Neural-Network Security-Boundary Constrained Optimal Power Flow

This paper proposes a new approach to model stability and security constraints in optimal power flow (OPF) problems based on a neural network (NN) representation of the system security boundary (SB). The novelty of this proposal is that a closed form, differentiable function derived from the system's SB is used to represent security constraints in an OPF model. The procedure involves two main steps: First, an NN representation of the SB is obtained based on back-propagation neural network (BPNN) training. Second, a differentiable mapping function extracted from the BPNN is used to directly incorporate this function as a constraint in the OPF model. This approach ensures that the operating points resulting from the OPF solution process are within a feasible and secure region, whose limits are better represented using the proposed technique compared to typical security-constrained OPF models. The effectiveness and feasibility of the proposed approach is demonstrated through the implementation, as well as testing and comparison using the IEEE two-area and 118-bus benchmark systems, of an optimal dispatch technique that guarantees system security in the context of competitive electricity markets.

[1]  F. Milano,et al.  An open source power system analysis toolbox , 2005, 2006 IEEE Power Engineering Society General Meeting.

[2]  D. Hill,et al.  Fast calculation of a voltage stability index , 1992 .

[3]  P. Kundur,et al.  Power system stability and control , 1994 .

[4]  João Peças Lopes,et al.  Real time preventive actions for transient stability enhancement with a hybrid neural network-optimization approach , 1995 .

[5]  Claudio A. Canizares,et al.  Fast prediction of loadability margins using neural networks to approximate security boundaries of power systems , 2007 .

[6]  Peter W. Sauer,et al.  Power System Dynamics and Stability , 1997 .

[7]  H. Schättler,et al.  Local bifurcations and feasibility regions in differential-algebraic systems , 1995, IEEE Trans. Autom. Control..

[8]  Deqiang Gan,et al.  Stability-constrained optimal power flow , 2000 .

[9]  M. Anjos,et al.  A practical voltage-stability-constrained optimal power flow , 2008, 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century.

[10]  R.J. Marks,et al.  Preliminary results on using artificial neural networks for security assessment (of power systems) , 1989, Conference Papers Power Industry Computer Application Conference.

[11]  Brian W. Kernighan,et al.  AMPL: A Modeling Language for Mathematical Programming , 1993 .

[12]  Ka Wing Chan,et al.  Transient stability screening using artificial neural networks within a dynamic security assessment system , 1996 .

[13]  E. De Tuglie,et al.  Transient security dispatch for the concurrent optimization of plural postulated contingencies , 2002, IEEE Power Engineering Society Summer Meeting,.

[14]  A. Berizzi,et al.  Comparison of voltage security constrained optimal power flow techniques , 2001, 2001 Power Engineering Society Summer Meeting. Conference Proceedings (Cat. No.01CH37262).

[15]  E. Acha,et al.  Modeling of VSC-Based HVDC Systems for a Newton-Raphson OPF Algorithm , 2007, IEEE Transactions on Power Systems.

[16]  S. Sahari,et al.  Development of artificial neural network for voltage stability monitoring , 2003, Proceedings. National Power Engineering Conference, 2003. PECon 2003..

[17]  James D. McCalley,et al.  Security boundary visualization for systems operation , 1997 .

[18]  Simon Haykin,et al.  Neural Networks: A Comprehensive Foundation , 1998 .

[19]  B. Jayasekara,et al.  Derivation of an Accurate Polynomial Representation of the Transient Stability Boundary , 2006, IEEE Transactions on Power Systems.

[20]  S. Talukdar,et al.  Trends in the history of large blackouts in the United States , 2008, 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century.

[21]  C.A. Canizares,et al.  Power system security in market clearing and dispatch mechanisms , 2006, 2006 IEEE Power Engineering Society General Meeting.

[22]  Enrique Acha,et al.  Efficient object oriented power systems software for the analysis of large-scale networks containing FACTS-controlled branches , 1998 .

[23]  H. Ghasemi,et al.  Benefits of employing an on-line security limit derivation tool in electricity markets , 2008, 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century.

[24]  T. T. Nguyen,et al.  Neural network load-flow , 1995 .

[25]  Enrico Carpaneto,et al.  The role of load demand elasticity in congestion management and pricing , 2000, 2000 Power Engineering Society Summer Meeting (Cat. No.00CH37134).

[26]  Sam Kodsi,et al.  Application of a Stability-Constrained Optimal Power Flow to Tuning of Oscillation Controls in Competitive Electricity Markets , 2007, IEEE Transactions on Power Systems.