Download as pdf or txt
Download as pdf or txt
You are on page 1of 14

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/350160482

A Fast Decomposition Method to Solve a Security-Constrained Optimal Power


Flow (SCOPF) Problem Through Constraint Handling

Article in IEEE Access · March 2021


DOI: 10.1109/ACCESS.2021.3067206

CITATIONS READS

8 295

7 authors, including:

Daniel Agudelo-Martínez Dario Mateo Arango Angarita

13 PUBLICATIONS 101 CITATIONS


National University of Colombia
5 PUBLICATIONS 21 CITATIONS
SEE PROFILE
SEE PROFILE

Sergio Rivera Diego Rodriguez


National University of Colombia Central University (Colombia)
163 PUBLICATIONS 866 CITATIONS 8 PUBLICATIONS 22 CITATIONS

SEE PROFILE SEE PROFILE

All content following this page was uploaded by Sergio Rivera on 20 March 2021.

The user has requested enhancement of the downloaded file.


This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2021.3067206, IEEE Access

Date of publication xxxx 00, 0000, date of current version xxxx 00, 0000.
Digital Object Identifier

A Fast Decomposition Method to Solve a


Security-Constrained Optimal Power
Flow (SCOPF) Problem Through
Constraint Handling
TOMÁS VALENCIA1 , DANIEL AGUDELO-MARTINEZ1,2 , DARIO ARANGO1,2 , CAMILO
ACOSTA1 , SERGIO RIVERA2 ,(Senior Member, IEEE) DIEGO
RODRÍGUEZ1,2 ,( MEMBER, IEEE), AND JUAN GERS1 ,(Senior Member, IEEE)
1
GERS USA, Weston, FL 33331, USA
2
Electrical Engineering Department, Universidad Nacional de Colombia, Bogotá 110111, Colombia

The information, data, or work presented herein was funded in part by the Advanced Research Projects Agency-Energy (ARPA-E), U.S.
Department of Energy, under Award Number DE-AR0001090. The views and opinions of authors expressed herein do not necessarily state
or reflect those of the United States Government or any agency thereof.

ABSTRACT This paper presents a decomposition methodology using constraint handling rules to improve
the computation time of a security-constrained optimal power flow (SCOPF) problem. In order to evaluate
methodology performance, tests over small (500 buses), medium (4,918 buses), and large scale (11,615
buses) transmission networks were carried out. The methodology consisted in the decomposition of the
SCOPF problem into a base case problem and contingency sub-problems using constraint handling rules to
solve the complete problem in an iterative fashion. The first stage involved solving an OPF problem using a
base case network. The second stage dealt with the modification of the initial base case by updating some of
the constraint limits according to the evaluation of potentially relevant contingencies. The entire algorithm
resorted to parallel computing tools. The methodology, along with active power re-dispatch through droop
control and PV/PQ switching in post-contingency scenarios, successfully solved the tested networks with
the set of proposed constraints.

INDEX TERMS Security-constrained optimal power flow (SCOPF); real-time optimal power flow
(OPF); interior point method; parallel processing; Constraint handling; Matpower; Interior Point Optimizer
(IPOPT)

I. INTRODUCTION Alternating Direction Multipliers Method -ADMM, Aug-


HE security-constrained optimal power flow (SCOPF) mented Lagrangian Method -ALM, Benders Decomposition
T problem aims to find an optimal operating cost of power
systems while ensuring security criteria (usually N-1) from
-BD, etc) and the screening of most relevant contingencies,
among others. These strategies usually yield accurate results
a plausible set of contingencies [1]–[5]. SCOPF is a non- and relatively low computational burden for electrical net-
linear, non-convex, static, large-scale optimization problem works considered small, i.e. equivalent networks with few
that might also have integer decision variables (generally buses, branches and elements. However, the implementation
known as a Mixed Integer Nonlinear Programming -MINLP- of these strategies might oversimplify the original prob-
optimization problem) [3], [4], [6], [7]. lem (linearization, quadratic optimization) or require time-
consuming algorithms that are not suitable for fast, online
Many different strategies have been explored in the litera- applications.
ture to make the SCOPF optimization problem more tractable
from a computational point of view. Some of them transform In order to solve the SCOPF problem for medium- and
the original problem by using linearization, convexification large-size networks in an online time frame (less than an
(e.g. quadratic optimization), decomposition strategies (e.g. hour), this paper presents a computationally-efficient fast

VOLUME 4, 2016 1

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2021.3067206, IEEE Access

Tomás Valencia et al.: A Fast Decomposition Method for Solving a SCOPF Problem Through Constraint Handling

decomposition strategy that relies on the constraint handling sponse to contingencies (e.g. active power of generators
of the original, time-consuming SCOPF problem by also participating in frequency control, automatic tap-changers,
using parallel computation tools. The main contributions of reactor banks switching and secondary voltage control) [3],
the proposed methodology are summarized as follows: [11]. Examples of P-SCOPF implementation can be found
• This methodology solves the SCOPF problem in an e.g. in [10], [13]. Its major drawbacks are the resulting
iterative way by modifying the constraint limits of the high operating cost due to the over-tightened feasible region
base case network. (conservative solution) and a high computation time as a
• Complementary constraints such as area Spin Reserve consequence of a large number of contingencies [5], [7], [11],
and AGC control are included for feasibility purposes. [14], [15].
• A set of rules for contingency filtering is proposed to In contrast, C-SCOPF allows the system operator to re-
reduce computation time. adjust control variables after a contingency actually occurs
• The evaluation of each contingency is performed by to eliminate any violations caused by the evaluated contin-
solving a power flow problem. This approach performs gencies [5], [7]. This is based on the fact that some power
faster than decomposition approaches, which may re- system components (i.e. transmission lines and transformers)
quire the solution of an optimization problem for each would not be affected by short period violations [5], [7].
contingency. Examples of C-SCOPF implementation can be found e.g. in
• The methodology also resorts to power re-dispatch and [2], [7], [10]. However, most of the proposed formulations for
PV/PQ switching algorithms during the evaluation of the C-SCOPF problem have not considered the active power
each contingency. droop control, the PV/PQ switching, the lack of modeling
The rest of the paper is organized as follows. Section of possible corrective control failures, neither the cost of the
III presents the complete formulation of the SCOPF prob- overall corrective actions [14]–[16].
lem and explains the proposed approach to address it. The Other SCOPF models include risk assessment [1], [17],
methodology and flow diagrams of the implemented al- [18], time constraints [19], and stochastic models [14], [16].
gorithms are described in Section IV. Sections V and VI However, many of these models must tackle computational
describe the results obtained and the corresponding discus- limitations (e.g. computation time and memory) when solv-
sion. Finally, Section VII presents the conclusions and future ing the SCOPF problem by considering medium- and large-
works based on this research. scale networks as well as a large number of contingencies [7],
[16].
II. SECURITY-CONSTRAINED OPF: AN OVERVIEW
The importance of a fast and optimal (or near-optimal) B. STRATEGIES TO SOLVE THE SCOPF PROBLEM
solution to the OPF and SCOPF problems is stressed by 1) Linearization and Convexification
organizations such as the North American Electric Reliability
The DC-OPF approximation is the most common lineariza-
Corporation (NERC) and the Federal Energy Regulatory
tion technique to solve the SCOPF problem [8], [13], [17],
Commission (FERC) [6], [8], [9]. The latter stated that a 5%
[20]. However, the linear approximation may be inaccurate
increase in the efficiency of the algorithms for OPF will yield
when using reactive power control variables (shunt reactance,
six billion dollars in savings per year in the United States
voltage at generator buses) or under highly loaded condi-
alone [9]. However, in addition to the complexity of the
tions [3]. Some linearization techniques act directly on the
SCOPF optimization problem, computational burden hugely
objective function [17] and others include the Successive
increases when large-scale networks and many contingen-
Linear Programming (SLP) method [2]. Other power system
cies are evaluated [10], [11], making an NP-Hard problem
approaches, include transformation of power system data as
the worst case [12]. For these reasons, the optimal global
power measurements to include quasi-real variable magni-
condition for the SCOPF problem cannot be ensured in its
tudes that allows real and reactive power decoupling to speed
generic formulation with constrained time [2]. The general
up solution in quadratic optimization problems [21].
classification and the strategies found in the literature to
solve the SCOPF problem are described in the following
subsections. 2) Decomposition strategies
These strategies have been proposed to divide optimiza-
A. CLASSIFICATION OF THE SCOPF PROBLEM tion problems into subproblems that can be solved easily
The security-constrained OPF problem can be addressed using e.g. parallel computation tools. The most commonly
through the preventive (P-SCOPF) and the corrective (C- used algorithms include the Augmented Lagrangian Method
SCOPF) approaches, or a combination of both (PC-SCOPF). (ALM), Alternating Direction Multipliers Method (ADMM),
The preventive and corrective models aim to find a minimum and Benders Decomposition (BD).
cost of operation that is also feasible for all the considered ALM in [22] was used to solve a distributed OPF, while
contingencies [5], [7]. in [23] it was used to solve the reactive OPF from network
P-SCOPF considers no corrective actions in post- splitting. However, its application to the SCOPF has not been
contingency states other than those with an automatic re- implemented yet.
2 VOLUME 4, 2016

