Next Article in Journal
Multi-Agent-Based Data-Driven Distributed Adaptive Cooperative Control in Urban Traffic Signal Timing
Next Article in Special Issue
Optimization of a Power Line Communication System to Manage Electric Vehicle Charging Stations in a Smart Grid
Previous Article in Journal
3D Imaging of Geothermal Faults from a Vertical DAS Fiber at Brady Hot Spring, NV USA
Previous Article in Special Issue
Optimal Placement of UHF Sensors for Accurate Localization of Partial Discharge Source in GIS
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Implementation of User Cuts and Linear Sensitivity Factors to Improve the Computational Performance of the Security-Constrained Unit Commitment Problem

by
Cristian Camilo Marín-Cano
,
Juan Esteban Sierra-Aguilar
,
Jesús M. López-Lezama
,
Álvaro Jaramillo-Duque
* and
Walter M. Villa-Acevedo
Research Group in Efficient Energy Management (GIMEL), Departamento de Ingeniería Eléctrica, Universidad de Antioquia, Calle 67 No. 53-108, Medellín 050010, Colombia
*
Author to whom correspondence should be addressed.
Energies 2019, 12(7), 1399; https://doi.org/10.3390/en12071399
Submission received: 20 March 2019 / Revised: 3 April 2019 / Accepted: 3 April 2019 / Published: 11 April 2019
(This article belongs to the Special Issue Optimization Methods Applied to Power Systems Ⅱ)

Abstract

:
Power system operators must schedule the available generation resources required to achieve an economical, reliable, and secure energy production in power systems. This is usually achieved by solving a security-constrained unit commitment (SCUC) problem. Through a SCUC the System Operator determines which generation units must be on and off-line over a time horizon of typically 24 h. The SCUC is a challenging problem that features high computational cost due to the amount and nature of the variables involved. This paper presents an alternative formulation to the SCUC problem aimed at reducing its computational cost using sensitivity factors and user cuts. Power Transfer Distribution Factors (PTDF) and Line Outage Distribution Factors (LODF) sensitivity factors allow a fast computation of power flows (in normal operative conditions and under contingencies), while the implementation of user cuts reduces computational burden by considering only biding N-1 security constraints. Several tests were performed with the IEEE RTS-96 power system showing the applicability and effectiveness of the proposed modelling approach. It was found that the use of Linear Sensitivity Factors (LSF) together with user cuts as proposed in this paper, reduces the computation time of the SCUC problem up to 97% when compared with its classical formulation. Furthermore, the proposed modelling allows a straightforward identification of the most critical lines in terms of the overloads they produce in other elements after an outage, and the number of times they are overloaded by a fault. Such information is valuable to system planners when deciding future network expansion projects.

1. Introduction

The electric power sector is currently facing rapid changes, mostly related to the integration of renewable energy resources and the new trend of smart grids. In this context, power system operators are continuously seeking novel sources of operational flexibility and improved methods to manage and integrate generation resources, guaranteeing a secure operation. Within the daily operation planning of a power system the unit commitment (UC) is one of the most important decision-making activities. The UC brings up the task of finding an optimal schedule and production level of a set of generation units over a given period of time. It also serves for clearing daily prices in power markets and as a tool used by generation companies for optimizing bidding strategies [1]. In its traditional approach, the UC is run within a typical time horizon of 24 h aiming at minimizing the total operation costs while meeting network demand.
UC is a widely studied problem. Recent works emphasize the inclusion of renewable energy [2,3,4], energy storage [5,6], uncertainty [7,8] and security constraints [9,10]. This paper focuses on the last issue. Within the daily operation planning of power systems, an important aspect to take into account is monitoring the limits of the electric network not only for normal operating conditions but also under credible contingencies; especially, at periods of peak demand when transmission capacity margins are reduced. Therefore, solving the UC problem considering security constraints becomes a fundamental condition for obtaining an economic, safe and reliable system operation [11]. When transmission limits and security constraints (N-1 criterion) are included in the UC, system operators find themselves dealing with a much more complex problem, namely the security-constraint unit commitment (SCUC) problem.
The SCUC is a non-linear, large-scale, mixed-integer combinatorial optimization problem that considers numerous operating constraints, such as ramp rates, minimum up/down time, start-up time as well as transmission and generation limits. The SCUC also incorporates contingency analyses that take into account forced outages of network elements. This problem can be represented as a mixed-integer programming (MIP) problem, and from the point of view of its computational complexity is NP-complex [9]. Several optimization methods have been used to approach the SCUC problem. These methods can be broadly classified in three groups: mathematical programming approaches, metaheuristic techniques, and hybrid methods. Classical mathematical programming approaches include Lagrangian Relaxation (LR) [12,13], Benders Decomposition (BD) [14,15,16,17] and Branch and Cut (BC) methods [18,19]. Several metaheuristic techniques have also been applied to solve the UC and SCUC problem such as genetic algorithms [20,21,22,23,24], cuckoo search algorithm [25] and swarm intelligence [26]. Finally, hybrid methodologies are presented in [27,28]. The literature regarding the SCUC problem is very extensive. A comparison of transmission constrained unit commitment formulations is presented in [29]. A survey of research work made in the domain of UC and SCUC using various techniques is presented in [30]. Also, literature reviews approaching specific issues such as stochasticity and uncertainty within the SCUC problem are addressed in [31,32], respectively.
The inclusion of security constraints is one of the main complicating factors of the UC problem. That is because its number is directly proportional to the product of the number of transmission lines and the discrete steps of the commitment horizon. Therefore, the SCUC can be greatly simplified if inactive security constraints are identified and eliminated. In [10], the authors show that inactive constraints can be identified by solving a series of small-scale mixed-integer linear programming (MILP) problems and propose an analytical condition to identify such constraints. They also found that computational requirements and numerical error of the SCUC are greatly reduced if inactive constraints are eliminated. Furthermore, the authors show that the crucial transmission lines affecting the total operating costs are among those associated with the remaining security constraints. In [33], the authors provide a systematic method to construct feasible solutions for the SCUC problem within a LR framework, based on a group of analytical feasibility conditions. In line with the work presented in [10] the authors, in [34] present the concept of umbrella constraints for the security-constraint optimal power flow (SCOPF) problem. This is because few of the constraints actually serve to enclose the feasible region of a typical SCOPF. Hence, the constraints that are not contributing directly to the feasible space can be discarded. The authors establish the necessary and sufficient conditions of the set of feasible solutions by ruling out unnecessary constraints of the SCOPF. Although these conditions allow the identification of inactive and binding constraints, they also involve solving MILP problems, which despite being less complex than the original formulation are not trivial in their solution, especially when dealing with large-scale problems, and therefore BD may be needed [10,34]. In [35] the authors propose an iterative algorithm to speed up the solution of an AC Preventive Security-Constrained Optimal Power Flow (AC-PSCOPF) through contingency filtering techniques; non-dominated N-1 contingencies are the security constraints bounded to the AC-PSCOPF model. Nevertheless, for performing the N-1 contingency analysis, AC-power flows, into this algorithm, must be computed.
A fundamental aspect in the modelling of the SCUC problem is the representation of the electrical network. A linear representation of the network (DC model) as in [13,15,16], instead of an AC modelling as in [36,37,38] allows the use of linear sensitivity factors (LSF) such as power transfer distribution factors (PTDF) and line outage distribution factors (LODF), commonly used in the analysis of electrical systems [39,40]. These factors represent the approximate change in power flows in transmission assets due to a change in power injection (PTDF) or due to a new topology configuration of the network when a transmission element fails (LODF). The use of these factors allows reducing the number of variables and constraints of the SCUC model, increasing computational efficiency. In [41], the authors use PTDF and LODF to calculate generation shifts so that power flows on transmission lines are kept within security limits after single and multiple-line outage events. In [9], the authors present an N-1 security-constraint formulation of the SCUC problem based on LODF combined with an iterative methodology for filtering N-1 congestion constraints. The authors show that such filtering through lazy constraints greatly reduces the computational time of the SCUC problem. A method for estimating these sensitivity factors based on near-real-time measurements and their applications can be found in [42]. Despite advantages of these linear factors, ref [43] proposes a new formulation to reduce the number of variables and constraints to speed up the SCUC solution in large-scale power systems, using BD and the BC in an iterative framework. Nonetheless, post-contingency power flows are modelled using the bus voltage angles.
This paper presents a novel formulation of the SCUC problem that considerably reduces its computing time. This is done through the implementation of user cuts and the use of LSF. On the one hand, the user cuts approach proposed in this paper serves as umbrella constraints which results in a considerable computational burden reduction when considering N-1 security constraints. This is because most of the N-1 contingency constraints are superfluous and do not set up the feasibility space of the SCUC problem [9]. On the other hand, PTDF and LODF sensitivity factors allow a fast computation of power flows both in normal operation and under contingencies. Furthermore, some indexes are proposed to identify the most severe faults as well as the most critical lines. The later information is of paramount importance to system planners since this can be included in expansion plan studies.
This paper is organized as follows: Section 2 describes the mathematical formulation of the SCUC problem. Section 3 presents the proposed approach to solve the SCUC problem. Section 4 shows tests and results. Finally, Section 5 reports conclusions.

