A SECURITY-CONSTRAINED DECOMPOSITION APPROACH TO OPTIMAL REACTIVE POWER PLANNING

被引:34
|
作者
GOMEZ, T
PEREZARRIAGA, IJ
LUMBRERAS, J
PARRA, VM
机构
[1] HIDROELECT ESPANOLA,ESTUD & PLANIFICAC,E-28001 MADRID,SPAIN
[2] UNIV POLITECN MADRID,DEPT INGN ELECT,E-28006 MADRID,SPAIN
关键词
POWER SYSTEM PLANNING; OPTIMIZATION; DECOMPOSITION; VOLTAGE CONTROL; VAR CONTROL;
D O I
10.1109/59.119248
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper presents a two-level decomposition technique for VAR sources planning in electric power systems. Several operating conditions of the system (different base cases with associated contingencies) can be considered simultaneously. Total flexibility in the corrective or preventive treatment for control variables is provided. New VAR sources are modeled by discrete variables and the operating and investment costs are represented in detail. Examples of applications to actual cases of reactive compensation planning in a large power system are reported to demonstrate the efficiency and capabilities of the approach.
引用
收藏
页码:1069 / 1076
页数:8
相关论文
共 50 条
  • [41] Security-Constrained Optimal Power Flow via Cross-Entropy Method
    Carvalho, Leonel de Magalhaes
    Leite da Silva, Armando Martins
    Miranda, Vladimiro
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2018, 33 (06) : 6621 - 6629
  • [42] Improving the statement of the corrective security-constrained optimal power-flow problem
    Capitanescu, Florin
    Wehenkel, Louis
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2007, 22 (02) : 887 - 889
  • [43] Probabilistic security-constrained optimal power flow including the controllability of HVDC lines
    Vrakopoulou, Maria
    Chatzivasileiadis, Spyros
    Andersson, Goeran
    2013 4TH IEEE/PES INNOVATIVE SMART GRID TECHNOLOGIES EUROPE (ISGT EUROPE), 2013,
  • [44] A Scalable Formulation for Look-Ahead Security-Constrained Optimal Power Flow
    Varawala, Lamia
    Hesamzadeh, Mohammad Reza
    Dan, Gyorgy
    Baldick, Ross
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2022, 9 (01): : 138 - 150
  • [45] Transferability-Oriented Adversarial Robust Security-Constrained Optimal Power Flow
    Zuo, Ke
    Sun, Mingyang
    Zhang, Zhenyong
    Cheng, Peng
    Strbac, Goran
    Kang, Chongqing
    IEEE TRANSACTIONS ON SMART GRID, 2024, 15 (05) : 5169 - 5181
  • [46] Security-constrained optimal rescheduling of real power using Hopfield neural network
    Ghosh, S
    Chowdhury, BH
    IEEE TRANSACTIONS ON POWER SYSTEMS, 1996, 11 (04) : 1743 - 1748
  • [47] Security-constrained optimal generation scheduling in large-scale power systems
    Martínez-Crespo, J
    Usaola, J
    Fernández, JL
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2006, 21 (01) : 321 - 332
  • [48] SECURITY-CONSTRAINED OPTIMAL POWER FLOW WITH POST-CONTINGENCY CORRECTIVE RESCHEDULING
    MONTICELLI, A
    PEREIRA, MVF
    GRANVILLE, S
    IEEE TRANSACTIONS ON POWER SYSTEMS, 1987, 2 (01) : 175 - 182
  • [49] Security-constrained transmission expansion planning: A stochastic multi-objective approach
    Akbari, Tohid
    Rahimi-Kian, Ashkan
    Bina, Mohammad Tavakoli
    INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2012, 43 (01) : 444 - 453
  • [50] Time decomposition strategy for security-constrained economic dispatch
    Safdarian, Farnaz
    Kargarian, Amin
    IET GENERATION TRANSMISSION & DISTRIBUTION, 2019, 13 (22) : 5129 - 5138