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2021.3067206, IEEE Access

Tomás Valencia et al.: A Fast Decomposition Method for Solving a SCOPF Problem Through Constraint Handling

ADMM has been widely used because it allows the total which took too long for a real time approach. EA was used in
problem to be divided and makes it parallelizable and easy to [14] for contingency filtering, but it demanded a full iteration
implement. This method was used in [17], [22], [24] to solve to identify insecure contingencies. In [2], vulnerability and
an OPF. The ADMM was also implemented in [5] to solve a critical measures were used to select the relevant contingen-
C-SCOPF by testing a set of networks of up to 3,012 buses. cies in the problem. However, it is necessary to evaluate a
However, the number of contingencies and the time to reach a power flow for each contingency to carry out this selection,
solution was not promising for a real time requirement (3,582 so it makes it infeasible in real time.
seconds for 4 contingencies).
BD was presented in [10] as an appropriate methodology III. FORMULATION OF THE SCOPF PROBLEM
to divide the C-SCOPF problem, but it was applied only A. COMPLETE FORMULATION
for a 6-bus network. In [1], [6] a 118-bus and 2,351-bus The SCOPF problem [32] is focused on minimizing the total
systems were validated, but using a DC model of power cost Ctot :
flow equations. In [5] BD was also used in a 3,012-bus
network, but it considered only 4 contingencies and took
  
1,165 seconds to reach the solution. [25] showed results for  X  1 − δ X σ
min(Ctot ) = min  cg + δcσ + ck 
systems of 2,312 and 3,013 buses and up to 990 contingencies |K|
g∈G k∈SC
using BD. k6=0
(1)
3) Optimization techniques where G is the set of generators, cg is the generation cost
Both the OPF and SCOPF are non-convex problems. There- of generator g, cσ is the total constraint violation penalty in
fore, it is not possible to ensure a global minimum through base case and cσk is the total constraint violation penalty in
mathematical programming [26]. Different attempts have contingency k. K is the set of all contingencies. δ is a weight
been made to reach solutions close to the global minimum assigned to the penalty cost in the base case.
through genetic (GA), metaheuristic (MA), and machine For all constraints, the lower and upper bounds of the
learning algorithms. Strategies such as the earthworm op- variable x are denoted respectively as x and x. On the other
timization algorithm, firefly algorithm tuned through fuzzy hand sc denotes a particular scenario of the set SC:
logic, and approaches based on historical data are described
in [27]–[29] to solve OPF. However, the size of the networks SC = {0, 1, 2, 3, ..., |K| − 1, |K|} (2)
analyzed does not exceed 300 buses and the number of where sc = 0 means the base case and sc = i with
iterations to reach the solution through these strategies cannot i > 0 denotes the i-th scenario, which corresponds to the
be ensured. occurrence of the i-th contingency. For the context of this
Several works have tried to solve non-convex problems paper, a contingency means the outage of one of the fol-
through a hybrid optimization strategy. For example, the lowing elements, one at a time (n-1 contingency): branches
OPF problem in [26] was solved through GA to group the (transmission lines, transformers) and generators.
chromosomes in a search space close to the absolute mini- The bounds of the decision variables are:
mum, and then a continuous Newton-Rhapson method was
used to mathematically reach the global minimum; however, vi ≤ vi ≤ vi ∀i ∈ I sc ∧ ∀sc ∈ SC (3)
overload constraints were not considered. In [7], ALM and
ADMM were used to solve the SCOPF in DC. In [14], BD where I sc is the set of active buses in scenario sc. vi is the
was used to solve PC-SCOPF along with an Evolutionary Al- voltage magnitude on bus i.
gorithm (EA) to select the relevant contingencies; however,
only a 118-bus system was tested. pg ≤ pg ≤ pg ∀g ∈ Gsc ∧ ∀sc ∈ SC (4)

4) Contingency Screening qg ≤ qg ≤ qg ∀g ∈ Gsc ∧ ∀sc ∈ SC (5)


Another strategy widely used to reduce the size of the SCOPF
problem is the contingency filtering [3], [4]. For example, where Gsc is the set of active generators in scenario sc. pg
in [30] the umbrella contingencies method was used to and qg are the active and reactive power of generator g.
select the most relevant contingencies taking into account The considered transmission lines overload constraints
the magnitude of the Lagrangian multipliers associated with are:
the post-contingency balance constraints. The disadvantage
of this approach is that it is necessary to solve the SCOPF p
(poe )2 + (qeo )2 ≤ Re vioe + σesc,s ∀e ∈ E sc ∧ ∀sc ∈ SC
first, which makes it infeasible in real time. In [31] a method (6)
for contingency evaluation in real time was proposed using
weighted digraphs and the central eigenvector of the Lapla- q
cian matrix. However, the Laplacian matrix was filled based (pde )2 + (qed )2 ≤ Re vide + σesc,s ∀e ∈ E sc ∧ ∀sc ∈ SC
on the number of overloads caused by the outaged lines, (7)
VOLUME 4, 2016 3

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2021.3067206, IEEE Access

Tomás Valencia et al.: A Fast Decomposition Method for Solving a SCOPF Problem Through Constraint Handling

