Next Article in Journal
Effects of Biochar Amendment on Chloropicrin Adsorption and Degradation in Soil
Previous Article in Journal
Operational Modal Analysis of a Spar-Type Floating Platform Using Frequency Domain Decomposition Method
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Risk-Limiting Scheduling of Optimal Non-Renewable Power Generation for Systems with Uncertain Power Generation and Load Demand

Department of Electrical Engineering, Chang Gung University, 259 Wen-Hwa 1st Road Kwei-Shan, Tao-Yuan 33302, Taiwan
*
Author to whom correspondence should be addressed.
Energies 2016, 9(11), 868; https://doi.org/10.3390/en9110868
Submission received: 22 July 2016 / Revised: 25 September 2016 / Accepted: 17 October 2016 / Published: 26 October 2016

Abstract

:
This study tackles a risk-limiting scheduling problem of non-renewable power generation for large power systems, and addresses potential violations of the security constraints owing to the volatility of renewable power generation and the uncertainty of load demand. To cope with the computational challenge that arises from the probabilistic constraints in the considered problem, a computationally efficient solution algorithm that involves a bisection method, an off-line constructed artificial neural network (ANN) and an on-line point estimation method is proposed and tested on the IEEE 118-bus system. The results of tests and comparisons reveal that the proposed solution algorithm is applicable to large power systems in real time, and the solution obtained herein is much better than the conventional optimal power flow (OPF) solution in obtaining a much higher probability of satisfying the security constraints.

Graphical Abstract

1. Introduction

There is a growing interest in utilizing renewable energy such as wind and solar as the power generation sources to overcome the global climate change induced by carbon emission [1,2,3,4]. Additionally, the economic incentives based demand response has prevailed recently to improve the efficiency of electricity utilization and reduce carbon emission [5]. However, to integrate the distributed renewable energy sources and increase the participation of demand response, it is necessary to transform the traditional electricity grid into a smart grid [6]. The smart grid itself is simply the application of modern communication infrastructure to various segments of the electricity grid. However, the intermittency of the electricity supplied by renewable energy sources and the uncertain load demand caused by demand response in a modern power system require some traditional power system operations to consider these uncertainties [7,8]. For example, Dvorkin et al. [9] used a hybrid stochastic/interval approach to tackle the transmission-constrained unit commitment problem with uncertainties of wind power generation and load demand. Wu et al. [10] proposed a day-ahead stochastic scheduling model to cope with the hourly forecast errors of system loads and variable renewable sources. Ahmadi-Khatir et al. [11] proposed a decentralized method to optimally schedule generating units for systems under wind power uncertainties. Kusiak et al. discuss wind turbine capacity [12]. In this paper, the schedule of non-renewable power generation in a large power system with uncertain power generation and load demand is under consideration.
The challenge posed by uncertain power generation and load demand in scheduling the non-renewable power generation is to maintain the power balance at all times and satisfy the security constraints on the security terms of interest, which are the bus voltage magnitude and the transmission line real power flow. In general, the scheduled value of optimal non-renewable power generation is the solution of optimal power flow (OPF), in which the renewable power generation and load demand are set to their predicted values, which differ from the actual values and cause a power mismatch in practice. Accordingly, the system operator should re-dispatch the scheduled optimal non-renewable power generation to maintain the power balance. This re-dispatch may cause the security constraints violated. Therefore, the purpose of this paper is to find a risk-limiting schedule of optimal non-renewable power generation to reduce the probability of violating security constraints after the re-dispatch in the presence of uncertain power generation and load demand. In past decades, numerous mathematical programming methods for solving deterministic OPF problems of the traditional electricity grid were proposed. For example, the successive linear programming method [13], the successive quadratic programming method [14], the Lagrange Newton method [15], the primal-dual interior point method [16], the dual-type method [17], the multi-objective programming method [18], the hybrid algorithm [19], the modified shuffle frog leaping (SFL) algorithm [20], the population based algorithm [21], etc. However, the aforementioned methods cannot be used to solve the problem considered in this paper.
Setting restrictive bounds for the security constraints in the OPF problem formulation can reduce the risk of violating the security constraints in practice; however, more restrictive bounds result in a larger scheduled optimal non-renewable power generation cost. Therefore, to minimize the scheduled optimal non-renewable power generation cost, the problem formulation of the proposed risk-limiting schedule of optimal non-renewable power-generation (RSONP) is to determine the least restrictive bounds that yield the required probability of satisfying the security constraints after the re-dispatch. Few articles have discussed this issue. Although Varaiya et al. [22] proposed a dispatch method with limiting risk, they ignored security constraints and considered only the need for power generation to satisfy load demand. Attaching a probability to the satisfaction of security constraints, Zhang and Li [23] developed a chance constrained programming (CCP) method for solving OPF with load uncertainty. Lin and Lin [24] proposed a risk-limiting OPF (RLOPF) method to solve the RLOPF problem for systems with a high penetration of wind power; however, they did not take into account the uncertainty of load demand. Therefore, the RSONP problem with uncertain power generation and load demand remains unsolved. Furthermore, both the CCP method and the RLOPF method were experimentally tested using small systems [23,24]. Hence, the contribution of this paper is to propose a computationally efficient RSONP algorithm to solve the RSONP problem of a large power system.
This paper is organized as follows. Section 2 presents the method for solving the RSONP problem. Section 3 presents the test results and discussions. Section 4 presents the conclusions and further research.

2. Method

2.1. Statement and Computational Challenges of Risk-Limiting Schedule of Optimal Non-Renewable Power-Generation Problem

For simplicity of presentation, the only renewable energy source considered herein is wind. However, solar power can be easily included in the formulated RSONP problem and the proposed RSONP algorithm.

2.1.1. Conventional Optimal Power Flow Problem

The OPF problem has various formulations. In this paper, the following conventional optimal power flow (COPF) problem is considered [8].
subject to : min u G i , i G \ W G i G \ W G a i P G i 2 + b i P G i + c i g ( x , u G , u ^ W , u ^ D ) = 0 p _ i j o p i j ( x i , x j ) p ¯ i j o ,   ( i , j ) L V _ i o V i V ¯ i o ,   i = 1 , , N u _ G i u G i u ¯ G i ,   i G \ W G
where V _ i o V i V ¯ i o ,   i = 1 , , N , and p _ i j o p i j ( x i , x j ) p ¯ i j o , ( i , j ) L represent the set of security constraints with normal bounds; and u _ G i u G i u ¯ G i represents the power generation constraint at bus i . Normally, V _ i o = 0.95 , V ¯ i o = 1.05 and p _ i j o = p ¯ i j o . For notational simplicity, the aforementioned security constraints are rewritten as h _ j o h j ( x ) h ¯ j o , j = 1 , , m , where m = N + | L | , and | L | is the total number of transmission lines, so m is the total number of security constraints. Notably, h _ j o = h ¯ j o for the transmission line real power flow, and the renewable power generation is assumed to have no cost.

2.1.2. Statement of Risk-Limiting Schedule of Optimal Non-Renewable Power-Generation Problem

As indicated in Section 1, the RSONP problem is to determine the least restrictive bounds for security constraints in the OPF problem formulation that yield the required probability η that the security constraints will be satisfied in practice as follows:
min h _ s , h ¯ s j = 1 m [ ( h _ j s h _ j o ) 2 + ( h ¯ j o h ¯ j s ) 2 ]
subject to:
Prob { h _ j o h j ( x ˜ s ) h ¯ j o | h _ s , h ¯ s } η ,   j = 1 , , m
where x ˜ s represents the random state-vector after re-dispatching (RSAR), which is resulted from the scheduling and re-dispatching stages that will be presented later. Prob { h _ j o h j ( x ˜ s ) h ¯ j o | h _ s , h ¯ s } represents the conditional probability of satisfying the j th security constraint after the re-dispatch for the given restrictive bounds ( h _ s , h ¯ s ) , and the objective function is the distance between the restrictive bounds ( h _ s , h ¯ s ) and the normal bounds ( h _ o , h ¯ o ) . Therefore, the RSONP problem is to find the ( h _ s , h ¯ s ) that is closest to ( h _ o , h ¯ o ) while satisfying the conditional probability constraints in Equation (2).

2.1.3. Monte Carlo Simulation Procedures for Evaluating Exact Conditional Probability of Satisfying Security Constraints

For the given ( h _ s , h ¯ s ) , the procedures to evaluate the exact value of Prob { h _ j o h j ( x ˜ s ) h ¯ j o | h _ s , h ¯ s } are described below.
• Scheduling Stage
In the scheduling stage, both wind power generation and load demand are set to their predicted values in the OPF problem with restrictive bounds ( h _ s , h ¯ s ) (OPFPRB), which is expressed as Equation (3).
subject to : min u G i , i G \ W G i G \ W G a i P G i 2 + b i P G i + c i g ( x , u G , u ^ W , u ^ D ) = 0 h _ j s h j ( x ) h ¯ j s ,   j = 1 , , m u _ G i u G i u ¯ G i ,   i G \ W G
The solution of OPFPRB is denoted by u G i s * , i G \ W G , and is called the scheduled optimal non-renewable power-generation (SONP) for the given restrictive bounds ( h _ s , h ¯ s ) .
• Random Generation of Wind Speed and Load Demand
The wind speed v l is a random variable, so is the wind power generation u ˜ W l ( v l ) . Although the actual load demand for all buses, u ˜ D i ,   i = 1 , , N , are also random variables, the variations of small load demand can be neglected relative to those of large load demand. Therefore, large load demand can be regarded as random variables and the corresponding buses and load demand can be re-indexed as u ˜ D 1 L , u ˜ D 2 L , , u ˜ D N L L . The vector of small load demand is set to the predicted vector u ^ D S . Based on p ( v l ) and p ( P ˜ D i L ) , v l and P ˜ D i L can be randomly generated. Subsequently, the wind power generation u ˜ W l ( v l ) = [ P ˜ W l ( v l ) , Q ˜ W l ( v l ) ] T can be calculated based on the randomly generated v l by:
P ˜ W l ( v l ) = 0.5 C p a v l 3 A
Q ˜ W l ( v l ) = P ˜ W l ( v l ) tan ϕ l
where a , A   and   C p represent the air density, cross-section swept by wind turbine blade and the power coefficient, respectively; ϕl represents the phase angle in the power factor cos ϕ l of the wind power generation. The reactive load demand Q ˜ D i L can be obtained based on the randomly generated P ˜ D i L by:
Q ˜ D i L = P ˜ D i L tan ϕ D i L
where ϕ D i L is the phase angle of the load power factor cos ϕ D i L . Then, we can have the large load demand u ˜ D i L = [ P ˜ D i L , Q ˜ D i L ] T .
• Re-dispatching Stage
u ˜ W l ( v l ) and u ˜ D i L differ from their predicted values u ^ W l and u ^ D i L , respectively. The total power generation deviation l W G u ˜ W l ( v l ) u ^ W l , the total large load-demand deviation i = 1 N L u ˜ D i L u ^ D i L and the deviation of the system’s total real and reactive line losses, which are denoted by Δ P l o s s and Δ Q l o s s , respectively, can be compensated by re-dispatching the SONP u G i s * , i G \ W G , using available economic dispatch (ED) method [25], such that:
( l W G P ˜ W l ( v l ) P ^ W l ) + ( i = 1 N L P ˜ D i L P ^ D i L ) + Δ P l o s s = i G \ W G P G i s * r P i %
( l W G Q ˜ W l ( v l ) Q ^ W l ) + ( i = 1 N L Q ˜ D i L Q ^ D i L ) + Δ Q l o s s = i G \ W G Q G i s * r Q i %
Then, in the re-dispatching stage, the SONP u G i s * , i G \ W G , is re-dispatched as the Non-renewable Power-generation After Re-dispatching (NPAR) u ˜ G i s , i G \ W G , for the given restrictive bounds ( h _ s , h ¯ s ) by:
P ˜ G i s = P G i s * ( 1 + r P i % )
Q ˜ G i s = Q G i s * ( 1 + r Q i % )
The RSAR x ˜ s in Equation (2) can be obtained by solving the following power flow balance equation in terms of the re-dispatched NPAR u ˜ G s , the randomly generated u ˜ W , the randomly generated u ˜ D L and the predicted small load demand u ^ D S :
g ( x ˜ s , u ˜ G s , u ˜ W , u ˜ D L , u ^ D S ) = 0
Subsequently, the security term after re-dispatching (STAR), h j ( x ˜ s ) , for the given restrictive bounds ( h _ s , h ¯ s ) can be evaluated for j = 1 , , m ; this re-dispatching stage associated with the randomly generated v l and u ˜ D L is repeated 10,000 times to carry out the Monte Carlo simulation (MCS), and 10,000 samples of h j ( x ˜ s ) can be obtained for each j = 1 , , m .
• Evaluating Exact Prob { h _ j o h j ( x ˜ s ) h ¯ j o | h _ s , h ¯ s }
Based on the obtained 10,000 samples of h j ( x ˜ s ) , the exact value of Prob { h _ j o h j ( x ˜ s ) h ¯ j o | h _ s , h ¯ s } can be calculated by Prob { h _ j o h j ( x ˜ s ) h ¯ j o | h _ s , h ¯ s } = (number of samples of h j ( x ˜ s ) satisfying the security constraints)/10,000.

2.1.4. Computational Challenges of Risk-Limiting Schedule of Optimal Non-Renewable Power-Generation Problem

Because MCS is too computational time consuming, the first computational challenge of the RSONP problem (Equation (2)) is to determine the feasibility of ( h _ s , h ¯ s ) that is defined as the satisfaction of the inequality constraints in Equation (2). Accordingly, the second computational challenge is to develop a computationally efficient algorithm to solve the RSONP problem (Equation (2)) for the optimal restrictive bounds ( h _ s * , h ¯ s * ) and the associated optimal SONP (OSONP) u G i s ^ * , i G \ W G , which is the optimal solution to the OPFPRB (Equation (3)) when ( h _ s , h ¯ s ) = ( h _ s * , h ¯ s * ) , in real time for a large system.

2.2. Risk-Limiting Schedule of Optimal Non-Renewable Power-Generation Algorithm

2.2.1. Method for Solving Risk-Limiting Schedule of Optimal Non-Renewable Power-Generation Problem

• Sufficient Conditions for Feasibility of ( h _ s , h ¯ s )
The RSONP problem (Equation (2)) is separable, and it can be decomposed into the following m independent sub-problems.
For j = 1 , , m ,
min h _ j s , h ¯ j s ( h _ j s h _ j o ) 2 + ( h ¯ j o h ¯ j s ) 2
subject to:
Prob { h _ j o h j ( x ˜ s ) h ¯ j o | h _ s , h ¯ s } η
Accordingly, the optimal solution ( h _ s * , h ¯ s * ) to the RSONP problem (Equations (2) or (12)) is defined such that:
Prob { h _ j o h j ( x ˜ s ) h ¯ j o | h _ s * , h ¯ s * } = η
for j = 1 , , m . Notably, both variables h _ j s and h ¯ j s have the same feasible region [ h ¯ j s * , h ¯ j s * ] and satisfy h _ j s < h ¯ j s , h _ j s * > h _ j o and h ¯ j s * < h ¯ j o . Therefore, h ¯ j o and feasible h ¯ j s are located on the right-hand side and the left-hand side of h ¯ j s * , respectively. Similarly, h _ j o and feasible h _ j s are located on the left-hand side and the right-hand side of h _ j s * , respectively.
The η-upper and η-lower bounds of h j ( x ˜ s ) are denoted by y ¯ j η and y _ j η , respectively. For the bus voltage magnitude, y ¯ j η and y _ j η are defined by:
( y ¯ j η , y _ j η ) = arg [ min y ¯ j η y _ j η Prob { y _ j η h j ( x ˜ s ) y ¯ j η | h _ s , h ¯ s } = η ]
However, for the transmission-line real-power flow, an additional constraint y _ j η = y ¯ j η must be imposed on the minimization problem that is specified on the right-hand side of Equation (14). Hence, ( y ¯ j η , y _ j η ) is a function of ( h _ s , h ¯ s ) and can also be written as ( y ¯ j η ( h _ s , h ¯ s ) , y _ j η ( h _ s , h ¯ s ) ) .
It can be easily proved that if y ¯ j η ( h _ s , h ¯ s ) h ¯ j o and y _ j η ( h _ s , h ¯ s ) h _ j o , then Prob { h _ j o h j ( x ˜ s ) h ¯ j o | h _ s , h ¯ s } η , meaning that the inequality constraints in Equation (2) hold. Therefore, y ¯ j η ( h _ s , h ¯ s ) h ¯ j o and y _ j η ( h _ s , h ¯ s ) h _ j o for j = 1 , , m represent sufficient conditions for the feasibility of ( h _ s , h ¯ s ) .
• Bisection Method
Based on the above analysis, h ¯ j s * and h _ j s * are the closest points to h ¯ j o and h _ j o , respectively, among all points in the corresponding feasible region. Accordingly, a bisection method can be used to identify h ¯ j s * and h _ j s * based on y ¯ j η ( h _ s , h ¯ s ) and y _ j η ( h _ s , h ¯ s ) as follows. Let U B ( h ¯ j s * ) and L B ( h ¯ j s * ) be a strict upper-bound and a strict lower-bound on h ¯ j s * , respectively, such that U B ( h ¯ j s * ) is an infeasible h ¯ j s but L B ( h ¯ j s * ) is a feasible h ¯ j s . Similarly, let U B ( h _ j s * ) and L B ( h _ j s * ) be a strict upper-bound and a strict lower-bound on h _ j s * , respectively, such that U B ( h _ j s * ) is a feasible h _ j s but L B ( h _ j s * ) is an infeasible h _ j s . For the given U B ( h ¯ j s * ) , L B ( h ¯ j s * ) , U B ( h _ j s * ) and L B ( h _ j s * ) , setting:
h ¯ j s = U B ( h ¯ j s * ) + L B ( h ¯ j s * ) 2
h _ j s = U B ( h _ j s * ) + L B ( h _ j s * ) 2
for j = 1 , , m and evaluating y ¯ j η ( h _ s , h ¯ s ) and y _ j η ( h _ s , h ¯ s ) for j = 1 , , m , enable U B ( h ¯ j s * ) , L B ( h ¯ j s * ) , U B ( h _ j s * ) and L B ( h _ j s * ) to be updated as:
U B ( h ¯ j s * ) = h ¯ j s   if   y ¯ j η ( h _ s , h ¯ s ) > h ¯ j o
L B ( h ¯ j s * ) = h ¯ j s   if   y ¯ j η ( h _ s , h ¯ s ) h ¯ j o
U B ( h _ j s * ) = h _ j s   if   y _ j η ( h _ s , h ¯ s ) h _ j o
L B ( h _ j s * ) = h _ j s   if   y _ j η ( h _ s , h ¯ s ) < h _ j o
based on the sufficient conditions for the feasibility of ( h _ s , h ¯ s ) . Notably, the evaluation of both y ¯ j η ( h _ s , h ¯ s ) and y _ j η ( h _ s , h ¯ s ) for the given ( h _ s , h ¯ s ) for j = 1 , , m are presented in the following section. The above iterative bisection method terminates when both U B ( h ¯ j s * ) L B ( h ¯ j s * ) < ε h ¯ j o and U B ( h _ j s * ) L B ( h _ j s * ) < ε h ¯ j o hold, where ε is a small positive real number, and the final L B ( h ¯ j s * ) and U B ( h _ j s * ) are the solutions for h ¯ j s * and h _ j s * , respectively, for j = 1 , , m .

