Understanding the inefficiency of security-constrained economic dispatch

The security-constrained economic dispatch (SCED) problem tries to maintain the reliability of a power network by ensuring that a single failure does not lead to a global outage. The previous research has mainly investigated SCED by formulating the problem in different modalities, e.g. preventive or corrective, and devising efficient solutions for SCED. In this paper, we tackle a novel and important direction, and analyze the economic cost of incorporating security constraints in economic dispatch. Inspired by existing inefficiency metrics in game theory and computer science, we introduce notion of price of security as a metric that formally characterizes the economic inefficiency of SCED as compared to the original problem without security constraints. Then, we focus on the preventive approach in a simple topology comprising two buses and two lines, and investigate the impact of generation availability and demand distribution on the price of security. Moreover, we explicitly derive the worst-case input instance that leads to the maximum price of security. By experimental study on two test-cases, we verify the analytical results and provide insights for characterizing the price of security in general networks.

[1]  Enrique Mallada,et al.  A unified framework for frequency control and congestion management , 2016, 2016 Power Systems Computation Conference (PSCC).

[2]  T. Satoh,et al.  Economic Dispatch with Network Security Constraints Using Parametric Quadratic Programming , 1982, IEEE Transactions on Power Apparatus and Systems.

[3]  Fangxing Li,et al.  Small test systems for power system economic studies , 2010, IEEE PES General Meeting.

[4]  Qi Zhu,et al.  Peak-Aware Online Economic Dispatching for Microgrids , 2015, IEEE Transactions on Smart Grid.

[5]  Tim Roughgarden,et al.  How bad is selfish routing? , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.

[6]  W. Marsden I and J , 2012 .

[7]  Anuradha M. Annaswamy,et al.  An Integrated Dynamic Market Mechanism for Real-Time Markets and Frequency Regulation , 2016, IEEE Transactions on Sustainable Energy.

[8]  Neil Genzlinger A. and Q , 2006 .

[9]  O. Alsac,et al.  Optimal Load Flow with Steady-State Security , 1974 .

[10]  P. Kundur,et al.  Definition and classification of power system stability IEEE/CIGRE joint task force on stability terms and definitions , 2004, IEEE Transactions on Power Systems.

[11]  Tim Roughgarden,et al.  Algorithmic Game Theory , 2007 .

[12]  Dick Duffey,et al.  Power Generation , 1932, Transactions of the American Institute of Electrical Engineers.

[13]  P. A. Kaplunovich,et al.  Fast selection of N−2 contingencies for online security assessment , 2013, 2013 IEEE Power & Energy Society General Meeting.

[14]  G. Ejebe,et al.  Automatic Contingency Selection , 1979, IEEE Transactions on Power Apparatus and Systems.

[15]  Minghua Chen,et al.  Peak-Aware Online Economic Dispatching for Microgrids , 2018, IEEE Trans. Smart Grid.

[16]  F. Wen,et al.  Risk-based security-constrained economic dispatch in power systems , 2013 .

[17]  James D. McCalley,et al.  A Computational Strategy to Solve Preventive Risk-Based Security-Constrained OPF , 2013, IEEE Transactions on Power Systems.

[18]  O. Alsac,et al.  Security analysis and optimization , 1987, Proceedings of the IEEE.

[19]  R. P. Kumudini Devi,et al.  Evolutionary programming based security constrained optimal power flow , 2004 .

[20]  Michael C. Ferris,et al.  Computational Study of Security Constrained Economic Dispatch With Multi-Stage Rescheduling , 2015, IEEE Transactions on Power Systems.

[21]  Adam Wierman,et al.  Distributed optimization decomposition for joint economic dispatch and frequency regulation , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[22]  Enrique Mallada,et al.  Optimal Load-Side Control for Frequency Regulation in Smart Grids , 2014, IEEE Transactions on Automatic Control.

[23]  Allen J. Wood,et al.  Power Generation, Operation, and Control , 1984 .

[24]  A. Monticelli,et al.  Security-Constrained Optimal Power Flow with Post-Contingency Corrective Rescheduling , 1987, IEEE Transactions on Power Systems.