Security Constraint Optimal Power Flow (SCOPF) - A Comprehensive Survey
Security Constraint Optimal Power Flow (SCOPF) - A Comprehensive Survey
42
International Journal of Computer Applications (0975 – 8887)
Volume 11– No.6, December 2010
methods) method to incorporate the steady state security Interior programming / Benders Decomposition techniques are
constraints into OPF, which allowed to consider the reactive used and tested on a North American electric utility system with
power and voltage constraints in outage cases. There, the OPF is 1449 buses, 2511 circuits, 778 transformers and 240 generators
solved using the „Dommel-Tinney‟ approach and later security and on a reduced Brazilian System of 11 buses and 15 circuits
constraints are added to the AC-Power Flow via their penalty and the authors has validated using Continuation Power Flow
functions (first to introduce) and Lagrange multipliers, to obtain and Point of Collapse Program (PFLOW). Don Hur et al. [22]
the optimum operating conditions which was tested on IEEE 30 (2001) proposed a Novel algorithm in decentralized framework,
bus system. But it was Monticelli et al. [10] (1987) has put using a price-based mechanism that models each region as an
forward a new blenders decomposition based method for economic unit. Here, Linear Programming based approach is
Economic dispatch with security constraints with post-outage used by the authors for maximum secure simultaneous transfer
correction and separate the base case with contingency analysis capability of tie-lines.
together with generation rescheduling using Benders feasibility
cuts. The method was tested on IEEE 118 bus system. Last 4. CONTINGENCY SELECTION
mentioned was that of non-decomposing methods and Carpentier Lizhi Wang [23] (2006) projected a new contingency selection
[11] (1973), Elacqua et al. [12] (1982), Schnyder et al. [13] technique for the SCOPF problem which proved to provide a
(1987) and Stott et al. [14] (1978) exposed various decomposed better solution than the conventional (N-K) selection principles.
methods involving security constraints. Dias et al. [15] (1991) A DC lossless load flow model is used and the trade-off between
claimed that by implementing the SCOPF for higher fuel cost economy and security is achieved using a parametric utility
systems, the total operating system tends to come down as the function. A best trade-off between the Economy benefit,
power demand on contingencies tend to come down due to Infeasibility cost and Infeasibility risk are considered and Integer
lowering of voltage and natural reasons, the expensive generators Programming method is used which was tested on 5 bus, 6 line
are lightly loaded. He has also highlighted the effect of Under system and on IEEE 30 bus system using Matlab™ and CPLEX
Load Tap Changing (ULTC) transformers in the normal OPF and 9.0 platform. Y Yuan et al. [24] proposed solutions for transient
SCOPF studies with load models implemented and modeled stability constrained OPF with multi-contingency rather with the
SCOPF solution which was tested on various 30, 57, 118 and the conventional single contingency analysis till then used. A Primal
Nova Scotia 131 bus reduced power system; with specified Dual Newton Interior Point method was used by authors to solve
power demand at loads fed by tap-transformers, when specified the TSOPF problem on 3 machines, 9 bus systems; IEEJ WEST
power demand occurs at voltages obtained from the standard 10 and IEEJ WEST 30 systems and implemented using
OPF solution and by using voltages from a standard security FORTRAN language. Francois Bouffard et al. [25] (2005)
constrained OPF solution with and without line flow constraints proposed a model to Identify, Analyze and Validate a set of
in OPF and SCOPF condition. In 1996, Saavedra [16] exploited contingencies from the complete set of contingencies by norms of
distributed processing environment with dual relaxation method the Lagrange multiplier vectors of Post-contingency analysis.
and was tested on two Brazilian systems consisting of 725 Two cases, viz. the Deterministic case and the Stochastic SCOPF
buses, 1212 branches and 76 adjustable power generators; problem have been analyzed here. In the former, the umbrella
Second system of 1663 buses, 2349 branches and 99 adjustable contingencies are identified as the contingency which yield the
power generators. Saavedra together with Rodrigues et al. [17] same market-clearing solution and in the latter case, the
(1994) proposed asynchronous method with dual-simplex identification is done such that the sensitivity of the optimum
relaxation solution for the linearized SCOPF with parallel solution to the neglected contingencies is smaller to a pre-
architecture processing for the preventive mode of SCOPF. specified threshold. In addition, authors have attempted to
Security Constraint Optimal Power Flow becomes a bi- validate "super umbrella" contingency, which are nothing but,
objective problem and the optimization occurs at the best trade- umbrella contingencies which remain as umbrella contingencies
off between generation cost and the security cost. The irrespective of the system parameters. A DC-OPF analysis was
'Opportune Security Index', first mentioned in the Ph.D thesis of used for Numerical analysis of deterministic SCOPF problem as
D. D Menniti (1989) and later widely used in his research on the load varies and the effect of ranking and other cut-off rules of
Steady State security using pattern recognition [18] and Neural stochastic SCOPF is demonstrated and is tested on a Three-bus,
Network [19] in 1991 and 1995 respectively. The very next year, three-line, three-generator system.
