Robust security constrained optimal power flow considering load and wind power generation uncertainties by applying Taguchi method

Document Type : Original Article

Authors

1 Razi University

2 Electrical Engineering Department, Engineering Faculty, Razi University, Kermanshah, Iran

Abstract

With the increased use of wind power in power systems, the necessity of revision of conventional deterministic approaches is indisputable. Presenting new and effective methods based on uncertainty modeling is greatly emphasized. In this paper, a new method for investigating the robust security constrained-optimal power flow (RSCOPF) is proposed, which is not only able to comply with security constraints but also robust to the uncertainty of electrical demand loads and wind power generation. The proposed approach is based on the definition of uncertain loads and wind power generation and uses the Taguchi orthogonal array technique (TOAT), for the first time, a technique which is adopted to solve the RSCOPF by applying the alternating current power flow (ACPF) and particle swarm optimization (PSO) algorithm. Also, some security analyses are presented to introduce the most critical lines and generation units whose loss imposes the highest operating costs on the network. The case study simulation on the IEEE 14-bus system using MATLAB software demonstrates the ability of the proposed algorithm.

Keywords

Main Subjects


1. K. Morison, L. Wang, and P. Kundur, "Power system security assessment," IEEE power and energy magazine, vol. 2, no. 5, pp. 30-39,
2004.
2. H. Abdi, S. D. Beigvand, and M. La Scala, "A review of optimal power
flow studies applied to smart grids and microgrids," Renewable and
Sustainable Energy Reviews, vol. 71, pp. 742-766, 2017.
3. F. Milano, C. A. Cañizares, and A. J. Conejo, "Sensitivity-based securityconstrained OPF market clearing model," IEEE Transactions on power
systems, vol. 20, no. 4, pp. 2051-2060, 2005.
4. F. Capitanescu et al., "State-of-the-art, challenges, and future trends
in security constrained optimal power flow," Electric Power Systems
Research, vol. 81, no. 8, pp. 1731-1741, 2011.
5. M. Shukla and G. Radman, "Optimal power flow using probabilistic load
model," in Proceedings of the Thirty-Seventh Southeastern Symposium
on System Theory, 2005. SSST’05., 2005: IEEE, pp. 439-442.
6. T. Yong and R. Lasseter, "Stochastic optimal power flow: formulation
and solution," in 2000 Power Engineering Society Summer Meeting
(Cat. No. 00CH37134), 2000, vol. 1: IEEE, pp. 237-242.
7. T. Zheng, J. Zhao, E. Litvinov, and F. Zhao, "Robust optimization and
its application to power system operation," in CIGRE, 2012.
8. A. Alabdulwahab, A. Abusorrah, X. Zhang, and M. Shahidehpour, "Coordination of interdependent natural gas and electricity infrastructures for
firming the variability of wind energy in stochastic day-ahead scheduling," IEEE Transactions on Sustainable Energy, vol. 6, no. 2, pp. 606-
615, 2015.
9. Z. Wang and F. L. Alvarado, "Interval arithmetic in power flow analysis,"
IEEE Transactions on Power Systems, vol. 7, no. 3, pp. 1341-1349,
1992.
10. M. Vahedipour-Dahraie, H. Rashidizadeh-Kermani, A. AnvariMoghaddam, and J. M. Guerrero, "Stochastic Risk-Constrained
Scheduling of Renewable-Powered Autonomous Microgrids with Demand Response Actions: Reliability and Economic Implications," IEEE
Transactions on Industry Applications, 2019.
11. R. Zhang, Z. Y. Dong, Y. Xu, K. P. Wong, and M. Lai, "Hybrid computation of corrective security-constrained optimal power flow problems,"
IET Generation, Transmission & Distribution, vol. 8, no. 6, pp. 995-1006,
2014.
12. J. Kardoš, D. Kourounis, and O. Schenk, "Two-Level Parallel Augmented Schur Complement Interior-Point Algorithms for the Solution of
Security Constrained Optimal Power Flow Problems," IEEE Transactions on Power Systems, 2019.
13. Y. Xu, Z. Y. Dong, R. Zhang, K. P. Wong, and M. Lai, "Solving preventivecorrective SCOPF by a hybrid computational strategy," IEEE Transactions on Power Systems, vol. 29, no. 3, pp. 1345-1355, 2013.
14. W. Zhang, Y. Xu, Z. Y. Dong, Y. Wang, and R. Zhang, "An efficient
approach for robust SCOPF considering load and renewable power uncertainties," in 2016 Power Systems Computation Conference (PSCC),
2016: IEEE, pp. 1-7.
15. Y. Xu, H. Yang, R. Zhang, Z. Y. Dong, M. Lai, and K. P. Wong, "A
contingency partitioning approach for preventive-corrective securityconstrained optimal power flow computation," Electric Power Systems
Research, vol. 132, pp. 132-140, 2016.
16. V. Saplamidis, R. Wiget, and G. Andersson, "Security constrained
optimal power flow for mixed AC and multi-terminal HVDC grids," in
2015 IEEE Eindhoven PowerTech, 2015: IEEE, pp. 1-6.
17. J. Cao, W. Du, and H. Wang, "An improved corrective security constrained OPF with distributed energy storage," IEEE Transactions on
Power Systems, vol. 31, no. 2, pp. 1537-1545, 2015.
18. J. Cao, Y. Liu, Y. Ge, H. Cai, and B. Zhou, "Enhanced corrective security
constrained OPF with hybrid energy storage systems," in 2016 UKACC
11th International Conference on Control (CONTROL), 2016: IEEE, pp.
1-7.
19. W. Zhang, Y. Xu, Z. Dong, and K. P. Wong, "Robust security
constrained-optimal power flow using multiple microgrids for corrective
control of power systems under uncertainty," IEEE Transactions on
Industrial Informatics, vol. 13, no. 4, pp. 1704-1713, 2016.
20. Y. Xu, M. Yin, Z. Y. Dong, R. Zhang, D. J. Hill, and Y. Zhang, "Robust
dispatch of high wind power-penetrated power systems against transient instability," IEEE Transactions on Power Systems, vol. 33, no. 1,
pp. 174-186, 2017.
21. C. G. Marcelino et al., "Solving security constrained optimal power flow
problems: a hybrid evolutionary approach," Applied Intelligence, vol.
48, no. 10, pp. 3672-3690, 2018.
22. L. de Magalhães Carvalho, A. M. L. da Silva, and V. Miranda, "SecurityConstrained Optimal Power Flow via Cross-Entropy Method," IEEE
Transactions on Power Systems, vol. 33, no. 6, pp. 6621-6629, 2018.
23. F. Capitanescu, "Approaches to Obtain Usable Solutions for Infeasible
Security-Constrained Optimal Power Flow Problems Due to Conflicting
Contingencies," in 2019 IEEE Milan PowerTech, 2019: IEEE, pp. 1-6.
24. S. Rahmani and N. Amjady, "Enhanced goal attainment method for
solving multi-objective security-constrained optimal power flow considering dynamic thermal rating of lines," Applied Soft Computing, vol. 77,
pp. 41-49, 2019.
25. K. Teeparthi and D. V. Kumar, "Security-constrained optimal power flow
with wind and thermal power generators using fuzzy adaptive artificial
physics optimization algorithm," Neural Computing and Applications,
vol. 29, no. 3, pp. 855-871, 2018.
26. F. Karbalaei, H. Shahbazi, and M. Mahdavi, "A new method for solving
preventive security-constrained optimal power flow based on linear network compression," International Journal of Electrical Power & Energy
Systems, vol. 96, pp. 23-29, 2018.
27. L. Yang, C. Zhang, and J. Jian, "A parallel method for solving the DC
security constrained optimal power flow with demand uncertainties,"
International Journal of Electrical Power & Energy Systems, vol. 102,
pp. 171-178, 2018.
28. D. B. Rathod and R. A. Jain, "Comparative Analysis on SecurityConstrained Optimal Power Flow Using Linear Sensitivity FactorsBased Contingency Screening," in Innovations in Infrastructure:
Springer, 2019, pp. 139-147.
29. F. Capitanescu, M. Glavic, D. Ernst, and L. Wehenkel, "Contingency
filtering techniques for preventive security-constrained optimal power
flow," IEEE Transactions on Power Systems, vol. 22, no. 4, pp. 1690-
1697, 2007.
30. E. Vaahedi, Y. Mansour, C. Fuchs, S. Granville, M. D. L. Latore, and H.
Hamadanizadeh, "Dynamic security constrained optimal power flow/var
planning," IEEE Transactions on Power Systems, vol. 16, no. 1, pp.
38-43, 2001.
31. P. Somasundaram, K. Kuppusamy, and R. K. Devi, "Evolutionary programming based security constrained optimal power flow," Electric
Power Systems Research, vol. 72, no. 2, pp. 137-145, 2004.
32. F. Capitanescu and L. Wehenkel, "A new iterative approach to the
corrective security-constrained optimal power flow problem," IEEE
transactions on power systems, vol. 23, no. 4, pp. 1533-1541, 2008.
33. D. Phan and J. Kalagnanam, "Some efficient optimization methods for
solving the security-constrained optimal power flow problem," IEEE
Transactions on Power Systems, vol. 29, no. 2, pp. 863-872, 2013.
34. L. Platbrood, F. Capitanescu, C. Merckx, H. Crisciu, and L. Wehenkel,
"A generic approach for solving nonlinear-discrete security-constrained
optimal power flow problems in large-scale systems," IEEE Transactions on Power Systems, vol. 29, no. 3, pp. 1194-1203, 2013.
35. A. Panda and M. Tripathy, "Security constrained optimal power flow
solution of wind-thermal generation system using modified bacteria
foraging algorithm," Energy, vol. 93, pp. 816-827, 2015.
36. D. T. Phan and X. A. Sun, "Minimal impact corrective actions in securityconstrained optimal power flow via sparsity regularization," IEEE Transactions on Power Systems, vol. 30, no. 4, pp. 1947-1956, 2014.
37. J. J. Thomas and S. Grijalva, "Flexible security-constrained optimal
power flow," IEEE Transactions on Power Systems, vol. 30, no. 3, pp.
1195-1202, 2014.
38. M. S. Jahan and N. Amjady, "Solution of large-scale security constrained optimal power flow by a new bi-level optimisation approach
based on enhanced gravitational search algorithm," IET Generation,
Transmission & Distribution, vol. 7, no. 12, pp. 1481-1491, 2013.
39. Q. Wang, J. D. McCalley, T. Zheng, and E. Litvinov, "Solving corrective
risk-based security-constrained optimal power flow with Lagrangian relaxation and Benders decomposition," International Journal of Electrical
Power & Energy Systems, vol. 75, pp. 255-264, 2016.
40. J. Mohammadi, G. Hug, and S. Kar, "Agent-based distributed security
constrained optimal power flow," IEEE Transactions on Smart Grid, vol.
9, no. 2, pp. 1118-1130, 2016.
41. H. Yu and W. Rosehart, "An optimal power flow algorithm to achieve
robust operation considering load and renewable generation uncertainties," IEEE Transactions on Power Systems, vol. 27, no. 4, pp.
1808-1817, 2012.
42. A. Venzke, D. T. Viola, J. Mermet-Guyennet, G. S. Misyris, and S.
Chatzivasileiadis, "Neural Networks for Encoding Dynamic SecurityConstrained Optimal Power Flow to Mixed-Integer Linear Programs,"
arXiv preprint arXiv:2003.07939, 2020.
43. M. Velay, M. Vinyals, Y. Besanger, and N. Retière, "Fully distributed
security constrained optimal power flow with primary frequency control,"
International Journal of Electrical Power & Energy Systems, vol. 110,
pp. 536-547, 2019.
44. A. J. Wood, B. F. Wollenberg, and G. B. Sheblé, Power generation,
operation, and control. John Wiley & Sons, 2013.
45. H. R. Nikzad and H. Abdi, "A robust unit commitment based on GAPL strategy by applying TOAT and considering emission costs and
energy storage systems," Electric Power Systems Research, vol. 180,
p. 106154, 2020.
46. H. Abdi, H. Fattahi, and S. Lumbreras, "What metaheuristic solves
the economic dispatch faster? A comparative case study," Electrical
Engineering, vol. 100, no. 4, pp. 2825-2837, 2018.
47. "The IEEE 14 BUS data." http://www.ee.washington.edu/research/pstca/
(accessed).