2022
DOI: 10.1016/j.epsr.2022.108566
|View full text |Cite
|
Sign up to set email alerts
|

Learning optimization proxies for large-scale Security-Constrained Economic Dispatch

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 28 publications
(14 citation statements)
references
References 53 publications
0
14
0
Order By: Relevance
“…The values are plotted in log-scaled, highlighting the skewed nature of the active powers and voltage magnitudes: indeed, most values lie on their extreme limits. This has been observed before, leading to the use of the classificationthen-regression approach [12]. However, fortunately, Figure 2 (right) shows that the distribution of the principal components is well-posed: it is more convenient to learn the regression to the principal components rather than to the original optimal solution space directly.…”
Section: Dimension Reduction Through Pcamentioning
confidence: 74%
See 1 more Smart Citation
“…The values are plotted in log-scaled, highlighting the skewed nature of the active powers and voltage magnitudes: indeed, most values lie on their extreme limits. This has been observed before, leading to the use of the classificationthen-regression approach [12]. However, fortunately, Figure 2 (right) shows that the distribution of the principal components is well-posed: it is more convenient to learn the regression to the principal components rather than to the original optimal solution space directly.…”
Section: Dimension Reduction Through Pcamentioning
confidence: 74%
“…This approach has attracted significant attention in power system applications recently because it holds the promise of decreasing the computation time needed to solve recurring optimization problems with reasonably small variations of the input parameters. For example, a classification-them-regression framework [12] was proposed to directly estimate the optimal solutions to the security constrained economic dispatch (SCED) problem. Because of the existence of the bound constraints, they recognized that the majority of the generators are at their maximum/minimum limits in optimal solutions.…”
Section: Related Workmentioning
confidence: 99%
“…Chen et al [14] use supervised learning to approximate a large-scale security-constrained economic dispatch. The cost coefficients are part of the NN input and get sampled from a fixed data set.…”
Section: B Learning the Optimal Power Flowmentioning
confidence: 99%
“…Recent contributions include the concepts of self‐supervised primal‐dual learning (Park and Van Hentenryck 2023), compact learning (Park et al. 2023), and end‐to‐end learning and repair (Chen, Tanneau, and Van Hentenryck 2023). The thrust draws inspiration from the end‐use cases in energy systems and supply chains, and also explores topics in decision‐focused learning, learning to optimize, verification, explanation, and formal guarantees.…”
Section: Methodology Thrustsmentioning
confidence: 99%
“…A single simulation may take up to 15 min, given the computational complexity and the sheer number of optimization problems, making it impractical to assess risk in real time. Work by the institute has shown that optimization proxies make it possible to run these simulations in 5 s (two to three orders of magnitude faster), identifying risk with very high accuracy (Chen, Tanneau, and Van Hentenryck 2023). Real‐time risk assessment represents one of the early successes of AI4OPT, demonstrating the true potential of fusing AI and optimization.…”
Section: Optimization Proxiesmentioning
confidence: 99%