Security constrained optimization-a case study (power system control)

A comparison has been made between two approaches for steady-state bulk transmission system voltage analysis: a conventional approach using both a power flow program and an optimal power flow program (OPF), and a novel software tool. This program, the security-constrained optimization program (SCO), has been introduced and demonstrated to be effective in solving difficult capacitor planning studies. The solutions from the SCO not only optimize the precontingency system conditions as an OPF, but the effects of all of the postcontingency constraints are included. All existing system control variables are set at their optimal preventive mode values by the program. The algorithm is efficient, requiring little overhead per contingency beyond a conventional OPF solution. The results of a comparison between the SCO and a conventional study solution show that the SCO computes accurate solutions in a fraction of the time required using conventional means. >

[1]  A. J. Elacqua,et al.  Security Constrained Dispatch at the New York Power Pool , 1982, IEEE Power Engineering Review.

[2]  A. Monticelli,et al.  An integrated methodology for VAr sources planning , 1988 .

[3]  Renato Lugtu,et al.  Security Constrained Dispatch , 1979, IEEE Transactions on Power Apparatus and Systems.

[4]  H. Happ,et al.  Quadratically Convergent Optimal Power Flow , 1984, IEEE Transactions on Power Apparatus and Systems.

[5]  W. Tinney,et al.  Optimal Power Flow By Newton Approach , 1984, IEEE Transactions on Power Apparatus and Systems.

[6]  O. Alsac,et al.  Optimal Load Flow with Steady-State Security , 1974 .

[7]  A. Monticelli,et al.  Security-Constrained Optimal Power Flow with Post-Contingency Corrective Rescheduling , 1987, IEEE Transactions on Power Systems.

[8]  H.H. Happ,et al.  Large Scale Security Dispatching: an Exact Model , 1983, IEEE Transactions on Power Apparatus and Systems.

[9]  H. Glavitsch,et al.  Integrated security control using an optimal power flow and switching concepts , 1988 .

[10]  B Stott,et al.  Linear Programming for Power-System Network Security Applications , 1979, IEEE Transactions on Power Apparatus and Systems.

[11]  V. F. Carvalho,et al.  Assessment of Real-Time Optimal Voltage Control , 1986, IEEE Transactions on Power Systems.