2.2.2. Evaluating η-Upper and η-Lower Bounds of h j ( x ˜ s )

To carry out the bisection method presented above, the y ¯ j η ( h _ s , h ¯ s ) and y _ j η ( h _ s , h ¯ s ) for the given ( h _ s , h ¯ s ) need to be evaluated first for j = 1 , , m . For this purpose, a two-stage approach is presented in this section.
The two-stage approach consists of an off-line stage and an on-line stage. In the off-line stage, the functional relationship between ( y ¯ j η ( h _ s , h ¯ s ) , y _ j η ( h _ s , h ¯ s ) ) and ( μ h j , σ h j ) for a large range of ( h _ s , h ¯ s ) is constructed using an artificial neural network (ANN) for each j = 1 , , m , where μ h j and σ h j represent the mean and standard deviation of h j ( x ˜ s ) for the given ( h _ s , h ¯ s ) . In the on-line stage, ( μ h j , σ h j ) will be evaluated for the given ( h _ s , h ¯ s ) . In general, to obtain the exact ( μ h j , σ h j ) of h j ( x ˜ s ) for the given ( h _ s , h ¯ s ) , MCS is required. However, MCS is too time consuming to be used on-line. Therefore, a 2 K + 1 point estimation method is used to evaluate ( μ h j , σ h j ) of h j ( x ˜ s ) for the given ( h _ s , h ¯ s ) on-line. Thus, for the given ( h _ s , h ¯ s ) , once the corresponding ( μ h j , σ h j ) of h j ( x ˜ s ) is obtained on-line, it will be input to the off-line constructed ANN, and whose output is the ( y ¯ j η ( h _ s , h ¯ s ) , y _ j η ( h _ s , h ¯ s ) ) needed in the bisection method. In the following, the ANN and the 2 K + 1 point estimation method are presented.
• ANN Model for Input–Output Relationship between ( μ h j , σ h j ) and ( y ¯ j η ( h _ s , h ¯ s ) , y _ j η ( h _ s , h ¯ s ) )
In the off-line stage, for each j = 1 , , m , an easily implementable feed-forward back propagation ANN [26,27], which comprises an input layer, a hidden layer and an output layer, is used to establish the input–output relationship between ( μ h j , σ h j ) and ( y ¯ j η ( h _ s , h ¯ s ) , y _ j η ( h _ s , h ¯ s ) ) for a large range of ( h _ s , h ¯ s ) . Figure 1 shows this three-layer ANN that consists of two input neurons, q hidden-layer neurons and two output neurons, where ω i l ,   i = 1 , 2 ,   l = 1 , , q and γ l k ,   k = 1 , 2 are the arc weights. The inputs to the two neurons in the input layer are μ h j and σ h j , and the outputs of the two output neurons are y ¯ j η ( h _ s , h ¯ s ) and y _ j η ( h _ s , h ¯ s ) .
The neurons in the input layer directly distribute μ h j and σ h j to the neurons in the hidden layer. The hyperbolic tangent sigmoid function given in Equation (21) is utilized as the activation function of the neurons in the hidden layer [26]:
tan   h ( x ) = e x e x e x + e x
The activation function in the output layer is a linear function, which sums all the weighted outputs of the hidden layer.
Each of the m ANNs is trained off-line in two steps, which are the collection of training data set and training the ANN.
• Collecting Training Data Set
In addition to a large range of ( h _ s , h ¯ s ) , a wide range of parameters of p ( v l ) and p ( P D i L ) should be considered to cover a wide range of applications. For example, if p ( v l ) is of a Weibull distribution, it can be described by Equation (22):
p ( v l ) = β α ( v l α ) β 1 e ( v l α ) β
where the parameters α and β are the scale and shape coefficients, respectively, then wide ranges of α and β will be considered. Similarly, if p ( P D i L ) is of a normal distribution, it can be described by Equation (23):
p ( P D i L ) = 1 σ D i L 2 π e 1 2 ( P D i L μ D i L σ D i L ) 2
where the parameters μ D i L and σ D i L are the mean and the standard deviation of P D i L , then wide ranges of μ D i L and σ D i L will be considered. Based on these premises, the procedure for collecting training data set can be described as follows.
  • Step Co1: Randomly select a sample of ( h _ s , h ¯ s ) , α, β, μ D i L and σ D i L .
  • Step Co2: For j = 1 , , m , use the MCS that is described in Section 2.1.3 to obtain 10,000 samples of h j ( x ˜ s ) to compute μ h j and σ h j , and determine the y ¯ j η ( h _ s , h ¯ s ) and y _ j η ( h _ s , h ¯ s ) based on Equation (14); the obtained ( μ h j , σ h j ) and ( y ¯ j η ( h _ s , h ¯ s ) , y _ j η ( h _ s , h ¯ s ) ) form a pair of input and output data of h j ( x ˜ s ) .
  • Step Co3: Repeat Steps Co1-Co2 M times, where M = 16,512. Then, for j = 1 , , m , M pairs of input output data that are ( μ h j i , σ h j i ) and ( y ¯ j η i ( h _ s , h ¯ s ) , y _ j η i ( h _ s , h ¯ s ) ) , i = 1 , , M , can be obtained as the training data set, where ( μ h j i , σ h j i ) and ( y ¯ j η i ( h _ s , h ¯ s ) , y _ j η i ( h _ s , h ¯ s ) ) represent the ( μ h j , σ h j ) and ( y ¯ j η ( h _ s , h ¯ s ) , y _ j η ( h _ s , h ¯ s ) ) of h j ( x ˜ s ) , respectively, obtained based on the i th randomly selected sample of ( h _ s , h ¯ s ) , (α, β) and ( μ D i L , σ D i L ) .
• Training m ANNs
For a given input ( μ h j i , σ h j i ) to the j th ANN that is shown in Figure 1, let the corresponding output be ξ ¯ j η i ( ( μ h j i , σ h j i ) | ω , γ ) and ξ _ j η i ( ( μ h j i , σ h j i ) | ω , γ ) , given by the following Equations:
ξ ¯ j η i = l = 1 q γ l , 1 tan   h ( ω 1 , l μ h j i + ω 2 , l σ h j i )
ξ _ j η i = l = 1 q γ l , 2 tan   h ( ω 1 , l μ h j i + ω 2 , l σ h j i )
where γ = [ γ 1 , 1 , , γ q , 1 , γ 1 , 2 , , γ q , 2 ] T and ω = [ ω 1 , 1 , , ω 1 , q , ω 2 , 1 , , ω 2 , q ] T are vectors of the arc weights of the j th ANN. The training problem for the j th ANN is to find ω and γ that minimize the mean square error (MSE):
min ω , γ 1 M i = 1 M ( y ¯ j η i ( h _ s , h ¯ s ) ξ ¯ j η i ) 2 + ( y _ j η i ( h _ s , h ¯ s ) ξ _ j η i ) 2
based on the j th training data set ( ( μ h j i , σ h j i ) , ( y ¯ j η i ( h _ s , h ¯ s ) , y _ j η i ( h _ s , h ¯ s ) ) ), i = 1 , , M . The Levenberg-Marquardt algorithm [28] is used herein as the iterative training algorithm for solving Equation (26). This training algorithm is terminated when either of the following two conditions is met: (i) MSE is less than 0.01; or (ii) the number of epochs exceeds 5000.
2 K + 1 point estimation method for estimating mean and standard deviation of h j ( x ˜ s )
As indicated previously, it is too computational time consuming to evaluate μ h j and σ h j of h j ( x ˜ s ) using MCS. Therefore, the goal of 2 K + 1 point estimation method is to evaluate μ h j and σ h j of h j ( x ˜ s ) for the given ( h _ s , h ¯ s ) in real time. Suppose that | W G | + N L = K , where | W G | is the total number of wind power generation buses. h j ( x ˜ s ) is a random function of K input random variables, then the employed 2 K + 1 point estimation method [7,24,29] can be described below.
First, the considered random variables are re-named and re-indexed, such that the random wind speeds v l , l W G , are re-named and re-indexed as z k , k = 1 , , | W G | , and the N L random large real load demands P D i L ,   i = 1 , , N L as z k , k = | W G | + 1 , , K . The 2 K + 1 point estimation method calculates 2 K pairs of ( z k , n , w k , n ) , k = 1 , , K ,   n = 1 , 2 first, where the location z k , n and the weighting factor w k , n are the n th concentration of the random variable z k , and can be calculated as follows. Let μ z k = E [ z k ] and σ z k 2 = E [ ( z k μ z k ) 2 ] ; μ z k and σ z k 2 can be calculated based on the pdf p ( z k ) , which is either p ( v l ) or p ( P D i L ) . For k = 1 , , K , n = 1 , 2 , z k , n = μ z k + τ k , n σ z k , where the standard point τ k , n = λ k , 3 2 + ( 1 ) 3 n λ k , 4 3 4 λ k , 3 2 , and the skewness λ k , 3 and kurtosis λ k , 4 are obtained based on λ k , j = M j ( z k ) ( σ z k ) j and M j ( z k ) = ( z k μ z k ) j p ( z k ) d z k for j = 3 , 4 . For k = 1 , , K , n = 1 , 2 , the weighting factor w k , n = ( 1 ) 3 n τ k , n ( τ k , 1 τ k , 2 ) . Once the 2 K pairs of ( z k , n , w k , n ) , k = 1 , , K ,   n = 1 , 2 are obtained, then for a given ( h _ s , h ¯ s ) , the h j ( x ˜ s ) is evaluated twice for each random variable z k at the two points made up of the n th location z k , n of z k and the mean z ^ k for the rest K 1 z k , which are ( z ^ 1 , , z ^ k 1 , z k , n , z ^ k + 1 , z ^ K ) ,   n = 1 , 2 , rather than the 10,000 times in the MCS. The weighting factor w k , n specifies the relative importance of the evaluation of h j ( x ˜ s ) at the point ( z ^ 1 , , z ^ k 1 , z k , n , z ^ k + 1 , z ^ K ) . These 2 K evaluations of h j ( x ˜ s ) and an evaluation at the point ( z ^ 1 , , z ^ k , , z ^ K ) that is associated with a weighting factor w 0 , 3 constitute the 2 K + 1 evaluations of h j ( x ˜ s ) , where w 0 , 3 = k = 1 K ( 1 K 1 λ k , 4 λ k , 3 2 ) . Then, μ h j and σ h j 2 can be estimated from the above 2 K + 1 evaluations of h j ( x ˜ s ) and the corresponding w k , n by:
μ h j = k = 1 K n = 1 2 w k , n h j ( x ˜ s ( z k , n ) ) + w 0 , 3 h j ( x ˜ s ( z 0 , 3 ) )
σ h j 2 = [ k = 1 K n = 1 2 w k , n ( h j ( x ˜ s ( z k , n ) ) ) 2 + w 0 , 3 ( h j ( x ˜ s ( z 0 , 3 ) ) ) 2 ] μ h j 2
The advantage of 2 K + 1 point estimation method is that it uses just 2 K + 1 evaluations to evaluate the μ h j and σ h j 2 of h j ( x ˜ s ) for the given ( h _ s , h ¯ s ) rather than using the 10,000 evaluations that are required in the MCS; therefore, it can be utilized in real-time applications. Clearly, estimating σ h j 2 yields an estimate of σ h j . Once μ h j and σ h j of h j ( x ˜ s ) for the given ( h _ s , h ¯ s ) are estimated, they can be input to the j th ANN that is constructed off-line, and whose outputs are the estimated y ¯ j η ( h _ s , h ¯ s ) and y _ j η ( h _ s , h ¯ s ) of h j ( x ˜ s ) .