Minniti together with Confroti and Sorrentino proposed Parallel Florin Capitanescu [26] (2007) introduced two novel
Gradient Distribution (PGD) and Non-Linear Programming contingency filtering techniques based on comparison of
based OPF algorithm with (N-1) contingencies [20] with intermediate solutions of Preventive Security Constrained OPF
continuous security metrics and was tested on a 5 bus system. (PSC-OPF) in post contingency analysis. Authors have compared
the proposed method with classical methods like severity index-
3. DYNAMIC SCOPF based (SI) filtering schemes and with direct PSCOPF method.
Ebrahim Vaahedi et al. [21] (2001) was the pioneer to include Two techniques viz., Individually Non-dominated Contingency
the dynamic constraints; voltage stability with the static security (INDC) Technique and Non-dominated Contingency Group
constraints viz., the flow and voltage profile during normal and (NDCG) Technique; both based on the concept of 'constraint
post contingency operations. The problem has been formulated as violation domination'. Both had the advantage that it is free from
a three level hierarchical decomposition scheme where the any parameter tuning (weight matrices and thresholds). The
43
International Journal of Computer Applications (0975 – 8887)
Volume 11– No.6, December 2010
former technique is found to keep only the non-dominated were tested on three custom test cases with a total load of
contingencies, which can obtain a solution to PSOPF, as of all 3595MW. The proposed algorithm consists two phases; first
contingencies are present and discarding all other ones; the later phase obtains a primal feasible solution by minimizing the sum
technique selects the contingency for each constraint, which of infeasibilities, whereas in second phase the generation cost is
creates maximum violation. The Interior-Point Method (IPM) is minimized and is solved using a revised simplex method. Yan et
used in the base algorithm. The algorithms were tested on a al. [31] (1997) unraveled the Security Constrained Economic
modified Nordic32 system (60 bus system) and on standard IEEE Dispatch (SCED) using successive linear
118 test bus system. Authors demonstrate that the proposed Programming/Predictor-Corrector Interior Point method. Efforts
methods are more robust and accelerate the sequential solution of have been made for the adjustment of Barrier Parameter and for
PSOPF than any other classical methods. determination of initial points. The proposed algorithm is
compared with the results obtained using primal-dual interior
5. CONTINGENCY CONSTRAINED OPF point method. The algorithm is not applied directly; instead, the
Ramesh et al. [27] (1997) put forward a decomposed form of successive linear programming is applied to exploit the
Contingency Constrained Optimal Power Flow (CCOPF) using computational gain achieved on not having to calculate the
Fuzzy Logic where, the minimization of both the base case (pre- second-order derivatives of Hessian matrix at each iteration. The
contingency) operating cost and of the post-contingency proposed algorithm was tested on 236, 354, 708, 1062, 2124 bus
systems, which are obtained by interconnecting standard IEEE
correction times which are conflicting, were accepted as fuzzy
118 bus systems in many ways. Authors concluded by using
goals. Devaraj et al. [28] (2005) demonstrated a new Real Coded
feasibility condition on fast reducing duality gap, by customizing
Genetic Algorithm (RCGA) centered approach for OPF for
initial points by adopting relatively small threshold and by
improving the security goals of line overload by generation re- balancing its primal and dual values, the number of iterations can
dispatching and by adjustment of phase-shifting transformers, be reduced even up to 50% and the time savings are found to
which are installed based on the Severity Index (SI). This increase with larger size systems. Luis Vargas et al. [32] (1993)
algorithm has overcome the traditional GA snags of solution published an in-depth tutorial on Interior point method and
being depended on the number of bits of the variables and the demonstrated the application of IP (Dual Affine version) on
cumbersome procedure of converting the real time variables into SCED problem. Luis deliberated on the superiority of the IP over
binary strings. The variables are modeled in natural form and the simplex method and a demonstrated a practical method to
operating the cross-over and mutation operators directly with avoid the oscillatory behavior in the iteration process of IP. Fast
integer and floating-point genetic algorithm. The authors has Decoupled Load Flow, Generalized Generation Distribution
adopted the IEEE 30 and IEEE 118 bus systems for Factors (GGDF) and generation power Incremental Transmission
implementation and three cases viz, for obtaining the optimal- Losses Factor (ITLF) concepts are used in sub problems of the
control variables in the IEEE 30-bus system; to alleviate proposed algorithm and to increase the computational speed,
overloads under line outage by generator rescheduling and phase- „Pre-conditioned Conjugate Gradient‟ (PCG) technique is used
shifting transformers; the third case, proposed algorithm was instead of the direct method based on Cholesky factorization, to
used to alleviate line overload in the IEEE 118-bus system. prevent ill-conditioning and added time consumption. The
Lopez-Lezama [29] (2006) offered a new coupled post algorithm was implemented and tested on IEEE 30 and 118 bus
contingency OPF with reliability criteria added as an additional systems and is compared with simplex code (MINOS). Rabih
linear constraint. The algorithm was tested on a Colombian Jabr et al. [33] (2000) put forward a new simplified
market. The actual nodal prices and marginal price of a blackout- homogeneous and self-dual (SHSD) linear programming (LP)
risk are also calculated. The mathematical modeling of that paper interior point algorithm for SCED and did the analysis not only
for SCOPF was adopted from Thorp et al. (2001) by using of for the conventional (N-1) criteria but also for the (N-2)
contingencies. The analysis has been compared with predictor-
coupled post contingency Optimal Power Flows and a unique
corrector interior point algorithm as proposed by Yan [31]. The
system of islands are build, which are nothing but the base case
cost curves in this paper are considered as convex and piecewise-
system and the system after contingency. Load of various types
linear and expressed in a separate programming which is tested
like Dispatchable, Curtailable and Sheddable are found to be on an IEEE 24 bus test system and on a practical 175 bus
included. Objective function modeling consisting of additional network. Yong Fu et al. [34] (2006) made an attempt on
variable; the difference of expected relative load shedding and modeling a Security constrained Unit Commitment (SCUC)
average of all the expected relative load shedding, together with model with preventive/corrective approach contingencies
probabilities of contingencies are included and MATPOWER has (controllable and uncontrollable) over an 24hr time schedule,
been used for optimization part by authors. AC-SCOPF, Load shedding and Unit commitment is considered,
wherever the security constraints are not met in the recalculation
6. ECONOMIC DISPATCH WITH of Unit commitment. The Authors have exploited Augmented
SECURITY CONSTRAINTS Lagrangian relaxation, Dynamic programming and Benders
Mohamed Aganagic et al. [30] (1997) demonstrated a two Decomposition for solving the SCOPF/SCUC/UC. Load
level decomposition algorithm using nonlinear version of the Shedding is resorted for unfeasible problem arising out of
„Dantzig-Wolfe‟ decomposition based Security constrained contingencies to act as Virtual generators based on decremental
Economic dispatch (SCED) using nonlinear unit cost functions. bids. Authors have adopted 6 bus, IEEE 118 bus and 1168 bus
A detailed representation of the reserve curves were given and (169 generators, 1168 buses, 1474 branches, and 568 load sides)
44
International Journal of Computer Applications (0975 – 8887)
Volume 11– No.6, December 2010
test systems for implementation and the AC results are depicted. tested on a small 3-bus network, medium system of 95 buses,
It‟s concluded that the implementation time increases linearly 105 branches with 19 load tap changing transformers, 22
with size of the problem. Kyoung Shin Kim [35] et al. (2006) generating units and 21 shunt compensation devices (Corsica
approached the SCED with Interior Point method by including Island) & on a large system consisting of 1207 buses, 1821
the power flow constraints. An novel algorithm is presented to branches, 185 generating units and 2 shunt compensation devices
linearize the SCED problem based relations among generator (French Continental Network). Oñate Yumbla et al. [39] (2008)
outputs, active power flows, loads, losses etc. and is solved using proposed a Particle Swarm Optimization with Reconstruction
Linear programming. The concepts of Incremental Transmission Operators (PSO-RO) based solution for SCOPF problem, where
Loss Factor (ITLF) and Generalized Generation Distribution the constraints are handled using reconstruction operators,
Factor (GGDF) concepts are used in the algorithm which is later instead of penalizing the objective function. Authors have
optimized using Primal Interior Point Method (PIPM). Authors
formulated the OPF with (N-1) criterion, where the Pre/Post
has compared the results obtained by applying this algorithm to
optimal contingency points are obtained, together while
IEEE 6-bus and 30-bus systems and comparing it with Simplex
considering the constraints in generating units‟ limits, minimum
Programming and its found that this algorithm offers more
and maximum up and down-time, slope-down and slope-up, and
computational speed and takes lesser iterations. Florin
Capitanescu et al. [36] (2008) proposed new techniques to solve coupling constraints in the pre- and the post-contingency states.
the Corrective Security Constrained Optimal Power Flow Authors claim that by PSO-Reconstruction Operator approach,
(CSCOPF) consisting of CSOPF, Steady State Security Analysis there is an increase in the search area/particles in the space.
(SSSA), a contingency filtering and an OPF variant to check post Performance Index based Contingency ranking system is used
contingency corrective analysis. Severity-Index-Based together with NRLF and is tested on two systems; viz. 39 buses,
Contingency Ranking Approach, Non-dominated Contingency 46 branches, ten generators (New England System) with a total
(NDC) Approaches are used by authors in the CF category. Other load of 1000MW and another one consisting of 26 buses, 46
variant of new Iterative CSCOPF approach like Infeasible post- branches, six generators, seven transformers, and nine shunt
contingency optimal power flow, without filtering and Severity capacitors (adopted from Hadi Sadat) with Six active power
based approaches are also demonstrated in the paper. Authors generations, Seven transformers-tap setting, and Nine var-
have analyzed the proposed method with classical direct injection values with a total load is 1263 MW and 22 control
approach and Benders decomposition techniques and are tested variables.
on modified 60 bus (Nordic32), IEEE 118 and 1203 bus (French-
RTE) systems and the algorithm is found to be more robust and 8. ARTIFICIAL INTELLIGENCE
faster than direct approach, Benders decomposition technique TECHNIQUES
and severity index (SI) based approaches. Literatures speak that the main constriction was that the
problem tend to settle in a global optimum as security constraints
7. SECURITY CONSTRAINED OPF are difficult to be included in the line security constraints into
Harshan et al. [37] exposed notable works in speeding up the fitness function. L L Lai et al. [40] (1997) proposed an Binary
SCOPF analysis to make them competent for the online analysis Coded Improved Genetic Algorithm approach for the Normal and
using with a new fast Cyclic Contingency Screening model contingent condition of the system and two cases has been
(CCS) of security analysis by accepting the results of a security compared on IEEE 30 bus system with a simulated circuit
analysis carried out at time 't k' for drawing the data to be used in outage. Somasundaram et al. [41] put forward a Evolutionary
a security analysis at a time 't k+At' to reduce the computational programming based solution for the SCOPF problem and claimed
burden which in turn increases the speed of the entire analysis. to be a better and robust technique as EP uses only the objective
Authors used local perturbation effect and Concentric Relaxation function information and not the first and second derivatives of it
Method and double stage pre-filters to separate non-critical cases or constraints and is independent of the nature of the search
on updating the database. This method was tested on National space such as smoothness, convexity or uni-modality and is
French 225-400 kV grid containing 462 nodes and 855 branches tested on a IEEE30 bus system. Zwe-Lee Gaing et al. [42] (2006)
with 96 real states for a 24hr period on 15 minute steps. Fabrice suggested a Real coded Mixed Integer Genetic Algorithm based
Zaoui et al. [38] (2006) proposed a new direct method for the approach to the SCOPF problem. There, real coding is exploited
simultaneous optimization of AC-OPF base case and with (N-K) instead of the conventional binary coding with a two arithmetic
contingencies rather having sub problem approach which has crossover and mutation schemes are proposed. Authors used
been commonly found, using Primal Dual Interior Point method uniform crossover, FDLF method and only one critical
(IPM). The contingency analysis is run before the optimization contingency is selected among all for the contingency analysis
process to select only the critical contingencies as size of the and the results provide a comparison with that of evolutionary
optimization problem increases linearly with the number of programming on same system. The proposed SCOPF not only
considered contingencies. In this approach, IPM converts the considers the generation cost, but also transmission security,
inequality constraints to the equality ones with addition of two transmission loss, bus voltage profile, value-point loading and is
positive slack variables and the equality constrained problem is tested on custom 26 bus (46 transmission lines, load demand of
converted to an unconstrained problem by using Lagrangian 1263 MW system) & IEEE 57 bus system.
function together with a „Fiacco-McCormick‟ approach for
barrier update (also called monotone strategy). The algorithm is
45
International Journal of Computer Applications (0975 – 8887)
Volume 11– No.6, December 2010
9. OTHER TECHNIQUES TO SCOPF OPF which used the natural form of the variables (Real coded
It was in 1997, Scott et al. [43] reviewed some exceptional GA) with floating point integers based crossover and mutation
works on their 'Invited paper' on Power System Security probability. Generator power output, Generator voltage
Optimization Techniques, which revealed the future scope of magnitude, Transformer Taps and Reactive power of the
online contingency analysis and pointed out areas of difficulty capacitor banks are selected as control variables and the voltage
that constitute them and challenges for successful practical on- stability is analyzed using the Maximum L-index value of load
line implementations which are applied for the security analysis buses. In the proposed genetic algorithm the continuous variables
of Power System in the future. An in-depth review of security are modeled as floating point numbers and discrete variables as
concepts and terminology, Security Assessment, Optimization integers. The method has been tested on a standard IEEE 30 bus
techniques; Linear and Non-linear, a thorough ideas on modeling system. Worawat Nakawiro et al. [49] (2009) proposed a novel
of Contingency Analysis, Direct & Indirect Contingency GA-ANN method for network loss minimization and for the
Selection methods, Active and Reactive power Contingency reactive power dispatch where the ANN are trained offline to
Screening, Security Constrained Optimal Scheduling; substitute for OPF online. The k-mean clustering method is used
Contingency constrained OPF with security level 1 and level 2; to select the input for the ANN, Line Indicator (L) is used to
online security analysis and its found to be must read literature analyze the security margin and GA is used for optimizing the
for any researchers on Power System Security. Momoh et al. complete problem. For the offline learning, a database
[44] offered a Quadratic Programming and New Non-Linear encompassing realistic operating conditions, in terms of random
Convex Network Flow Programming (NLCNFP) model, which load, generation mix and outages is simulated on 6000 operating
considers the tie-line security and transfer constraints together points which were selected for ANN training using Back
with buying and selling contracts, has been implemented on a propagation method (Lavenberg-Marquart optimization
four area IEEE 30 bus system. Karim Karoui [45] (2008) adopted). The proposed algorithm was tested on a Standard IEEE
highlighted the use of Interior Point programing (Interior-point 30 bus system and it‟s found to be 5 times faster than other
Direct, Interior-point CG, Active set algorithms) for SCOPF conventional methods.
using KNITRO (Integrated Power System Optimizer) software,
which offers preventive and corrective strategy, the discrete
11. DECENTRALIZED OPF
Biskas et al. [50] (2005) presented a decentralized solution
variables modeling, the modeling of units capability curves, the
for large interconnected system by decomposing multi-area
modeling of the primary active power-frequency control,
system SCOPF problem into smaller individual SCOPF problem.
modeling of discrete variables, Transformer taps discretization
Later, the sub problems are combined using a pricing
with shunt variables discretization and authors has demonstrated
mechanism, which are the electricity exchange prices of the
the use of the same in evaluating the Total Transfer Capability.
neighboring areas, until they converge all smaller sub problems.
It‟s found that KNITRO models the problem into barrier method
The advantage of this method is found to be reduced effect of
where, nonlinear objective function is replaced to a set of barrier
line outages. Unit outages outside the sub problem area are
sub-problems controlled by a barrier parameter. The algorithm is
ignored. Authors have implemented this algorithm for an IEEE 3
demonstrated on a 2351 bus, 4587 lines European system. Anibal
area RTS-96 and Balkan Power system consisting of 310 buses,
et al. [46] proposed a Predictor-Corrector Interior Point algorithm
77 units, 485 internal lines and 5 tie-lines. Don Hur et al. [51]
for SCOPF problem with Branch Outages, Generator Outages
presented a new parallel decentralized solution for SCOPF
and Multiple equipment congestion together with the objective of
problem using Linear Programming using Line Outage
minimization of transmission loss. A scalar weight method is
Distribution Factor and was implemented on the Korean Power
used for integrating the objectives together. Line Outage
System consisting of four regions and each region connected
Distribution Factors (LODFs) and Generalized Generation
directly by the major eight 345 kV transmission lines and
Distribution Factors (GGDFs) are used in the contingency
seventeen 154 kV transmission lines, which are considered as tie
analysis consisting of 157 security constraints. Authors have
lines. The intraregional SCOPF is solved using conventional
validated the algorithm on a Brazilian power system consisting of
Linear Programming (LP) approach by the authors.
3535 bus and 4238 branches for a tolerance of 0.01.
46
International Journal of Computer Applications (0975 – 8887)
Volume 11– No.6, December 2010
decomposed SCOPF problem, based on the tests implemented on 13. FACTS INCORPORATED SCOPF
one with 57 buses, 80 branches and 9 contingencies, another Carsten Lehmköster [54] (2002) validated the modeling of
with 3493 buses, 6689 branches and 79 contingencies and is FACTS and contingencies, their analysis and optimization with
compared with MatPower software. Carmen et al. [53] (2007) for different objective functions and constraints using Sequential
was the first to demonstrate a SCOPF in real time using Quadratic Programming / Gradient method. The system has been
distributed processing environment for an Energy Management well demonstrated and tested on an IEEE 118 bus system.
System (EMS – supposed as National System Operation Center). Alberto Berizzi et al. [55] (2005) proposed a compact and
Authors used „Message Passing Interface‟ system (MPI) for reduced SCOPF formulation with FACTS devices as control
parallel processing, Interior Programming for the optimization variable and used „Han–Powell‟ algorithm to solve the OPF. The
and Benders Decomposition technique for solving SCOPF. The approach used a new penalty related to control variables of
authors have best explained the previous developments like FACTS with improved sensitivity calculation; reactive Jacobean
„Parallel Virtual Machine‟ (VPM) and FLUPOT - Interior and the voltage displacement approach to find a global solution
programming technique from the previous literatures. The for the entire system with a single quadratic equality constraint
conventional method of base case and contingency induced representing the real power balance of the total production, load,
subcase is followed in this paper too. During unfeasible losses, and a reduced set of constraints on the current flows. The
contingency cases, penalties are levied to represent the quantity paper modeled two mono-dimensional; Series Power Flow
of variation. In the proposed algorithm, reading of input and base Control (SPFC), Thyristor-Controlled Phase Angle Regulator
(TCPAR) and one bi-dimensional; Unified Power Flow
case analysis is done simultaneously by all processors, whereas
Controller (UPFC) FACTS devices applied to the most heavily
reorganization of the Benders-Cut data structure are done by
loaded lines and (N-1) security analysis (29 contingencies were
using distributed computing, where each slave processor solves
used by authors) is performed on a the CIGRE 63–bus system of
its own contingency list and produces its own partial benders-cut, 2080 MW total load and an Italian EHV network of 1414 buses,
which are sent to the Master processor, which in turn reorganizes more than 300 generators and with a total load of about 34 000
all collected data from Slave processors into a new benders-cut MW. The authors concluded that the proposed algorithm is very
structure. Later, it‟s found that SAGE – „Sistema Aberto de fast for mono-dimensional devices and is found to be time
Gerenciamento de Energia‟ system integrates the collected consuming for bi-dimensional FACTS devices. Glanzmann et al.
distributed SCOPF data into SCADA/EMS. 16 dual-processed [56] (2006) developed a current injection method by which the
nodes cluster of computers are put on work for a large real time power flow in any line during an outage can be calculated using
Brazilian system consisting of 3073 bus, 4547 branches, 963 linear equations. The current injection method was tossed by
active and reactive controls with 700 contingencies, 57,947 MW Bacher et al. (1986) and Schnyder et al. (1988), which has the
and 16,007 Mvar total load with a generation of 60,698 MW and advantage of not having to go through the cumbersome
19,112 Mvar, losses are 2,751 MW and 3,105 Mvar. The authors rebuilding of Power Flow iteration in case of any contingency
claim to have achieved an efficiency increase of 92% and and is implemented by the authors in this paper. An excellent
processing speed decreased to 111.16% and much economic illustration of the current injection method is given in the paper
profits as number of additional hardware is require to integrate and authors have introduced Additional Bus Injection Currents in
this system to SCADA/EMS is lesser than other conventional the proposed method to all other buses other than the load and
approaches. Saavedra et al. [17] (1994) offered parallel generator bus. Total susceptance or reactance model concepts are
architecture processing for the preventive mode of SCOPF using used for the inclusion of the FACTS devices (SVC & TCSC) in
Asynchronous Dual-Simplex method. Don Hur et al. [22] (2001) the system. Only critical contingencies are considered by the
approached parallel SCOPF problem in a decentralized authors in the inclusion of (N-1) contingencies in the later stage
with an IEEE 57 Bus grid with additional generator at bus 30 is
framework, using a price-based mechanism that models each
used as a test system. Narmatha Banu et al. [57] proposed a new
region as an economic unit. Here an approach based on Linear
enhanced Genetic Algorithm based solution for SCOPF with
Programming is used and post-contingency constraints are
FACTS (TCSC) incorporated and the optimal location of the
linearized to append to the base case in every iteration. There,
FACTS are found using Overload Index Factor. The authors have
OPF problems is solved for maximum secure simultaneous predetermined the possible sites for the installation of the TCSC
transfer capability of each tie-line between adjacent regions by during various contingencies, by selecting the most overloaded
taking only the Security Constraints imposed on the tie-lines into lines and by selecting the best four lines beside it to place TCSC
account and by using the Line Outage Distribution Factors and there after the Genetic Algorithm is used to find the optimal
(LDF). In the next stage the maximum secure transfer capability values. The results (Fuel Cost, Generation) has been compared
of tie-lines are solved in such a way that the system stays in limit with Evolutionary Programming and with the method opted by
even when a generator is removed. GAMS 2.25 software is used Alsca (1973- using penalty function) and it‟s found that authors‟
for the parallel computing using the in-built MINOS5 and proposed method offers the best solution and security for an
CONOPT solvers on a test system of two area Korean Power IEEE 30 bus system. Prasanna et al. [58] proposed a new
System and the maximum allowable flow on all tie-lines is combinational algorithm for multi-area SCOPF incorporating
tabulated in the conclusive statement of authors. Fuzzy Logic in Evolutionary Programming and Tabu Search and
termed it as Fuzzy Muted Evolutionary Programming (FMEP)
and Fuzzy Guided Tabu Search (FGTS). The proposed algorithm
has been tested on single area IEEE 30 bus system and
47
International Journal of Computer Applications (0975 – 8887)
Volume 11– No.6, December 2010
interconnected two area systems formed by joining two IEEE 30 SCOPF with Available Transfer Capability (ATC) and
bus system thorough a tie-line of scheduled interchange. Fuzzy Congestion Management. Authors have used Successive Linear
logic is incorporated to expedite the convergence. The search Programming and Fast Decoupled Power Flow method for
range factor and scaling factor are improved using Fuzzy in the linearized AC-PF analysis and Multi-transaction framework of
proposed algorithm to make it adaptive. Three single line outages Shu & George (2002) was adopted for analysis. The algorithm
are considered by the authors in the paper and a conclusive enforces the line flow limits and two cases viz., with fixed
statement on the other possible applications of this algorithm is fractions assigned to participants and another one with flexible
well given. Hug-Glanzmann et al. [59] (2009) proposed a fractions in multi-transaction are evaluated on a three area IEEE
sensitivity based method to find the reduced area optimization 24 bus reliability test system and 119 bus Indian Utility system
with FACTS device incorporating (N-1) security criteria. Current consisting of 25 generators, 168 transmission lines, 26
Injection method (voltage/bus currents is given as a function of
transformers, 3 shunt reactors and shunt capacitors. It‟s found
the decision variables in the base case) is adopted to determine
that there is an improvement of 8.74% and 4.26% without and
the system state in case of contingency, complete Load Flow
with security constraints respectively. Sarbjeet Kaur Bath et al.
need not to be run. Reduced Area method is found to be an
[62] (2007) proposed a Multi-objective Security Constrained
attractive option as the influence of FACTS are limited to certain
area and the complete area need to be considered for OPD solution by minimizing various objectives like Operating
optimization in SCOPF analysis. Sensitivity Analysis is used to cost, Emission together with variance of active power generation
find the area of influence and the simulations are validated using and reactive power generation. A stochastic approach is followed
„fmincon‟ in MATLAB TOMLAB. The proposed method and is here with Variations in system parameters and variables are
tested on a modified IEEE 57 bus system (additional generator at modeled mathematically using their variance and covariance.
bus 30) and the results are found to be promising. Fuzzy Logic technique has been exploited to model various
objectives and membership functions are modeled for Security of
14. MISCELLANEOUS APPLICATIONS transmission lines with respect to expected active power flow.
Florin Capitanescu et al. [60] (2006) narrated much of the Again, the „G.E.P. Box’s‟ Evolutionary search technique is made
importance of SCOPF with main stress on three factors; use for searching the 'weight factor' which are used for trade-off
Generation cost minimization, Cost of removing congestion and in integrating conflicting multiple objectives and NR method is
Maximum power transfer (Loadability margin) computation. used for solving Lagrange‟s function in each weight factor
Newer developments like introduction of surrogate power flow combination. In this paper, a hypercube search pattern is
limits have been stated. Modeling of SCOPF in 'preventive followed by EP, where weight combinations are simulated at
approach' (PSCOPF) and 'corrective approach' (CSCOPF) has corner points of multi-dimensional hypercube, which forms
been explained and to prevent unrealistic variations of control around an initial search point, which constantly moves to a better
variables under the effect of contingency, "coupling" constraints 'fit' place. Security of the transmission lines considered in the
between the base case and post-contingency values of control proposed algorithm and the authors have made a novel attempt
variables are included in this approach. An interior point (Primal by converting the stochastic models into deterministic models by
Dual Interior Point) approach is narrated and the inequality cogitating their expected values with basic statistical principles.
constraints are eliminated by adding them to the objective Robert Thomas et al. [63] proposed an advanced SCOPF
function as logarithmic barrier controlled by a scalar "barrier algorithm in a co-optimization framework in which
parameter", which gradually comes down to zero with iterations. contingencies, ancillary services, and network constraints are
The system adopted for testing is a NORDIC32; 60 bus system, taken care of. The proposed method is a full AC non-linear OPF
where, above mentioned three factors are analyzed for cases like method with (N-1) contingencies of both dynamic and static in
OPF with no security constraints; PSCOPF; and CSCOPF. The nature. Proposed method also offers procuring an adequate and
power of the proposed algorithm to withstand congestion is locational relevant supply of real and reactive power to meet
tested by overloading the test case up to 147%. The authors have critical contingencies, sets day-ahead contract prices for reactive
discussed in deep, the critical issues connected to SCOPF like power and for reserves and re-dispatch of load and supply for
effect and tediousness in analyzing the large number of next day. There was no demonstration of the proposed
contingencies in a real system, contingencies filtering techniques "superOPF" to any test systems, but a wider literature survey
and about identification of umbrella contingencies, Parallel was conveyed.
processing techniques etc. Jayashree et al. [61] (2008) explained
the newer application of SCOPF in deregulated market by
developing a coupled unified model of multi-transaction based
48
International Journal of Computer Applications (0975 – 8887)
Volume 11– No.6, December 2010
49
International Journal of Computer Applications (0975 – 8887)
Volume 11– No.6, December 2010
50
International Journal of Computer Applications (0975 – 8887)
Volume 11– No.6, December 2010
evaluation of an Electrical Power system" European Trans Power Systems, IEEE Transactions on , vol.12, no.1,
on Electrical Power Engineering, Vol. I, No.5. pp. 243-251, pp.105-112, Feb 1997
1991.
[31] Yan, X.; Quintana, V.H., "An efficient predictor-corrector
[19] D Menniti, D Picardi, C Sorrentino, N Tesla, "Neural interior point algorithm for security-constrained economic
network based prediction of the steady state security for dispatch," Power Systems, IEEE Transactions on , vol.12,
electrical power system," 2nd IFAC Sipower'95, Mexico no.2, pp.803-810, May 1997
Mexico, 6-8 December 1995
[32] Vargas, L.S.; Quintana, V.H.; Vannelli, A., "A tutorial
[20] Conforti, D.; Menniti, D.; Sorrentino, N.; Verde, P.; Testa, description of an interior point method and its applications
A., "Optimal load-flow with N-1 steady-state security via to security-constrained economic dispatch," Power Systems,
high performance computing," Electrotechnical Conference, IEEE Transactions on , vol.8, no.3, pp.1315-1324, Aug 1993
1996. MELECON '96., 8th Mediterranean , vol.2, no.,
[33] Jabr, R.A.; Coonick, A.H.; Cory, B.J., "A homogeneous
pp.873-879 vol.2, 13-16 May 1996
linear programming algorithm for the security constrained
[21] E.Vaahedi, Y.Mansour, C.Fuches, S. Granville, M.Latore, economic dispatch problem," IEEE Transactions on Power
H.Hamadanizadeh, "Dynamic Security Constrained Optimal Systems, vol.15, no.3, pp.930-936, Aug 2000
Power Flow/VAr Planning", IEEE Transaction on Power
[34] Yong Fu; Shahidehpour, M.; Zuyi Li, "AC contingency
Systems, Vol. 16, No. 1, pp 38-43, February 2001
dispatch based on security-constrained unit commitment,"
[22] Hur, D.; Jong-Keun Park; Kim, B.H.; Kwang-Myoung Son, Power Systems, IEEE Transactions on , Vol.21, No.2, pp.
"Security constrained optimal power flow for the evaluation 897-908, May 2006
of transmission capability on Korea electric power system,"
[35] Kyoung-Shin Kim; Leen-Hark Jung; Seung-Chul Lee; Un-
Power Engineering Society Summer Meeting, 2001. IEEE,
Chul Moon, "Security Constrained Economic Dispatch
vol.2, pp.1133-1138, 2001
Using Interior Point Method, "International Conference on
[23] Lizhi Wang, Mainak Mazumdar, "Contingency Selection in Power System Technology, PowerCon 2006. pp.1-6, 22-26
Security Constrained Optimal Power Flow Problem: A Oct. 2006
Multi-Objective Approach", Electricity Conference 2006
[36] Capitanescu, F.; Wehenkel, L., "A New Iterative Approach
[24] Y. Yuan, J. Kubokawa, and H. Sasaki, “A solution of to the Corrective Security-Constrained Optimal Power Flow
optimal power flow with multi-contingency transient Problem," Power Systems, IEEE Transactions on , vol.23,
stability constraints,” IEEE Trans. on Power Systems, Vol. no.4, pp.1533-1541, Nov. 2008
18, No. 3, pp. 1094-1102, Aug. 2003
[37] Harsan, H.; Hadjsaid, N.; Pruvot, P., "Cyclic security
[25] F. Bouffard, F. D. Galiana, J. M. Arroyo. "Umbrella analysis for security constrained optimal power flow," IEEE
Contingencies in Security-Constrained Optimal Power Transactions on Power Systems, vol.12, no.2, pp.948-953,
Flow". 15th Power Systems Computation Conference, May 1997
PSCC'05. Liege, Belgium. August 2005
[38] Zaoui, F.; Fliscounakis, S., "A Direct Approach for the
[26] Capitanescu, F.; Glavic, M.; Ernst, D.; Wehenkel, L., Security Constrained," Power Systems Conference and
"Contingency Filtering Techniques for Preventive Security- Exposition, 2006. PSCE '06. 2006 IEEE PES , vol., no.,
Constrained Optimal Power Flow," Power Systems, IEEE pp.1562-1569, Oct. 29 2006-Nov. 1, 2006
Transactions on , vol.22, no.4, pp.1690-1697, Nov. 2007
[39] P. E. Onate Yumbla, J. M. Ramirez, and C. A. Coello,
[27] V. C. Ramesh and Xuan Li, “A fuzzy multi-objective "Optimal power flow subject to security constraints solved
approach to contingency constrained OPF”, IEEE Trans. with a Particle swarm optimizer," IEEE Transactions on
Power Syst., vol. 12, no. 3, pp.1348-1354, Aug. 1997 Power Systems, Vol. 23, No. 1, pp. 33-40, February 2008
[28] Devaraj, D.; Yegnanarayana, B., "Genetic-algorithm-based [40] L. L. Lai, J. T. Ma, R. Yokoyama, and M. Zhao, “ Improved
optimal power flow for security enhancement," Generation, genetic algorithms for optimal power flow under both
Transmission and Distribution, IEE Proceedings- , vol.152, normal and contingent operation states,” Electrical Power &
no.6, pp. 899-905, 4 Nov. 2005 Energy Systems, Vol. 19, No. 5, pp. 287-292, June 1997
[29] Lopez-Lezama, J.M.; Murillo-Sanchez, C.E.; Zuluaga, L.J.; [41] P.Somasundaram, K., Kuppusamy, and Kumudini Devi,
Gutierrez-Gomez, J.F., "A Contingency-Based Security- “Evolutionary programming based security constrained
Constrained Optimal Power Flow Model For Revealing The optimal power flow”, Electric Power System Research,
Marginal Cost of a Blackout Risk-Equalizing Policy in the Elsevier, pp. 137-145, 2004
Colombian Electricity Market," Transmission &
[42] Zwe-Lee Gaing; Rung-Fang Chang, "Security-constrained
Distribution Conference and Exposition: Latin America,
optimal power flow by mixed-integer genetic algorithm with
2006. TDC '06. IEEE/PES , vol., no., pp.1-6, 15-18 Aug.
arithmetic operators," IEEE Power Engineering Society
2006
General Meeting, pp. 1-8, 2006
[30] Aganagic, M.; Mokhtari, S., "Security constrained economic
dispatch using nonlinear Dantzig-Wolfe decomposition,"
51
International Journal of Computer Applications (0975 – 8887)
Volume 11– No.6, December 2010
[43] Stott, B.; Alsac, O.; Monticelli, A.J., "Security analysis and [54] C. Lehmköster, “Security constrained optimal power flow
optimization," Proceedings of the IEEE, Vol.75, No.12, pp. for an economical operation of FACTS-devices in
1623-1644, Dec. 1987 liberalized energy markets,” IEEE Trans. Power Del., vol.
17, no. 2, pp. 603–608, Apr. 2002
[44] J. A. Momoh and J. Zhu, “Multi-area power systems
economic dispatch using nonlinear convex network flow [55] Berizzi, A.; Delfanti, M.; Marannino, P.; Pasquadibisceglie,
programming”, Electric Power Syst. Research, vol. 59, pp. M.S.; Silvestri, A., "Enhanced Security-Constrained OPF
13-20, 2001 With FACTS Devices," Power Systems, IEEE Transactions
on , vol.20, no.3, pp. 1597-1605, Aug. 2005
[45] Karoui, K.; Platbrood, L.; Crisciu, H.; Waltz, R.A., "New
large-scale security constrained optimal power flow program [56] Glanzmann, G.; Andersson, G., "Incorporation of N-1
using a new interior point algorithm," Electricity Market, Security into Optimal Power Flow for FACTS Control,"
2008. EEM 2008. 5th International Conference on European Power Systems Conference and Exposition, 2006. PSCE '06.
, vol., no., pp.1-6, 28-30 May 2008 2006 IEEE PES , vol., no., pp.683-688, Oct. 29 2006-Nov.
1, 2006
[46] Anibal T. de Azevedo, Carlos A. Castro, Aurelio R.L.
Oliveira, Secundino Soares, "Security constrained optimal [57] R, Narmatha Banu, D, Devaraj, "Enhanced genetic
active power flow via Network model and interior point algorithm approach for Security constrained optimal power
method", Revista Controle & Automação/Vol.20 no.2, pp flow Including FACTS devices", International Journal of
206-216/Abril, Maio e Junho 2009 Electrical Power and Energy Systems Engineering, pp. 33-
38, 2009
[47] Claudio Cañizares, William Rosehart, Alberto Berizzi,
Cristian Bovo, "Comparison of Voltage Security [58] T.S. Prasanna, N.B. Muthuselvan, P. Somasundaram,
Constrained Optimal Power Flow Techniques", Proc. 2001 "Security constrained OPF by Fuzzy stochastic Algorithms
IEEE-PES Summer Meeting, Vancouver, BC, July 2001 in Interconnected Power Systems", Journal of Electrical
Engineering, 5-1, 2009
[48] D. Devaraj, J. Preetha Roselyn, "Improved genetic algorithm
for voltage security constrained optimal power flow [59] G. Hug-Glanzmann, G. Andersson, "N-1 security in optimal
problem", International Journal of Energy Technology and power flow control applied to limited areas", IET
Policy, Vol. 5, No. 4, pp.475-488, 2007 Generation, Transmission and Distribution, Vol. 3, Issue. 2,
pp. 206–215, 2009
[49] Nakawiro, W.; Erlich, I., "A Combined GA-ANN Strategy
for Solving Optimal Power Flow with Voltage Security [60] F. Capitanescu, M. Glavic, D. Ernst, L. Wehenkel,
Constraint," Power and Energy Engineering Conference, "Applications of Security-Constrained Optimal Power
2009. APPEEC 2009. Asia-Pacific , vol., no., pp.1-4, 27-31 Flows", Modern Electric Power Systems Symposium,
March 2009 MEPS06, Wroclaw, Poland, September 2006
[50] Biskas, P.N.; Bakirtzis, A.G., "A decentralized solution to [61] R Jayashree, M Abdullah Khan, "A Mutli-Transaction based
the Security Constrained DC-OPF problem of multi-area Security Constrained Optimal Power Flow tool for
power systems," Power Tech, 2005 IEEE Russia , pp.1-7, Assessment of Available transfer capability and Congestion
pp. 27-30, June 2005 Management", International Journal of Electrical and Power
Engineering, pp. 501-511, 2007
[51] Don Hur, Kim Balho, "Application of Distributed Optimal
Power Flow to Power System Security Assessment", Journal [62] Sarbjeet Kaur Bath, Jaspreet Singh Dhillon, and D P
of Electric Power Components and Systems, Taylor & Kothari. "Security Constrained Stochastic Multi-objective
Francis, Vol. 31, Issue. 1, pp. 71-80, 2003 Optimal Power Dispatch" International Journal of Emerging
Electric Power Systems 8.1, 2007
[52] Wei Qiu; Flueck, A.J.; Feng Tu, "A new parallel algorithm
for security constrained optimal power flow with a nonlinear [63] Thomas, R.J.; Murillo-Sanchez, C.E.; Zimmerman, R.D.,
interior point method," Power Engineering Society General "An advanced security constrained OPF that produces
Meeting, 2005. IEEE , pp. 447-453 Vol. 1, 12-16 June 2005 correct market-based pricing," Power and Energy Society
General Meeting - Conversion and Delivery of Electrical
[53] Borges, C.L.T.; Alves, J.M.T., "Power System Real Time
Energy in the 21st Century, 2008 IEEE , vol., no., pp.1-6,
Operation based on Security Constrained Optimal Power
20-24 July 2008
Flow and Distributed Processing," Power Tech, 2007 IEEE
Lausanne , vol., no., pp.960-965, 1-5 July 2007
52