Professional Documents
Culture Documents
Abstract - This paper describes a mathematical frame- the outage has occurred. These capabilities include
work for the solution of the economic dispatch problem generation rescheduling, switching, overload rotation,
with security constraints, which can take into account etc., and may be very significant for the elimination
the system corrective capabilities after the outage has of constrained violations. One example can be found in
occurred. The solution algorithm is based on mathemat- predominantly hydro systems, where the fast response
ical programming decomposition techniques that allow rate of the hydroelectric generators ensures that a
the iterative solution of a "base-case" economic dis- substantial rescheduling capability will be available.
patch and separate contingency analysis with generation
rescheduling to eliminate constraint violations. The This paper describes a mathematical framework for
resulting dispatch has the same security level as the the solution of the security-constrained dispatch that
usual security-constrained dispatch, but with lower can take into account the system rescheduling capabili-
operating costs. Case studies with the IEEE 118-bus ties. The methodology is based on mathematical pro-
are presented. The extension of the methodology to the gramming decomposition techniques that allow the itera-
probabilistic case will be discussed in a forthcoming tive solution of a "base-case" economic dispatch and
paper. separate contingency analysis with generation resche-
duling to eliminate constraint violations. The preven-
INTRODUCTION
tive control actions are implemented from linear con-
straints, known as feasibility cuts, that are generated
The objective of the economic dispatch of an on the contingency analysis and sent to the economic
electric energy system is to determine a generation dispatch problem. The resulting dispatch has the same
schedule that minimizes the system operating cost security level as the usual security-constrained
(measured, for example, in terms of fuel cost for the dispatch, but with lower operating costs.
thermal plants and of "shadow" costs for the energy- Development of the framework for the linearized power
limited hydro plants) and does not violate any of the flow model was based on Benders decomposition and is de-
system operating constraints such as maximum line scribed in [2]. This paper extends the methodology to
flows, bus voltage levels, etc... the AC power flow model by using generalized Benders decom-
position [3]. Convergence of the GBD algorithm can only be
It has beem recognized for some years that the guaranteed under some convexity assumptions, which cannot
economic dispatch may be unsafe, that is, it may not be be proven for the AC power flow model. Our computational
possible to keep the system in a normal state after a experience so far has been encouraging, and is illustrated
major disturbance (line and/or generator outages). by case studies with the IEEE 118-bus system.
This led to the concept of system security, and to the
view that the objective of system operation is to keep FORMULATION OF THE DISPATCHI PROBLEMS
the system in a normal state during the relatively long
periods between disturbances and to insure that, on the Example
occurrence of a major disturbance, the system does not
depart from the normal state [1]. The following simple example will be used to char-
acterize the economic dispatch problem with security
This security-constrained dispatch is usually constraints Generators #1 and #2 in the 2-bus sys tem
,
implemented by adding other cons-traints, known as of Figure 1 are used to supply a 200-MW load in bus #2,
security constraints, to the economic dispatch prob- The system data are as follows:
lem. These constraints impose additional limits on
branch flows and nodal voltages for the post-disturbance #1
configurations resulting from a given set of contingen- Generator #2
cies. In other words, the security-constrained dispatch
leads to the implementation of preventive control Min. Generation (MW) 50 0
actions in the system, and thus to a higher level of Max. Generation (MW) 200 120
system security. Incr. Cost ($/MW) 1 2
(2)
generators #1l and #2 can be redispatched (increase or The security-constrained dispatch is then written as
decrease generation) by 40 MW and 35 MW, respectively,
before the protection system is actuated (ramping con- z2 Mmn c(xo)
straints). In this case, it is possible to increase
the output of generator #1 and obtain the dispatch of
Figure 4.
s /to ao (xo) >,- b 0 (5)
ai (x0) >, bi For all i =1,2,...,M
67.5 _ _
65 The constraints ai(xo) > bi impose additional
135 Cost =
265 limits on power flows for the post-disturbance configu-
_-200
67. 5_ rations. As mentioned in the Introduction, the
security-constrained dispatch (5) leads to the imple-
mentation of preventive control actions on the system,
Figure 4: Security Constrained Dispatch and thus to ahigher level of system security.
