CFP last date
22 April 2024
Reseach Article

Article:Security Constraint Optimal Power Flow (SCOPF) ñ A Comprehensive Survey

by Mithun Bhaskar M, Srinivas Muthyala, Sydulu Maheswarapu
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 11 - Number 6
Year of Publication: 2010
Authors: Mithun Bhaskar M, Srinivas Muthyala, Sydulu Maheswarapu
10.5120/1583-2122

Mithun Bhaskar M, Srinivas Muthyala, Sydulu Maheswarapu . Article:Security Constraint Optimal Power Flow (SCOPF) ñ A Comprehensive Survey. International Journal of Computer Applications. 11, 6 ( December 2010), 42-52. DOI=10.5120/1583-2122

@article{ 10.5120/1583-2122,
author = { Mithun Bhaskar M, Srinivas Muthyala, Sydulu Maheswarapu },
title = { Article:Security Constraint Optimal Power Flow (SCOPF) ñ A Comprehensive Survey },
journal = { International Journal of Computer Applications },
issue_date = { December 2010 },
volume = { 11 },
number = { 6 },
month = { December },
year = { 2010 },
issn = { 0975-8887 },
pages = { 42-52 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume11/number6/1583-2122/ },
doi = { 10.5120/1583-2122 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:59:53.940051+05:30
%A Mithun Bhaskar M
%A Srinivas Muthyala
%A Sydulu Maheswarapu
%T Article:Security Constraint Optimal Power Flow (SCOPF) ñ A Comprehensive Survey
%J International Journal of Computer Applications
%@ 0975-8887
%V 11
%N 6
%P 42-52
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper reviews the existing developments in Security Constrained Optimal Power Flow (SCOPF) from 1960’s to till date. Diverse schemes and approaches on Single Area/Multi-area, Algorithms, Contingency Selection, Steady and Dynamic SCOPF, Artificial Intelligence based SCOPF, Real time and SCOPF using Parallel/Distributed Processing, Economic Dispatch with Security Constraints, Decentralized SCOPF, Voltage Constrained SCOPF (VSCOPF), Incorporation of FACTS on SCOPF studies and Literatures on Applications of SCOPF etc., are appraised in a structured manner chronologically with detailed reviews on the strategies and the test systems used for the analysis are reported. A brief summary of the existing stratagems and test system data which can be retrieved are given in the conclusion for easy access of researchers.

