Call for Paper - April 2023 Edition
IJCA solicits original research papers for the April 2023 Edition. Last date of manuscript submission is March 20, 2023. Read More

Security Constraint Optimal Power Flow (SCOPF) – A Comprehensive Survey

Print
PDF
International Journal of Computer Applications
© 2010 by IJCA Journal
Number 6 - Article 8
Year of Publication: 2010
Authors:
Mithun Bhaskar M
Srinivas Muthyala
Sydulu Maheswarapu
10.5120/1583-2122

Mithun Bhaskar M, Srinivas Muthyala and Sydulu Maheswarapu. Article:Security Constraint Optimal Power Flow (SCOPF) A Comprehensive Survey. International Journal of Computer Applications 11(6):42–52, December 2010. Published By Foundation of Computer Science. BibTeX

@article{key:article,
	author = {Mithun Bhaskar M and Srinivas Muthyala and Sydulu Maheswarapu},
	title = {Article:Security Constraint Optimal Power Flow (SCOPF)  A Comprehensive Survey},
	journal = {International Journal of Computer Applications},
	year = {2010},
	volume = {11},
	number = {6},
	pages = {42--52},
	month = {December},
	note = {Published By Foundation of Computer Science}
}

Abstract

This paper reviews the existing developments in Security Constrained Optimal Power Flow (SCOPF) from 1960’s to till date. Diverse schemes and approaches on Single Area/Multi-area, Algorithms, Contingency Selection, Steady and Dynamic SCOPF, Artificial Intelligence based SCOPF, Real time and SCOPF using Parallel/Distributed Processing, Economic Dispatch with Security Constraints, Decentralized SCOPF, Voltage Constrained SCOPF (VSCOPF), Incorporation of FACTS on SCOPF studies and Literatures on Applications of SCOPF etc., are appraised in a structured manner chronologically with detailed reviews on the strategies and the test systems used for the analysis are reported. A brief summary of the existing stratagems and test system data which can be retrieved are given in the conclusion for easy access of researchers.

Reference

  • H. W. Dommel and W. F. Tinney, “ Optimal load flow solutions,” IEEE Trans. on Power Apparatus and Systems, Vol. PAS-87, pp. 1866-1876, Oct. 1968
  • J. Carpentier, "Optimal Power Flows: Uses, methods and developments", IFAC Symposium on planning and operation of electric energy systems. Rio de Janeiro, July 1985 (Invited survey paper)
  • M. Huneault and F. D. Galiana, “A Survey of the Optimal Power Flow Literature,” IEEE Trans. Power Systems, vol. 6, pp. 762-770, May 1991
  • N. M. Peterson, W. F. Tinney & D. W. Bree, "Iterative linear power flow solution for fast approximate outage studies", IEEE Trans. on Power Apparatus and Systems, Vol. PAS-91, pp. 2048-2053, September/ October, 1972
  • Wells, D.W., "Method for Economic Secure Loading of a Power System", IEE Proceedings, Vol. 115, No. 8, pp. 1190-1194, Aug. 1968
  • El-Hawary, M.E. and Dias, L.G., "Bus Sensitivity to Model Parameters in Load-Flow Studies", IEE Proceedings, Vol. 134, Part C, No.4, pp. 302-305, July 1987.
  • Kaltenbach, J.C. and Hajdu, L.P., "Optimal Corrective Rescheduling for Power System Security", IEEE Trans. Power App. and Syst., Vol. PAS-90, No. 2, pp 843-851, March/April, l971
  • Shen, C.M. and Laughton, M A., "Power System Load Scheduling with Security Constraints using Dual Linear programming', IEE Proceedings, Vol. 117, No. 11, pp. 2117-2127, Nov. 1970
  • O. Alsac and B. Stott, “Optimal load flow with steady state security,” IEEE Trans. on Power Apparatus and Systems, Vol. PAS-93, pp. 745-751, May/June 1974
  • Monticelli, A.; Pereira, M. V. F.; Granville, S., "Security-Constrained Optimal Power Flow with Post-Contingency Corrective Rescheduling," Power Systems, IEEE Transactions on , vol.2, no.1, pp.175-180, Feb. 1987
  • Carpentier, J., "Differential Injections Method: A General Method for Secure and Optimal Load Flows", IEEE PICA Conference Proceedings Minneapolis, MN, pp. 255-262, June 1973
  • Elacqua, A. J. and Corey, S. L., "Security Constrained Dispatch at the New York Power Pool", IEEE Trans. Power App. Syst., Vol. PAS-101, pp. 2876-2884, Aug. 1982.
  • Schnyder, G. and Glavitsch, H., "Integrated Security Control Using an Optimal Power Flow and Switching Concepts", IEEE PICA Conference Proceedings, Montreal, Canada, pp. 429436, May 1987
  • Stott, B. and Hobson, E., "Power System Security Control Calculations Using Linear Programming Pam I and 2", IEEE Trans. Power App. Systems., Vol. PAS-97, pp. 1713-1731, Sept./Oct. 1978
  • Dias, L.G. and El-Hawary, M.E., "Effects of Load Modeling in Security Constrained OPF Studies", IEEE Trans. on Power Systems, Vol. 6, No.2, pp. 87-93, February 1991
  • Saavedra, O.R., "Solving the security constrained optimal power flow problem in a distributed computing environment," Generation, Transmission and Distribution, IEE Proceedings, vol.143, no.6, pp.593-598, Nov 1996
  • Rodrigues, M.; Saavedra, O.R.; Monticelli, A., "Asynchronous programming model for the concurrent solution of the security constrained optimal power flow problem," Power Systems, IEEE Transactions on, vol.9, no.4, pp.2021-2027, Nov 1994
  • F. Gagliardi, E Chiodo, D Mehnniti and A. Tesla, "A pattern recognition approach for steady state security evaluation of an Electrical Power system" European Trans on Electrical Power Engineering, Vol. I, No.5. pp. 243-251, 1991.
  • D Menniti, D Picardi, C Sorrentino, N Tesla, "Neural network based prediction of the steady state security for electrical power system," 2nd IFAC Sipower'95, Mexico Mexico, 6-8 December 1995
  • Conforti, D.; Menniti, D.; Sorrentino, N.; Verde, P.; Testa, A., "Optimal load-flow with N-1 steady-state security via high performance computing," Electrotechnical Conference, 1996. MELECON '96., 8th Mediterranean , vol.2, no., pp.873-879 vol.2, 13-16 May 1996
  • E.Vaahedi, Y.Mansour, C.Fuches, S. Granville, M.Latore, H.Hamadanizadeh, "Dynamic Security Constrained Optimal Power Flow/VAr Planning", IEEE Transaction on Power Systems, Vol. 16, No. 1, pp 38-43, February 2001
  • Hur, D.; Jong-Keun Park; Kim, B.H.; Kwang-Myoung Son, "Security constrained optimal power flow for the evaluation of transmission capability on Korea electric power system," Power Engineering Society Summer Meeting, 2001. IEEE, vol.2, pp.1133-1138, 2001
  • Lizhi Wang, Mainak Mazumdar, "Contingency Selection in Security Constrained Optimal Power Flow Problem: A Multi-Objective Approach", Electricity Conference 2006
  • Y. Yuan, J. Kubokawa, and H. Sasaki, “A solution of optimal power flow with multi-contingency transient stability constraints,” IEEE Trans. on Power Systems, Vol. 18, No. 3, pp. 1094-1102, Aug. 2003
  • F. Bouffard, F. D. Galiana, J. M. Arroyo. "Umbrella Contingencies in Security-Constrained Optimal Power Flow". 15th Power Systems Computation Conference, PSCC'05. Liege, Belgium. August 2005
  • Capitanescu, F.; Glavic, M.; Ernst, D.; Wehenkel, L., "Contingency Filtering Techniques for Preventive Security-Constrained Optimal Power Flow," Power Systems, IEEE Transactions on , vol.22, no.4, pp.1690-1697, Nov. 2007
  • V. C. Ramesh and Xuan Li, “A fuzzy multi-objective approach to contingency constrained OPF”, IEEE Trans. Power Syst., vol. 12, no. 3, pp.1348-1354, Aug. 1997
  • Devaraj, D.; Yegnanarayana, B., "Genetic-algorithm-based optimal power flow for security enhancement," Generation, Transmission and Distribution, IEE Proceedings- , vol.152, no.6, pp. 899-905, 4 Nov. 2005
  • Lopez-Lezama, J.M.; Murillo-Sanchez, C.E.; Zuluaga, L.J.; Gutierrez-Gomez, J.F., "A Contingency-Based Security-Constrained Optimal Power Flow Model For Revealing The Marginal Cost of a Blackout Risk-Equalizing Policy in the Colombian Electricity Market," Transmission & Distribution Conference and Exposition: Latin America, 2006. TDC '06. IEEE/PES , vol., no., pp.1-6, 15-18 Aug. 2006
  • Aganagic, M.; Mokhtari, S., "Security constrained economic dispatch using nonlinear Dantzig-Wolfe decomposition," Power Systems, IEEE Transactions on , vol.12, no.1, pp.105-112, Feb 1997
  • Yan, X.; Quintana, V.H., "An efficient predictor-corrector interior point algorithm for security-constrained economic dispatch," Power Systems, IEEE Transactions on , vol.12, no.2, pp.803-810, May 1997
  • Vargas, L.S.; Quintana, V.H.; Vannelli, A., "A tutorial description of an interior point method and its applications to security-constrained economic dispatch," Power Systems, IEEE Transactions on , vol.8, no.3, pp.1315-1324, Aug 1993
  • Jabr, R.A.; Coonick, A.H.; Cory, B.J., "A homogeneous linear programming algorithm for the security constrained economic dispatch problem," IEEE Transactions on Power Systems, vol.15, no.3, pp.930-936, Aug 2000
  • Yong Fu; Shahidehpour, M.; Zuyi Li, "AC contingency dispatch based on security-constrained unit commitment," Power Systems, IEEE Transactions on , Vol.21, No.2, pp. 897-908, May 2006
  • Kyoung-Shin Kim; Leen-Hark Jung; Seung-Chul Lee; Un-Chul Moon, "Security Constrained Economic Dispatch Using Interior Point Method, "International Conference on Power System Technology, PowerCon 2006. pp.1-6, 22-26 Oct. 2006
  • Capitanescu, F.; Wehenkel, L., "A New Iterative Approach to the Corrective Security-Constrained Optimal Power Flow Problem," Power Systems, IEEE Transactions on , vol.23, no.4, pp.1533-1541, Nov. 2008
  • Harsan, H.; Hadjsaid, N.; Pruvot, P., "Cyclic security analysis for security constrained optimal power flow," IEEE Transactions on Power Systems, vol.12, no.2, pp.948-953, May 1997
  • Zaoui, F.; Fliscounakis, S., "A Direct Approach for the Security Constrained," Power Systems Conference and Exposition, 2006. PSCE '06. 2006 IEEE PES , vol., no., pp.1562-1569, Oct. 29 2006-Nov. 1, 2006
  • P. E. Onate Yumbla, J. M. Ramirez, and C. A. Coello, "Optimal power flow subject to security constraints solved with a Particle swarm optimizer," IEEE Transactions on Power Systems, Vol. 23, No. 1, pp. 33-40, February 2008
  • L. L. Lai, J. T. Ma, R. Yokoyama, and M. Zhao, “ Improved genetic algorithms for optimal power flow under both normal and contingent operation states,” Electrical Power & Energy Systems, Vol. 19, No. 5, pp. 287-292, June 1997
  • P.Somasundaram, K., Kuppusamy, and Kumudini Devi, “Evolutionary programming based security constrained optimal power flow”, Electric Power System Research, Elsevier, pp. 137-145, 2004
  • Zwe-Lee Gaing; Rung-Fang Chang, "Security-constrained optimal power flow by mixed-integer genetic algorithm with arithmetic operators," IEEE Power Engineering Society General Meeting, pp. 1-8, 2006
  • Stott, B.; Alsac, O.; Monticelli, A.J., "Security analysis and optimization," Proceedings of the IEEE, Vol.75, No.12, pp. 1623-1644, Dec. 1987
  • J. A. Momoh and J. Zhu, “Multi-area power systems economic dispatch using nonlinear convex network flow programming”, Electric Power Syst. Research, vol. 59, pp. 13-20, 2001
  • Karoui, K.; Platbrood, L.; Crisciu, H.; Waltz, R.A., "New large-scale security constrained optimal power flow program using a new interior point algorithm," Electricity Market, 2008. EEM 2008. 5th International Conference on European , vol., no., pp.1-6, 28-30 May 2008
  • Anibal T. de Azevedo, Carlos A. Castro, Aurelio R.L. Oliveira, Secundino Soares, "Security constrained optimal active power flow via Network model and interior point method", Revista Controle & Automação/Vol.20 no.2, pp 206-216/Abril, Maio e Junho 2009
  • Claudio Cañizares, William Rosehart, Alberto Berizzi, Cristian Bovo, "Comparison of Voltage Security Constrained Optimal Power Flow Techniques", Proc. 2001 IEEE-PES Summer Meeting, Vancouver, BC, July 2001
  • D. Devaraj, J. Preetha Roselyn, "Improved genetic algorithm for voltage security constrained optimal power flow problem", International Journal of Energy Technology and Policy, Vol. 5, No. 4, pp.475-488, 2007
  • Nakawiro, W.; Erlich, I., "A Combined GA-ANN Strategy for Solving Optimal Power Flow with Voltage Security Constraint," Power and Energy Engineering Conference, 2009. APPEEC 2009. Asia-Pacific , vol., no., pp.1-4, 27-31 March 2009
  • Biskas, P.N.; Bakirtzis, A.G., "A decentralized solution to the Security Constrained DC-OPF problem of multi-area power systems," Power Tech, 2005 IEEE Russia , pp.1-7, pp. 27-30, June 2005
  • Don Hur, Kim Balho, "Application of Distributed Optimal Power Flow to Power System Security Assessment", Journal of Electric Power Components and Systems, Taylor & Francis, Vol. 31, Issue. 1, pp. 71-80, 2003
  • Wei Qiu; Flueck, A.J.; Feng Tu, "A new parallel algorithm for security constrained optimal power flow with a nonlinear interior point method," Power Engineering Society General Meeting, 2005. IEEE , pp. 447-453 Vol. 1, 12-16 June 2005
  • Borges, C.L.T.; Alves, J.M.T., "Power System Real Time Operation based on Security Constrained Optimal Power Flow and Distributed Processing," Power Tech, 2007 IEEE Lausanne , vol., no., pp.960-965, 1-5 July 2007
  • C. Lehmköster, “Security constrained optimal power flow for an economical operation of FACTS-devices in liberalized energy markets,” IEEE Trans. Power Del., vol. 17, no. 2, pp. 603–608, Apr. 2002
  • Berizzi, A.; Delfanti, M.; Marannino, P.; Pasquadibisceglie, M.S.; Silvestri, A., "Enhanced Security-Constrained OPF With FACTS Devices," Power Systems, IEEE Transactions on , vol.20, no.3, pp. 1597-1605, Aug. 2005
  • Glanzmann, G.; Andersson, G., "Incorporation of N-1 Security into Optimal Power Flow for FACTS Control," Power Systems Conference and Exposition, 2006. PSCE '06. 2006 IEEE PES , vol., no., pp.683-688, Oct. 29 2006-Nov. 1, 2006
  • R, Narmatha Banu, D, Devaraj, "Enhanced genetic algorithm approach for Security constrained optimal power flow Including FACTS devices", International Journal of Electrical Power and Energy Systems Engineering, pp. 33-38, 2009
  • T.S. Prasanna, N.B. Muthuselvan, P. Somasundaram, "Security constrained OPF by Fuzzy stochastic Algorithms in Interconnected Power Systems", Journal of Electrical Engineering, 5-1, 2009
  • G. Hug-Glanzmann, G. Andersson, "N-1 security in optimal power flow control applied to limited areas", IET Generation, Transmission and Distribution, Vol. 3, Issue. 2, pp. 206–215, 2009
  • F. Capitanescu, M. Glavic, D. Ernst, L. Wehenkel, "Applications of Security-Constrained Optimal Power Flows", Modern Electric Power Systems Symposium, MEPS06, Wroclaw, Poland, September 2006
  • R Jayashree, M Abdullah Khan, "A Mutli-Transaction based Security Constrained Optimal Power Flow tool for Assessment of Available transfer capability and Congestion Management", International Journal of Electrical and Power Engineering, pp. 501-511, 2007
  • Sarbjeet Kaur Bath, Jaspreet Singh Dhillon, and D P Kothari. "Security Constrained Stochastic Multi-objective Optimal Power Dispatch" International Journal of Emerging Electric Power Systems 8.1, 2007
  • Thomas, R.J.; Murillo-Sanchez, C.E.; Zimmerman, R.D., "An advanced security constrained OPF that produces correct market-based pricing," Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century, 2008 IEEE , vol., no., pp.1-6, 20-24 July 2008