Research Article

Article:Security Constraint Optimal Power Flow (SCOPF) ñ A Comprehensive Survey

by  Mithun Bhaskar M, Srinivas Muthyala, Sydulu Maheswarapu
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 11 - Issue 6
Published: December 2010
Authors: Mithun Bhaskar M, Srinivas Muthyala, Sydulu Maheswarapu
10.5120/1583-2122
PDF

Mithun Bhaskar M, Srinivas Muthyala, Sydulu Maheswarapu . Article:Security Constraint Optimal Power Flow (SCOPF) ñ A Comprehensive Survey. International Journal of Computer Applications. 11, 6 (December 2010), 42-52. DOI=10.5120/1583-2122

                        @article{ 10.5120/1583-2122,
                        author  = { Mithun Bhaskar M,Srinivas Muthyala,Sydulu Maheswarapu },
                        title   = { Article:Security Constraint Optimal Power Flow (SCOPF) ñ A Comprehensive Survey },
                        journal = { International Journal of Computer Applications },
                        year    = { 2010 },
                        volume  = { 11 },
                        number  = { 6 },
                        pages   = { 42-52 },
                        doi     = { 10.5120/1583-2122 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2010
                        %A Mithun Bhaskar M
                        %A Srinivas Muthyala
                        %A Sydulu Maheswarapu
                        %T Article:Security Constraint Optimal Power Flow (SCOPF) ñ A Comprehensive Survey%T 
                        %J International Journal of Computer Applications
                        %V 11
                        %N 6
                        %P 42-52
                        %R 10.5120/1583-2122
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper reviews the existing developments in Security Constrained Optimal Power Flow (SCOPF) from 1960’s to till date. Diverse schemes and approaches on Single Area/Multi-area, Algorithms, Contingency Selection, Steady and Dynamic SCOPF, Artificial Intelligence based SCOPF, Real time and SCOPF using Parallel/Distributed Processing, Economic Dispatch with Security Constraints, Decentralized SCOPF, Voltage Constrained SCOPF (VSCOPF), Incorporation of FACTS on SCOPF studies and Literatures on Applications of SCOPF etc., are appraised in a structured manner chronologically with detailed reviews on the strategies and the test systems used for the analysis are reported. A brief summary of the existing stratagems and test system data which can be retrieved are given in the conclusion for easy access of researchers.

References
  • H. W. Dommel and W. F. Tinney, ‚Äú Optimal load flow solutions,‚Äù IEEE Trans. on Power Apparatus and Systems, Vol. PAS-87, pp. 1866-1876, Oct. 1968
  • J. Carpentier, "Optimal Power Flows: Uses, methods and developments", IFAC Symposium on planning and operation of electric energy systems. Rio de Janeiro, July 1985 (Invited survey paper)
  • M. Huneault and F. D. Galiana, ‚ÄúA Survey of the Optimal Power Flow Literature,‚Äù IEEE Trans. Power Systems, vol. 6, pp. 762-770, May 1991
  • N. M. Peterson, W. F. Tinney & D. W. Bree, "Iterative linear power flow solution for fast approximate outage studies", IEEE Trans. on Power Apparatus and Systems, Vol. PAS-91, pp. 2048-2053, September/ October, 1972
  • Wells, D.W., "Method for Economic Secure Loading of a Power System", IEE Proceedings, Vol. 115, No. 8, pp. 1190-1194, Aug. 1968
  • El-Hawary, M.E. and Dias, L.G., "Bus Sensitivity to Model Parameters in Load-Flow Studies", IEE Proceedings, Vol. 134, Part C, No.4, pp. 302-305, July 1987.
  • Kaltenbach, J.C. and Hajdu, L.P., "Optimal Corrective Rescheduling for Power System Security", IEEE Trans. Power App. and Syst., Vol. PAS-90, No. 2, pp 843-851, March/April, l971
  • Shen, C.M. and Laughton, M A., "Power System Load Scheduling with Security Constraints using Dual Linear programming', IEE Proceedings, Vol. 117, No. 11, pp. 2117-2127, Nov. 1970
  • O. Alsac and B. Stott, ‚ÄúOptimal load flow with steady state security,‚Äù IEEE Trans. on Power Apparatus and Systems, Vol. PAS-93, pp. 745-751, May/June 1974
  • Monticelli, A.; Pereira, M. V. F.; Granville, S., "Security-Constrained Optimal Power Flow with Post-Contingency Corrective Rescheduling," Power Systems, IEEE Transactions on , vol.2, no.1, pp.175-180, Feb. 1987
  • Carpentier, J., "Differential Injections Method: A General Method for Secure and Optimal Load Flows", IEEE PICA Conference Proceedings Minneapolis, MN, pp. 255-262, June 1973
  • Elacqua, A. J. and Corey, S. L., "Security Constrained Dispatch at the New York Power Pool", IEEE Trans. Power App. Syst., Vol. PAS-101, pp. 2876-2884, Aug. 1982.
  • Schnyder, G. and Glavitsch, H., "Integrated Security Control Using an Optimal Power Flow and Switching Concepts", IEEE PICA Conference Proceedings, Montreal, Canada, pp. 429436, May 1987
  • Stott, B. and Hobson, E., "Power System Security Control Calculations Using Linear Programming Pam I and 2", IEEE Trans. Power App. Systems., Vol. PAS-97, pp. 1713-1731, Sept./Oct. 1978
  • Dias, L.G. and El-Hawary, M.E., "Effects of Load Modeling in Security Constrained OPF Studies", IEEE Trans. on Power Systems, Vol. 6, No.2, pp. 87-93, February 1991
  • Saavedra, O.R., "Solving the security constrained optimal power flow problem in a distributed computing environment," Generation, Transmission and Distribution, IEE Proceedings, vol.143, no.6, pp.593-598, Nov 1996
  • Rodrigues, M.; Saavedra, O.R.; Monticelli, A., "Asynchronous programming model for the concurrent solution of the security constrained optimal power flow problem," Power Systems, IEEE Transactions on, vol.9, no.4, pp.2021-2027, Nov 1994
  • F. Gagliardi, E Chiodo, D Mehnniti and A. Tesla, "A pattern recognition approach for steady state security evaluation of an Electrical Power system" European Trans on Electrical Power Engineering, Vol. I, No.5. pp. 243-251, 1991.
  • D Menniti, D Picardi, C Sorrentino, N Tesla, "Neural network based prediction of the steady state security for electrical power system," 2nd IFAC Sipower'95, Mexico Mexico, 6-8 December 1995
  • Conforti, D.; Menniti, D.; Sorrentino, N.; Verde, P.; Testa, A., "Optimal load-flow with N-1 steady-state security via high performance computing," Electrotechnical Conference, 1996. MELECON '96., 8th Mediterranean , vol.2, no., pp.873-879 vol.2, 13-16 May 1996
  • E.Vaahedi, Y.Mansour, C.Fuches, S. Granville, M.Latore, H.Hamadanizadeh, "Dynamic Security Constrained Optimal Power Flow/VAr Planning", IEEE Transaction on Power Systems, Vol. 16, No. 1, pp 38-43, February 2001
  • Hur, D.; Jong-Keun Park; Kim, B.H.; Kwang-Myoung Son, "Security constrained optimal power flow for the evaluation of transmission capability on Korea electric power system," Power Engineering Society Summer Meeting, 2001. IEEE, vol.2, pp.1133-1138, 2001
  • Lizhi Wang, Mainak Mazumdar, "Contingency Selection in Security Constrained Optimal Power Flow Problem: A Multi-Objective Approach", Electricity Conference 2006
  • Y. Yuan, J. Kubokawa, and H. Sasaki, ‚ÄúA solution of optimal power flow with multi-contingency transient stability constraints,‚Äù IEEE Trans. on Power Systems, Vol. 18, No. 3, pp. 1094-1102, Aug. 2003
  • F. Bouffard, F. D. Galiana, J. M. Arroyo. "Umbrella Contingencies in Security-Constrained Optimal Power Flow". 15th Power Systems Computation Conference, PSCC'05. Liege, Belgium. August 2005
  • Capitanescu, F.; Glavic, M.; Ernst, D.; Wehenkel, L., "Contingency Filtering Techniques for Preventive Security-Constrained Optimal Power Flow," Power Systems, IEEE Transactions on , vol.22, no.4, pp.1690-1697, Nov. 2007
  • V. C. Ramesh and Xuan Li, ‚ÄúA fuzzy multi-objective approach to contingency constrained OPF‚Äù, IEEE Trans. Power Syst., vol. 12, no. 3, pp.1348-1354, Aug. 1997
  • Devaraj, D.; Yegnanarayana, B., "Genetic-algorithm-based optimal power flow for security enhancement," Generation, Transmission and Distribution, IEE Proceedings- , vol.152, no.6, pp. 899-905, 4 Nov. 2005
  • Lopez-Lezama, J.M.; Murillo-Sanchez, C.E.; Zuluaga, L.J.; Gutierrez-Gomez, J.F., "A Contingency-Based Security-Constrained Optimal Power Flow Model For Revealing The Marginal Cost of a Blackout Risk-Equalizing Policy in the Colombian Electricity Market," Transmission & Distribution Conference and Exposition: Latin America, 2006. TDC '06. IEEE/PES , vol., no., pp.1-6, 15-18 Aug. 2006
  • Aganagic, M.; Mokhtari, S., "Security constrained economic dispatch using nonlinear Dantzig-Wolfe decomposition," Power Systems, IEEE Transactions on , vol.12, no.1, pp.105-112, Feb 1997
  • Yan, X.; Quintana, V.H., "An efficient predictor-corrector interior point algorithm for security-constrained economic dispatch," Power Systems, IEEE Transactions on , vol.12, no.2, pp.803-810, May 1997
  • Vargas, L.S.; Quintana, V.H.; Vannelli, A., "A tutorial description of an interior point method and its applications to security-constrained economic dispatch," Power Systems, IEEE Transactions on , vol.8, no.3, pp.1315-1324, Aug 1993
  • Jabr, R.A.; Coonick, A.H.; Cory, B.J., "A homogeneous linear programming algorithm for the security constrained economic dispatch problem," IEEE Transactions on Power Systems, vol.15, no.3, pp.930-936, Aug 2000
  • Yong Fu; Shahidehpour, M.; Zuyi Li, "AC contingency dispatch based on security-constrained unit commitment," Power Systems, IEEE Transactions on , Vol.21, No.2, pp. 897-908, May 2006
  • Kyoung-Shin Kim; Leen-Hark Jung; Seung-Chul Lee; Un-Chul Moon, "Security Constrained Economic Dispatch Using Interior Point Method, "International Conference on Power System Technology, PowerCon 2006. pp.1-6, 22-26 Oct. 2006
  • Capitanescu, F.; Wehenkel, L., "A New Iterative Approach to the Corrective Security-Constrained Optimal Power Flow Problem," Power Systems, IEEE Transactions on , vol.23, no.4, pp.1533-1541, Nov. 2008
  • Harsan, H.; Hadjsaid, N.; Pruvot, P., "Cyclic security analysis for security constrained optimal power flow," IEEE Transactions on Power Systems, vol.12, no.2, pp.948-953, May 1997
  • Zaoui, F.; Fliscounakis, S., "A Direct Approach for the Security Constrained," Power Systems Conference and Exposition, 2006. PSCE '06. 2006 IEEE PES , vol., no., pp.1562-1569, Oct. 29 2006-Nov. 1, 2006
  • P. E. Onate Yumbla, J. M. Ramirez, and C. A. Coello, "Optimal power flow subject to security constraints solved with a Particle swarm optimizer," IEEE Transactions on Power Systems, Vol. 23, No. 1, pp. 33-40, February 2008
  • L. L. Lai, J. T. Ma, R. Yokoyama, and M. Zhao, ‚Äú Improved genetic algorithms for optimal power flow under both normal and contingent operation states,‚Äù Electrical Power & Energy Systems, Vol. 19, No. 5, pp. 287-292, June 1997
  • P.Somasundaram, K., Kuppusamy, and Kumudini Devi, ‚ÄúEvolutionary programming based security constrained optimal power flow‚Äù, Electric Power System Research, Elsevier, pp. 137-145, 2004
  • Zwe-Lee Gaing; Rung-Fang Chang, "Security-constrained optimal power flow by mixed-integer genetic algorithm with arithmetic operators," IEEE Power Engineering Society General Meeting, pp. 1-8, 2006
  • Stott, B.; Alsac, O.; Monticelli, A.J., "Security analysis and optimization," Proceedings of the IEEE, Vol.75, No.12, pp. 1623-1644, Dec. 1987
  • J. A. Momoh and J. Zhu, ‚ÄúMulti-area power systems economic dispatch using nonlinear convex network flow programming‚Äù, Electric Power Syst. Research, vol. 59, pp. 13-20, 2001
  • Karoui, K.; Platbrood, L.; Crisciu, H.; Waltz, R.A., "New large-scale security constrained optimal power flow program using a new interior point algorithm," Electricity Market, 2008. EEM 2008. 5th International Conference on European , vol., no., pp.1-6, 28-30 May 2008
  • Anibal T. de Azevedo, Carlos A. Castro, Aurelio R.L. Oliveira, Secundino Soares, "Security constrained optimal active power flow via Network model and interior point method", Revista Controle & Automa√ß√£o/Vol.20 no.2, pp 206-216/Abril, Maio e Junho 2009
  • Claudio Ca√±izares, William Rosehart, Alberto Berizzi, Cristian Bovo, "Comparison of Voltage Security Constrained Optimal Power Flow Techniques", Proc. 2001 IEEE-PES Summer Meeting, Vancouver, BC, July 2001
  • D. Devaraj, J. Preetha Roselyn, "Improved genetic algorithm for voltage security constrained optimal power flow problem", International Journal of Energy Technology and Policy, Vol. 5, No. 4, pp.475-488, 2007
  • Nakawiro, W.; Erlich, I., "A Combined GA-ANN Strategy for Solving Optimal Power Flow with Voltage Security Constraint," Power and Energy Engineering Conference, 2009. APPEEC 2009. Asia-Pacific , vol., no., pp.1-4, 27-31 March 2009
  • Biskas, P.N.; Bakirtzis, A.G., "A decentralized solution to the Security Constrained DC-OPF problem of multi-area power systems," Power Tech, 2005 IEEE Russia , pp.1-7, pp. 27-30, June 2005
  • Don Hur, Kim Balho, "Application of Distributed Optimal Power Flow to Power System Security Assessment", Journal of Electric Power Components and Systems, Taylor & Francis, Vol. 31, Issue. 1, pp. 71-80, 2003
  • Wei Qiu; Flueck, A.J.; Feng Tu, "A new parallel algorithm for security constrained optimal power flow with a nonlinear interior point method," Power Engineering Society General Meeting, 2005. IEEE , pp. 447-453 Vol. 1, 12-16 June 2005
  • Borges, C.L.T.; Alves, J.M.T., "Power System Real Time Operation based on Security Constrained Optimal Power Flow and Distributed Processing," Power Tech, 2007 IEEE Lausanne , vol., no., pp.960-965, 1-5 July 2007
  • C. Lehmk√∂ster, ‚ÄúSecurity constrained optimal power flow for an economical operation of FACTS-devices in liberalized energy markets,‚Äù IEEE Trans. Power Del., vol. 17, no. 2, pp. 603‚Äì608, Apr. 2002
  • Berizzi, A.; Delfanti, M.; Marannino, P.; Pasquadibisceglie, M.S.; Silvestri, A., "Enhanced Security-Constrained OPF With FACTS Devices," Power Systems, IEEE Transactions on , vol.20, no.3, pp. 1597-1605, Aug. 2005
  • Glanzmann, G.; Andersson, G., "Incorporation of N-1 Security into Optimal Power Flow for FACTS Control," Power Systems Conference and Exposition, 2006. PSCE '06. 2006 IEEE PES , vol., no., pp.683-688, Oct. 29 2006-Nov. 1, 2006
  • R, Narmatha Banu, D, Devaraj, "Enhanced genetic algorithm approach for Security constrained optimal power flow Including FACTS devices", International Journal of Electrical Power and Energy Systems Engineering, pp. 33-38, 2009
  • T.S. Prasanna, N.B. Muthuselvan, P. Somasundaram, "Security constrained OPF by Fuzzy stochastic Algorithms in Interconnected Power Systems", Journal of Electrical Engineering, 5-1, 2009
  • G. Hug-Glanzmann, G. Andersson, "N-1 security in optimal power flow control applied to limited areas", IET Generation, Transmission and Distribution, Vol. 3, Issue. 2, pp. 206‚Äì215, 2009
  • F. Capitanescu, M. Glavic, D. Ernst, L. Wehenkel, "Applications of Security-Constrained Optimal Power Flows", Modern Electric Power Systems Symposium, MEPS06, Wroclaw, Poland, September 2006
  • R Jayashree, M Abdullah Khan, "A Mutli-Transaction based Security Constrained Optimal Power Flow tool for Assessment of Available transfer capability and Congestion Management", International Journal of Electrical and Power Engineering, pp. 501-511, 2007
  • Sarbjeet Kaur Bath, Jaspreet Singh Dhillon, and D P Kothari. "Security Constrained Stochastic Multi-objective Optimal Power Dispatch" International Journal of Emerging Electric Power Systems 8.1, 2007
  • Thomas, R.J.; Murillo-Sanchez, C.E.; Zimmerman, R.D., "An advanced security constrained OPF that produces correct market-based pricing," Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century, 2008 IEEE , vol., no., pp.1-6, 20-24 July 2008
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Optimal Power Flow Optimization Techniques Security Constrained Optimal Power Flow (SCOPF) Security Analysis Flexible AC Transmission System

Powered by PhDFocusTM