A Decomposition Algorithm with Fast Identification of Critical Contingencies for Large-Scale Security-Constrained AC-OPF

被引:2
|
作者
Curtis, Frank E. [1 ]
Molzahn, Daniel K. [2 ]
Tu, Shenyinying [3 ]
Wachter, Andreas [3 ]
Wei, Ermin [4 ]
Wonge, Elizabeth [5 ]
机构
[1] Lehigh Univ, Dept Ind & Syst Engn, Bethlehem, PA 18015 USA
[2] Georgia Inst Technol, Sch Elect & Comp Engn, Atlanta, GA 30313 USA
[3] Northwestern Univ, Dept Ind Engn & Management Sci, Evanston, IL 60208 USA
[4] Northwestern Univ, Dept Elect & Comp Engn, Dept Ind Engn & Management Sci, Evanston, IL 60208 USA
[5] Univ Calif San Diego, Dept Math, La Jolla, CA 92093 USA
关键词
nonlinear optimization; network optimization; security-constrained AC optimal power flow; complementarity constraints; decomposition methods;
D O I
10.1287/opre.2023.2453
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
A decomposition algorithm for solving large-scale security-constrained AC optimal power flow problems is presented. The formulation considered is the one used in the Advanced Research Projects Agency-Energy Grid Optimization Competition, Challenge 1, held from November 2018 through October 2019. Algorithmic strategies are proposed for contingency selection, fast contingency evaluation, handling complementarity constraints, avoiding issues related to degeneracy, and exploiting parallelism. The results of numerical experiments are provided to demonstrate the effectiveness of the proposed techniques as compared with alternative strategies.
引用
收藏
页码:2031 / 2044
页数:15
相关论文
共 34 条
  • [31] New Large-scale Security Constrained Optimal Power Flow program using a new Interior Point algorithm
    Karoui, Karim
    Platbrood, Ludovic
    Crisciu, Horia
    Waltz, Richard A.
    2008 5TH INTERNATIONAL CONFERENCE ON THE EUROPEAN ELECTRICITY MARKET, VOLS 1 AND 2, 2008, : 433 - +
  • [32] Fast Modal Identification, Monitoring, and Visualization for Large-Scale Power Systems using Dynamic Mode Decomposition
    Mohapatra, Saurav
    Overbye, Thomas J.
    2016 POWER SYSTEMS COMPUTATION CONFERENCE (PSCC), 2016,
  • [33] Normalised normal constraint algorithm applied to multi-objective security-constrained optimal generation dispatch of large-scale power systems with wind farms and pumped-storage hydroelectric stations
    Lin, Shunjiang
    Liu, Mingbo
    Li, Qifeng
    Lu, Wentian
    Yan, Yuan
    Liu, Cuiping
    IET GENERATION TRANSMISSION & DISTRIBUTION, 2017, 11 (06) : 1539 - 1548
  • [34] Solution of large-scale security constrained optimal power flow by a new bi-level optimisation approach based on enhanced gravitational search algorithm
    Jahan, Mohammad Sadegh
    Amjady, Nima
    IET GENERATION TRANSMISSION & DISTRIBUTION, 2013, 7 (12) : 1481 - 1491