References
  1. H. W. Dommel and W. F. Tinney, “ Optimal load flow solutions,” IEEE Trans. on Power Apparatus and Systems, Vol. PAS-87, pp. 1866-1876, Oct. 1968
  2. J. Carpentier, "Optimal Power Flows: Uses, methods and developments", IFAC Symposium on planning and operation of electric energy systems. Rio de Janeiro, July 1985 (Invited survey paper)
  3. M. Huneault and F. D. Galiana, “A Survey of the Optimal Power Flow Literature,” IEEE Trans. Power Systems, vol. 6, pp. 762-770, May 1991
  4. N. M. Peterson, W. F. Tinney & D. W. Bree, "Iterative linear power flow solution for fast approximate outage studies", IEEE Trans. on Power Apparatus and Systems, Vol. PAS-91, pp. 2048-2053, September/ October, 1972
  5. Wells, D.W., "Method for Economic Secure Loading of a Power System", IEE Proceedings, Vol. 115, No. 8, pp. 1190-1194, Aug. 1968
  6. El-Hawary, M.E. and Dias, L.G., "Bus Sensitivity to Model Parameters in Load-Flow Studies", IEE Proceedings, Vol. 134, Part C, No.4, pp. 302-305, July 1987.
  7. Kaltenbach, J.C. and Hajdu, L.P., "Optimal Corrective Rescheduling for Power System Security", IEEE Trans. Power App. and Syst., Vol. PAS-90, No. 2, pp 843-851, March/April, l971
  8. Shen, C.M. and Laughton, M A., "Power System Load Scheduling with Security Constraints using Dual Linear programming', IEE Proceedings, Vol. 117, No. 11, pp. 2117-2127, Nov. 1970
  9. O. Alsac and B. Stott, “Optimal load flow with steady state security,” IEEE Trans. on Power Apparatus and Systems, Vol. PAS-93, pp. 745-751, May/June 1974
  10. Monticelli, A.; Pereira, M. V. F.; Granville, S., "Security-Constrained Optimal Power Flow with Post-Contingency Corrective Rescheduling," Power Systems, IEEE Transactions on , vol.2, no.1, pp.175-180, Feb. 1987
  11. Carpentier, J., "Differential Injections Method: A General Method for Secure and Optimal Load Flows", IEEE PICA Conference Proceedings Minneapolis, MN, pp. 255-262, June 1973
  12. Elacqua, A. J. and Corey, S. L., "Security Constrained Dispatch at the New York Power Pool", IEEE Trans. Power App. Syst., Vol. PAS-101, pp. 2876-2884, Aug. 1982.
  13. Schnyder, G. and Glavitsch, H., "Integrated Security Control Using an Optimal Power Flow and Switching Concepts", IEEE PICA Conference Proceedings, Montreal, Canada, pp. 429436, May 1987
  14. Stott, B. and Hobson, E., "Power System Security Control Calculations Using Linear Programming Pam I and 2", IEEE Trans. Power App. Systems., Vol. PAS-97, pp. 1713-1731, Sept./Oct. 1978
  15. Dias, L.G. and El-Hawary, M.E., "Effects of Load Modeling in Security Constrained OPF Studies", IEEE Trans. on Power Systems, Vol. 6, No.2, pp. 87-93, February 1991
  16. Saavedra, O.R., "Solving the security constrained optimal power flow problem in a distributed computing environment," Generation, Transmission and Distribution, IEE Proceedings, vol.143, no.6, pp.593-598, Nov 1996
  17. Rodrigues, M.; Saavedra, O.R.; Monticelli, A., "Asynchronous programming model for the concurrent solution of the security constrained optimal power flow problem," Power Systems, IEEE Transactions on, vol.9, no.4, pp.2021-2027, Nov 1994
  18. F. Gagliardi, E Chiodo, D Mehnniti and A. Tesla, "A pattern recognition approach for steady state security evaluation of an Electrical Power system" European Trans on Electrical Power Engineering, Vol. I, No.5. pp. 243-251, 1991.
  19. D Menniti, D Picardi, C Sorrentino, N Tesla, "Neural network based prediction of the steady state security for electrical power system," 2nd IFAC Sipower'95, Mexico Mexico, 6-8 December 1995
  20. Conforti, D.; Menniti, D.; Sorrentino, N.; Verde, P.; Testa, A., "Optimal load-flow with N-1 steady-state security via high performance computing," Electrotechnical Conference, 1996. MELECON '96., 8th Mediterranean , vol.2, no., pp.873-879 vol.2, 13-16 May 1996
  21. E.Vaahedi, Y.Mansour, C.Fuches, S. Granville, M.Latore, H.Hamadanizadeh, "Dynamic Security Constrained Optimal Power Flow/VAr Planning", IEEE Transaction on Power Systems, Vol. 16, No. 1, pp 38-43, February 2001
  22. Hur, D.; Jong-Keun Park; Kim, B.H.; Kwang-Myoung Son, "Security constrained optimal power flow for the evaluation of transmission capability on Korea electric power system," Power Engineering Society Summer Meeting, 2001. IEEE, vol.2, pp.1133-1138, 2001
  23. Lizhi Wang, Mainak Mazumdar, "Contingency Selection in Security Constrained Optimal Power Flow Problem: A Multi-Objective Approach", Electricity Conference 2006
