K. Chung, Balho H. Kim, Jeong-Ho Lee, T. Oh, Jinsu Lee
{"title":"基于广义Benders分解的传输安全约束最优调度调度","authors":"K. Chung, Balho H. Kim, Jeong-Ho Lee, T. Oh, Jinsu Lee","doi":"10.1109/TD-ASIA.2009.5356864","DOIUrl":null,"url":null,"abstract":"For the secure power system operation, we introduce a decomposition technique that separates a transmission-security constrained dispatch scheduling problem into a master problem (MP) and several subproblems (SPs) using Benders decomposition. The MP solves a general optimal power flow (OPF) problem while the SPs inspect the feasibility of OPF solution under respective transmission line contingencies. If a dispatch scheduling solution given by the MP violates transmission-security constraints, then additional constraints corresponding to the violations are imposed to the MP. Through this iterative process between the MP and SPs, we derive an optimal dispatch schedule incorporating the post-contingency corrective rescheduling. Numerical example demonstrates efficiency of the proposed approach.","PeriodicalId":131589,"journal":{"name":"2009 Transmission & Distribution Conference & Exposition: Asia and Pacific","volume":"44 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Transmission-security constrained optimal dispatch scheduling using generalized Benders decomposition\",\"authors\":\"K. Chung, Balho H. Kim, Jeong-Ho Lee, T. Oh, Jinsu Lee\",\"doi\":\"10.1109/TD-ASIA.2009.5356864\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"For the secure power system operation, we introduce a decomposition technique that separates a transmission-security constrained dispatch scheduling problem into a master problem (MP) and several subproblems (SPs) using Benders decomposition. The MP solves a general optimal power flow (OPF) problem while the SPs inspect the feasibility of OPF solution under respective transmission line contingencies. If a dispatch scheduling solution given by the MP violates transmission-security constraints, then additional constraints corresponding to the violations are imposed to the MP. Through this iterative process between the MP and SPs, we derive an optimal dispatch schedule incorporating the post-contingency corrective rescheduling. Numerical example demonstrates efficiency of the proposed approach.\",\"PeriodicalId\":131589,\"journal\":{\"name\":\"2009 Transmission & Distribution Conference & Exposition: Asia and Pacific\",\"volume\":\"44 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-12-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 Transmission & Distribution Conference & Exposition: Asia and Pacific\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/TD-ASIA.2009.5356864\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Transmission & Distribution Conference & Exposition: Asia and Pacific","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TD-ASIA.2009.5356864","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Transmission-security constrained optimal dispatch scheduling using generalized Benders decomposition
For the secure power system operation, we introduce a decomposition technique that separates a transmission-security constrained dispatch scheduling problem into a master problem (MP) and several subproblems (SPs) using Benders decomposition. The MP solves a general optimal power flow (OPF) problem while the SPs inspect the feasibility of OPF solution under respective transmission line contingencies. If a dispatch scheduling solution given by the MP violates transmission-security constraints, then additional constraints corresponding to the violations are imposed to the MP. Through this iterative process between the MP and SPs, we derive an optimal dispatch schedule incorporating the post-contingency corrective rescheduling. Numerical example demonstrates efficiency of the proposed approach.