2.2.3. Risk-Limiting Schedule of Optimal Non-Renewable Power-Generation Algorithm

• Initial Setting of Bounds
In the bisection method, the initial values of the four bounds U B ( h ¯ j s * ) , L B ( h ¯ j s * ) , U B ( h _ j s * ) and L B ( h _ j s * ) must first be specified. With respect to the transmission line real power flow, since h ¯ j o > h ¯ j s * , h _ j o = h ¯ j o and | p i j | 0 , the initial values of these four bounds can be set to U B ( h ¯ j s * ) = h ¯ j o , L B ( h ¯ j s * ) = 0 , U B ( h _ j s * ) = 0 and L B ( h _ j s * ) = h _ j o . With respect to the bus voltage magnitude, since h ¯ j o > h ¯ j s * > h _ j s * > h _ j o , the initial values of these four bounds can be set to U B ( h ¯ j s * ) = h ¯ j o , L B ( h ¯ j s * ) = h _ j o + d , U B ( h _ j s * ) = h ¯ j o d and L B ( h _ j s * ) = h _ j o , where d is a positive real number.
• Algorithm
Based on the analysis presented in Section 2.2.1 and Section 2.2.2, the algorithmic steps of the proposed RSONP algorithm for solving the RSONP problem (Equation (2)) can be presented in the following.
Given data: The pdf p ( v l ) , parameters C p , a , A and | cos ϕ l | of bus l W G . The pdf p ( P D i L ) and | cos ϕ D i | , i = 1 , , N L . The m ANNs constructed off-line. The values of η, d and ε.
Step 0: Calculate u ^ W l = [ P ^ W l , Q ^ W l ] T using Equations (4) and (5) and calculate u ^ D i L = [ P ^ D i L , Q ^ D i L ] T using Equation (6) based on p ( v l ) and p ( P D i L ) . For j = 1 , , m , set initial values of U B ( h ¯ j s * ) , L B ( h ¯ j s * ) , U B ( h _ j s * ) and L B ( h _ j s * ) as described above, and calculate h ¯ j s and h _ j s by Equations (15) and (16).
Step 1: Solve OPFPRB (Equation (3)) using an available OPF solution method [30] and obtain the SONP u G i s * , i G \ W G .
Step 2: Use 2 K + 1 point estimation method to estimate μ h j and σ h j of h j ( x ˜ s ) for j = 1 , , m .
Step 3: For j = 1 , , m , input μ h j and σ h j , obtained in Step 2, into the j th ANN, and whose outputs are the estimated η-upper bound y ¯ j η ( h _ s , h ¯ s ) and η-lower bound y _ j η ( h _ s , h ¯ s ) of h j ( x ˜ s ) .
Step 4: For j = 1 , , m , update U B ( h ¯ j s * ) , L B ( h ¯ j s * ) , U B ( h _ j s * ) and L B ( h _ j s * ) using Equations (17)–(20), and update h ¯ j s and h _ j s using Equations (15) and (16).
Step 5: If both U B ( h ¯ j s * ) L B ( h ¯ j s * ) < ε h ¯ j o and U B ( h _ j s * ) L B ( h _ j s * ) < ε h ¯ j o hold for all j = 1 , , m , stop and the final L B ( h ¯ j s * ) and U B ( h _ j s * ) are the solutions for h ¯ j s * and h _ j s * , respectively, for j = 1 , , m ; otherwise, return to Step 1. If the algorithm stops, output the optimal restrictive bounds ( h _ s * , h ¯ s * ) and the OSONP u G i s ^ * , i G \ W G , which is obtained from Step 1 in the final iteration.

2.2.4. Flow Chart of the Risk-Limiting Schedule of Optimal Non-Renewable Power-Generation Algorithm

The structure of the proposed RSONP algorithm for solving the RSONP problem can be summarized by the flow chart presented in Figure 2, and the corresponding algorithmic steps are also indicated in the figure.

3. Results and Discussion

3.1. Setup of Tests

The IEEE 118-bus system that is presented in [31] is used as the test system. In this system, there are 44 non-renewable power generation buses, 10 wind power generation buses and 25 buses of large load demand. Consequently, | W G | = 10 , N L = 25 and K = 35 . Bus 69 is designated as the swing bus; the number of transmission lines is 186, so m = 304 . ( V _ j o , V ¯ j o ) and ( p _ i j o , p ¯ i j o ) are set to (0.95, 1.05) and ( | p ^ i j | ( 1 + 7 % ) , | p ^ i j | ( 1 + 7 % ) ) , respectively, where | p ^ i j | is the absolute value of the p i j in the base case. In the OPFPRB (Equation (3)) and COPF problem (Equation (1)), the values of the cost coefficients a i , b i and c i i G \ W G are randomly selected from the intervals (6.78, 74.33), (8.3391, 37.6968) and (0.002401, 0.069663), respectively. Notably, the units of a i , b i and c i are $/ ( MW ) 2 ( h ) 3 , $/ MW ( h ) 2 and $, respectively. The Weibull distribution given by Equation (22) and the normal distribution given by Equation (23) are adopted for p ( v l ) and p ( P D i L ) , respectively. The parameters used in the RSONP algorithm are set as follows. η = 0.95, ε = 10 3 , d = 0.02, α = 9 , β = 1.6 , C p = 0.3 , a = 1.225 , A = 706.8 and | cos ϕ l | = 0.9; μ D i L is set to the load demand in the base case, and σ D i L = 0.03 μ D i L . The parameters used in the ANN are set as q = 5 and epochs = 5000.
To study the effect of re-dispatching the SONP u G i s * , i G \ W G , on the performance of the OSONP u G i s ^ * , i G \ W G , and the corresponding generation cost, two test cases, A and B, are designed with extremely different re-dispatching results. In Case A, r P i % = r Q i % = 0 , i G \ W G and i 69 are assumed, consistent with a situation in which no non-renewable power generation bus other than the swing bus has a power generation reserve to compensate for the power mismatch. In Case B, r P i % = r P j % and r Q i % = r Q j % , i , j G \ W G , are assumed, approximately consistent with a situation in which all non-renewable power generation buses including the swing bus can generate enough power to compensate for the power deviations of interest.
Notably, all simulations in this test are performed using a personal computer with 3.3 GHz Intel Core I5 and 4 GB RAMS, and all algorithms are implemented in MATLAB (2015b, MathWorks, Natick, MA, USA).

3.2. Test Results, Comparison and Discussions of Case A

Based on the above test setup and the m off-line constructed ANNs, the RSONP algorithm is used to solve the RSONP problems on the IEEE 118-bus system in test Case A to obtain the OSONP u G i s ^ * , i G \ W G , and the optimal restrictive bounds ( h _ s * , h ¯ s * ) . The five Terms (a)–(e) listed in Table 1 are reported or evaluated in this test.
The Terms (a) and (b) correspond to the run time of the RSONP algorithm. Term (c) is the optimal objective value of the RSONP problem (Equation (2)). Term (d) represents the scheduled optimal total non-renewable power generation cost in unit $/h, which is the optimal objective value of the OPFPRB (Equation (3)) when ( h _ s , h ¯ s ) = ( h _ s * , h ¯ s * ) . Term (e) reflects the performance of the OSONP u G i s ^ * , i G \ W G , and is evaluated based on the MCS presented in Section 2.1.3 but replacing ( h _ s , h ¯ s ) and u G i s * , i G \ W G by ( h _ s * , h ¯ s * ) and u G i s ^ * , i G \ W G , respectively.
Table 2 presents the test results concerning the aforementioned five terms that were obtained using the proposed RSONP algorithm in Case A. Although RSONP algorithm takes ten iterations to reach the termination criterion, the results that were obtained in 6–9 th iterations are also reported. Columns 1 and 3 of Table 2 reveal the iteration-wise improvement of the objective value of the RSONP problem (Equation (2)), indicating that the distance between the obtained restrictive bounds and the normal bounds becomes smaller each iteration. As the restrictive bounds become less restrictive, the scheduled optimal total non-renewable power generation cost shown in Column 4 of Table 2 becomes smaller as predicted. Moreover, as the restrictive bounds becomes more restrictive, the performance of the OSONP u G i s ^ * , i G \ W G , improves but at the cost of an increase in the scheduled optimal total non-renewable power generation cost as is observed from Columns 3–5 in Table 2. This is reasonable, because a higher cost is required for a better performance. The performance of the OSONP u G i s ^ * , i G \ W G , in iterations six to ten of the RSONP algorithm exceeds 0.95 and the consumed CPU time are all less than 83.4 s, as revealed by Columns 5 and 2 in Table 2. In fact, the RSONP algorithm can be terminated after iteration 7, because the corresponding CPU time is less than one minute, but the performance is 0.55% better than that achieved in ten iterations, at the cost of only a 0.03% increase in the scheduled optimal total non-renewable power generation cost. The above results imply the following. The solution obtained at the end of iteration ten being the best is simply because the objective function of the RSONP problem (Equation (2)) considers only Term (c) that is proportional to Term (d), the non-renewable power generation cost, but do not consider Term (e), the performance regarding the probability of satisfying the security constraints in the presence of uncertain power generation and load demand. Since some system operators may care more about the security than the cost, a multi-objective OPF that considers both non-renewable power generation cost and the probability of satisfying the security constraints would be an issue that is worthy of investigation.
To demonstrate the advantage of the RSONP algorithm, the performance of the obtained OSONP u G i s ^ * , i G \ W G , is compared with the conventional schedule of optimal non-renewable power-generation (CSONP) u G i o * , i G \ W G , which is obtained by solving the COPF problem (Equation (1)) using the OPF solution method [30] that was used in Step 1 of the RSONP algorithm. The performance of u G i o * , i G \ W G , is defined as Prob { h _ j o h j ( x ˜ o ) h ¯ j o , j = 1 , , m | h _ o , h ¯ o } , where x ˜ o is the normal-bound-based random state-vector after re-dispatching (NRSAR) for all buses i = 1 , , N . The NRSAR x ˜ o is obtained using the procedure that was elucidated in the re-dispatching stage (Section 2.1.3) but with u G i s ^ * , u ˜ G i s , i G \ W G , and x ˜ s replaced by u G i o * , u ˜ G i o , i G \ W G , and x ˜ o , respectively, where u ˜ G i o , i G \ W G , is the Normal-bound-based Non-renewable Power-generation After Re-dispatching (NNPAR) that was obtained by re-dispatching the CSONP u G i o * , i G \ W G , using Equations (9) and (10) based on the re-dispatching percentage share in Case A. The procedure for evaluating Prob { h _ j o h j ( x ˜ o ) h ¯ j o , j = 1 , , m | h _ o , h ¯ o } in Case A is also based on the MCS presented in Section 2.1.3 but replacing ( h _ s , h ¯ s ) and u G i s * , i G \ W G by ( h _ o , h ¯ o ) and u G i o * , i G \ W G , respectively. The test results show that the performance of the CSONP u G i o * , i G \ W G , in Case A is 0.7723 which is far from performance of greater than 0.95 that results from all the OSONP u G i s ^ * , i G \ W G , obtained in iterations six to ten of the proposed RSONP algorithm as shown in Table 2. However, the total non-renewable power generation cost of u G i o * , i G \ W G , that is calculated as i G \ W G a i ( P G i o * ) 2 + b i P G i o * + c i is $129,630.47/h. Hence, in Case A, the performance of the OSONP u G i s ^ * , i G \ W G , obtained by executing the RSONP algorithm for ten iterations is 23.28% better than that of CSONP u G i o * , i G \ W G , at the cost of a 0.024% increase in the total non-renewable power generation cost. The above results reveal that the proposed RSONP algorithm can be applied in real time to a large power system and effectively reduce the risk of violating security constraints in the presence of uncertain power generation and load demand at the very small cost of an increase in the total non-renewable power generation cost.

3.3. Test Results, Comparisons and Discussions of Case B

The procedure of using the RSONP algorithm to solve the RSONP problem on the IEEE 118-bus system in Case B is the same as that in Case A, but with a different re-dispatching percentage share. Table 3 presents the test results of Case B regarding the five Terms, (a)–(e), defined in Table 1, and they are qualitatively the same as those in Case A.
To demonstrate the advantage of the RSONP algorithm in Case B, the performance of the previously obtained CSONP u G i o * , i G \ W G , is also investigated in Case B. The test procedures are the same as that for Case A described in Section 3.2 except for the re-dispatching percentage share. The test result shows that the performance of the CSONP u G i o * , i G \ W G , , i.e., Prob { h _ j o h j ( x ˜ o ) h ¯ j o , j = 1 , , m | h _ o , h ¯ o } in Case B is 0.7715 (<0.95) in contrast to the larger than 0.95 performances resulted from all the OSONP u G i s ^ * , i G \ W G , obtained by the proposed RSONP algorithm using 6 to 10 iterations as presented in Table 3. Notably, the total non-renewable power generation cost of CSONP u G i o * , i G \ W G , in Case B is exactly the same as that presented in Case A. Therefore, comparing with the CSONP u G i o * , i G \ W G , the performance of the OSONP u G i s ^ * , i G \ W G , obtained from executing the RSONP algorithm for 10 iterations in Case B is 23.35% better at the small cost of a 0.022% increase in the total non-renewable power generation cost. Since the re-dispatching percentage share for all the non-renewable power generation busses in these two cases are extremely different, the test results presented in Table 2 and Table 3 demonstrate the robustness of the proposed RSONP algorithm.

4. Conclusions and Further Research

Intermittent renewable power generation and uncertain load demand may cause security constraints to be violated. To limit this risk, an RSONP problem is formulated and a computationally efficient RSONP algorithm is presented and tested on the IEEE 118-bus power system. The computing speed of the RSONP algorithm and its comparison with the CSONP show that it can be applied in real time to reduce the risk of violating security constraints at the very small cost of an increase in the total non-renewable power generation cost. As for further research, due to the conflicting nature between the non-renewable power generation cost and the probability of satisfying security constraints indicated in Section 3.2, it would be worthwhile to formulate a multi-objective OPF problem by taking into account the aforementioned two conflicting terms and propose a computationally efficient algorithm to solve it.

Acknowledgments

This research work is supported in part by the Ministry of Science and Technology in Taiwan under grant MOST 105-2221-E-182-038. Ted Knoy is appreciated for his editorial assistance.

Author Contributions

Shin-Yeu Lin proposed the idea of this research and wrote the paper. Ai-Chih Lin designed and performed all the computer programs and simulations.

Conflicts of Interest

The authors declare no conflict of interest.

Nomenclature

OPFOptimal power flow
RSONPRisk-limiting schedule of optimal non-renewable power-generation
MCSMonte Carlo simulation
OPFPRBOPF problem with restrictive bounds, Equation (3)
SONPScheduled Optimal Non-renewable Power-generation
COPFConventional OPF
OSONPOptimal SONP
NPARNon-renewable Power-generation After Re-dispatching
RSARRandom State-vector After Re-dispatching
STARSecurity Term after Re-dispatching
CSONPConventional Schedule of Optimal Non-renewable Power-generation
NRSARNormal-bound-based Random State-vector After Re-dispatching
NSTARNormal-bound-based Security Term after re-dispatching
NNPARNormal-bound-based Non-renewable Power-generation after Re-dispatching
V i / θ i Voltage magnitude/phase angle of bus i
V ¯ i o / V _ i o Normal upper/lower bound of V i
x i = [ V i , θ i ] T state variable of bus i
N / L Total number of busses/the set of all transmission lines of the system
x = [ x 1 T , , x N T ] T state vector of all busses
G / W G / ( G \ W G ) Set of all/wind power/non-renewable power generation busses
P G i / Q G i Real/reactive power generation at bus i
u G i = [ P G i , Q G i ] T the power generation at bus i
u ¯ G i / u _ G i Upper/lower bound of u G i
v l , l W G Random wind speed of wind power generation bus l W G
p ( v l ) Probability density function (pdf) of random wind speed v l
u ^ W l Predicted wind power generation at bus l
u ˜ W l ( v l ) Random wind power generation at bus l
u ^ D L Vector of predicted large load-demand
u ^ D S Vector of predicted small load-demand
u ^ D = [ u ^ D L T , u ^ D S T ] T
u ˜ D i L = [ P ˜ D i L , Q ˜ D i L ] T random large load demand at bus D i L
u ˜ D i L = [ P ˜ D i L , Q ˜ D i L ] T random large load demand at bus D i L
u ˜ D L = [ u ˜ D 1 L , u ˜ D 2 L , , u ˜ D N L L ] T random vector of large load demand
p ( P ˜ D i L ) Probability density function (pdf) of random large real load demand at bus D i L
p i j Real power flow over transmission line ( i , j )
p ¯ i j o / p _ i j o Normal upper/lower bound of p i j
g ( x , u G , u W , u D ) = 0 Real and reactive power flow balance equation
i G \ W G a i P G i 2 + b i P G i + c i Total non-renewable power generation cost, where a i , b i and c i are cost coefficients
h j Function of the j th security term such as voltage magnitude V i at bus i or real power flow p i j over transmission line ( i , j )
h ¯ j o / h _ j o Normal upper/lower bound of the j th security constraint
h ¯ j s / h _ j s Restrictive upper/lower bound of the j th security constraint; h ¯ j s h ¯ j o and h _ j s h _ j o
h ¯ j s * / h _ j s * Optimal restrictive upper/lower bound
h _ ( $ ) / h ¯ ( $ ) = [ h _ 1 ( $ ) , , h _ m ( $ ) ] T / [ h ¯ 1 ( $ ) , , h ¯ m ( $ ) ] T for any superscript ( $ ) , where m denotes the total number of security constraints
ηRequired probability level of satisfying the security constraints in Equation (2), and 0 < η < 1
r P i % / r Q i % Non-renewable power generation bus i ’s re-dispatching percentage share of real/reactive power generation
r i % = [ r P i % , r Q i % ] T
u G i o * , i G \ W G CSONP, which is the solution of COPF Problem (1)
u G i s * , i G \ W G SONP for the given restrictive bounds ( h _ s , h ¯ s ) , which is the solution of OPFPRB (3)
u G i s ^ * , i G \ W G OSONP, which is the solution of OPFPRB (3) when ( h _ s , h ¯ s ) = ( h _ s * , h ¯ s * )
u ˜ G i o , i G \ W G NNPAR
u ˜ G i s , i G \ W G NPAR for the given restrictive bounds ( h _ s , h ¯ s )
u ( & ) ( Δ ) ( $ ) = [ P ( & ) ( Δ ) ( $ ) , Q ( & ) ( Δ ) ( $ ) ] T for any heading (&), subscript ( Δ ) or superscript ($), where P ( & ) ( Δ ) ( $ ) and Q ( & ) ( Δ ) ( $ ) are real and reactive parts of u ( & ) ( Δ ) ( $ ) , respectively
x ˜ o NRSAR
h j ( x ˜ o ) The j th NSTAR
x ˜ s The RSAR resulted from the scheduling and re-dispatching stages
h j ( x ˜ s ) The j th STAR for the given restrictive bounds ( h _ s , h ¯ s )
y ¯ j η / y _ j η η-upper bound/η-lower bound of h j ( x ˜ s )
μ h j / σ h j 2 mean/variance of h j ( x ˜ s )

References

  1. Niayifar, A.; Porte-Agel, F. Analytical modeling of wind farms: A new approach for power prediction. Energies 2016, 9, 741. [Google Scholar] [CrossRef]
  2. Cho, Y.; Lee, C.; Hur, K.; Kang, Y.C.; Muljadi, E.; Park, S.-H.; Choy, Y.-D.; Yoon, G.-G. A framework to analyze the stochastic harmonics and resonance of wind energy grid interconnection. Energies 2016, 9, 700. [Google Scholar] [CrossRef]
  3. Curreli, A.; Serra-Coch, G.; Isalgue, A.; Crespo, I.; Coch, H. Solar energy as a form giver for future cities. Energies 2016, 9, 544. [Google Scholar] [CrossRef]
  4. Buonomano, A.; Calise, F.; Vicidomini, M. Design, simulation and experimental investigation of a solar system based on PV and PVT collectors. Energies 2016, 9, 496. [Google Scholar] [CrossRef]
  5. Luo, Z.; Hong, S.-H.; Kim, J.-B. A price-based demand response scheme for discrete manufacturing in smart grids. Energies 2016, 9, 650. [Google Scholar] [CrossRef]
  6. Kim, Y.-S.; Hwang, C.-S.; Kim, E.-S.; Cho, C. State of charge-based active power sharing method in a standalone microgrid with high penetration level of renewable energy sources. Energies 2016, 9, 480. [Google Scholar] [CrossRef]
  7. Li, Y.; Li, W.; Yan, W.; Yu, J.; Zhao, X. Probabilistic optimal power flow considering correlations of wind speeds following different distributions. IEEE Trans. Power Syst. 2014, 29, 1847–1854. [Google Scholar] [CrossRef]
  8. Zou, B.; Xiao, Q. Solving probabilistic optimal power flow problem using quasi Monte Carlo method and ninth-order polynomial normal transformation. IEEE Trans. Power Syst. 2014, 29, 300–306. [Google Scholar] [CrossRef]
  9. Dvorkin, Y.; Pandzic, H.; Ortega-Vazquez, M.A.; Kirschen, D.S. A hybrid stochastic/interval approach to transmission-constrained unit commitment. IEEE Trans. Power Syst. 2015, 30, 621–631. [Google Scholar] [CrossRef]
  10. Wu, H.; Shahidehpour, M.; Li, Z.; Tian, W. Chance-constrained day-ahead scheduling in stochastic power system operation. IEEE Trans. Power Syst. 2014, 29, 1583–1591. [Google Scholar] [CrossRef]
  11. Ahmadi-Khatir, A.; Conejo, A.J.; Cherkaoui, R. Multi-area unit scheduling and reserve allocation under wind power uncertainty. IEEE Trans. Power Syst. 2014, 29, 1701–1710. [Google Scholar] [CrossRef]
  12. Kusiak, A.; Verma, A.; Wei, X. Wind turbine capacity frontier from SCADA. Wind Syst. Mag. 2012, 3, 36–39. [Google Scholar]
  13. Sttt, B.; Marinho, J.L. Linear programming for power system network security applications. IEEE Trans. Power Appl. Syst. 1979, 98, 837–848. [Google Scholar] [CrossRef]
  14. Burchett, R.C.; Happ, H.H.; Vierth, D.R. Quadratically convergent optimal power flow by Newton approach. IEEE Trans. Power Appl. Syst. 1985, 103, 3267–3275. [Google Scholar]
  15. Sun, D.I.; Ashly, B.; Brewer, B.; Hughes, A.; Tinney, W.F. Optimal power flow by Newton approach. IEEE Trans. Power Appl. Syst. 1984, 103, 2864–2880. [Google Scholar] [CrossRef]
  16. Wu, Y.; Debs, A.S.; Marsten, R.E. A direct nonlinear predictor-corrector primal-dual interior point algorithm for optimal power flow. IEEE Trans. Power Syst. 1994, 9, 876–882. [Google Scholar]
  17. Lin, C.-H.; Lin, S.-Y. A new dual-type method used in solving optimal power flow problems. IEEE Trans. Power Syst. 1997, 12, 1667–1675. [Google Scholar]
  18. Salgado, R.S.; Ranger, E.L., Jr. Optimal power flow solutions through multi-objective programming. Energy 2012, 42, 35–45. [Google Scholar] [CrossRef]
  19. Narimani, M.R.; Azizipanah-Abarghooee, R.; Zoghdar-Moghadam-Shahrekohne, B.; Gholami, K. A novel approach to multi-objective optimal power flow by a new hybrid optimization algorithm considering generator constraints and multi-fuel type. Energy 2013, 49, 119–136. [Google Scholar] [CrossRef]
  20. Niknam, T.; Narimani, M.R.; Jabbari, M.; Malekpour, A.R. A modified shuffle frog leaping algorithm for multi-objective optimal power flow. Energy 2011, 36, 6420–6432. [Google Scholar] [CrossRef]
  21. Niknam, T.; Azizipanah-Abarghooee, R.; Narimani, R. Reserve constrained dynamic optimal power flow subject to valve-point effects, prohibited zones and multi-fuel constraints. Energy 2012, 47, 451–464. [Google Scholar] [CrossRef]
  22. Varaiya, P.; Wu, F.F.; Bialek, J.W. Smart operation of smart grid: Risk-limiting dispatch. Proc. IEEE 2011, 99, 40–57. [Google Scholar] [CrossRef]
  23. Zhang, H.; Li, P. Chance constrained programming for optimal power flow under uncertainty. IEEE Trans. Power Syst. 2011, 26, 2417–2424. [Google Scholar] [CrossRef]
  24. Lin, S.-Y.; Lin, A.-C. RLOPF (risk-limiting optimal power flow) for systems with high penetration of wind power. Energy 2014, 71, 49–61. [Google Scholar] [CrossRef]
  25. Danaraj, R.M.S. Economic Dispatch by Quadratic Programming. Available online: http://www.mathworks.com/matlabcentral/fileexchange/19538-economic-dispatch-by-quadratic-programming (accessed on 4 April 2015).
  26. Svozil, D.; Kvasnicka, V.; Pospichal, J. Introduction to multi-layer feed-forward neural networks. Chemom. Intell. Lab. Syst. 1997, 39, 43–62. [Google Scholar] [CrossRef]
  27. Wei, X.; Kusiak, A.; Sadat, H.R. Prediction of influent flow rate: Data-mining approach. J. Energy Eng. 2012, 139, 118–123. [Google Scholar] [CrossRef]
  28. Wilamowski, B.M.; Yu, H. Improved computation for Levenberg-Marquardt training. IEEE Trans. Neural Netw. 2010, 21, 930–937. [Google Scholar] [CrossRef] [PubMed]
  29. Morales, J.M.; Perez-Ruiz, J. Point estimate schemes to solve the probabilistic power flow. IEEE Trans. Power Syst. 2007, 22, 1594–1601. [Google Scholar] [CrossRef]
  30. Zimmerman, R.; Murillo-Sanchez, C.; Gan, D. MATPOWER: A MATLAB Power System Simulation Package; PSERC, Cornell University: Ithaca, NY, USA, 2005. [Google Scholar]
  31. IIT Power Group. One-Line Diagram of IEEE 118-Bus System. Illinois Institute of Technology, 2003. Available online: http://motor.ece.iit.edu/data/IEEE118bus_inf/IEEE118bus_figure.pdf (accessed on 25 May 2015).
Figure 1. Three-layer artificial neural network (ANN).
Figure 1. Three-layer artificial neural network (ANN).
Energies 09 00868 g001
Figure 2. Flow chart of the risk-limiting schedule of optimal non-renewable power-generation algorithm.
Figure 2. Flow chart of the risk-limiting schedule of optimal non-renewable power-generation algorithm.
Energies 09 00868 g002
Table 1. The five terms evaluated in the test. RSONP: risk-limiting schedule of optimal non-renewable power-generation.
Table 1. The five terms evaluated in the test. RSONP: risk-limiting schedule of optimal non-renewable power-generation.
TermContent
(a)Number of iterations executed in the RSONP algorithm
(b)Corresponding CPU time of (a)
(c) j = 1 m [ ( h _ j s * h _ j o ) 2 + ( h ¯ j o h ¯ j s * ) 2 ]
(d) i G \ W G a i ( P G i s ^ * ) 2 + b i P G i s ^ * + c i
(e) Prob { h _ j o h j ( x ˜ s ) h ¯ j o , j = 1 , , m | h _ s * , h ¯ s * }
Table 2. Results of using the RSONP algorithm to solve the RSONP problem on the IEEE 118-bus system in Case A.
Table 2. Results of using the RSONP algorithm to solve the RSONP problem on the IEEE 118-bus system in Case A.
(a) *(b) *(c) *(d) *(e) *
648.618.292129,711.7595.89
756.810.871129,699.9195.74
864.54.355129,688.8395.43
972.12.871129,673.2395.29
1083.40.709129,661.6995.21
* Terms regarding (a)–(e) are specified in Table 1.
Table 3. Results of using the RSONP algorithm to solve the RSONP problem on the IEEE 118-bus system in Case B.
Table 3. Results of using the RSONP algorithm to solve the RSONP problem on the IEEE 118-bus system in Case B.
(a) *(b) *(c) *(d) *(e) *
647.518.278129,709.0695.86
756.410.843129,696.3895.65
865.34.326129,681.1395.38
971.52.858129,670.8495.26
1082.60.722129,659.7295.17
* Terms regarding (a)–(e) are specified in Table 1.

Share and Cite

MDPI and ACS Style

Lin, S.-Y.; Lin, A.-C. Risk-Limiting Scheduling of Optimal Non-Renewable Power Generation for Systems with Uncertain Power Generation and Load Demand. Energies 2016, 9, 868. https://doi.org/10.3390/en9110868

AMA Style

Lin S-Y, Lin A-C. Risk-Limiting Scheduling of Optimal Non-Renewable Power Generation for Systems with Uncertain Power Generation and Load Demand. Energies. 2016; 9(11):868. https://doi.org/10.3390/en9110868

Chicago/Turabian Style

Lin, Shin-Yeu, and Ai-Chih Lin. 2016. "Risk-Limiting Scheduling of Optimal Non-Renewable Power Generation for Systems with Uncertain Power Generation and Load Demand" Energies 9, no. 11: 868. https://doi.org/10.3390/en9110868

APA Style

Lin, S. -Y., & Lin, A. -C. (2016). Risk-Limiting Scheduling of Optimal Non-Renewable Power Generation for Systems with Uncertain Power Generation and Load Demand. Energies, 9(11), 868. https://doi.org/10.3390/en9110868

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop