State-of-the-art, challenges, and future trends in security constrained optimal power flow

[1]  Jovica V. Milanovic,et al.  PEGASE R&D project: advanced algorithms for state estimation and simulation of the Pan-European power system , 2012 .

[2]  G. L. Torres,et al.  Robust Optimal Power Flow Solution Using Trust Region and Interior-Point Methods , 2011, IEEE Transactions on Power Systems.

[3]  L. Wehenkel,et al.  Redispatching Active and Reactive Powers Using a Limited Number of Control Actions , 2011, IEEE Transactions on Power Systems.

[4]  D. Ernst,et al.  Multistage Stochastic Programming: A Scenario Tree Based Approach to Planning under Uncertainty , 2011 .

[5]  L. Wehenkel,et al.  Security management under uncertainty: From day-ahead planning to intraday operation , 2010, 2010 IREP Symposium Bulk Power System Dynamics and Control - VIII (IREP).

[6]  L. Wehenkel,et al.  Sensitivity-Based Approaches for Handling Discrete Variables in Optimal Power Flow Computations , 2010, IEEE Transactions on Power Systems.

[7]  A.J. Conejo,et al.  Securing Transient Stability Using Time-Domain Simulations Within an Optimal Power Flow , 2010, IEEE Transactions on Power Systems.

[8]  L. Wehenkel,et al.  Optimal Power Flow Computations With a Limited Number of Controls Allowed to Move , 2010, IEEE Transactions on Power Systems.

[9]  D. Ruiz-Vega,et al.  Global Transient Stability-Constrained Optimal Power Flow Using an OMIB Reference Trajectory , 2010, IEEE Transactions on Power Systems.

[10]  S. Oren,et al.  Optimal transmission switching with contingency analysis , 2009, IEEE PES General Meeting.

[11]  Fabrice Zaoui,et al.  Loss reduction as a Mixed Integer optimization problem , 2009, 2009 IEEE Bucharest PowerTech.

[12]  L. Wehenkel,et al.  Optimal power flow computations with constraints limiting the number of control actions , 2009, 2009 IEEE Bucharest PowerTech.

[13]  Xifan Wang,et al.  A Robust Approach to Optimal Power Flow With Discrete Variables , 2009, IEEE Transactions on Power Systems.

[14]  L. Wehenkel,et al.  Coupling Optimization and Dynamic Simulation for Preventive-Corrective Control of Voltage Instability , 2009, IEEE Transactions on Power Systems.

[15]  J.D. McCalley,et al.  Decomposed SCOPF for Improving Efficiency , 2009, IEEE Transactions on Power Systems.

[16]  L. Wehenkel,et al.  A New Iterative Approach to the Corrective Security-Constrained Optimal Power Flow Problem , 2008, IEEE Transactions on Power Systems.

[17]  Jos√© Luis Mart√≠nez Ramos,et al.  Optimal and Secure Operation of Transmission Systems , 2008 .

[18]  K. Karoui,et al.  New large-scale security constrained optimal power flow program using a new interior point algorithm , 2008, 2008 5th International Conference on the European Electricity Market.

[19]  M. Ferris,et al.  Optimal Transmission Switching , 2008, IEEE Transactions on Power Systems.

[20]  K. Karoui,et al.  LARGE SCALE SECURITY CONSTRAINED OPTIMAL POWER FLOW , 2008 .

[21]  D. Ernst,et al.  Contingency Filtering Techniques for Preventive Security-Constrained Optimal Power Flow , 2007, IEEE Transactions on Power Systems.

[22]  J. McCalley,et al.  Risk-Based Security and Economy Tradeoff Analysis for Real-Time Operation , 2007, IEEE Transactions on Power Systems.

[23]  R.J. Thomas,et al.  On Computational Issues of Market-Based Optimal Power Flow , 2007, IEEE Transactions on Power Systems.

[24]  L. Wehenkel,et al.  Improving the Statement of the Corrective Security-Constrained Optimal Power-Flow Problem , 2007, IEEE Transactions on Power Systems.

[25]  Patrice Marcotte,et al.  An overview of bilevel optimization , 2007, Ann. Oper. Res..

[26]  O. Alsaç,et al.  Security Constrained Unit Commitment: Network Modeling and Solution Issues , 2006, 2006 IEEE PES Power Systems Conference and Exposition.

[27]  Fang Liu,et al.  A hybrid genetic algorithm-interior point method for optimal reactive power flow , 2006, IEEE Transactions on Power Systems.

[28]  M. Shahidehpour,et al.  AC contingency dispatch based on security-constrained unit commitment , 2006, IEEE Transactions on Power Systems.

[29]  Lorenz T. Biegler,et al.  On the implementation of an interior-point filter line-search algorithm for large-scale nonlinear programming , 2006, Math. Program..

[30]  T. Gedra,et al.  Optimal power flow with expected security costs , 2006, IEEE Transactions on Power Systems.

[31]  Mario Montagna,et al.  Optimal network reconfiguration for congestion management by deterministic and genetic algorithms , 2006 .

[32]  J. Usaola,et al.  Security-constrained optimal generation scheduling in large-scale power systems , 2006, IEEE Transactions on Power Systems.

[33]  V. Vittal,et al.  Corrective switching algorithm for relieving overloads and voltage violations , 2005, IEEE Transactions on Power Systems.

[34]  F. Bouffard,et al.  Market-clearing with stochastic security-part II: case studies , 2005, IEEE Transactions on Power Systems.

[35]  A. Conejo,et al.  Market-clearing with stochastic security-part I: formulation , 2005, IEEE Transactions on Power Systems.

[36]  J. Arroyo,et al.  Umbrella contingencies in security-constrained optimal power flow , 2005 .

[37]  Wei Qiu,et al.  A new parallel algorithm for security constrained optimal power flow with a nonlinear interior point method , 2005, IEEE Power Engineering Society General Meeting, 2005.

[38]  Wang Min,et al.  A trust region interior point algorithm for optimal power flow problems , 2005 .

[39]  Federico Milano,et al.  Voltage stability constrained OPF market models considering N−1 contingency criteria , 2005 .

[40]  Gerardo López Camino,et al.  A practical approach to solve power system constraints with application to the Spanish electricity market , 2004, IEEE Transactions on Power Systems.

[41]  Interior point cutting plane method for optimal power flow , 2004 .

[42]  Y. Ho,et al.  An ordinal optimization theory-based algorithm for solving the optimal power flow problem with discrete control variables , 2004 .

[43]  A comparison of the AC and DC power flow models for LMP calculations , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.

[44]  Mania Pavella,et al.  A comprehensive approach to transient stability control. I. Near optimal preventive control , 2003 .

[45]  Sae-Hyuk Kwon,et al.  Reactive reserve-based contingency constrained optimal power flow (RCCOPF) for enhancement of voltage stability margins , 2003 .

[46]  Hiroshi Sasaki,et al.  A solution of optimal power flow with multicontingency transient stability constraints , 2003 .

[47]  Yixin Ni,et al.  Available transfer capability calculation with static security constraints , 2003, 2003 IEEE Power Engineering Society General Meeting (IEEE Cat. No.03CH37491).

[48]  M. Pavella,et al.  A comprehensive approach to transient stability control part 1: near optimal preventive control , 2003, 2003 IEEE Power Engineering Society General Meeting (IEEE Cat. No.03CH37491).

[49]  Slobodan Pajic,et al.  Stochastic OPF by constraint relaxation , 2003, 2003 IEEE Bologna Power Tech Conference Proceedings,.

[50]  R. Casanova,et al.  A mixed-integer LP based network topology optimization algorithm for overload alleviation , 2003, 2003 IEEE Bologna Power Tech Conference Proceedings,.

[51]  D. Jayaweera,et al.  Value of Security: Modeling Time-Dependent Phenomena and Weather Conditions , 2002, IEEE Power Engineering Review.

[52]  S. Tso,et al.  An Extended Nonlinear Primal-Dual Interior-Point Algorithm for Reactive-Power Optimization of Large-Scale Power Systems with Discrete Control Variables , 2002, IEEE Power Engineering Review.

[53]  A. Bakirtzis,et al.  Optimal Power Flow by Enhanced Genetic Algorithm , 2002, IEEE Power Engineering Review.

[54]  T. Van Cutsem,et al.  Preventive control of voltage security margins : a multi-contingency sensitivity-based approach , 2002, IEEE Power Engineering Society Summer Meeting,.

[55]  E. De Tuglie,et al.  Transient security dispatch for the concurrent optimization of plural postulated contingencies , 2002, IEEE Power Engineering Society Summer Meeting,.

[56]  Robert A. Schlueter,et al.  Preventive and corrective open access system dispatch based on the voltage stability security assessment and diagnosis , 2001 .

[57]  Anna Pinnarelli,et al.  A model for the ISO insecurity costs management in a deregulated market scenario , 2001, 2001 IEEE Porto Power Tech Proceedings (Cat. No.01EX502).

[58]  G. L. Torres,et al.  On a nonlinear multiple-centrality-corrections interior-point method for optimal power flow , 2001, PICA 2001. Innovative Computing for Power - Electric Energy Meets the Market. 22nd IEEE Power Engineering Society. International Conference on Power Industry Computer Applications (Cat. No.01CH37195).

[59]  V. H. Quintana,et al.  On a Nonlinear Multiple-Centralitycorrections Interior-Point Method for Optimal Power Flow , 2001, IEEE Power Engineering Review.

[60]  E. Vaahedi,et al.  Dynamic security constrained optimal power flow/VAr planning , 2001 .

[61]  M. Dicorato,et al.  A corrective control for angle and voltage stability enhancement on the transient time-scale , 2001, 2001 IEEE Power Engineering Society Winter Meeting. Conference Proceedings (Cat. No.01CH37194).

[62]  B. J. Cory,et al.  A homogeneous linear programming algorithm for the security constrained economic dispatch problem , 2000 .

[63]  Deqiang Gan,et al.  Stability-constrained optimal power flow , 2000 .

[64]  Robert J. Vanderbei,et al.  Interior-point methods for nonconvex nonlinear programming: orderings and higher-order methods , 2000, Math. Program..

[65]  D. Ernst,et al.  Transient stability-constrained optimal power flow , 1999, PowerTech Budapest 99. Abstract Records. (Cat. No.99EX376).

[66]  P. Scarpellini,et al.  Real-time preventive actions for the enhancement of voltage-degraded trajectories , 1999 .

[67]  J. G. Rolim,et al.  A study of the use of corrective switching in transmission systems , 1999 .

[68]  G. L. Torres,et al.  An interior-point method for nonlinear optimal power flow using voltage rectangular coordinates , 1998 .

[69]  Goran Strbac,et al.  A method for computing the value of corrective security , 1998 .

[70]  Michele Trovato,et al.  On-line dynamic preventive control: an algorithm for transient security dispatch , 1998 .

[71]  Luonan Chen,et al.  Mean field theory for optimal power flow , 1997 .

[72]  John R. Birge,et al.  Introduction to Stochastic Programming , 1997 .

[73]  Hua Wei,et al.  An interior point nonlinear programming for optimal power flow problems with a novel data structure , 1997, Proceedings of the 20th International Conference on Power Industry Computer Applications.

[74]  P. Pruvot,et al.  Cyclic security analysis for security constrained optimal power flow , 1997 .

[75]  James A. Momoh,et al.  Challenges to optimal power flow , 1997 .

[76]  G. Irisarri,et al.  Maximum loadability of power systems using interior point nonlinear optimization method , 1997 .

[77]  Alex D. Papalexopoulos,et al.  Challenges To On-line Opf Implementation , 1997 .

[78]  S. Granville,et al.  Application of interior point methods to power flow unsolvability , 1996 .

[79]  J. Doyle,et al.  Robust and optimal control , 1995, Proceedings of 35th IEEE Conference on Decision and Control.

[80]  X. Guan,et al.  Fuzzy constraint enforcement and control action curtailment in an optimal power flow , 1995, Proceedings of Power Industry Computer Applications Conference.

