2021
DOI: 10.1016/j.epsr.2020.106677
|View full text |Cite
|
Sign up to set email alerts
|

An exact and scalable problem decomposition for security-constrained optimal power flow

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3

Relationship

3
5

Authors

Journals

citations
Cited by 17 publications
(22 citation statements)
references
References 18 publications
0
20
0
Order By: Relevance
“…The results also show that the predictions can be used to seed a load flow optimization that returns a feasible solution within 0.03% of the AC-OPF objective, while reducing the running times by a factor close to 3. Future work will focus on generalizing the approach to security-constrained OPF, by studying how to merge the algorithm proposed in [3] to the AC setting and the proposed 2-stage approach.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…The results also show that the predictions can be used to seed a load flow optimization that returns a feasible solution within 0.03% of the AC-OPF objective, while reducing the running times by a factor close to 3. Future work will focus on generalizing the approach to security-constrained OPF, by studying how to merge the algorithm proposed in [3] to the AC setting and the proposed 2-stage approach.…”
Section: Discussionmentioning
confidence: 99%
“…. However, assume that flows (p f 4,3 , q f 4,3 ), along with the voltage magnitudes v 3 , v 4 are fixed and respect constraints ( 4), (5r), (5i) associated with line (3,4). In that case, the setpoints for the generator at bus 2 can be computed without the knowledge of (p d 4 , q d 4 , p d 5 , q d 5 , p d 6 , q d 6 ): the vector (p f 4,3 , q f 4,3 , v 3 ) encodes all the information from area 2 needed to compute the generator setpoint.…”
Section: Capturing Flows On Coupling Linesmentioning
confidence: 99%
See 1 more Smart Citation
“…Recent studies in SCACOPF have focused on improving the representation and tractability of realistic coupling constraints between the base case and contingencies (Dvorkin et al 2018, Velloso et al 2020, which permits not only optimizing the base case solution to make it secure, but also optimize the primary response of generators to contingencies. At the same time, novel machine learning techniques have begun to be proposed and theoretically validated for SCACOPF (Venzke and Chatzivasileiadis 2021), opening the door for future progress in the area, as is required by the evolving needs of power grids.…”
Section: State-of-the-art and Contributionsmentioning
confidence: 99%
“…In the US, TSOs like MISO and PJM execute a SCED every five minutes, which means that the optimization problem must be solved in an even tighter time frame, i.e., well under a minute [2]. Security constraints, which enforce robustness against the loss of any individual component, render SCED models particularly challenging for large systems [3]- [5] unless only a subset of contingencies is considered. With more distributed resources and increased operational uncertainty, such computational bottlenecks will only become more critical [2].…”
Section: Introductionmentioning
confidence: 99%