Security constrained optimal power flow for the evaluation of transmission capability on Korea electric power system

This paper presents an algorithm for the parallel solution of the security constrained optimal power flow (SCOPF) problem in a decentralized framework, consisting of regions, using a price-based mechanism that models each region as an economic unit. We first solve the distributed optimal power flow (OPF) problem to determine the maximum secure simultaneous transfer capability of each tie-line between adjacent regions by taking only the security constraints imposed on the tie-lines into account. In this study, the line outage distribution factors (LODF) calculated at the current state are used to formulate the appended constraints. Once the secure transfer capability of each tie-line is determined, the maximum secure transfer capability of tie-lines joining two regions is solved in such a way that the transmission system can also stay within limits in the event of turning generation units off when they are not needed. A description on the inclusion of security constraints with distributed optimal power flow algorithm is given, followed by case studies for Korea power system.

[1]  B. H. Kim,et al.  A comparison of distributed optimal power flow algorithms , 2000 .

[2]  Balho H. Kim,et al.  A fast distributed implementation of optimal power flow , 1999 .

[3]  H.J.C.P. Pinto,et al.  Developing concurrent processing applications to power system planning and operations , 1989, Conference Papers Power Industry Computer Application Conference.

[4]  Allen J. Wood,et al.  Power Generation, Operation, and Control , 1984 .

[5]  Ross Baldick,et al.  Coarse-grained distributed optimal power flow , 1997 .

[6]  O. Alsac,et al.  Optimal Load Flow with Steady-State Security , 1974 .

[7]  B Stott,et al.  Linear Programming for Power-System Network Security Applications , 1979, IEEE Transactions on Power Apparatus and Systems.

[8]  M.A. Tantawy,et al.  Fast Technique for Power System Security Assessment Using Sensitivity Parameters of Linear Programming , 1984, IEEE Transactions on Power Apparatus and Systems.

[9]  A. J. Elacqua,et al.  Security Constrained Dispatch at the New York Power Pool , 1982, IEEE Power Engineering Review.

[10]  H.H. Happ,et al.  Large Scale Security Dispatching: an Exact Model , 1983, IEEE Transactions on Power Apparatus and Systems.

[11]  A. Monticelli,et al.  Security-Constrained Optimal Power Flow with Post-Contingency Corrective Rescheduling , 1987, IEEE Transactions on Power Systems.

[12]  O. Alsac,et al.  Security analysis and optimization , 1987, Proceedings of the IEEE.