2009
DOI: 10.1590/s0103-17592009000200008
|View full text |Cite
|
Sign up to set email alerts
|

Security constrained optimal active power flow via network model and interior point method

Abstract: This paper presents a new formulation for the security constrained optimal active power flow problem which enables the representation of three basic constraints: branch outage, generator outage and multiple equipment congestion. It consists of a network model with additional linear equality and inequality constraints and quadratic separable objective function, which is efficiently solved by a predictor-corrector interior point method. Sparsity techniques are used to exploit the matricial structure of the probl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0
7

Year Published

2011
2011
2016
2016

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(11 citation statements)
references
References 30 publications
0
4
0
7
Order By: Relevance
“…The mathematical model to find the optimal DC power flows with the addition of the security constraints can be characterized as follows (Carvalho et al., ; Azevedo et al., ): 0trueminimize2em2em2emα2fRf+β2γ(p)subjecttoAf=pd,Tf=0sminMp+Nfsmaxfminffmax,pminppmax,where α and β are weights regarding the objectives, f represents the vector of active power flow, p represents the vector of active power generation, R represents the diagonal matrix of resistances, γ(p) represents the function associated with generation loss, A represents the network incidence matrix, T represents the network reactance matrix, d represents the demands for the active power, M represents the active power flow contingency matrix, N is the contingency matrix for generation, fmax and fmin are the limits on active power flow f , pmax and pmin are the limits on power generation p , and smax and smin are the limits on the security constraints.…”
Section: Mathematical Modelsmentioning
confidence: 99%
See 1 more Smart Citation
“…The mathematical model to find the optimal DC power flows with the addition of the security constraints can be characterized as follows (Carvalho et al., ; Azevedo et al., ): 0trueminimize2em2em2emα2fRf+β2γ(p)subjecttoAf=pd,Tf=0sminMp+Nfsmaxfminffmax,pminppmax,where α and β are weights regarding the objectives, f represents the vector of active power flow, p represents the vector of active power generation, R represents the diagonal matrix of resistances, γ(p) represents the function associated with generation loss, A represents the network incidence matrix, T represents the network reactance matrix, d represents the demands for the active power, M represents the active power flow contingency matrix, N is the contingency matrix for generation, fmax and fmin are the limits on active power flow f , pmax and pmin are the limits on power generation p , and smax and smin are the limits on the security constraints.…”
Section: Mathematical Modelsmentioning
confidence: 99%
“…The first set, suggested by Azevedo et al. (), has the following characteristics: f0=sf0=fmax/2, p0=sp0=pmax/2, y10=y20=0, wf0=zf0=false(R+Ifalse)e, wp0=zp0=ws0=zs0=I, s0=2false(smaxsminfalse)/3, ss0=false(smaxsminfalse)/3.…”
Section: Case Studiesmentioning
confidence: 99%
“…Em muitas das aplicações tem sido adotada a representação linearizada (CC) devido à maior simplicidade e ao grau de precisão satisfatório de seus resultados [1].…”
Section: Introductionunclassified
“…O modelo de fluxo de potênciaótimo (FPO) tem aplicações em diversos problemas de análise e operação de sistemas de potência, tais como despacho econômico, análise de confiabilidade do sistema, análise de segurança, programação da geração em curto prazo e planejamento de expansão do sistema geração/transmissão. Em diversas aplicações tem sido adotada a representação linearizada (CC) devidoà maior simplicidade e ao grau de precisão satisfatório de seus resultados, podendo ser formulada como um modelo de fluxo em redes com restrições adicionais [2,4,1].…”
Section: Introductionunclassified