2016
DOI: 10.1109/tpwrs.2015.2504870
|View full text |Cite
|
Sign up to set email alerts
|

Practical Security Boundary-Constrained DC Optimal Power Flow for Electricity Markets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 20 publications
(9 citation statements)
references
References 15 publications
0
9
0
Order By: Relevance
“…For a recent literature review in these issues, we recommend the following references: References [12][13][14].…”
Section: Dcopf Literature Reviewmentioning
confidence: 99%
“…For a recent literature review in these issues, we recommend the following references: References [12][13][14].…”
Section: Dcopf Literature Reviewmentioning
confidence: 99%
“…Instead, the classical DC flow algorithm, due to its simple mathematical model, linearized equation, rapid solving speed, is widely used in quick calculation occasions, such as power system planning [1], [2], security and stability evaluation of power system [3]- [5], transaction price calculation of electricity market [6]- [9], analysis of The associate editor coordinating the review of this manuscript and approving it for publication was Jenny Mahoney. transmission capability [10], [11], operation dispatching [5], and probabilistic load flow analysis [12], etc. However, the classical DC power flow algorithm has been found to be mainly suitable for high voltage transmission networks with small branch impedance, with its calculation error usually being within 3%-10%, which is only considered acceptable for occasions with low precision requirements [13].…”
Section: Introductionmentioning
confidence: 99%
“…Leveraging semidefinite programming relaxation of OPF, this problem can be formulated as a semidefinite program with quasi-convex objective [12]. Polyhedron approximation of security boundaries has been applied in a DC-OPF model in [13] for proper accounting of system loading margins. However, the characterization of security boundary gets complicated as the dimension of feasible region goes up.…”
Section: Introductionmentioning
confidence: 99%