Skip to main content

Comparative Analysis on Security-Constrained Optimal Power Flow Using Linear Sensitivity Factors-Based Contingency Screening

  • Conference paper
  • First Online:
Innovations in Infrastructure

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 757))

  • 1082 Accesses

Abstract

Security-Constrained Optimal Power Flow (SCOPF) is a significant tool used for analysis of power system operation and planning. This paper presents a solution of SCOPF considering critical contingencies simulated on IEEE 30-bus system. The main objective of the presented work is to minimize the total generation cost. An interior point algorithm has been used to find out a feasible and optimal solution with minimum computational time for secured power system operation. Contingency screening for SCOPF formulation has been accomplished with the help of Linear Sensitivity Factors (LSFs) obtained from the Z-bus algorithm. Comparative analysis has been carried out for the results obtained with those of other techniques published in the literature for same test cases.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Alsac, O., Stott, B.: Optimal load flow with steady-state security. IEEE Trans. Power Appar. Syst. PAS-93(3), 745–751 (1974)

    Article  Google Scholar 

  2. Monticelli, A., Pereira, M.V.F., Granville, S.: Security-constrained optimal power flow with post-contingency corrective rescheduling. IEEE Trans. Power Syst. 2(1), 175–180 (1987)

    Article  Google Scholar 

  3. Momoh, J.A., El-Hawary, M.E., Adapa, R.: A review of selected optimal power flow literature to 1993 part I: nonlinear and quadratic programming approaches. IEEE Trans. Power Syst. 14(1), 96–103 (1999)

    Article  Google Scholar 

  4. Monoh, J.A., Ei-Hawary, M.E., Adapa, R.: A review of selected optimal power flow literature to 1993 part II: Newton, linear programming and interior point methods. IEEE Trans. Power Syst. 14(1), 105–111 (1999)

    Article  Google Scholar 

  5. Capitanescu, F., Glavic, M., Ernst, D., Wehenkel, L.: Interior-point based algorithms for the solution of optimal power flow problems. Electr. Power Syst. Res. 77(5–6), 508–517 (2007)

    Article  Google Scholar 

  6. Gunda, J., Djokic, S., Langella, R., Testa, A.: Comparison of conventional and meta-methods for security-constrained OPF analysis. In: 2015 AEIT International Annual Conference (AEIT), pp. 58–65 (2015)

    Google Scholar 

  7. J. J. Grainer and W. Stevenson, Power System Analysis. McGraw-Hill, 1994

    Google Scholar 

  8. Wood, A.J., Wollenberg, B.F.: Power Generation, Operation, and Control. Wiley, New York (1984)

    Google Scholar 

  9. Christie, R: Power Systems Test Case Archive. Washington University, 2013. www.ee.Washington.edu/research/pstca

  10. Zimmerman, R.D., Murillo-Sánchez, C.E., Thomas, R.J.: MATPOWER’s extensible optimal power flow architecture. In: 2009 IEEE Power and Energy Society General Meeting, PES’09, no. 2, pp. 1–7 (2009)

    Google Scholar 

  11. Ongsakul, W., Tantimaporn, T.: Optimal power flow by improved evolutionary programming. Electr. Power Compon. Syst. 34(1), 79–95 (2006)

    Article  Google Scholar 

  12. Thitithamrongchai, C., Eua-Arporn, B.: Security-constrained optimal power flow: a parallel self-adaptive differential evolution approach. Electr. Power Compon. Syst. 36(3), 280–298 (2008)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Darshan B. Rathod .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Rathod, D.B., Jain, R.A. (2019). Comparative Analysis on Security-Constrained Optimal Power Flow Using Linear Sensitivity Factors-Based Contingency Screening. In: Deb, D., Balas, V., Dey, R. (eds) Innovations in Infrastructure. Advances in Intelligent Systems and Computing, vol 757. Springer, Singapore. https://doi.org/10.1007/978-981-13-1966-2_12

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-1966-2_12

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-1965-5

  • Online ISBN: 978-981-13-1966-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics