2001
DOI: 10.1016/s0142-0615(00)00054-5
|View full text |Cite
|
Sign up to set email alerts
|

A method of inclusion of security constraints with distributed optimal power flow

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
8
0
2

Year Published

2004
2004
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(10 citation statements)
references
References 14 publications
0
8
0
2
Order By: Relevance
“…Unlike the NBNC and NBLC formulations, the base case variable x0 is a subcomponent of the the decision variable x 0 . To elaborate, in order to calculate solution1.txt, the reactive powers, shunt susceptances, and voltage magnitudes remain to be calculated even after having solved (10). Although setting these remaining variables to midpoints of their corresponding regions technically yields a feasible base case solution, it is desired to achieve a feasible base case point with minimal slack penalties.…”
Section: B Approximate Formulationsmentioning
confidence: 99%
See 1 more Smart Citation
“…Unlike the NBNC and NBLC formulations, the base case variable x0 is a subcomponent of the the decision variable x 0 . To elaborate, in order to calculate solution1.txt, the reactive powers, shunt susceptances, and voltage magnitudes remain to be calculated even after having solved (10). Although setting these remaining variables to midpoints of their corresponding regions technically yields a feasible base case solution, it is desired to achieve a feasible base case point with minimal slack penalties.…”
Section: B Approximate Formulationsmentioning
confidence: 99%
“…[5], [6]. To further relieve the computational burden arising from contingency constraints, decomposition techniques such as Benders [7], [8], Lagrangian methods [9], [10], and consensus-based methods [11] are suggested in the literature. Prior methods struggle to solve the comprehensive SCOPF formulation (implemented in the industry software that is used by power grid operators) and often make simplifying assumptions to make the original problem tractable.…”
mentioning
confidence: 99%
“…To counter this problem, the line-outage of a tie-line is modeled as a generator outage. The use of generation outages to model tie-line outages is performed also in [43]; however, there they are not used to calculate the safe transmission capacity, but rather to explicitly model the effect of the tie-line outage. The import of energy across the tie-line acts similar to a local generator; losing it will necessitate the increase of local generation to re-establish power balance, or the redistribution of tie-line flows.…”
Section: Formulationmentioning
confidence: 99%
“…As técnicas de decomposição matemáticas em que o problema de FP multi-áreas é resolvido possuem poucas referências na literatura especializada. A maioria delas são aplicadas ao problema de fluxo de potência ótimo (Bakirtzis e Biskas, 2003;Biskas e Bakirtzis, 2006;Conejo e Aguado, 1998;Granada et al, 2008;Kim e Baldick, 1997;Kim et al, 2001;Nogales et al, 2003) . Em Bakirtzis e Biskas (2002) é apresentado um FP-DC descentralizado usando o princípio do problema auxiliar (PPA), no qual um dos objetivos é preservar a confidencialidade dos dados de rede para cada ORS em um mercado de livre concorrência.…”
Section: Revisão Da Literaturaunclassified