  24. Y. Yuan, J. Kubokawa, and H. Sasaki, “A solution of optimal power flow with multi-contingency transient stability constraints,” IEEE Trans. on Power Systems, Vol. 18, No. 3, pp. 1094-1102, Aug. 2003
  25. F. Bouffard, F. D. Galiana, J. M. Arroyo. "Umbrella Contingencies in Security-Constrained Optimal Power Flow". 15th Power Systems Computation Conference, PSCC'05. Liege, Belgium. August 2005
  26. Capitanescu, F.; Glavic, M.; Ernst, D.; Wehenkel, L., "Contingency Filtering Techniques for Preventive Security-Constrained Optimal Power Flow," Power Systems, IEEE Transactions on , vol.22, no.4, pp.1690-1697, Nov. 2007
  27. V. C. Ramesh and Xuan Li, “A fuzzy multi-objective approach to contingency constrained OPF”, IEEE Trans. Power Syst., vol. 12, no. 3, pp.1348-1354, Aug. 1997
  28. Devaraj, D.; Yegnanarayana, B., "Genetic-algorithm-based optimal power flow for security enhancement," Generation, Transmission and Distribution, IEE Proceedings- , vol.152, no.6, pp. 899-905, 4 Nov. 2005
  29. Lopez-Lezama, J.M.; Murillo-Sanchez, C.E.; Zuluaga, L.J.; Gutierrez-Gomez, J.F., "A Contingency-Based Security-Constrained Optimal Power Flow Model For Revealing The Marginal Cost of a Blackout Risk-Equalizing Policy in the Colombian Electricity Market," Transmission & Distribution Conference and Exposition: Latin America, 2006. TDC '06. IEEE/PES , vol., no., pp.1-6, 15-18 Aug. 2006
  30. Aganagic, M.; Mokhtari, S., "Security constrained economic dispatch using nonlinear Dantzig-Wolfe decomposition," Power Systems, IEEE Transactions on , vol.12, no.1, pp.105-112, Feb 1997
  31. Yan, X.; Quintana, V.H., "An efficient predictor-corrector interior point algorithm for security-constrained economic dispatch," Power Systems, IEEE Transactions on , vol.12, no.2, pp.803-810, May 1997
  32. Vargas, L.S.; Quintana, V.H.; Vannelli, A., "A tutorial description of an interior point method and its applications to security-constrained economic dispatch," Power Systems, IEEE Transactions on , vol.8, no.3, pp.1315-1324, Aug 1993
  33. Jabr, R.A.; Coonick, A.H.; Cory, B.J., "A homogeneous linear programming algorithm for the security constrained economic dispatch problem," IEEE Transactions on Power Systems, vol.15, no.3, pp.930-936, Aug 2000
  34. Yong Fu; Shahidehpour, M.; Zuyi Li, "AC contingency dispatch based on security-constrained unit commitment," Power Systems, IEEE Transactions on , Vol.21, No.2, pp. 897-908, May 2006
  35. Kyoung-Shin Kim; Leen-Hark Jung; Seung-Chul Lee; Un-Chul Moon, "Security Constrained Economic Dispatch Using Interior Point Method, "International Conference on Power System Technology, PowerCon 2006. pp.1-6, 22-26 Oct. 2006
  36. Capitanescu, F.; Wehenkel, L., "A New Iterative Approach to the Corrective Security-Constrained Optimal Power Flow Problem," Power Systems, IEEE Transactions on , vol.23, no.4, pp.1533-1541, Nov. 2008
  37. Harsan, H.; Hadjsaid, N.; Pruvot, P., "Cyclic security analysis for security constrained optimal power flow," IEEE Transactions on Power Systems, vol.12, no.2, pp.948-953, May 1997
  38. Zaoui, F.; Fliscounakis, S., "A Direct Approach for the Security Constrained," Power Systems Conference and Exposition, 2006. PSCE '06. 2006 IEEE PES , vol., no., pp.1562-1569, Oct. 29 2006-Nov. 1, 2006
  39. P. E. Onate Yumbla, J. M. Ramirez, and C. A. Coello, "Optimal power flow subject to security constraints solved with a Particle swarm optimizer," IEEE Transactions on Power Systems, Vol. 23, No. 1, pp. 33-40, February 2008
  40. L. L. Lai, J. T. Ma, R. Yokoyama, and M. Zhao, “ Improved genetic algorithms for optimal power flow under both normal and contingent operation states,” Electrical Power & Energy Systems, Vol. 19, No. 5, pp. 287-292, June 1997
  41. P.Somasundaram, K., Kuppusamy, and Kumudini Devi, “Evolutionary programming based security constrained optimal power flow”, Electric Power System Research, Elsevier, pp. 137-145, 2004
  42. Zwe-Lee Gaing; Rung-Fang Chang, "Security-constrained optimal power flow by mixed-integer genetic algorithm with arithmetic operators," IEEE Power Engineering Society General Meeting, pp. 1-8, 2006
  43. Stott, B.; Alsac, O.; Monticelli, A.J., "Security analysis and optimization," Proceedings of the IEEE, Vol.75, No.12, pp. 1623-1644, Dec. 1987
  44. J. A. Momoh and J. Zhu, “Multi-area power systems economic dispatch using nonlinear convex network flow programming”, Electric Power Syst. Research, vol. 59, pp. 13-20, 2001