2. Problem Statement

2.1. Linear Sensitivity Factors

Distribution factors are linear approximations of the sensitivities of power flows with respect to changes in nodal injections [39]. PTDF represent changes in power flows in lines as regards the transfer of one MW from an injection node to a consumption node. On the other hand, LODF represent the distribution of power flows in the remaining lines after an outage has taken place. The DC model of the transmission network is one of the most used in power system studies. With this model it is possible to compute the power flows using the vector of power injections in each bus P ¯ and the susceptance matrix B ¯ . Power flows are given in terms of angular differences that can be obtained from Equation (1). Since matrix B ¯ is non-invertible, the row and column corresponding to the slack bus are eliminated resulting in matrix B ¯ as indicated in Equation (2). The computation of the power flow in a transmission line is obtained as the product of the susceptance of the line by the angular difference between the two buses that connect it. This operation can be expressed in matrix form as shown in Equation (3), where D ¯ is the diagonal matrix of susceptances, A ¯ is the incidence matrix of the system and θ ¯ is the vector of bus voltages angles. Power flows in lines can be expressed as a function of P ¯ , by replacing Equation (2) in Equation (3), as shown in Equation (4). Finally, Equation (5) shows how to compute the matrix of PTDF. It is worth mentioning that when calculating matrix A ¯ , the row corresponding to the slack bus must be removed to perform matrix operations without dimensional problems. This leads to the PTDF matrix not considering the slack bus until this instance of the calculation. Subsequently, to account for the slack bus, a column of zeros in the position of this node is added to the PTDF matrix. This is because there is no power flow change in the transmission lines when the power injection is made in the slack bus and withdrawn from it.
P ¯ = B ¯ · θ ¯
θ ¯ = B ¯ 1 · P ¯
F ¯ = D ¯ A ¯ θ ¯
F ¯ = D ¯ A ¯ B ¯ 1 · P ¯
PTDF ¯ = D ¯ A ¯ B ¯ 1
The computation of LODF indices is done by means of an auxiliary matrix H ¯ as shown in Equation (6). One of the drawbacks of this methodology lies on the fact that there are no defined values of LODF for radial lines. To address this problem, it is suggested in [44] to assign values of 0 (see Equation (7); that is to say, contingencies associated with radial lines are not taken into account. Furthermore, in the main diagonal of the LODF matrix, −1 is assigned, since there is no post-fault power flow for the line that is out of operation. With these established rules, the post-contingency power flow in line l when line k fails ( F l , k ) is given as shown in Equation (8).
H ¯ = PTDF ¯ · A ¯ T
LODF ¯ = H i , j 1 H j , j if H i , j 0 0 if H j , j = 1 1 if i = j
F l , k = F l + LODF ¯ l , k · F k
where F l and F k are the power flows in normal operation state, that is, prior to the contingency k.

2.2. Modelling Approach: Classic UC Formulation

The SCUC model proposed in this paper uses as starting point the classic UC formulation described and modelled in [29,45], respectively. From this initial model, a new one was developed adopting LSF to account for power flow constraints both in normal operative conditions and under contingencies. In this way, the UC model described in [29] is turned into a SCUC problem. The base UC formulation is given by Equations (9)–(29). The objective function, given by Equation (9) consists of minimizing the total generation cost of a set power plants over a given time horizon. In this case, C i ( t ) is the cost of power plant i at time t, c s h is the cost of non-attended demand, and L s s h is the unserved load at bus s at time t. This objective function is subject to a set of constraints as explained below.
Minimize t = 1 T i = 1 I C i ( t ) + t = 1 T s = 1 S c s h · L s s h ( t )
Constraints given by Equations (10) and (11) are used to preserve the logic of running, start-up, and shut-down status of generators. Where y i ( t ) and z i ( t ) are binary variables that are equal to 1 if generator i is started or shut down at the beginning of time interval t, respectively, and 0 otherwise. On the other hand, x i ( t ) is a binary variable that is equal to 1 if generator i is committed in time interval t, and 0 otherwise. Equation (10) is used to preserve the logic of running units, while Equation (11) indicates that a given generator cannot be simultaneously on and off.
y i ( t ) z i ( t ) = x i ( t ) x i ( t 1 ) t T , i I
y i ( t ) + z i ( t ) 1 t T , i I
Although there are several technologies of eclectic power plants, for the sake of simplicity only thermal generators were considered. The cost curve of thermal generator units was modelled using B linear segments and is described by Equation (12). In this case, a i is a fixed production cost that is taken into account only if generator i is committed as indicated by the binary variable x i ( t ) ; k i , b is the slope of the cost curve for segment b of generator i, g i , b ( t ) is the output of generator i in segment b at time t and S U C i ( t ) is the start-up cost of generator i at time t. Equation (13) indicates that the total generation output given by g i ( t ) must be equal to the sum of the generation in each segment of the cost curve. Equations (14) and (15) indicate the minimum and maximum output limits for each generation level, respectively.
C i ( t ) = a i · x i ( t ) + b = 1 B k i , b · g i , b ( t ) + S U C i ( t ) t T , i I
g i ( t ) = b = 1 B g i , b ( t ) t T , i I
g i ( t ) g i m i n · x i ( t ) t T , i I
g i , b ( t ) g i m a x · x i ( t ) t T , i I , b B
Minimum up/down time constraints are expressed by Equations (16)–(18). Where g i o n o f f represents the on-off status of generator i at t = 0 , L i u p , m i n is the minimum length of time generator i must be on once it is committed, and L i d o w n , m i n is the minimum length of time generator i must be off before being committed again.
x i ( t ) = g i o n o f f i I , t L i u p , m i n + L i d o w n , m i n
t t = t g i u p + 1 t y i ( t t ) x i ( t ) t L i u p , m i n
t t = t g i d o w n + 1 t z i ( t t ) 1 x i ( t ) t L i d o w n , m i n
Ramping constraints are given by Equations (19)–(21). These are added to take into consideration how fast a generator can increase or decrease its output. In this case, r a m p i u p and r a m p i d o w n are the up and down ramp limits of generator i, g i ( t ) is the generator output at time t, and g i 0 is the output of generator i at t = 0.
r a m p i d o w n g i ( t ) g i ( t 1 ) i I , 2 t T
r a m p i u p g i ( t ) g i ( t 1 ) i I , 2 t T
r a m p i d o w n g i ( t 1 ) g i 0 i I
r a m p i u p g i ( t 1 ) g i 0 i I
Generator off counter set-up constraints are given by Equations (23)–(25). These equations are used to take into account the initial conditions of generators. The symbols | and indicate the logical conditions IF and AND, respectively.
w i , j ( t ) t t = S U C i , j l i m m i n { t 1 , S U C i , j + 1 l i m 1 } z i ( t j ) + 1 | { j = J 1 S U C i , j l i m g i d o w n , i n i t + t 1 < S U C i , j + 1 l i m } + 1 | { j = J S U C i , j l i m g i d o w n , i n i t + t 1 } t T , i I , j J
j = 1 J w i , j ( t ) = y i ( t ) t T , i I
S U C i ( t ) = j = 1 J w i , j ( t ) t T , i I
Equations (26)–(29) take into account transmission constraints within a DC modelling of the network. Equation (26) indicates the active power balance constraint. This means that the supply and demand must be equal over all time intervals on each node. In this case, θ s ( t ) is the voltage angle at bus s at time t, and B s , m is the admittance connecting nodes s m . Equation (27) accounts for power flow limits, where l s , m m a x is the maximum power flow allowed in line connecting nodes s m . Finally, Equations (28) and (29) indicate limits on bus angles and the angular value of the reference bus, respectively.
i = 1 I g i ( t ) { s , m } L | m > s B s , m ( θ s ( t ) θ m ( t ) ) + { s , m } L | m < s B m , s ( θ m ( t ) θ s ( t ) ) = d s ( t ) t T , s S
F s , m m a x B s , m ( θ s ( t ) θ m ( t ) ) F s , m m a x t T , { s , m } L
π θ s ( t ) π t T , s S \ s : r e f e r e n c e b u s
θ s ( t ) = 0 t T , s : r e f e r e n c e b u s

2.3. Improvements and Adaptations to the Classic UC Model

Several modifications were introduced to the aforementioned UC model aiming at considering contingency constraints and improving computational time. The improvements and adaptations performed on the UC model are described below.
  • Net power injection and power balance
    The first modification introduced in the UC model given by Equations (9)–(29) is the reformulation of the power balance constraint given by Equation (26). We introduce the variable P s , t N e t in Equation (30) that indicates the net power injection in bus s at time t. In this case, A s , i g is a matrix that identifies which generator is in each bus. If generator i is located at bus s the corresponding position of A s , i g is equal to one. Otherwise, it is zero; g i ( t ) is the output of generator i at time t, D s , t is the forecasted demand at bus s at time t. To guarantee the power balance, the sum of the total generation must be equal to the sum of the total demand for each period of time, as indicated by Equation (31). The formulation of the net power injection provided in Equations (30) and (31) replaces Equation (26). Please note that such formulation does not take into account bus angles, reducing the number of variables and rendering constraints (28) and (29) unnecessary.
    P s N e t ( t ) = i A s , i g g i ( t ) D s ( t ) + L s s h ( t ) s S , t T
    s P s N e t ( t ) = 0 t T
  • Power flows and post-contingency power flows
    Power flows in lines can be obtained as the product of the PTDF matrix and the vector of net power injections. Power flows must be within minimum and maximum limits as indicated in Equation (32). On the other hand, post-contingency power flows can be obtained using the LODF matrix as indicated in Equation (33). In this case, T C F stands for Transmission Capacity Factor, which is a parameter used to adjust transmission capacity limits. When post-contingency constraints are included in the UC formulation, this one is turned into a SCUC problem. Nevertheless, as it will be explained later, not all security constraints given by Equation (33) need to be incorporated in the model to guarantee network security. This is because most of these constraints may not be binding in the optimal solution. Therefore, only the security constraints that need to be enforced to avoid post-contingency overloads are added as user cuts as explained in the next section.
    F l max · T C F s P T D F ¯ l , s · P s N e t ( t ) F l max · T C F l L , t T
    F l m a x · T C F F l ( t ) + L O D F ¯ l , k · F k ( t ) F l m a x · T C F l L , k K , t T

3. Methodology

The proposed modelling approach to the SCUC problem was inspired by [9], and it has two main features: the use of LSF (described in Section 2.1) for a straightforward computation of power flows and post-contingency power flows (see Equations (32)–(33); and the implementation of user cuts that reduce computational burden by considering only biding N-1 security constraints. In this section, a detailed description of the so-called user cuts is provided along with its implementation within the SCUC problem.

3.1. User Cuts

For large power systems, most single-element contingencies (N-1) do not result in power flow violations of other lines; that is to say, the majority of the N-1 security constraints may be superfluous and do not set up the feasibility space of the SCUC problem. Therefore, user cuts are implemented in this paper to consider only biding security constraints. In a MILP problem, a user cut is basically an additional linear constraint defined by the user, which is not part of the original model and does not rule out any feasible integer solutions [46]. Suppose the hypothetical two variable pure integer linear programming problem presented in Figure 1. In this case, the black dots indicate the feasible region of the problem and the black polygon indicates the integer hull or IP hull, which is the smallest convex set containing all integer-feasible solutions. The polygon bounded in blue represents the feasible region of the linear relaxation, also known as the linear hull or LP hull. This one is obtained when relaxing integrality constraints while enforcing variable bounds and functional constraints. Please note that the IP hull is always a subset of the LP hull. A user cut is illustrated by a red line, the shaded area shows the portion of the original LP hull that is removed by the user cut. Please note that none of the integer solutions of the original problem are removed by the cut.
In the approach proposed in this paper, the original problem is represented by the classic UC formulation presented in Section 2.2 considering the LSF through Equations (33) to (35). Please note that this first modification of the modelling does not include Equation (33). In consequence, it only deals with normal operative conditions. However with an alternative expression for power flow limits and power flow balance as a function of the PTDF and net power injections.
To turn a classic UC into a SCUC problem it must be guaranteed that N-1 security constraints are properly dealt with. However, in the operation of a power system not every contingency results in overloads. Therefore, it is not necessary or practical to consider the whole set of all security constraints given by Equation (33). Only those single contingencies that result in overloads must be considered. This is done by adding new security constraints as user cuts.

3.2. Adding N-1 Security Constraints to the UC Problem

The addition of N-1 security constraints to the UC problem is done by means of user cuts as described below (see Figure 2).
  • Step 0: read system data.
  • Step 1: set the Security-Constraint Recorder S C R l , k ( t ) to zero as indicated in Equation (34). This with the aim of only accounting for the normal operation state and excluding the security constraints (given by Equation (33) in the first iteration of the algorithm.
    S C R l , k ( t ) = 0 l L , k K , t T
  • Step 2: solve the model given by Equations (9) to (25) and (30) to (32). Additionally, set the parameter O P l , k ( t ) to zero, which will store the overloads of every transmission line l, under every contingency k in every period of time t.
  • Step 3: Estimate post-contingency power flows F ^ l , k ( t ) as indicated in Equation (35), using the optimal power flows F l * ( t ) and F k * ( t ) prior to the contingencies.
    F ^ l , k ( t ) = F l * ( t ) + L O D F ¯ l , k · F k * ( t ) t T , l L , k K
  • Step 4: verify post-contingency power flow limits in every line l for every period of time t, under every contingency k. If there is an overload in line l, for a contingency k, in the period of time t, assign a value of 1 in the corresponding position of S C R l , k ( t ) , as indicated in Equation (36).
    If F ^ l , k ( t ) F l max · T C F S C R l , k ( t ) = 1 t T , l L , k K
    For those lines presenting overloads, the excess value is stored in the Overload Parameter O P l , k ( t ) . If there is not an overload in line l, under contingency k in the period of time t the corresponding position of O P l , k ( t ) is set to zero as indicated in Equation (37). The sum over the sets of periods, lines and contingencies yields the total overload ( T O ) of the system as indicated by Equation (38).
    O P l , k ( t ) = F ^ l , k ( t ) F l max · T C F If F ^ l , k ( t ) F l m a x · T C F 0 If F ^ l , k ( t ) < F l max · T C F t T , l L , k K
  • Step 5: compute the total overload ( T O ) as indicated in Equation (38).
    T O = l , k , t O P l , k ( t )
  • Step 6: check convergence verifying if T O is lower than a given tolerance ( t o l ). If it is true, stop the algorithm and report the solution. Otherwise, return to Step 2 introducing user cuts by adding new security constraints through Equation (33). This is done with the values of l, k, and t for which F ^ l , k ( t ) F l max ; which in turn correspond to the positions where S C R l , k ( t ) = 1 .

3.3. Identification of Vulnerable Lines and Critical Contingencies

Using the information stored in S C R l , k ( t ) it is possible to identify the most vulnerable lines and critical contingencies. For example, adding S C R l , k ( t ) over t and k as indicated in Equation (39) yields L l v ; this is a vector that contains the number of times each line is overloaded due to every contingency in each period of time t. Thus, L l v provides information regarding the most vulnerable lines of the system.
t , k S C R l , k ( t ) = L l v l L
The identification of the most critical contingencies (in terms of the number of overloads they cause) is obtained by adding S C R l , k ( t ) over t and l as indicated in Equation (40). In this case, L k s is a vector that contains the number of lines that are overloaded due to a given contingency k over the set t. In consequence, L k s identifies the most critical contingencies of the system.
t , l S C R l , k ( t ) = L k s k K
Finally, it is possible to obtain a mapping of contingencies and overloads adding S C R l , k ( t ) over t. In this case, L l , k c is a matrix that maps every contingency with every line overloaded, permitting identification of which contingencies impact which lines. This information is valuable to system planners when deciding over reinforcements on the network or eventual expansion plans.
t S C R l , k ( t ) = L l , k c k K l L

4. Tests and Results

To show the applicability of the proposed modelling approach several tests were performed using the IEEE RTS-96 for a time horizon of 24 h. This power system is made of 73 buses, 120 transmission lines, 96 thermal generators, and 51 loads that add up a maximum demand of 7539 MW. Figure 3 depicts the power system under study. Information regarding initial conditions of generators is necessary to enforce ramping constraints as well as minimum up/down time constraints denoted by Equations (19)–(21) and (16)–(18), respectively. Cost data of generators and their initial conditions are presented in Table A1 and Table A2, respectively. The system data and classic UC model used in this paper as starting point can be found in [45]. Furthermore, data and models are available at GitHub [47].
Three different formulations as described in Table 1 were implemented for comparative purposes. Two instances of the problem were considered for all formulations varying line ratings and the gap of relative optimality (inGAP). The inGAP is a user-defined parameter that indicates the grade of optimality (quality of solution) required for the software. The first instance of the problem is solved with an inGAP of 0.001 and a TCF of 1.0 (nominal line ratings); the second one considers an inGAP of 0.005 and a TCF of 0.8 (line rating reduction of 20%). The proposed model was solved using the commercial software of algebraic modelling GAMS version 24.8.5, under CPLEX solver in an 8-core 3.4 GHz Intel Core i7 desktop computer with an 8 GB RAM memory. The results of the simulations are presented in Table 2.

4.1. Impact of Linear Sensitivity Factors in the Performance of the SCUC Problem

A comparison of results with formulations A and B is initially presented to illustrate the impact of including LSF within the SCUC formulation. As described in Table 1 formulation A considers a classic network modelling and although it considers LODF to account for contingencies, it does not take into account PTDF to model network constraints. It can be seen in Table 2 that formulations A and B require similar computing time to solve the SCUC problem when using a TCF equal to 1 (formulation A takes 1220 seconds and formulation B 1209). Although the same inGAP was used for both formulations, the outGAP (which is indicative of the quality of the solution reached by the solver) obtained when using formulation B is almost half the one obtained when using formulation A. This means that including LSF to represent network constraints leads to better solutions as can be verified in the first column of Table 2. To illustrate, even more, the superior computational efficiency of formulation B compared to formulation A, an additional simulation with an inGAP of 0.00254, labeled as B * was carried out. Such inGAP is used to basically force the solver to reach a solution with a similar quality as the one already obtained with formulation A. In this case, formulation B* finds such solution in significantly less time (495 seconds). Please note that for obtaining results of similar quality, formulation A takes 1220 seconds while formulation B* takes 495 seconds. This corresponds to a time reduction of nearly 60%. On the other hand, when using a TCF of 0.8 the outGAPs of both formulations are similar (0.00480 for formulation A and 0.00490 for formulation B). However, formulations A takes 519 seconds while formulation B only takes 345 seconds. This indicates a reduction of computational time of 33.5%.

4.2. Impact of User Cuts in the Performance of the SCUC Problem

As described in Table 1 formulation C considers user cuts (described in Section 3.1 and Section 3.2) to account for security constraints. As can be observed in Table 2 for a TCF equal to 1, this formulation takes 169 seconds to solve the SCUC problem. This represents an important time reduction (approximately 86%) when compared with formulations A and B that take 1220 and 1209 seconds to solve the same problem, respectively. Furthermore, the outGAP obtained with formulation C is lower than the ones obtained with formulations A and B. This indicates that the proposed formulation not only improves computational time but also quality of solutions. This last aspect can be verified by comparing the data presented in the second column of Table 2. When a TCF of 0.8 is considered, formulation C also outperforms formulations A, B and B * both in terms of computational time and quality of solutions. As regards computational time, formulation C takes 321 seconds to solve the SCUC problem while formulation A takes 519 seconds. On the other hand, to achieve a solution with a similar quality (see outGAP in the last column of Table 2) formulation B* takes 687 seconds. Consequently, formulation C provides in this case a time reduction of 53.2%.
Table 3 presents details of each iteration when using formulation C with an inGAP of 0.005 and TCF = 0.8. The solution to the SCUC problem is found after 6 iterations in 321 seconds. Please note that in the first iteration, normal operation state of the system is solved, that is, security constraints are not considered. However, in the second iteration 68 security constraints are added as user cuts. These correspond to the positions where S C R l , k ( t ) = 1 . Subsequently, more user cuts are added in every iteration until all post-contingency power flows under every single contingency over all periods of time are within limits. This is achieved with 144 additional constraints. In contrast, classic modelling approaches (formulations A and B) require 13816 additional constraints to account for security in the UC problem. This corresponds to a reduction of 99% in the number of security constraints required to solve the SCUC problem.

4.3. Most Vulnerable Lines and Critical Contingencies

As mentioned in Section 3.3, the proposed approach also allows identification of the most vulnerable lines and critical contingencies over the time horizon under consideration and for every N-1 contingency. Figure 4a presents the most vulnerable lines when the SCUC is solved with TFC = 0.8. It can be observed that the lines labeled as L115 and L93 are overloaded 54 and 11 times, respectively due to every N-1 contingency over the 24h time horizon. These lines are indicated in red in Figure 3. The most critical contingencies are presented in Figure 4b. Please note that the outage of lines labeled as L45 or L64 impacts 22 other lines. These are indicated in blue in Figure 3. Figure 5 presents a mapping of critical contingencies and vulnerable lines. Please note that it is possible to identify which contingencies cause overloads in which lines. For example, the most critical line already identified in Figure 4a presents 54 overloads. This is line L115 indicated in the first position of the x-axis. In this case, 20 of the overloads of line L115 are due to the outage of line L45, another 20 are due to the outage of line L64, and the remaining 12 are caused by outages of lines L119 and L120, each of them contributing with 6 overloads. This information is valuable to the system planner who may decide over future reinforcements of the corridor where line L115 is located to reduce its criticality. Furthermore, the mapping of critical contingencies vs. Vulnerable lines can be used for the assessment of generation and transmission expansion plans on the security of the system operation.

4.4. Scalability Evaluation

To show the robustness and flexibility of the proposed approach, several tests were performed with a larger power system. The new test system was built duplicating the original IEEE RTS-96 depicted in Figure 3. The new buses were labeled following the same pattern as the original IEEE RTS-96 (prefixing numbers 4, 5, and 6 for each subsystem). The two power systems were connected through two double circuits at 220 kV between buses 221 and 612 and 114 and 613; each with a transmission capacity of 500 MW and a reactance of 0.084 pu. The TCF was modified by a factor of 1.6 to avoid infeasibilities when evaluating contingencies of the circuits connecting the two power systems. The equivalent test system is composed of 146 buses, 244 lines, 192 generators, and 102 demand sides. Table 4 presents the results with formulations B and C for the new test system. Simulations were performed in an Intel ® Xeon E5 @ 2.40 GHz, 44 cores, and 256 GB memory RAM processor.
According to the results presented in Table 4 formulation C outperforms formulation B in both computation time and quality of the solution found. Formulation C takes approximately 209.7 seconds to find a solution, while formulation B takes 7494 seconds. Please note that in this case a time reduction of 97.2% is achieved when using formulation C. For comparative purposes, the same inGAP was used in both formulations. However, the outGAP of formulation C turned out to be lower than the one reached with formulation B. This might be attributable to the fact that formulation C is more compact than formulation B. The quality of solutions can be verified in the second column of Table 4. It is worth mentioning that for this particular power system, formulation B must deal with a set of 1,446,480 constraints associated with the N-1 criterion, while implementing user cuts only requires 16,511 additional N-1 constraints. This represents a reduction of 98.85% of the number of N-1 constraints when using formulation C. Additional simulations were run using a desktop computer which characteristics are previously described in Section 4. In this case, the solution found with formulation C, takes approximately 15 minutes reaching an objective function of 4.8731 MUSD and an outGAP of 0.00158; however, the same simulation could not be performed with formulation B due to lack of RAM memory. Therefore, an additional decomposition algorithm might be necessary to run formulation B in a desktop computer, which is not required when using formulation C. This further emphasizes the advantage of the proposed approach.

5. Conclusions

This paper presented a new modelling approach of the SCUC problem based on PTDF and LODF LSF and user cuts. On the one hand PTDF are used to model power injection balance constraints, avoiding the use of voltage angles and reducing the number of variables and constraints of the UC formulation. On the other hand, LODF are used to evaluate post-contingency power flows and check overloads quickly and reliably. Finally, user cuts are iteratively added to the base problem to account for security constraints. This is because most security constraints of the SCUC problem are not binding in the optimal solution.
The proposed model uses as starting point a classic UC formulation. Subsequently, security constraints are taken into account through an array that registers whether a given contingency in a given time produces overloads on other lines. If this happens, new security constraints are added as user cut to the current problem. This is done iteratively until no overloads are produced by any contingency.
Several tests performed on a benchmark IEEE power system evidenced the robustness and applicability of the proposed model. The main advantage of considering LSF and user cuts to model the SCUC problem lies on the reduction of computing time. Furthermore, better solutions are found with the proposed model. Results show that time reduction ranges from 53% to 97% when compared with a classic formulation set to reach a solution of similar quality (same inGAP parameters). A scalability test showed that such reduction of computing time increases with the size of the test system. Moreover, decomposition techniques as BD or LR are not needed to efficiently address the SCUC problem.
An additional advantage of the proposed methodology lies on its flexibility and ease of implementation. The proposed approach to deal with the SCUC problem was devised to be solver-independent. Therefore, unlike other research works reported in the specialized literature, it does not depend on built-in functions or callbacks.
A value-added element of the methodology is the identification of the most critical lines and most severe contingencies. The mapping of critical contingencies vs. vulnerable lines can be used for the assessment of generation and transmission expansion plans on the security of the system operation. Finally, the tight and compact modelling proposed in this paper can be used in a future work as a basis for other studies such as the integration of renewable energy resources within a SCUC problem.

Author Contributions

Conceptualization, Á.J.-D., C.C.M.-C., J.E.S.-A., and W.M.V.-A.; Data curation, C.C.M.-C., and J.E.S.-A.; Formal analysis, Á.J.-D., C.C.M.-C., J.E.S.-A., and W.M.V.-A.; Funding acquisition, Á.J.-D. and J.M.L.-L.; Investigation, J.E.S.-A., C.C.M.-C., Á.J.-D., J.M.L.-L. and W.M.V.-A.; Methodology, J.E.S.-A., and C.C.M.-C.; Project administration, Á.J.-D.; Software, C.C.M.-C., and J.E.S.-A.; Validation, C.C.M.-C., and J.E.S.-A.; Visualization, C.C.M.-C., and J.E.S.-A.; Writing—original draft, J.M.L.-L.; Writing—review & editing, W.M.V.-A., J.M.L.-L. and Á.J.-D.

Funding

This research was funded by Colciencias. Project code 1115-745-54929; contract 056-2017; proyect name: “Despacho Económico Multiperiodo Integrando Energías Renovables Intermitentes”.

Acknowledgments

The authors would like to thank Colciencias, Universidad de Antioquia and the Research Group on Efficient Energy Management (GIMEL).

