{\"name\":\"2009 Transmission & Distribution Conference & Exposition: Asia and Pacific\",\"volume\":\"44 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-12-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 Transmission & Distribution Conference & Exposition: Asia and Pacific\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/TD-ASIA.2009.5356864\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Transmission & Distribution Conference & Exposition: Asia and Pacific","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TD-ASIA.2009.5356864","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

为了保证电力系统的安全运行,提出了一种利用Benders分解将输电安全约束调度问题分解为一个主问题(MP)和若干子问题(SPs)的分解技术。最优潮流算法求解一般最优潮流问题,而最优潮流算法在各自的输电线路突发事件下检验最优潮流解的可行性。如果MP给出的调度调度解决方案违反了传输安全约束,则对MP施加与该违反相对应的附加约束。通过MP和sp之间的迭代过程,我们得到了一个包含事后纠偏重新调度的最优调度计划。数值算例验证了该方法的有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Transmission-security constrained optimal dispatch scheduling using generalized Benders decomposition
For the secure power system operation, we introduce a decomposition technique that separates a transmission-security constrained dispatch scheduling problem into a master problem (MP) and several subproblems (SPs) using Benders decomposition. The MP solves a general optimal power flow (OPF) problem while the SPs inspect the feasibility of OPF solution under respective transmission line contingencies. If a dispatch scheduling solution given by the MP violates transmission-security constraints, then additional constraints corresponding to the violations are imposed to the MP. Through this iterative process between the MP and SPs, we derive an optimal dispatch schedule incorporating the post-contingency corrective rescheduling. Numerical example demonstrates efficiency of the proposed approach.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信