2007
DOI: 10.1109/tpwrs.2007.901751
|View full text |Cite
|
Sign up to set email alerts
|

Hydrothermal Scheduling Using Benders Decomposition: Accelerating Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
46
0
7

Year Published

2010
2010
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 77 publications
(53 citation statements)
references
References 19 publications
0
46
0
7
Order By: Relevance
“…This operating point is closer to the initial point but at this point the operation of system 2 is more disturbed due to a significant redistribution of power flows inside the minor loop. The proposed algorithm does not yield this solution because the pre-contingency changes are constrained to obey (28). In fact, having attributed the security problem to a certain cause (an excessive transit flow), the algorithm tries to find the closest correctively secure operating point towards the direction that mitigates this cause.…”
Section: B Optimality Of the Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…This operating point is closer to the initial point but at this point the operation of system 2 is more disturbed due to a significant redistribution of power flows inside the minor loop. The proposed algorithm does not yield this solution because the pre-contingency changes are constrained to obey (28). In fact, having attributed the security problem to a certain cause (an excessive transit flow), the algorithm tries to find the closest correctively secure operating point towards the direction that mitigates this cause.…”
Section: B Optimality Of the Methodsmentioning
confidence: 99%
“…The proposed problem decomposition offers some similarities with the Benders decomposition method [19], [21], [22], [27], [28] from which it differs, however, as discussed hereafter.…”
Section: Analogy With Benders Decompositionmentioning
confidence: 99%
See 1 more Smart Citation
“…In the technical literature, there are few works addressing the ac-UC problem. Reference [14] proposes an approach based on Benders' decomposition to solve an ac network-constrained hydrothermal scheduling problem. A security-constrained ac-UC problem is proposed in [15], whose objective is to minimize the system's operating cost while maintaining appropriate security.…”
Section: B Literature Review and Contributionsmentioning
confidence: 99%
“…In the past decades, several conventional methods have been used to solve the classical HTS problem neglecting environment aspects such as dynamic programming (DP) [4], network flow programming (NFP) [5], Lagrange relaxation (LR) [6], and Benders decomposition [7] methods. Among these methods, the DP and LR methods are more popular ones.…”
Section: Introductionmentioning
confidence: 99%