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
SCOPFSecurity-Constraint Optimal Power Flow
UCUnit Commitment
SCUCSecurity-Constrained Unit Commitment
MILPMixed-Integer Linear Programming
PTDFPower Transfer Distribution Factors
LODFLine Outage Distribution Factors

Nomenclature

The nomenclature used in this paper is provided here for quick reference:
Indices
bIndex of generating unit cost curve segments, 1 to B
iIndex of generating units, 1 to I
jIndex of generating unit star-up cost, 1 to K
l, kIndex of lines, 1 to L
s, mIndex of buses, 1 to S
t, ttIndex of hours, 1 to T
Parameters
a i Fixed production cost of generator ($)
B s m Admittance of line connecting nodes s-m (S)
d s ( t ) Demand at bus s (MW)
g i d o w n Minimum down time of generator i (h)
g i u p Minimum up time of generator i (h)
g i d o w n , i n i t Time that generator i has been down before t = 0 (h)
g i u p , i n i t Time that generator i has been up before t = 0 (h)
g i 0 Output if generator i at t = 0 (MW)
g i m a x Rated capacity of generator i (MW)
g i m i n Minimum output of generator i (MW)
g i , b m a x Capacity of segment b of the cost curve of generator i (MW)
g i o n o f f On-Off status of generator i at t = 0 (equal to 1 if g i u p , i n i t > 0 and 0 otherwise)
k i , b Slope of the segment b of the cost curve of generator i ($/MW)
c s h Cost of non-attended demand ($/MW)
A s , i g Generation map for thermal units
F s m m a x Capacity of the line between nodes s and m (MW)
F s , m m a x Capacity of the line between nodes s and m (MW)
T C F Transmission capacity factor
L i d o w n , m i n Length of time the generator i must be off at the start time of the planning horizon (h)
L i u p , m i n Length of time the generator i must be on at the start time of the planning horizon (h)
MLarge number used of linearization - larger than the maximum number of hours a unit can be on or off
r a m p i d o w n Ramp-down limit of generator i (MW/h)
r a m p i u p Ramp-up limit of generator i (MW/h)
S U C i , j c o s t Cost steps in start-up cost curve of generator i ($)
S U C i , j l i m Time steps in start-up cost curve of generator i (h)
P T D F l , s Matrix of Power transfer distribution factors
L O D F l , k Matrix of Line Outage distribution factors
S C R l , k ( t ) Security-Constraint Recorder
L l v Vector of vulnerable lines
L k s Vector of critical contingencies
L l , k c Matrix of vulnerable lines vs. critical contingencies
Variables
C i ( t ) Operating cost of generator i at time t ($)
c o u n t i d o w n Generator i down time period counter
g i ( t ) Generator i output at time t (MW)
g i , b ( t ) Output of generator i of segment b at time t (MW)
L s s h ( t ) Unserved load at bus s at time t (MW)
S U C i ( t ) Start-up cost of generator i at time t ($)
w i , j ( t ) Binary variable equal to 1 if generator i is started at time t after being off for j hours, and 0 otherwise
x i ( t ) Binary variable equal to 1 if the generator i is producing at time t, and 0 otherwise
y i ( t ) Binary variable equal to 1 if the generator i is started at the beginning of time t, and 0 otherwise
z i ( t ) Binary variable equal to 1 if the generator i is shut down at the beginning of time t, and 0 otherwise
θ s ( t ) Voltage angle at bus s (rad)
P s N e t ( t ) Net power injection in bus s at time t (MW)
f l ( t ) Line flow in line l at time t (MW)

Appendix A.

Table A1 and Table A2 present generator cost data and initial conditions of generators, respectively.
Table A1. Generator cost data.
Table A1. Generator cost data.
UnitRangekibRangekibRangekib
Type(MW)($/MW)(MW)($/MW)(MW)($/MW)
15.4–7.629.4537.6–9.830.1209.8–1230.856
28–1228.96712–1629.24316–2029.703
326–3428.31334–4229.25643–5030.498
440–5218.42352–6419.22864–7620.102
540–6017.59060–8018.28080–10018.966
654.24–87.8323.81087.83–121.4124.525121.41–15525.240
7104–13517.193135–16617.708166–19718.225
8140–21026.213210–28026.708280–35027.200
9100–2006.961200–3007.230300–4007.499
Table A2. Initial conditions of generators.
Table A2. Initial conditions of generators.
GOn/offInitGOn/offInitGOn/offInit
1120338206590020
240020348920669020
3220703566706778970
42036660684560
517037660693750
64038660703750
766039660711700
83304010721700
91110041110073170100
102904256907480090
1128043568075250080
1221774456177762500177
1321554556155772500155
1420465607825000
1561247561279100012
167124856128020312
178124998128160012
189050124082460
19505110000832360
20813452100013484236134
2181235310001238564123
2280545008660
2383775550377878377
24847569047889047
25848579004889548
26805890009060
27805990009170
28850609005092850
29850619005093950
30815062900150947150
318063900095660
328064900096550

References

  1. Song, M.; Amelin, M. Purchase Bidding Strategy for a Retailer With Flexible Demands in Day-Ahead Electricity Market. IEEE Trans. Power Syst. 2017, 32, 1839–1850. [Google Scholar] [CrossRef]
  2. Lee, H.; Tekin, C.; van der Schaar, M.; Lee, J. Adaptive Contextual Learning for Unit Commitment in Microgrids with Renewable Energy Sources. IEEE J. Sel. Top. Signal Process. 2018, 12, 688–702. [Google Scholar] [CrossRef]
  3. Li, N.; Hedman, K.W. Economic Assessment of Energy Storage in Systems With High Levels of Renewable Resources. IEEE Trans. Sustain. Energy 2015, 6, 1103–1111. [Google Scholar] [CrossRef]
  4. Carrión, M.; Zárate-Miñano, R.; Domínguez, R. A Practical Formulation for Ex-Ante Scheduling of Energy and Reserve in Renewable-Dominated Power Systems: Case Study of the Iberian Peninsula. Energies 2018, 11, 1939. [Google Scholar] [CrossRef]
  5. Pozo, D.; Contreras, J.; Sauma, E.E. Unit Commitment With Ideal and Generic Energy Storage Units. IEEE Trans. Power Syst. 2014, 29, 2974–2984. [Google Scholar] [CrossRef]
  6. Lv, M.; Lou, S.; Wu, Y.; Miao, M. Unit Commitment of a Power System Including Battery Swap Stations Under a Low-Carbon Economy. Energies 2018, 11, 1898. [Google Scholar] [CrossRef]
  7. Pandžić, H.; Dvorkin, Y.; Qiu, T.; Wang, Y.; Kirschen, D.S. Toward Cost-Efficient and Reliable Unit Commitment Under Uncertainty. IEEE Trans. Power Syst. 2016, 31, 970–982. [Google Scholar] [CrossRef]
  8. Zhao, B.; Conejo, A.J.; Sioshansi, R. Unit Commitment Under Gas-Supply Uncertainty and Gas-Price Variability. IEEE Trans. Power Syst. 2017, 32, 2394–2405. [Google Scholar] [CrossRef]
  9. Tejada-Arango, D.A.; Sánchez-Martın, P.; Ramos, A. Security Constrained Unit Commitment Using Line Outage Distribution Factors. IEEE Trans. Power Syst. 2018, 33, 329–337. [Google Scholar] [CrossRef]
  10. Zhai, Q.; Guan, X.; Cheng, J.; Wu, H. Fast Identification of Inactive Security Constraints in SCUC Problems. IEEE Trans. Power Syst. 2010, 25, 1946–1954. [Google Scholar] [CrossRef]
  11. Fu, Y.; Shahidehpour, M.; Li, Z. Long-term security-constrained unit commitment: hybrid Dantzig-Wolfe decomposition and subgradient approach. IEEE Trans. Power Syst. 2005, 20, 2093–2106. [Google Scholar] [CrossRef]
  12. Al-Agtash, S. Hydrothermal scheduling by augmented Lagrangian: consideration of transmission constraints and pumped-storage units. IEEE Trans. Power Syst. 2001, 16, 750–756. [Google Scholar] [CrossRef]
  13. Guan, X.; Guo, S.; Zhai, Q. The conditions for obtaining feasible solutions to security-constrained unit commitment problems. IEEE Trans. Power Syst. 2005, 20, 1746–1756. [Google Scholar] [CrossRef]
  14. Lu, B.; Shahidehpour, M. Unit commitment with flexible generating units. IEEE Trans. Power Syst. 2005, 20, 1022–1034. [Google Scholar] [CrossRef]
  15. Martinez-Crespo, J.; Usaola, J.; Fernandez, J.L. Security-constrained optimal generation scheduling in large-scale power systems. IEEE Trans. Power Syst. 2006, 21, 321–332. [Google Scholar] [CrossRef]
  16. Fu, Y.; Shahidehpour, M. Fast SCUC for Large-Scale Power Systems. IEEE Trans. Power Syst. 2007, 22, 2144–2151. [Google Scholar] [CrossRef]
  17. Alemany, J.; Magnago, F. Benders decomposition applied to security constrained unit commitment: Initialization of the algorithm. Int. J. Electr. Power Energy Syst. 2015, 66, 53–66. [Google Scholar] [CrossRef]
  18. Guan, X.; Zhai, Q.; Papalexopoulos, A. Optimization based methods for unit commitment: Lagrangian relaxation versus general mixed integer programming. In Proceedings of the 2003 IEEE Power Engineering Society General Meeting (IEEE Cat. No.03CH37491), Toronto, ON, Canada, 13–17 July 2003; Volume 2, pp. 1095–1100. [Google Scholar] [CrossRef]
  19. Bragin, M.A.; Luh, P.B.; Yan, J.H.; Stern, G.A. Novel exploitation of convex hull invariance for solving unit commitment by using surrogate Lagrangian relaxation and branch-and-cut. In Proceedings of the 2015 IEEE Power Energy Society General Meeting, Denver, Colorado, 26–30 July 2015; pp. 1–5. [Google Scholar] [CrossRef]
  20. Swarup, K.S.; Yamashiro, S. Unit commitment solution methodology using genetic algorithm. IEEE Trans. Power Syst. 2002, 17, 87–91. [Google Scholar] [CrossRef]
  21. Senjyu, T.; Yamashiro, H.; Shimabukuro, K.; Uezato, K.; Funabashi, T. Fast solution technique for large-scale unit commitment problem using genetic algorithm. IEE Proc. Gener. Trans. Distrib. 2003, 150, 753–760. [Google Scholar] [CrossRef]
  22. Aghdam, F.H.; Hagh, M.T. Security Constrained Unit Commitment (SCUC) formulation and its solving with Modified Imperialist Competitive Algorithm (MICA). J. King Saud Univ. Eng. Sci. 2017. [Google Scholar] [CrossRef]
  23. Roque, L.A.C.; Fontes, D.B.M.M.; Fontes, F.A.C.C. A Metaheuristic Approach to the Multi-Objective Unit Commitment Problem Combining Economic and Environmental Criteria. Energies 2017, 10, 2029. [Google Scholar] [CrossRef]
  24. Jo, K.H.; Kim, M.K. Improved Genetic Algorithm-Based Unit Commitment Considering Uncertainty Integration Method. Energies 2018, 11, 1387. [Google Scholar] [CrossRef]
  25. Zhao, J.; Liu, S.; Zhou, M.; Guo, X.; Qi, L. An Improved Binary Cuckoo Search Algorithm for Solving Unit Commitment Problems: Methodological Description. IEEE Access 2018, 6, 43535–43545. [Google Scholar] [CrossRef]
  26. Singhal, P.K.; Naresh, R.; Sharma, V. Binary fish swarm algorithm for profit-based unit commitment problem in competitive electricity market with ramp rate constraints. IET Gener. Trans. Distrib. 2015, 9, 1697–1707. [Google Scholar] [CrossRef]
  27. Trivedi, A.; Srinivasan, D.; Pal, K.; Saha, C.; Reindl, T. Enhanced Multiobjective Evolutionary Algorithm Based on Decomposition for Solving the Unit Commitment Problem. IEEE Trans. Ind. Inform. 2015, 11, 1346–1357. [Google Scholar] [CrossRef]
  28. Arora, V.; Chanana, S. Solution to unit commitment problem using Lagrangian relaxation and Mendel’s GA method. In Proceedings of the 2016 International Conference on Emerging Trends in Electrical Electronics Sustainable Energy Systems (ICETEESES), Sultanpur, India, 11–12 March 2016; pp. 126–129. [Google Scholar] [CrossRef]
  29. Pandžić, H.; Qiu, T.; Kirschen, D.S. Comparison of state-of-the-art transmission constrained unit commitment formulations. In Proceedings of the 2013 IEEE Power Energy Society General Meeting, Vancouver, BC, USA, 21–25 July 2013; pp. 1–5. [Google Scholar] [CrossRef]
  30. Bhardwaj, A.; Kamboj, V.K.; Shukla, V.K.; Singh, B.; Khurana, P. Unit commitment in electrical power system-a literature review. In Proceedings of the 2012 IEEE International Power Engineering and Optimization Conference, Melaka, Malaysia, 6–7 June 2012; pp. 275–280. [Google Scholar] [CrossRef]
  31. Zheng, Q.P.; Wang, J.; Liu, A.L. Stochastic Optimization for Unit Commitment—A Review. IEEE Trans. Power Syst. 2015, 30, 1913–1924. [Google Scholar] [CrossRef]
  32. Jurković, K.; Pandšić, H.; Kuzle, I. Review on unit commitment under uncertainty approaches. In Proceedings of the 2015 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatija, Croatia, 25–29 May 2015; pp. 1093–1097. [Google Scholar] [CrossRef]
  33. Wu, H.; Guan, X.; Zhai, Q.; Ye, H. A Systematic Method for Constructing Feasible Solution to SCUC Problem With Analytical Feasibility Conditions. IEEE Trans. Power Syst. 2012, 27, 526–534. [Google Scholar] [CrossRef]
  34. Ardakani, A.J.; Bouffard, F. Identification of Umbrella Constraints in DC-Based Security-Constrained Optimal Power Flow. IEEE Trans. Power Syst. 2013, 28, 3924–3934. [Google Scholar] [CrossRef]
  35. Capitanescu, F.; Glavic, M.; Ernst, D.; Wehenkel, L. Contingency Filtering Techniques for Preventive Security-Constrained Optimal Power Flow. IEEE Trans. Power Syst. 2007, 22, 1690–1697. [Google Scholar] [CrossRef] [Green Version]
  36. Fu, Y.; Shahidehpour, M.; Li, Z. Security-constrained unit commitment with AC constraints. IEEE Trans. Power Syst. 2005, 20, 1538–1550. [Google Scholar] [CrossRef]
  37. Fu, Y.; Shahidehpour, M.; Li, Z. AC contingency dispatch based on security-constrained unit commitment. IEEE Trans. Power Syst. 2006, 21, 897–908. [Google Scholar] [CrossRef]
  38. Bragin, M.A.; Luh, P.B.; Yan, J.H.; Stern, G.A. An efficient approach for Unit Commitment and Economic Dispatch with combined cycle units and AC Power Flow. In Proceedings of the 2016 IEEE Power and Energy Society General Meeting (PESGM), Boston, MA, USA, 17–21 July 2016; pp. 1–5. [Google Scholar] [CrossRef]
  39. Guler, T.; Gross, G.; Liu, M. Generalized Line Outage Distribution Factors. IEEE Trans. Power Syst. 2007, 22, 879–881. [Google Scholar] [CrossRef]
  40. Leveringhaus, T.; Hofmann, L. Comparison of methods for state prediction: Power Flow Decomposition (PFD), AC Power Transfer Distribution factors (AC-PTDFs), and Power Transfer Distribution factors (PTDFs). In Proceedings of the 2014 IEEE PES Asia-Pacific Power and Energy Engineering Conference (APPEEC), Kowloon, Hong Kong, 7–10 December 2014; pp. 1–6. [Google Scholar] [CrossRef]
  41. Song, C.S.; Park, C.H.; Yoon, M.; Jang, G. Implementation of PTDFs and LODFs for Power System Security. J. Int. Counc. Electr. Eng. 2011, 1, 49–53. [Google Scholar] [CrossRef]
  42. Chen, Y.C.; Domínguez-García, A.D.; Sauer, P.W. Measurement-Based Estimation of Linear Sensitivity Distribution Factors and Applications. IEEE Trans. Power Syst. 2014, 29, 1372–1382. [Google Scholar] [CrossRef]
  43. Eslami, M.; Moghadam, H.A.; Zayandehroodi, H.; Ghadimi, N. A New Formulation to Reduce the Number of Variables and Constraints to Expedite SCUC in Bulky Power Systems. Proc. Natl. Acad. Sci. India Sect. A Phys. Sci. 2018. [Google Scholar] [CrossRef]
  44. Wood, A.J.; Wollenberg, B.F.; Sheble, G.B. Power Generation, Operation, and Control; Wiley-IEEE Press: Piscataway, NJ, USA, 2013. [Google Scholar]
  45. Pandzic, H.; Dvorkin, Y.; Qiu, T.; Wang, Y.; Kirschen, D. Unit Commitment under Uncertainty—GAMS Models; Library of the Renewable Energy Analysis Lab (REAL), University of Washington: Seattle, DC, USA; Available online: https://www2.ee.washington.edu/research/real/gams_code.html (accessed on 27 February 2019).
  46. IBM®-IBM Knowledge Center. Differences between User Cuts and Lazy Constraints. 2014. Available online: https://www.ibm.com/support/knowledgecenter/SSSA5P_12.6.1/ilog.odms.cplex.help/CPLEX/UsrMan/topics/progr_adv/usr_cut_lazy_constr/04_diffs.html (accessed on 15 February 2019).
  47. IceMerman. Unit Commitment with User Cuts Implementation. 2019. Available online: https://github.com/IceMerman/SCUC-UserCuts (accessed on 1 March 2019).
Figure 1. Illustration of user cuts.
Figure 1. Illustration of user cuts.
Energies 12 01399 g001
Figure 2. Flowchart of the algorithm for adding security constraints as user cuts.
Figure 2. Flowchart of the algorithm for adding security constraints as user cuts.
Energies 12 01399 g002
Figure 3. Test system under study (IEEE RTS-96).
Figure 3. Test system under study (IEEE RTS-96).
Energies 12 01399 g003
Figure 4. Vulnerable lines and critical contingencies considering TCF = 0.8.
Figure 4. Vulnerable lines and critical contingencies considering TCF = 0.8.
Energies 12 01399 g004
Figure 5. Mapping of vulnerable lines and critical contingencies considering TCF = 0.8.
Figure 5. Mapping of vulnerable lines and critical contingencies considering TCF = 0.8.
Energies 12 01399 g005
Table 1. Formulations of the SCUC problem.
Table 1. Formulations of the SCUC problem.
FormulationDescription
AConventional network formulation given by Equations (9)–(29)
Contingency constraints computed using LODF (Equation (33))
BNetwork formulation using PTDF (Equations (26) to (29) are replaced by Equations (30) to (32)
Contingency constraints computed using LODF (Equation (33)
CNetwork formulation using PTDF (Equations (26) to (29) are replaced by Equations (30) to (32)
Contingency constraints computed using LODF (Equation (33)
Implementation of user cuts as described in Section 3.1
Table 2. Results obtained for different formulations of the SCUC problem.
Table 2. Results obtained for different formulations of the SCUC problem.
FormulationObjective Function [M$]Time [s]inGAPoutGAP
TCF = 1TCF = 0.8 TCF = 1TCF = 0.8 TCF = 1TCF = 0.8 TCF = 1TCF = 0.8
A 2.6968 2.7024 1220519 0.0010 0.0050 0.00250 0.00480
B 2.6943 2.7041 1209345 0.0010 0.0050 0.00109 0.00490
C 2.6940 2.7016 169321 0.0010 0.0050 0.0010 0.00430
B* 2.6970 2.7024 495687 0.00254 0.0045 0.00254 0.00437
Table 3. Performance of the SCUC formulation (TCF = 0.8 and inGAP = 0.005).
Table 3. Performance of the SCUC formulation (TCF = 0.8 and inGAP = 0.005).
IterationAdded Constraints
N-1
Elapsed Time of Simulation
[s]
Objective Function
[M$]
1-25 2.6947
26866 2.6986
32187 2.6980
4753 2.7021
52757 2.7025
62133 2.7016
total144321-
Table 4. Results obtained for scaled test system.
Table 4. Results obtained for scaled test system.
FormulationObjective Function [M$]Time [s]inGAPoutGAP
B4.87487494.0010.010.00178
C4.8701209.6870.010.00100