σesc,s ≥ 0 ∀sc ∈ SC (8) X


sc
X
qg − qLi
− (−bsc sc 2
f si − bcsi )vi − qeo −
wherein poe , qeo , pde and qed are the active (p) and reactive g∈Gsc
i e∈Eisc,o
(q) power at both ends of line e; superscript o denotes the
X X X
qed − qfo − qfd = (16)
origin bus, d the destination bus. E sc is the set of active f ∈Fisc,o
e∈Eisc,d f ∈Fisc,d
transmission lines in scenario sc. vioe and vide are the voltage
magnitudes at the origin and destination buses respectively σisc,Q+ − σisc,Q− ∀i ∈ I sc ∧ ∀sc ∈ SC
for the line e. Re is the maximal allowed current in line e
expressed in MVA at rated voltage. σesc,s is a slack variable σisc,Q+ ≥ 0 ∀i ∈ I sc ∧ ∀sc ∈ SC (17)
that accommodates the current in excess of line e’s capacity
and is used for penalty calculation, for scenario sc. σisc,Q− ≥ 0 ∀i ∈ I sc ∧ ∀sc ∈ SC (18)
The considered transformers overload constraints were the
following: for reactive power respectively.
where psc sc
Li and qLi are the active and reactive load power
q on bus i in scenario sc. gfscsi and bsc
f si are the conductance and
(pof )2 + (qfo )2 ≤ sf + σfsc,s ∀f ∈ F sc ∧ ∀sc ∈ SC susceptance of the fixed shunts on bus i in scenario sc. E sc,o
(9) and E sc,d are the set of active lines in scenario sc that have
bus i as the origin and destination buses respectively. F sc,o
q and F sc,d are the set of active transformers in scenario sc that
(pdf )2 + (qfd )2 ≤ sf + σfsc,s ∀f ∈ F sc ∧ ∀sc ∈ SC have bus i as the origin and destination buses respectively.
(10) σisc,P + and σisc,P − (σisc,Q+ and σisc,Q− ) are slack vari-
ables for the positive and negative parts of the violation of
σfsc,s ≥ 0 ∀sc ∈ SC (11) active (reactive) power balance for bus i in scenario sc.
wherein pof , qfo , pdf and qfd are the active (p) and reactive An area spin reserve constraint was considered to prevent
(q) power at both ends of transformer f ; superscript o denotes the lack of power when generation contingencies occur.
the origin bus, d the destination bus. F sc is the set of X
transformers in scenario sc . The apparent power rating is (P g − Pg ) + σA ≥ maxg∈(χ T A) P g (19)
defined as S f for transformer f . σfsc,s is a slack variable that g∈A

accommodates the apparent power in excess of transformer where χ is the set of all generators that appear in at least
f ’s capacity and is used for penalty calculation, for scenario one contingency and σA is an area spin reserve slack variable
sc. for each affected area A in the base case.
The commutable shunts were modeled as generators with The penalization cost of Eq. 1 for scenario sc is computed
null real power. The reactive power constraints were consid- according to the defined slack variables as follows:
ered as:
αp (σisc,P + + σisc,P − ) +
X X
σ
Csc = αq (σisc,Q+ + σisc,Q− )
bcs 2 cs cs 2
i vi ≤ qi ≤ bi vi ∀i ∈ I sc ∧ ∀sc ∈ SC (12) X
i∈I
X
i∈I

+ αef (σfsc,s ) + αef (σesc,s ) + ασ σA,sc


where qics and bcsi are the reactive power and the suscep- f ∈F e∈E
tance value of the commutable shunt on bus i respectively (if (20)
it has one). vi is the voltage magnitude on the same bus.
The considered power balance constraints are: The total penalty cost for constraints violation in the base
case and in contingencies is given by a piece-wise, linear
X X cost function composed by three regions: small, medium and
pg − psc sc 2
Li − gf si vi − poe − high penalty values for minor, medium and large amounts
g∈Gsc
i e∈Eisc,o of constraint violations respectively. This penalty cost was
only related to soft-constraint violations, i.e. all constraints
X X X
pde − pof − pdf = (13)
f ∈Fisc,o
using slack variables (soft-constraint violation variables).
e∈Eisc,d f ∈Fisc,d
Soft-constraints play a relevant role in optimization problems
σisc,P + − σisc,P − ∀i ∈ I sc ∧ ∀sc ∈ SC since they allow feasible OPF solutions [33]. Similarly, they
represent short time violations that are normally managed
σisc,P + ≥ 0 ∀i ∈ I sc ∧ ∀sc ∈ SC (14) by power system operators in near real-time. In this sense,
the total penalty cost includes penalties for violations of line
σisc,P − ≥ 0 ∀i ∈ I sc ∧ ∀sc ∈ SC (15) apparent current ratings (lines overloading), and penalties
for violations of transformer apparent power ratings (trans-
for active power, and formers overloading). On the other hand, bus voltages and
4 VOLUME 4, 2016

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2021.3067206, IEEE Access

Tomás Valencia et al.: A Fast Decomposition Method for Solving a SCOPF Problem Through Constraint Handling

generated active and reactive power belonged to the set


of hard constraints. Any hard-constraint violation leads to pg (m) ≤ pg ≤ pg (m) ∀g ∈ G (25)
considering the final solution as infeasible.
According to secondary frequency regulation in multi-area
systems, each control area should be able to maintain the qg (m) ≤ qg ≤ qg (m) ∀g ∈ G (26)
frequency according to participation factors predefined by the
network operator [34]. After the contingency has occurred p
in steady state, the active power generated in the sc > 0 (poe )2 + (qeo )2 ≤ Re (m)vioe + σes ∀e ∈ E (27)
scenario must be satisfied for each generator g of the affected
area: q
(pde )2 + (qed )2 ≤ Re (m)vide + σes ∀e ∈ E (28)
if Pg0 + ag ∆P sc ≤ Pg

 Pg
Pgsc = P 0 + ag ∆P sc if Pg ≤ Pg0 + ag ∆P sc ≤ Pg
 g q
Pg if Pg0 + ag ∆P sc ≥ Pg (pof )2 + (qfo )2 ≤ sf (m) + σfs ∀f ∈ F (29)
(21)
where Pgsc is the real power of the g generator in the
affected area to the sc contingency. ag is the participation
q
(pdf )2 + (qfd )2 ≤ sf (m) + σfs ∀f ∈ F (30)
factor of the generator g. Pg0 is the active power of the
generator g in the base case, ∆P sc is the difference of real
cs
generation between the base case and the sc contingency. bcs 2 cs 2
i vi ≤ qi ≤ bi vi ∀i ∈ I (31)
The PV/PQ switching is performed according to voltage
stability criteria when sc > 0. In principle, the voltage
control tries to maintain the pre-fault voltage magnitude X X X
pg − pL FS 2
i − gi vi − poe − pde −
unless reactive limits are violated [35]: g∈Gi e∈Ei0 e∈Eid

sc 0
(32)
if Qg ≤ Qsc
X X
 Vg = Vg
 g ≤ Qg pof − pdf = σiP + − σiP −
Vg ≤ Vg ≤ Vg if Qsc
sc 0
g = Q g (22) f ∈Fio f ∈Fid
 V 0 ≤ V sc ≤ V if Qsc = Q

g g g g g
X X X
Where Qscg is the reactive power generated variable in the
qg − qiL − (−bF
i
S
− bCS 2
i )vi − qeo − qed −
contingency sc, Vg0 and Vgsc are voltage magnitude variables g∈Gi e∈Ei0 e∈Eid
in the generators in the base case and contingency sc, respec-
X X
qfo − qfd = σiQ+ − σiQ−
tively. f ∈Fio f ∈Fid
(33)
B. PROPOSED APPROACH
Considering the set of constraints corresponding to each X
contingency is a computationally demanding problem when (P g (m) − Pg ) + σA ≥ maxg∈(χ T A) P g (34)
a huge amount of contingencies are to be evaluated. g∈A
In order to simplify the complete SCOPF problem, the
The penalization cost for the base case is computed from
methodology applied in this research pretends to cover the
the slack variables as follows:
post-contingency restrictions by means of constraint han-
dling in the base case.That is to say, modifying the constraint X X
limits of the base case network. In other words, constraints Cσ = αp (σiP + + σiP − ) + αq (σiQ+ + σiQ− )+
corresponding to post-contingency violations are not ex- i∈I i∈I
plicitly included in the optimization problem. Instead, the
X X
αef (σfs ) + αef (σes ) + ασ σA
existing base-case constraints are modified iteratively. f ∈F e∈E
According to the latter reasoning, the objective function (35)
for the base case is:
X Where αp , αq , αef and ασ are penalization functions.
C=( Cg + δC σ ) (23) Each of these penalization functions satisfies that:
g∈G 
k1 |x| if 0 ≤ |x| ≤ x1
The lower and upper bounds of the variable x for the α(x) = k2 |x| if x1 < |x| < x2 (36)
iteration m are denoted respectively as x(m) and x(m). The 
k3 |x| if |x| ≥ x2
iteration-dependent constraints are therefore:
The last optimization problem can be summarized as the
vi (m) ≤ vi ≤ vi (m) ∀i ∈ I (24) following vector optimization problem:
VOLUME 4, 2016 5

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2021.3067206, IEEE Access

Tomás Valencia et al.: A Fast Decomposition Method for Solving a SCOPF Problem Through Constraint Handling

chosen to continue towards the Select Contingencies stage.


minimize f (x0 , u0 )
xc , u0
subject to g(xc , u0 ) = 0, , (37)
Pre-processing Parallel Constraint Handling Post-processing
h(xc , u0 ) ≤ B(m), OPF
FSM(m)
The IPOPT solver [36] was used to compute the optimal
base case in each iteration. In [37], [38] and [39], ipopt has Start Load
SwShunts
to RunOPF
SwGenerators
to End
data Generators Shunts
been shown as a high performance algorithm to solve large- Select RunSelected
scale optimization problems, both to solve SCOPF, OPF and Contingencies Contingencies

state estimation problems. Contingencies

FIGURE 1: Overview of sections composing the main algo-


rithm.
IV. METHODOLOGY
The first step of the methodology consists in the decom-
position of the SCOPF problem into a base case problem
and contingency sub-problems. Several OPF problems were Load parallel seeds

solved through a base case network. The second stage dealt Seed 1
RunOPF
with the modification of the base case by updating some of Linear solver 1
Worker 1
Ipopt Tol 1
the limits of constraints (constraint handling) according to the
Seed 2
evaluation of potentially relevant contingencies. Linear solver 2
RunOPF
Worker 2
An algorithm based on the Matpower toolbox [40] and Ipopt Tol 2
the Interior Point Optimizer (IPOPT [41] [36]) was proposed
to solve the SCOPF problem described in Section III [32] Seed n
RunOPF
Linear solver n
[42]. The algorithm consisted of Pre- and Post-processing Worker n
Ipopt Tol n
stages (input and output data) and other stages classified into
three groups: Parallel OPF, Contingencies, and Constraint
Check first in finish
Handling.
Figure 1 shows the approach used to update the constraint
limits and to solve the SCOPF problem in an iterative way. No To select
The Pre- and Post-processing stages included two blocks Acceptable Tol?
contingencies
named SwShunts to Generators and SwGenerators to Shunts.
These blocks treated the switching shunts as generators with Yes

null active power before the OPF computation, and then these Wait extra time Check lower cost
“reactive generators” switched them back to switched shunts
before the algorithm delivered the final solution. The other FIGURE 2: Parallel optimal power flow.
stages, named Parallel OPF, Contingencies, and Constraint
Handling, are described in the following subsections. Finally,
two stop rules for the loop depicted in Figure 1 were im- B. CONTINGENCIES
plemented: when the penalty cost was lower than a certain 1) Select Contingencies: Ranking and screening
percentage of the objective function or when a number of The contingency ranking and screening was used as a speed-
iterations was reached. up strategy for medium- and large-scale networks (i.e. more
than 1,000 buses). The strategy was used separately for
A. PARALLEL OPF branches and generation contingencies, as explained in Fig-
The RunOPF block executed optimal power flows in parallel ure 3.
and is summarized in Figure 2. At this stage, the different The indices used in Figure 3 are described below:
combinations for the interior point solver (IPOPT) param-
• Apparent Power (S): main criteria for both branch and
eters were set. The initial conditions and tolerance levels
generator contingencies.
of the optimization variables for the linear solvers used
• Reactive Power (Q): used in branch contingencies.
(i.e. the Multifrontal Massively Parallel sparse direct Solver
• Reactive Power Difference (Qd): computed for branch
(MUMPS [43]), MA57 [44], or MA86 [45]), were combined
and generator contingencies as Q difference between
in multiple workers due to their influence on the convergence
“origin” and “destiny” buses.
time.
• Power factor (pf): computed with Equation 38 for both
branch and generator contingencies.
If a configuration with a sub-optimal cost is the first to
reach a feasible solution, extra time is given to find better
  
Q
solutions. After that, the solution with the lowest cost is pf = cos atan (38)
P
6 VOLUME 4, 2016

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2021.3067206, IEEE Access

Tomás Valencia et al.: A Fast Decomposition Method for Solving a SCOPF Problem Through Constraint Handling

The differences in active power between the values ini-


tially set and the results from power flow evaluation were
due to QV violations in some generators. To fix the reactive
power violations in PV buses, these were converted to PQ to
meet Equation 22. Nevertheless, this could lead to changes
in voltage magnitude in PQ buses and power losses in the
system.
According to slack deviation, the delta value was recalcu-
lated and the power flow was executed again until it reached
a minimal deviation.
If there is a reported non-converge power flow situation
which enters to the noconv stage in the finite state machine
described below.
FIGURE 3: Contingencies selection flowchart.