[81]  J.N. Wrubel,et al.  Practical experience with corrective switching algorithm for on-line applications , 1995, Proceedings of Power Industry Computer Applications Conference.

[82]  Pierre Hansen,et al.  Links Between Linear Bilevel and Mixed 0–1 Programming Problems , 1995 .

[83]  A. Monticelli,et al.  Asynchronous programming model for the concurrent solution of the security constrained optimal power flow problem , 1994 .

[84]  S. Granville,et al.  Application of decomposition techniques to VAr planning: methodological and computational aspects , 1994 .

[85]  S. A. Soman,et al.  Curtailed number and reduced controller movement optimization algorithms for real time voltage/reactive power control , 1994 .

[86]  S. Granville Optimal reactive dispatch through interior point methods , 1994 .

[87]  R. E. Marsten,et al.  A direct nonlinear predictor-corrector primal-dual interior point algorithm for optimal power flows , 1993, Conference Proceedings Power Industry Computer Application Conference.

[88]  R. Bacher,et al.  Power System Models, Objectives and Constraints in Optimal Power Flow Calculations , 1993 .

[89]  S. M. Shahidehpour,et al.  Stochastic Approach to Small Disturbance Stability Analysis , 1992, IEEE Power Engineering Review.

[90]  W. Tinney,et al.  Discrete Shunt Controls in Newton Optimal Power Flow , 1992, IEEE Power Engineering Review.

[91]  Ignacio J. Pérez-Arriaga,et al.  A security-constrained decomposition approach to optimal reactive power planning , 1991 .

[92]  B. Stott,et al.  Further developments in LP-based optimal power flow , 1990 .

[93]  T.J. Bertram,et al.  An integrated package for real-time security enhancement , 1989, Conference Papers Power Industry Computer Application Conference.

[94]  Felix F. Wu,et al.  Large-scale optimal power flow , 1989 .

[95]  Ebrahim Vaahedi,et al.  Considerations in Applying Optimal Power Flow to Power System Operation , 1989, IEEE Power Engineering Review.

[96]  Felix F. Wu,et al.  Large-Scale Optimal Power Flow: Effects of Initialization, Decoupling & Discretization , 1989, IEEE Power Engineering Review.

[97]  H. Glavitsch,et al.  Security enhancement using an optimal switching power flow , 1989, Conference Papers Power Industry Computer Application Conference.

[98]  Kenichi Aoki,et al.  Optimal VAr planning by approximation method for recursive mixed-integer linear programming , 1988 .

[99]  W. F. Tinney,et al.  Some deficiencies in optimal power flow , 1988 .

[100]  R. Bacher,et al.  Loss reduction by network switching , 1988 .

[101]  Daniel S. Kirschen,et al.  MW/voltage control in a linear programming based optimal power flow , 1988 .

[102]  O. Alsac,et al.  Security analysis and optimization , 1987, Proceedings of the IEEE.

[103]  A. G. Bakirtzis,et al.  Incorporation of Switching Operations in Power System Corrective Control Computations , 1987, IEEE Transactions on Power Systems.

[104]  A. Monticelli,et al.  Security-Constrained Optimal Power Flow with Post-Contingency Corrective Rescheduling , 1987, IEEE Transactions on Power Systems.

[105]  R. Bacher,et al.  Network Topology Optimization with Security Constraints , 1986, IEEE Power Engineering Review.

[106]  B. F. Wollenberg,et al.  Corrective Control of Power System Flows by Line and Bus-Bar Switching , 1986, IEEE Transactions on Power Systems.

[107]  H. Glavitsch,et al.  Switching as means of control in the power system , 1985 .

[108]  A. Germond,et al.  NETWORK TOPOLOGY OPTIMIZATION FOR POWER SYSTEM SECURITY ENHANCEMENT. , 1983 .

[109]  O. Alsac,et al.  Optimal Load Flow with Steady-State Security , 1974 .

[110]  A. M. Geoffrion Generalized Benders decomposition , 1972 .

[111]  William F. Tinney,et al.  Optimal Power Flow Solutions , 1968 .

[112]  J. F. Benders Partitioning procedures for solving mixed-variables programming problems , 1962 .