with Corrective Rescheduling
Security-Constrained Dispatch With Rescheduling
Note that this dispatch will not lead to overloads As discussed in the Example, the security-
in case any of the lines is outaged, because the output constrained dispatch defined in (5) does not take into
of generator #1 can be safely reduced to 100 MW in the account the possibility of post-disturbance corrective
most severe case (a reduction of 35 MW, less than the
ramping constraint of 40 MW), and compensated by an in- actions, such as generation reschedul'ing, to eliminate
creased generation at bus #2, within its ramping limit the constraint violations. The possible range of
of 35 MW. It is thus possible to obtainl the same level rescheduling actions depends on time constraints and
of security as the previous dispatch, but with a lower equipment limits, and will be represented by coupling
operating cost of 265 in this case. This kind of constraints of the type Jxo - xil < Ai (fxo - xl is a
vector whose elements are the absolute values of the
savings can be particularly significant during the elements of xo - xi). The security constrained dispatch
peak-hours. with rescheduling can then be represented as
The dispatch problems of Figures 2, 3 and 4 can be
mathematically formulated as follows. Z3 = Min c(xo)
s/to ao(xo) >b (6)
The Economic Dispatch Problem
The "pure" economic dispatch of an electric energy ai(xi) > bi
For all il,12,...,M
system is formulated as the following optimization
prob lem: xiI <
Ai
z1 - Min c(xo) The coupling constraints also serve as a "bridge"
(1) between the "pure" economic dispatch (1) and the
s/to a0(x0) > bo security-constrained dispatch (5). It is possible
177
to see that if we make A - 0 (no corrective actions Representation of Infeasibilities
allowed), Problem (6) becomes identical to the
security-constrained dispatch (5). Conversely, if we The infeasible post-contingency operating subprob-
make A - X (the full range of rescheduling actions lems will be represented as follows.
allowed in the period), the post-disturbance operating
points xi, i -1,2,...,M become independent of the Suppose that penalty variables have been added to
operating point xo, and Problem (6) becomes identical the constraints of each post-contingency subproblem.
to the "pure" economic dispatch (1). Their function is to ensure the mathematical feasibil-
ity of the subproblem for any given x0, and they can be
It is also possible to see that the operating interpreted as the amount of constraint violation asso-
costs of (6) have as lower and upper bounds respec- ciated to the post-contingency operating point xi. If a
tively the costs of economic dispatch (1) and the costs subproblem is feasible, these variables are naturally
of security-constrained dispatch (5), that is, equal to zero. Therefore, we can define the minimiza-
tion of constraint violations as an objective function.
The operating subproblem is then formulated as in (8),
z1 <z3 <
z2 (7)
where the post-contingency index i has been dropped for
notational convenience.
As discussed in the Example, the security-
constrained dispatch with rescheduling has the same w = Min d.r + d!s
security level as the usual security-constrained
dispatch, but with lower operating costs. The solution s/to a(x)
methodology will be described next. + r > b (8)
-xo -
Xl - s < A
OUTLINE OF THE SOLUTION METHODOLOGY where r > 0 is the vector of penalty variables for
set of operating constraints
Introduction
Problem (6) can be interpreted as a two-stage s > 0 is the vector of penalty variables for
set of coupling constraints
decision process:
In the first stage, find an operating point
dr and ds are positive cost vectors
o xo
for the "base-case" problem ao(xo) > bo From Problem (8), we can conclude that
o In the second stage, given the operating point w - 0 <-> Subproblem is feasible
xo, find new operating points xi that meet the w > 0 <-> Subproblem is not feasible
constraints ai(xi) bi and the coupling con-
>
straints |xo - xij |Ahi for each post-distur- These properties will be used in the decomposition
bance configuration i 1l,2, ...,M. methodology described next.
The objective is to minimize the operating cost Outline of the Decomposition Methodology
c(xo) while ensuring that the second-stage problems are
feasible. Figure 5 illustrates the decision process. The decomposition methodology is based on the
following observations:
The solution methodology is based on mathematical
programming decomposition techniques that allow us to 0 The objective function w in the operating
handle separately the "base-case" economic dispatch and subproblem (8) can be seen as a function of
each of the M post-contingency operation subproblems. the operating point xo, that is,
The representation of infeasibilities will be discussed
next. w(xo) - Min drr + d s
s/to a(x) + r > b (9)
STAGE I
Ixo - XI - s < A
0 The security-constrained dispatch with
rescheduling (6) can then be rewritten in
terms of the xo variables as
Min c(xo)
s/to ao(xo) > bo (10)
STAGE II
wi(x ) < 0 for all i -1,2,...,M
z = Min c
E Z(P0 ) (12)
k kg
w(P0) = Min E s
k
(13)
Figure 6. Outline of the Decomposition Algorithm g k