Faster identification of redundant security constraints in SCUC

One of the main reasons why it has long been difficult to solve the security-constrained unit commitment (SCUC) problem is that there are a large number of security constraints in SCUC such as transmission constraints in the base case and N-1 criterion constraints, and adding all of them to the mode...

Full description

Bibliographic Details
Main Authors: Wenjun Zhang, Liyou Fu
Format: Article
Language:English
Published: Elsevier 2022-11-01
Series:Energy Reports
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S2352484722022363
_version_ 1797901879048404992
author Wenjun Zhang
Liyou Fu
author_facet Wenjun Zhang
Liyou Fu
author_sort Wenjun Zhang
collection DOAJ
description One of the main reasons why it has long been difficult to solve the security-constrained unit commitment (SCUC) problem is that there are a large number of security constraints in SCUC such as transmission constraints in the base case and N-1 criterion constraints, and adding all of them to the model will make the solution of the problem very challenging. Related research shows that most of these security constraints are redundant for solving SCUC, so identifying and eliminating most of the redundant security constraints in the model will greatly improve the speed of solving SCUC. In this paper, a fast and efficient algorithm is proposed for identifying redundant security constraints in SCUC. The proposed algorithm introduces parameters in the basic transmission constraints to additionally limit the transmission capacity. In the N-1 constraints based on Line Outage Distribution Factor (LODF), more redundant constraints are identified and removed in the model by comparing the upper limit of transmission line capacity with the maximum transmission power flow that may occur in the line when the system is running. More importantly, the proposed algorithm does not need to solve additional auxiliary optimization problems or iteratively solve multiple models, and only needs to identify a large number of redundant security constraints through a quick calculation and logical judgment in the early stage of model establishment. It has been tested on the IEEE 30-bus system and the IEEE 118-bus system. The numerical experimental results show that the algorithm can identify 98.52% and 99.3% of redundant security constraints, and the computational speed is 1.63 times and 17.85 times of the full model, respectively. Compared with other methods in the literature, it has more advantages in computational efficiency.
first_indexed 2024-04-10T09:08:56Z
format Article
id doaj.art-8e2b9077416f49fa9a82a7e1f798aeb6
institution Directory Open Access Journal
issn 2352-4847
language English
last_indexed 2024-04-10T09:08:56Z
publishDate 2022-11-01
publisher Elsevier
record_format Article
series Energy Reports
spelling doaj.art-8e2b9077416f49fa9a82a7e1f798aeb62023-02-21T05:14:11ZengElsevierEnergy Reports2352-48472022-11-0181414414153Faster identification of redundant security constraints in SCUCWenjun Zhang0Liyou Fu1Business School, Shanghai DianJi University, Shanghai, 201306, ChinaCorresponding author.; Business School, Shanghai DianJi University, Shanghai, 201306, ChinaOne of the main reasons why it has long been difficult to solve the security-constrained unit commitment (SCUC) problem is that there are a large number of security constraints in SCUC such as transmission constraints in the base case and N-1 criterion constraints, and adding all of them to the model will make the solution of the problem very challenging. Related research shows that most of these security constraints are redundant for solving SCUC, so identifying and eliminating most of the redundant security constraints in the model will greatly improve the speed of solving SCUC. In this paper, a fast and efficient algorithm is proposed for identifying redundant security constraints in SCUC. The proposed algorithm introduces parameters in the basic transmission constraints to additionally limit the transmission capacity. In the N-1 constraints based on Line Outage Distribution Factor (LODF), more redundant constraints are identified and removed in the model by comparing the upper limit of transmission line capacity with the maximum transmission power flow that may occur in the line when the system is running. More importantly, the proposed algorithm does not need to solve additional auxiliary optimization problems or iteratively solve multiple models, and only needs to identify a large number of redundant security constraints through a quick calculation and logical judgment in the early stage of model establishment. It has been tested on the IEEE 30-bus system and the IEEE 118-bus system. The numerical experimental results show that the algorithm can identify 98.52% and 99.3% of redundant security constraints, and the computational speed is 1.63 times and 17.85 times of the full model, respectively. Compared with other methods in the literature, it has more advantages in computational efficiency.http://www.sciencedirect.com/science/article/pii/S2352484722022363Mixed-integer linear programming (MILP)Security-constrained unit commitment (SCUC)Inactive security constraintsN-1 criterion
spellingShingle Wenjun Zhang
Liyou Fu
Faster identification of redundant security constraints in SCUC
Energy Reports
Mixed-integer linear programming (MILP)
Security-constrained unit commitment (SCUC)
Inactive security constraints
N-1 criterion
title Faster identification of redundant security constraints in SCUC
title_full Faster identification of redundant security constraints in SCUC
title_fullStr Faster identification of redundant security constraints in SCUC
title_full_unstemmed Faster identification of redundant security constraints in SCUC
title_short Faster identification of redundant security constraints in SCUC
title_sort faster identification of redundant security constraints in scuc
topic Mixed-integer linear programming (MILP)
Security-constrained unit commitment (SCUC)
Inactive security constraints
N-1 criterion
url http://www.sciencedirect.com/science/article/pii/S2352484722022363
work_keys_str_mv AT wenjunzhang fasteridentificationofredundantsecurityconstraintsinscuc
AT liyoufu fasteridentificationofredundantsecurityconstraintsinscuc