C. CONSTRAINT HANDLING RULES


Where: 1) Iteration-dependent Finite State Machine
– pf : Power factor This stage modifies the constraint limits of the base case
– atan: Four-quadrant inverse tangent function according to the soft (overloads) and hard (voltage, no con-
– P, Q: Active and Reactive power vergence) violations identified by the Run Selected Contin-
gencies stage in Figure 1. After the set of selected contingen-
• Power factor difference (pfd): similar to reactive power
cies is evaluated and the summary of the largest violations is
difference, the power factor difference was computed
established (overloads, voltage violations, no convergences),
between origin and destination terminals.
the Finite State Machine (FSM) updates the limits of the
• Rated voltage: This criteria sorted branch contingencies
inequality constraints prior to the next iteration. Figure 5
according to the highest rated voltage between origin
depicts how the stages of the FMS are selected according to
and destination terminals.
both the violations at iteration m and the stage at the previous
• Connectivity: it sorted branches according to the num-
iteration m-1, stored in FSM memory.
ber of elements their buses were connected to.
After the FSM selects the proper stage (Overloads, Volt-
According to the indices shown in Figure 3, the branch ages or NoConvs), the constraints are updated accordingly
contingencies were ranked in 7 different lists, and the gener- and the loop returns to the RunOPF stage. If the stage
ator contingencies in 2 different lists. All lists were sorted in selected by the FSM is End, the loop is interrupted and the
descending order but Power Factor and Connectivity, which general algorithm continues to the Post-processing stage.
were sorted in ascending order and marked with a mark (*) The block Select Stage(m) in Figure 5 represents the set
in Figure 3. of stages (Overloads, Voltages, NoConvs) and logical transi-
Once the branch and generator contingencies are ranked tions between them. The stages and transitions of the FSM
from the most to the least relevant, the positions within each are explained in detail in Figure 6.
different list are averaged. Elements ranked at the top of The three stages composing the FSM and their correspond-
several lists are considered relevant. The top x contingencies ing transitions are explained below.
are therefore selected to continue as the input for the Contin-
gency evaluation stage.
2) Updating constraint limits: FSM stages and transitions
The constraint limits were tuned depending on the current
2) Run Selected Contingencies: Evaluation stage of FSM (see Figure 6). These rules affect the B(m)
Different workers executed the steps simultaneously as sum- term in Equation 37.
marized in Figure 4 through parallel computation. First, If the state is overloads, the rules for updating limits
the contingency applied and conventional power flow were shown in Figure 7 will be applied. Branch is used to refer
executed with the same load and generated active power as in to both transmission lines and transformers.
the base case. If the current stage is Voltages, the limit update rule shown
The difference between the total active power generated in in Figure ?? will be applied. In this case, a marginal violation
the base case and the total active power in the contingency is defined as a violation that meets:
case was a first estimation ∆P , Equation 21. According to
this value, the active power set point in post contingency was ((vk − vmin < 0.125)||(vmax − vk < 0.125))
adjusted based on the participation factors. If a generator tries (39)
& |vbase − vlim | < 0.01
to exceed its active power limit, it will be saturated and the
∆P value would be increased, neglecting the participating The power factor at the origin or destination terminals was
factor of saturated generators. validated as another criteria to update the voltage limit. In this
VOLUME 4, 2016 7

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2021.3067206, IEEE Access

Tomás Valencia et al.: A Fast Decomposition Method for Solving a SCOPF Problem Through Constraint Handling

Contingencies (K)
Start

k=1

Apply contingency k
k=k+1
to base case

Identify participating
generators

i =1

i=i+1 Run power flow

Are gens
Increase Delta and recalculate Yes exceeding max No No
Are Qlims violations?
Pg participating gens limit and available
gens?
Yes

No i =maxIt or Yes Do QV violations Yes Change violated


swing bus < TOL? exist? PV/PQ buses to PV
No

Compute and save violations

No
k=K?

Yes

End

FIGURE 4: Active power re-dispatch and PV/PQ switch algorithm.

Iteration-synchronized FSM
PRE-PROCESSING

POST-PROCESSING

Update constraints
RunOPF(m) according to selected
Stage(m)

Select
SelectContingencies(m) Stage(m)

RunSelContingencies(m) Violations(m) FSM


Stage(m-1) Memory

FIGURE 5: Finite State Machine synchronized at each itera-


tion m

case, the voltage can similarly update both under-voltages


and over-voltages.
If the marginal voltage or power factor criteria is not met,
a new set of constraints will be added in the base case:
qfd < qfmax (40) FIGURE 6: FSM stages and transitions

qfo < qfmax (41)


When the contingency involves a branch such as a trans- Both constraint limit updates in figures 7 and ??
former or line, these are the additional constraints:
V. RESULTS
qed < qemax (42) The algorithm proposed in this research was implemented
through the Matpower toolbox [40] and IPOPT solver [36]
qeo < qemax (43)
[41] to solve the SCOPF problem described in Section
If the state violates maximum or minimum voltages, the III. The set of tested networks are described in Table 1.
limits will be updated according to Figure ??. These datasets were used in the ARPA-E Grid Optimization
8 VOLUME 4, 2016

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2021.3067206, IEEE Access

Tomás Valencia et al.: A Fast Decomposition Method for Solving a SCOPF Problem Through Constraint Handling

4 200

180
3.5
160
3
140
2.5

Log(Cost * )
120

Violations
2 100

25% 80
1.5 50%
75% 60
1 100%
25% 40
50%
0.5 75% 20
100%
0 0
1 2 3 4 5
Iterations
FIGURE 8: Cost and violations in function of iterations for
network 1 for different percentage of CS.
FIGURE 7: Overloads stage: Updating branch limits
10 6
1.35 90
Competition - Challenge 1. More information about these 25%
50%
80
and other datasets can be found in [42]. Results from the 1.3 75%
100%
evaluation of the networks listed in Table 1 are presented and 25% 70
1.25 50%
discussed below. All the networks tested were run in a 64-bits 75%
Linux distribution of Matlab® 2019, Intel(R) Xeon(R) CPU 100% 60
1.2

violations
E5-2680 @ 2.70GHz, 128 GB RAM memory and 16 cores.
cost

50
A set of different initial points were used for the optimal 980 s
1.15
power flow computation. The solver used for the OPF prob- 862 s 1307 s
40
lem was IPOPT [36]. Since the IPOPT methodology strongly 1.1
depends on the initial point [11], a set of 16 different initial 30

points were proposed to run the OPF algorithm in parallel. 1.05 1673 s
20
Each combination was executed at a different CPU core.
These different combinations changed the initial point for the 1 10
1 2 3 4 5 6 7
IPOPT solver and included the following fields: iterations
• Linear Solver: mumps, ma57 [36].
FIGURE 9: Cost and violations in function of iterations for
• Strategy: monotone (default), adaptive [36]. network 2 for different percentage of CS.
• Oracle: quality function (default), Loqo [36].
• Seed: initialization of decision variables from a base
case (warm starting), from “zero” condition (cold start- contingency are translated into a power unbalance, according
ing) or from previous algorithm iterations [46], to 32 and 33 equations. To compute the penalization cost,
• Initial voltage: from a base case (warm starting) or set the equation 36 was used with k1 = 1000, k2 = 5000,
to 1 p.u. k3 = 10e6, x1 = x2 = 2, and x3 = 50
To test the performance of contingencies selection (CS), Figure 8 shows the normalized cost in logarithmic scale
a scenario was tested for each network of Table 1. CS was (Cost∗ ) and violations number in function of the algorithm
made for each iteration of the algorithm, leaving a fixed iterations for the network 1. Different lines indicate the
percentage of selection ( 25%, 50%, 75%, 100%) of the total percentage of total set contingencies used for the evaluation.
number of sorted generation and branch contingencies. In The transformed cost was computed because the unbalance
each iteration, an evaluation of 100% of the contingencies penalization was higher in respect to the minimum cost in
was carried out in order to determine the total number of the first three iterations, so it was computed as follows:
violations (overvoltage, undervoltage, overloads) and non-
Cost
convergences. In addition, the operating cost of the sys- Cost∗ = log10 ( ) (44)
tem was computed by taking into account the penalties for Cmin
overload and power unbalance. Voltage violations for the k In all cases, the algorithm ends within 5 iterations. The
VOLUME 4, 2016 9

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2021.3067206, IEEE Access

Tomás Valencia et al.: A Fast Decomposition Method for Solving a SCOPF Problem Through Constraint Handling

TABLE 1: Description of networks tested.

Network Buses Generators Loads Branches Transformers Contingencies Shunts Areas


1 500 224 281 540 193 786 44 1
2 4,918 1,340 3,070 4,412 2,315 5,085 732 31
3 11,615 899 19,272 13,967 5,936 8,747 1,332 1

minimal cost Cmin was $ 2.63e5. A 50% of CS was enough


450
to achieve a cost with no significant difference from the full
contingency evaluation. 400 72 workers
16 workers
The computation time using 25% was 33.08 seconds, and
350
for 100% was 42 seconds. Therefore just a 26% of compu-

time per contingency [ms/Cont]


tation time was increased when 75% more contingencies are 300

evaluated.
250
Figure 9 depicts the costs and number of violations in
function of the algorithm iteration for a 4,918-buses network. 200

In this case, the operation cost is minimal for 50% and 150
highest for 75% of CS; nevertheless, the cost difference was
less than 2%. For 100% the algorithm saves the best iteration, 100

so the minimal cost is reached in the iteration 5. 50


In terms of violations, with 50% of CS there were 33
0
violations and with 100% the algorithm ended with 23. This 4 6 8 10 12 14 16 18 20
shows that it is not always cheaper to have fewer violations. Buses number [10 3
]
In terms of time, for 25% of CS, the algorithm ended with FIGURE 11: Average time per contingency in function of
the lowest time (682s) and the final cost was lower than for number of buses.
100%. With 75% of CS, there were only 4 iterations, but
the computation time was higher than with 25%. In general TABLE 2: Summary Results for different percentage of CS
terms, for a real time approach 25% of CS had an acceptable
Screening 25 50 75 100
performance for this scenario.
percentage
The normalized cost for network 3 is shown in Figure 10.
Convergence 2200 2817 2542 5352
In this case, a low cost is reached with 50%, 75%, and 100%
Time [s]
of CS. With 25%, the penalization is approximately of 64
Cost (1e8) [$] 1.3467 0.0211 0.0264 0.0231
times higher than the minimal cost.
Violations 22 2 0 2

4.5 1500
25%
4 50%
only 0.18% of the total number of the buses is violated, the
75% unbalance cost could be unacceptable. With 50%, 75%, and
100%
3.5 25% 100%, the penalty cost of violations could be acceptable. In
50%
3 75% 1000 terms of time and cost, the best performance was reached
100%
with 75% of CS.
Log(Cost * )

Violations

2.5
Figure 11 shows the average time per contingency in
2 function of the network size by using 16 and 72 workers.
The time differences between them for a 11,615 network is
1.5 500
52 ms/cont, therefore, for 75% (6,560 contingencies) the time
1 would decrease around 341 s per iteration. For four iterations,
0.5
the computation time would have been about 1,178 s (19.6
minutes) instead of 2,542s, reducing the calculation time by
0 0
1 2 3 4 5 6
more than twice.
Iterations In comparison with [47], the methodology presented here
FIGURE 10: Cost and violations in function of iterations for is faster than Benders Decomposition (BD). The average time
network 3 for different percentage of CS. per contingency for a 2312 buses network is less than 50 ms
for 16 and 72 parallel workers, whereas in BD it is about 750
In Table 2 results for the network 3 are summarized. With ms.
25% the algorithm ends with 22 voltage violations. Although
10 VOLUME 4, 2016

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2021.3067206, IEEE Access

Tomás Valencia et al.: A Fast Decomposition Method for Solving a SCOPF Problem Through Constraint Handling

VI. DISCUSSION a better performance.


The selection of contingencies strongly depends on the size
of the analyzed network. Indeed, the results obtained from Acknowledgments: Authors would like to thank the con-
network 1 (500-bus system) showed that the selection of sulting firm GERS, the Electrical Engineering Department
contingencies is not convenient for a real-time approach us- of Universidad Nacional de Colombia and ARPA-E for their
ing the proposed methodology. The relevance of contingency support in this work.
selection increases as the network size also increases.
Sometimes the algorithm can steeply increase the costs REFERENCES
from one iteration to another (as in the third iteration for 75% [1] Q. Wang, J. D. McCalley, T. Zheng, and E. Litvinov, “A computational
selection shown in Figure 10). However, in the next iteration strategy to solve preventive risk-based security-constrained OPF,” IEEE
it can return to a better cost. In case it does not improve, the Transactions on Power Systems, vol. 28, no. 2, pp. 1666–1675, may 2013.
[Online]. Available: https://doi.org/10.1109/tpwrs.2012.2219080
best solution is saved from one iteration to another until the [2] S. A. Sadat, D. Haralson, and M. Sahraei-Ardakani, “Security versus
pre-set time of calculation is finished. computation time in IV-ACOPF with SOCP initialization,” in 2018
The number of cores available for the calculation is an- IEEE International Conference on Probabilistic Methods Applied to
Power Systems (PMAPS). IEEE, jun 2018. [Online]. Available:
other determining factor, since the evaluation of contingen- https://doi.org/10.1109/pmaps.2018.8440287
cies is the bottleneck of the algorithm. The desired percent- [3] F. Capitanescu, J. M. Ramos, P. Panciatici, D. Kirschen, A. M. Marcolini,
age of contingencies could be selected based on the available L. Platbrood, and L. Wehenkel, “State-of-the-art, challenges, and future
trends in security constrained optimal power flow,” Electric Power
time, the number of cores, and the number of buses in the Systems Research, vol. 81, no. 8, pp. 1731–1741, Aug 2011. [Online].
network. Once the desired percentage is known, the criteria Available: https://doi.org/10.1016/j.epsr.2011.04.003
of Figure 3 will be applied. [4] F. Capitanescu, “Critical review of recent advances and further
developments needed in AC optimal power flow,” Electric Power
According to [10], the decomposition formulation of the Systems Research, vol. 136, pp. 57–68, jul 2016. [Online]. Available:
SCOPF problem in base case and contingency scenarios https://doi.org/10.1016/j.epsr.2016.02.008
[5] D. Phan and J. Kalagnanam, “Some efficient optimization methods for
improve overall efficiency. In this paper, the decomposition solving the security-constrained optimal power flow problem,” IEEE
technique is coupled with parallel power flow solution of Transactions on Power Systems, vol. 29, no. 2, pp. 863–872, March 2014.
contingency scenarios, reducing even more the computa- [6] J. Mohammadi, G. Hug, and S. Kar, “A benders decomposition approach
to corrective security constrained OPF with power flow control devices,”
tional time for solution. in 2013 IEEE Power & Energy Society General Meeting. IEEE, 2013.
[Online]. Available: https://doi.org/10.1109/pesmg.2013.6672684
[7] D. T. Phan and X. A. Sun, “Minimal impact corrective actions in
VII. CONCLUSIONS
security-constrained optimal power flow via sparsity regularization,”
This article proposes an algorithm capable of solving the IEEE Transactions on Power Systems, vol. 30, no. 4, pp. 1947–1956, jul
Security-Constrained OPF (SCOPF) problem for large-scale 2015. [Online]. Available: https://doi.org/10.1109/tpwrs.2014.2357713
[8] M. Al-Saffar and P. Musilek, “Distributed optimal power flow for
networks in a timely manner. This fast decomposition method electric power systems with high penetration of distributed energy
considered a larger number of buses, elements, and con- resources,” in 2019 IEEE Canadian Conference of Electrical and
tingencies if compared with the size of networks usually Computer Engineering (CCECE). IEEE, may 2019. [Online]. Available:
https://doi.org/10.1109/ccece.2019.8861718
analyzed in the literature. The use of parallel computing [9] R. Louca and E. Bitar, “Robust AC optimal power flow,” IEEE
techniques served both to reduce the uncertainty of the seed Transactions on Power Systems, vol. 34, no. 3, pp. 1669–1681, may 2019.
and the solver in the OPF solution and to quickly perform the [Online]. Available: https://doi.org/10.1109/tpwrs.2018.2849581
[10] Y. Li and J. McCalley, “Decomposed SCOPF for improving efficiency,”
contingency evaluation stage of the algorithm. IEEE Transactions on Power Systems, vol. 24, no. 1, pp. 494–495, feb
Solving an optimization problem only for the base case 2009. [Online]. Available: https://doi.org/10.1109/tpwrs.2008.2002166
of the OPF requires less time compared with strategies [11] F. Capitanescu, M. Glavic, D. Ernst, and L. Wehenkel, “Applications of
security-constrained optimal power flows,” in In Proceedings of Modern
such as Bender’s Decomposition, which involves solving an Electric Power Systems Symposium, MEPS06, 2006.
optimization problem for each contingency. The proposed [12] S. Sojoudi and J. Lavaei, “Physics of power networks makes hard
methodology only executes conventional power flows, which optimization problems easy to solve,” in 2012 IEEE Power and
Energy Society General Meeting. IEEE, jul 2012. [Online]. Available:
saves even more time when the number of contingencies is as https://doi.org/10.1109/pesgm.2012.6345272
high as in the evaluated networks. [13] V. Hinojosa and F. Gonzalez-Longatt, “Preventive security-constrained
DCOPF formulation using power transmission distribution factors and
The criteria for selecting contingencies using the pro- line outage distribution factors,” Energies, vol. 11, no. 6, p. 1497, jun
posed algorithm proved to have good performance. All cases 2018. [Online]. Available: https://doi.org/10.3390/en11061497
showed that it was enough to select 50% of the contingencies [14] Y. Xu, H. Yang, R. Zhang, Z. Dong, M. Lai, and K. Wong, “A contingency
partitioning approach for preventive-corrective security-constrained opti-
to obtain final costs similar to when 100% of the contingen- mal power flow computation,” Electric Power Systems Research, vol. 132,
cies were evaluated. pp. 132–140, 2016.
As a suggestion for future work, uncertainty costs could [15] Y. Xu, Z. Y. Dong, R. Zhang, K. P. Wong, and M. Lai, “Closure
to discussion on “solving preventive-corrective scopf by a hybrid
be introduced to model renewable injection, restrictions computational strategy”,” IEEE Transactions on Power Systems,
in storage, and ramp elements to model the limitation of vol. 29, no. 6, p. 3124–3125, Nov 2014. [Online]. Available:
actuators. Additionally, new strategies to update the limits http://dx.doi.org/10.1109/TPWRS.2014.2359354
[16] E. Karangelos and L. Wehenkel, “An iterative AC-SCOPF approach
could be researched, aiming at less iterations to reach a lower managing the contingency and corrective control failure uncertainties
cost. A network partitioning algorithm could be used to reach with a probabilistic guarantee,” IEEE Transactions on Power Systems,

VOLUME 4, 2016 11

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2021.3067206, IEEE Access

Tomás Valencia et al.: A Fast Decomposition Method for Solving a SCOPF Problem Through Constraint Handling

vol. 34, no. 5, pp. 3780–3790, sep 2019. [Online]. Available: [37] Y. Yuan, X. Wen, and K. Qian, “Preventive/corrective control for voltage
https://doi.org/10.1109/tpwrs.2019.2902486 stability based on primal-dual interior point method,” in 2006 International
[17] M. Javadi, A. E. Nezhad, M. Gough, M. Lotfi, and J. P. Catalao, Conference on Power System Technology, 2006, pp. 1–5.
“Implementation of consensus-ADMM approach for fast DC-OPF [38] Xuelian Liu, Jiwen Li, Hongmei Li, and Hongxia Peng, “Fuzzy modeling
studies,” in 2019 International Conference on Smart Energy Systems and interior point algorithm of multi-objective opf with voltage security
and Technologies (SEST). IEEE, sep 2019. [Online]. Available: margin,” in 2005 IEEE/PES Transmission Distribution Conference Expo-
https://doi.org/10.1109/sest.2019.8848992 sition: Asia and Pacific, 2005, pp. 1–6.
[18] A. Attarha and N. Amjady, “Solution of security constrained optimal [39] Y. Chen, J. Ma, P. Zhang, F. Liu, and S. Mei, “Robust state estimator based
power flow for large-scale power systems by convex transformation on maximum exponential absolute value,” IEEE Transactions on Smart
techniques and taylor series,” IET Generation, Transmission & Grid, vol. 8, no. 4, pp. 1537–1544, 2017.
Distribution, vol. 10, no. 4, p. 889–896, Mar 2016. [Online]. Available: [40] R. D. Zimmerman and C. E. Murillo-Sánchez, “Matpower,” 2019.
http://dx.doi.org/10.1049/iet-gtd.2015.0494 [Online]. Available: https://zenodo.org/record/3251119
[19] A. Werner, K. Duwadi, N. Stegmeier, T. M. Hansen, and J.-H. [41] A. Wächter and L. T. Biegler, “On the implementation of an interior-point
Kimn, “Parallel implementation of ac optimal power flow and time filter line-search algorithm for large-scale nonlinear programming,”
constrained optimal power flow using high performance computing,” Mathematical Programming, vol. 106, no. 1, pp. 25–57, apr 2005.
in 2019 IEEE 9th Annual Computing and Communication Workshop [Online]. Available: https://doi.org/10.1007/s10107-004-0559-y
and Conference (CCWC). IEEE, Jan 2019. [Online]. Available: [42] ARPA-E, Grid Optimization (GO) Competition, 2019 (accessed December
http://dx.doi.org/10.1109/CCWC.2019.8666551 5th, 2019), available in: https://gocompetition.energy.gov.
[20] S. Lee, W. Kim, and B. H. Kim, “Performance comparison of [43] E. Agullo, A. Guermouche, and J.-Y. L’Excellent, “A parallel
optimal power flow algorithms for lmp calculations of the full out-of-core multifrontal method: Storage of factors on disk
scale korean power system,” Journal of Electrical Engineering and and analysis of models for an out-of-core active memory,”
Technology, vol. 10, no. 1, p. 109–117, Jan 2015. [Online]. Available: Parallel Computing, vol. 34, no. 6, pp. 296 – 317, 2008,
http://dx.doi.org/10.5370/JEET.2015.10.1.109 parallel Matrix Algorithms and Applications. [Online]. Available:
[21] Y. Chen, Z. Zhang, Y. Lang, J. Ma, and S. Zheng, “Generalised-fast http://www.sciencedirect.com/science/article/pii/S0167819108000495
decoupled state estimator,” IET Generation, Transmission Distribution, [44] I. S. Duff, “Ma57—a code for the solution of sparse symmetric definite and
vol. 12, no. 22, pp. 5928–5938, may 2018. indefinite systems,” ACM Trans. Math. Softw., vol. 30, no. 2, p. 118–144,
[22] J. Guo, G. Hug, and O. K. Tonguz, “A case for nonconvex distributed Jun. 2004. [Online]. Available: https://doi.org/10.1145/992200.992202
optimization in large-scale power systems,” IEEE Transactions on Power [45] J. Hogg and J. Scott, “An indefinite sparse direct solver for large prob-
Systems, vol. 32, no. 5, pp. 3842–3851, sep 2017. [Online]. Available: lems on multicore machines,” Rutherford Appleton Laboratory Technical
https://doi.org/10.1109/tpwrs.2016.2636811 Reports, 2010.
[46] R. D. Zimmerman and C. E. Murillo-Sánchez, “Matpower user’s manual,”
[23] M. Granada Echeverri, M. J. Rider Flores, and J. R. S. Mantovani, “Dos
2019. [Online]. Available: https://zenodo.org/record/3251118
técnicas de descomposición aplicadas al problema de flujo de potencia óp-
[47] M. Bazrafshan, K. Baker, and J. Mohammadi, “Computationally efficient
timo multi-areas,” DYNA, vol. 77, pp. 303 – 312, 06 2010. [Online]. Avail-
solutions for large-scale security-constrained optimal power flow,” 2020.
able: http://www.scielo.org.co/scielo.php?script=sci_arttextpid=S0012-
73532010000200031nrm=iso
[24] J. Guo, G. Hug, and O. Tonguz, “Asynchronous admm for distributed non-
convex optimization in power systems,” arXiv preprint arXiv:1710.08938,
2017.
[25] M. Bazrafshan, K. Baker, and J. Mohammadi, “Computationally efficient
solutions for large-scale security-constrained optimal power flow,” 2020.
TOMÁS VALENCIA-ZULUAGA received his
[26] S. Stankovic and L. Soder, “Optimal power flow based on genetic
algorithms and clustering techniques,” in 2018 Power Systems Bachelor’s Degree in Mechatronics Engineering
Computation Conference (PSCC). IEEE, Jun 2018. [Online]. Available: from the Universidad Nacional de Colombia at
http://dx.doi.org/10.23919/PSCC.2018.8442583 Bogota, Colombia in 2014 and his Master’s De-
[27] A. Zamzam and K. Baker, “Learning optimal solutions for extremely fast gree in Electrical Engineering at the same univer-
ac optimal power flow,” arXiv preprint arXiv:1910.01213, 2019. sity in 2018. He has worked in the electricity gen-
[28] I. Ghosh and P. K. Roy, “Application of earthworm optimization algorithm eration sector and was an engineer at GERS until
for solution of optimal power flow,” in 2019 International Conference 2019. He is currently a Fulbright Scholar pursuing
on Opto-Electronics and Applied Optics (Optronix). IEEE, Mar 2019. a Ph.D. in Industrial Engineering and Operations
[Online]. Available: http://dx.doi.org/10.1109/OPTRONIX.2019.8862335 Research at the University of California, Berkeley.
[29] “Optimal power flow using fuzzy-firefly algorithm,” in 2018 5th His research interests are in the area of Power System operation optimization
International Conference on Electrical Engineering, Computer Science and optimization under uncertainty.
and Informatics (EECSI). IEEE, Oct 2018. [Online]. Available:
http://dx.doi.org/10.1109/EECSI.2018.8752903
[30] F. Bouffard, F. D. Galiana, and J. M. Arroyo, “Umbrella contingencies in
security-constrained optimal power flow,” in 15th Power systems compu-
tation conference, PSCC, vol. 5, 2005.
[31] S. Eftekharnejad, “Selection of multiple credible contingencies for real
time contingency analysis,” in 2015 IEEE Power Energy Society General DANIEL AGUDELO-MARTINEZ received BSc.
Meeting, July 2015, pp. 1–5. degrees in Electrical Engineering and Electron-
[32] ARPA-E, “SCOPF Problem Formulation: Challenge 1,” Advanced Re- ics Engineering, and a MSc. degree in Electrical
search Projects Agency–Energy), Tech. Rep., 04 2018. Engineering from the Universidad Nacional de
[33] B. Stott and O. Alsac, “Optimal Power Flow- Basic Requirements for Real- Colombia at Bogota, Colombia, in 2016 and 2020
Life Problems and their Solutions,” Tech. Rep., 2012. respectively. He has performed electric power sys-
[34] H. Bevrani, Robust Power System Frequency Control, ser. Power tems studies and developed software applications
Electronics and Power Systems. Springer US, 2008. [Online]. Available: at the consulting firm GERS since 2019. His con-
https://books.google.com.co/books?id=wVtGuzkrwiAC sulting activities include among others, assessing
[35] J. Zhao, H.-D. Chiang, H. Li, and P. Ju, “On pv-pq bus type switching logic the interconnection of distributed energy resources
in power flow computation,” in Proceedings of the 16th power systems (renewables) to the current and future power grid. His research interests
computation conference, vol. 16, jul 2008, p. 7. include power systems modeling, optimal operation, power quality, and
[36] HSL, A collection of Fortran codes for large scale scientific artificial intelligence applied to power systems monitoring and control.
computation, 2019 (accessed December 5th, 2019), availabel in:
http://www.hsl.rl.ac.uk/.

12 VOLUME 4, 2016

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2021.3067206, IEEE Access

Tomás Valencia et al.: A Fast Decomposition Method for Solving a SCOPF Problem Through Constraint Handling

DARIO ARANGO-ANGARITA received BSc. DIEGO RODRÍGUEZ-MEDINA holds a BSc. in


degrees in Electrical Engineering and Electronic electrical engineering from the Universidad Na-
Engineering from the Universidad Nacional de cional de Colombia at Bogota, Colombia (2012).
Colombia at Bogota, Colombia in 2016 and 2018 He also holds a MSc. in electrical and computer
respectively. He currently works as a data analyst science engineering from the University of Okla-
in Enel Codensa, His areas of interest include Big homa (2014). Currently, he is a Ph.D. student in
Data, machine learning, power system control, and the Department of Electrical Engineering at the
distributed optimization. Universidad Nacional de Colombia at Bogota. Ad-
ditionally, he is the international studies manager
at GERS. His interests are in Transmission and
Distribution planning, power system security and optimization.

CAMILO ACOSTA-URREGO received his B.Sc.


degree in Electrical Engineering from the Univer-
sidad Tecnológica de Pereira, Colombia in 2011.
Currently, he is the head of planning studies at
GERS consulting engineers. His areas of inter-
est include power system distribution planning,
numerical methods, artificial intelligence, applied
optimization to energy systems, operations re-
search and power systems protection.

SERGIO RIVERA received his degree in elec-


trical engineering from the Universidad Nacional
de Colombia at Bogota, Colombia in 2001, a
postgraduate degree in electrical engineering, in JUAN GERS holds a degree In Electrical En-
2004 with an emphasis on distribution systems, gineering from The Universidad del Valle, Cali-
and a Ph.D. in electrical engineering from the Colombia (1977). In 1981, he received a Mas-
Electric Power Institute, Universidad Nacional de ter´s degree in Power Systems at the University
San Juan, Argentina, in 2011. He was a Postdoc- of Salford, England and received a Ph.D degree
toral Associate with the Massachusetts Institute of from University of Strathclyde, Glasgow-Scotland
Technology (MIT) in 2013-2017, and a Postdoc- in 1998. He is the President and Founder of GERS,
toral Fellow with the Masdar Institute of Science and Technology in 2014. an electrical engineering consulting group with
He is an associate Professor in power systems and electrical machines with operations in Colombia, the USA, Chile and Mex-
the National University of Colombia at Bogota, since 2014. His current ico. He also is an adjunct professor at Gonzaga and
research interests include the reliability of power systems and electricity Penn State Universities, and the Universidad del Valle. He is a Chartered
markets. He is specifically involved in the coordination and control of smart- Engineer of the IET (UK) and an active member of the Power System
grids and microgrids using multi agent systems (MAS), and applications Relaying Committee of the IEEE (USA).
of modern heuristic optimization for operation and improvement of power
systems.

VOLUME 4, 2016 13

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
View publication stats

You might also like