  45. Karoui, K.; Platbrood, L.; Crisciu, H.; Waltz, R.A., "New large-scale security constrained optimal power flow program using a new interior point algorithm," Electricity Market, 2008. EEM 2008. 5th International Conference on European , vol., no., pp.1-6, 28-30 May 2008
  46. Anibal T. de Azevedo, Carlos A. Castro, Aurelio R.L. Oliveira, Secundino Soares, "Security constrained optimal active power flow via Network model and interior point method", Revista Controle & Automação/Vol.20 no.2, pp 206-216/Abril, Maio e Junho 2009
  47. Claudio Cañizares, William Rosehart, Alberto Berizzi, Cristian Bovo, "Comparison of Voltage Security Constrained Optimal Power Flow Techniques", Proc. 2001 IEEE-PES Summer Meeting, Vancouver, BC, July 2001
  48. D. Devaraj, J. Preetha Roselyn, "Improved genetic algorithm for voltage security constrained optimal power flow problem", International Journal of Energy Technology and Policy, Vol. 5, No. 4, pp.475-488, 2007
  49. Nakawiro, W.; Erlich, I., "A Combined GA-ANN Strategy for Solving Optimal Power Flow with Voltage Security Constraint," Power and Energy Engineering Conference, 2009. APPEEC 2009. Asia-Pacific , vol., no., pp.1-4, 27-31 March 2009
  50. Biskas, P.N.; Bakirtzis, A.G., "A decentralized solution to the Security Constrained DC-OPF problem of multi-area power systems," Power Tech, 2005 IEEE Russia , pp.1-7, pp. 27-30, June 2005
  51. Don Hur, Kim Balho, "Application of Distributed Optimal Power Flow to Power System Security Assessment", Journal of Electric Power Components and Systems, Taylor & Francis, Vol. 31, Issue. 1, pp. 71-80, 2003
  52. Wei Qiu; Flueck, A.J.; Feng Tu, "A new parallel algorithm for security constrained optimal power flow with a nonlinear interior point method," Power Engineering Society General Meeting, 2005. IEEE , pp. 447-453 Vol. 1, 12-16 June 2005
  53. Borges, C.L.T.; Alves, J.M.T., "Power System Real Time Operation based on Security Constrained Optimal Power Flow and Distributed Processing," Power Tech, 2007 IEEE Lausanne , vol., no., pp.960-965, 1-5 July 2007
  54. C. Lehmköster, “Security constrained optimal power flow for an economical operation of FACTS-devices in liberalized energy markets,” IEEE Trans. Power Del., vol. 17, no. 2, pp. 603–608, Apr. 2002
  55. Berizzi, A.; Delfanti, M.; Marannino, P.; Pasquadibisceglie, M.S.; Silvestri, A., "Enhanced Security-Constrained OPF With FACTS Devices," Power Systems, IEEE Transactions on , vol.20, no.3, pp. 1597-1605, Aug. 2005
  56. Glanzmann, G.; Andersson, G., "Incorporation of N-1 Security into Optimal Power Flow for FACTS Control," Power Systems Conference and Exposition, 2006. PSCE '06. 2006 IEEE PES , vol., no., pp.683-688, Oct. 29 2006-Nov. 1, 2006
  57. R, Narmatha Banu, D, Devaraj, "Enhanced genetic algorithm approach for Security constrained optimal power flow Including FACTS devices", International Journal of Electrical Power and Energy Systems Engineering, pp. 33-38, 2009
  58. T.S. Prasanna, N.B. Muthuselvan, P. Somasundaram, "Security constrained OPF by Fuzzy stochastic Algorithms in Interconnected Power Systems", Journal of Electrical Engineering, 5-1, 2009
  59. G. Hug-Glanzmann, G. Andersson, "N-1 security in optimal power flow control applied to limited areas", IET Generation, Transmission and Distribution, Vol. 3, Issue. 2, pp. 206–215, 2009
  60. F. Capitanescu, M. Glavic, D. Ernst, L. Wehenkel, "Applications of Security-Constrained Optimal Power Flows", Modern Electric Power Systems Symposium, MEPS06, Wroclaw, Poland, September 2006
  61. R Jayashree, M Abdullah Khan, "A Mutli-Transaction based Security Constrained Optimal Power Flow tool for Assessment of Available transfer capability and Congestion Management", International Journal of Electrical and Power Engineering, pp. 501-511, 2007
  62. Sarbjeet Kaur Bath, Jaspreet Singh Dhillon, and D P Kothari. "Security Constrained Stochastic Multi-objective Optimal Power Dispatch" International Journal of Emerging Electric Power Systems 8.1, 2007
  63. Thomas, R.J.; Murillo-Sanchez, C.E.; Zimmerman, R.D., "An advanced security constrained OPF that produces correct market-based pricing," Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century, 2008 IEEE , vol., no., pp.1-6, 20-24 July 2008
Index Terms

Computer Science
Information Sciences

Keywords

Optimal Power Flow Optimization Techniques Security Constrained Optimal Power Flow (SCOPF) Security Analysis Flexible AC Transmission System