Fast stochastic security-constrained unit commitment using point estimation method

被引:21
|
作者
Mehrtash, Mahdi [1 ]
Raoofat, Mahdi [1 ]
Mohammadi, Mohammad [1 ]
Zareipour, Hamidreza [2 ]
机构
[1] Shiraz Univ, Sch Engn, Zand St, Shiraz, Iran
[2] Univ Calgary, Schulich Sch Engn, Dept Elect & Comp Engn, Calgary, AB, Canada
关键词
Bender's decomposition (BD); two-point estimation (TPE) method; scenario-based approach; stochastic SCUC; DEMAND RESPONSE; GENERATION; SCUC; COORDINATION; OPTIMIZATION; ENERGY;
D O I
10.1002/etep.2107
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Security-constrained unit commitment (SCUC) is a key component of operating electricity markets. By increasing the share of renewable energies on the generation side, and emergence and growth of new stochastic loads on the demand side, stochastic SCUC has become more important for secure-optimal operation of the market. Scenario-based techniques have been suggested widely for stochastic SCUC in the literature. However, they are usually very time-consuming. This problem is escalated in large-scale power systems with high penetration of stochastic generation and loads. To mitigate the computational burden of SCUC problem, this paper develops an algorithm, based on point estimation method and Bender's decomposition technique. The proposed approach breaks the probabilistic problem into a few deterministic points with much lower computation burden yet with minimal loss of accuracy. The proposed approach is implemented on a six-bus system as the first numerical study, and on a modified IEEE 118-bus system with 94 probabilistic variables as the second case study. The efficacy of proposed algorithm is confirmed, especially in the last test case with notable reduction in computational burden without considerable loss of precision. Copyright (c) 2015 John Wiley & Sons, Ltd.
引用
收藏
页码:671 / 688
页数:18
相关论文
共 50 条
  • [1] Stochastic security-constrained unit commitment
    Wu, Lei
    Shabidehpour, Mohammad
    Li, Tao
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2007, 22 (02) : 800 - 811
  • [2] Interval optimization combined with point estimate method for stochastic security-constrained unit commitment
    Zhou, Ming
    Xia, Shu
    Li, Gengyin
    Han, Xiao
    INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2014, 63 : 276 - 284
  • [3] Security-constrained unit commitment with stochastic constraints
    Shahidehpour, Mohammad
    2007 IEEE POWER ENGINEERING SOCIETY GENERAL MEETING, VOLS 1-10, 2007, : 4894 - 4896
  • [4] Fully Parallel Stochastic Security-Constrained Unit Commitment
    Wang, Chunheng
    Fu, Yong
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2016, 31 (05) : 3561 - 3571
  • [5] Direct method for security-constrained unit commitment
    ALPHATECH, Inc, Burlington, United States
    IEEE Trans Power Syst, 3 (1329-1342):
  • [6] A DIRECT METHOD FOR SECURITY-CONSTRAINED UNIT COMMITMENT
    SHAW, JJ
    IEEE TRANSACTIONS ON POWER SYSTEMS, 1995, 10 (03) : 1329 - 1342
  • [7] Comparative Study of Stochastic Unit Commitment and Security-Constrained Unit Commitment Using High Performance Computing
    Papavasiliou, Anthony
    Oren, Shmuel S.
    2013 EUROPEAN CONTROL CONFERENCE (ECC), 2013, : 2507 - 2512
  • [8] Determining inactive constraints in stochastic security-constrained unit commitment using cumulants
    Ghannadi, Siavash
    Mehrtash, Mahdi
    Mohammadi, Mohammad
    Raoofat, Mahdi
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2017, 32 (03) : 2123 - 2135
  • [9] Security-constrained unit commitment using particle swarms
    Collett, Robert
    Quaicoe, John
    2006 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-5, 2006, : 933 - +
  • [10] Security region based security-constrained unit commitment
    YiXin Yu
    Chao Qin
    Science China Technological Sciences, 2013, 56 : 2732 - 2744