An sequential linear programming algorithm for security-constrained optimal power flow

This paper describes a new formulation of the security-constrained optimal power flow (SCOPF) problem and proposes a sequential linear programming algorithm for its solution. The new formulation introduces mismatch variables to ensure that the algorithm remains in the feasible region. Thus the algorithm starts from an arbitrary state: mismatch currents are computed and introduced at each bus to make the present iterate appear in a feasible region. The algorithm moves the solution towards the optimal while minimizes the mismatch variables. When the mismatch variables are zeroed, the optimal has been found. At each iteration, the problem is formulated as a nonlinear optimization problem with linear or quadratic equations via a quadratization procedure presented in earlier papers. The formulation and algorithm is demonstrated on a three-bus system.

[1]  William F. Tinney,et al.  Optimal Power Flow Solutions , 1968 .

[2]  Louis Wehenkel,et al.  Applications of an interior point method based optimal power flow , 2005 .

[3]  G. L. Torres,et al.  An interior-point method for nonlinear optimal power flow using voltage rectangular coordinates , 1998 .

[4]  Yasuo Tamura,et al.  A Load Flow Calculation Method for Ill-Conditioned Power Systems , 1981, IEEE Transactions on Power Apparatus and Systems.

[5]  Louis Wehenkel,et al.  Experience with the multiple centrality corrections interior point algorithm for optimal power flow , 2005 .

[6]  Yong Fu,et al.  Benders decomposition: applying Benders decomposition to power systems , 2005 .

[7]  G.K. Stefopoulos,et al.  Contingency Simulation Using Single Phase Quadratized Power Flow , 2006, 2006 International Conference on Probabilistic Methods Applied to Power Systems.

[8]  R. E. Marsten,et al.  A direct nonlinear predictor-corrector primal-dual interior point algorithm for optimal power flows , 1993 .

[9]  G.K. Stefopoulos,et al.  Quadratized Three-Phase Induction Motor Model for Steady-State and Dynamic Analysis , 2006, 2006 38th North American Power Symposium.

[10]  J. Usaola,et al.  Security-constrained optimal generation scheduling in large-scale power systems , 2006, IEEE Transactions on Power Systems.

[11]  W. Tinney,et al.  Optimal Power Flow By Newton Approach , 1984, IEEE Transactions on Power Apparatus and Systems.

[12]  B. Stott,et al.  Power System Security Control Calculations Using Linear Programming, Part I , 1978, IEEE Transactions on Power Apparatus and Systems.