Share and Cite

MDPI and ACS Style

Marín-Cano, C.C.; Sierra-Aguilar, J.E.; López-Lezama, J.M.; Jaramillo-Duque, Á.; Villa-Acevedo, W.M. Implementation of User Cuts and Linear Sensitivity Factors to Improve the Computational Performance of the Security-Constrained Unit Commitment Problem. Energies 2019, 12, 1399. https://doi.org/10.3390/en12071399

AMA Style

Marín-Cano CC, Sierra-Aguilar JE, López-Lezama JM, Jaramillo-Duque Á, Villa-Acevedo WM. Implementation of User Cuts and Linear Sensitivity Factors to Improve the Computational Performance of the Security-Constrained Unit Commitment Problem. Energies. 2019; 12(7):1399. https://doi.org/10.3390/en12071399

Chicago/Turabian Style

Marín-Cano, Cristian Camilo, Juan Esteban Sierra-Aguilar, Jesús M. López-Lezama, Álvaro Jaramillo-Duque, and Walter M. Villa-Acevedo. 2019. "Implementation of User Cuts and Linear Sensitivity Factors to Improve the Computational Performance of the Security-Constrained Unit Commitment Problem" Energies 12, no. 7: 1399. https://doi.org/10.3390/en12071399

APA Style

Marín-Cano, C. C., Sierra-Aguilar, J. E., López-Lezama, J. M., Jaramillo-Duque, Á., & Villa-Acevedo, W. M. (2019). Implementation of User Cuts and Linear Sensitivity Factors to Improve the Computational Performance of the Security-Constrained Unit Commitment Problem. Energies, 12(7), 1399. https://doi.org/10.3390/en12071399

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop