Optimal Power Flow
Optimal Power Flow
J Carpentier
Electricit& de France, 3 Rue de Messine, 75008 Paris, France
I. I n t r o d u c t i o n
Before tile introduction of optimal load flows, so-called
'economic dispatch' was used to determine the best way to
share the real load between several generating thermal units
having a total capacity greater than the generation required.
Everything was as simple as in paradise : losses were taken
into account through B coefficients, control orders were sent
directly to the units and nothing happened but savings.
The trouble started around 1961 when the use of networks
close to their limits led to a fear of line overloadings; security
constraints had to be introduced and optimal power flows
were rapidly born. Instead of a 'compact' model consisting
of one equation with real powers only, it appeared necessary
to consider all the variables defining the state of the system
and to solve the economic dispatch and the load flow
problems at the same time. An optimal power flow may
thus be dethaed as the determination of the complete state
of a power system corresponding to the best operation
within security constraints. Best operation usually means
least fuel cost: security may range from the generation
feasibility up to very sophisticated constraints, so that the
optimization problem may become huge.
Since 1961, a number of optimal power flow computation
methods have been proposed. In this paper, after presenting
various possible statements of the problem, our aim is to
point out the most typical methods, as they appear today
with a thought towards their possible usefulness, and bearing
in mind that omissions are always possible. Except for a few
papers, the author compelled himself to read (or re-read)
each paper mentioned in the references; so, please, forgive
him if the list is too limited. Complements to references
may be found in the excellent survey on optimal power
dispatch carried out by Happ 6s a few years ago.
The author found writing this review very exciting for two
reasons: first, looking at 15 years' work corroborated his
opinion that sometimes there exist barriers between
countries -- researchers from one country working on
subjects solved and published elsewhere five or ten years
before; secondly, the revolution in computer hardware
means that cheap, fast and powerful computers will soon
HDVC lines
Pi
Qi
Ci
Di
Ii
Ki
Pik
C
Ri
T
V
E =
'
W=
,J =
~E
J'" J'
X:[~]
g(JO
= 0= 0 tj (physical) load flow equations
g(x, u)
i ~ [0, NI
Vi
Oi
h(X) ~< 0 }
h(x, u) <~0 set of inequality constraints
L
Lagrangian function
(1)
with
(2)
~ Pi = C + p(P)
i
~}p
(3)
- - = 2 E BliP/+ B
aPi
X(~/Pi -P
C)
li(O, V)
Qi + Di : 0 i 'injections' relations, V i
(6)
(7)
(s)
aF/a&
- ?, = constant
(4)
(~p/~iPi)
Q~" ~ Qi <~Q~4
Ki(O , V)
which gives:
l -
<s,
vF' < v, v
0i
0/~< T0
(9)
(10)
(Jl)
v i
l\)r any couple i, / of
neighbouring buses
(]2)
a#
Op _ j T I __
OP
O0
(5)
V. General static optimization methods I1: noncompact secure optimal power flow methods
v. 1 General characteristics
(13)
~3L_0f+[~3g']
ax
C(X)
0u
(16)
~, = 0
(17)
7-
--=g(x,u) = 0
(14)
k=0
ax l a x l r
-
0u
0L
H(X) A X =
(is)
(18)
0k
Differentiating g(x, u) = 0, it is easy to show that OL/Ou
is the reduced gradient V f o f f versus u considered as independent variables, i.e. d f = Vfrdu. So, the basic minimization algorithm, for n security only, is as follows:
(1)
(2)
(3)
(4)
(5)
An alternate algorithm was written by Velghe and Peterson, 37 including area interchange equations. Alsac and
Stott 49 ingeniously generalized the algorithm to n - 1
security. They considered not only the state variable x
corresponding to .the intact system but also all the variables
x l, x 2, . . . , x k corresponding to all the studied contingencies, as well as the related dual vectors M, k 2, . . . , k k,
u having a single value except in some special cases. The
numerical example presented was limited to 30 buses and
15 control variables: as could be foreseen from the number
of variables considered, it seems that the n - I security
requirement cuts down the performance of the method.
Other refinements were performed sl,67 essentially using a
Hessian to define c, or real-reactive decoupling. 36
Concerning tire use of penalty functions to handle constraints, it is true for this reduced gradient method and for
the previous Hessian method that constraints are nret in a
'soft' manner, with a relatively large tolerance zone; this is
certainly acceptable in many cases but causes problems for
some difficult security problems.
(23)
such that
V.5 Peschon GRG m e t h o d
V.5.1 Principle. A number of other noncompact methods
were proposed and it is impossible to be exhaustive.
A special mention must be made of the application of the
generalized reduced gradient (GRG) method 9,16 of
Peschon 27 and others. Peschon, whose previous research
with Tinney and others (among whom CuOnod had originated the reduced gradient method just studied) presented
GRG in 1971 and compared it with the Dommel Tinney
method.
The GRG is a general convex programming method. Several
versions exist. Peschon used the general program, which
may roughly be summed up as follows.
(1) At each step, the constraints C(Z) = b are linearized,
such as:
A dZ
db
(19)
C(2) = - - z
bF
- A-'~
az
-:-
az
(2o)
{21)
and
(22)
which defines the variation
A Z = ph
P l minimizing F
(24)
(4) Compute
= -c'(2)
C(Z) = C(22, Z l ) = b
(23)
explains why the GRG general code fitted so well with optimal power flows in Peschon's experiment, GRG being a
by-product of optimal power flow and not the reverse as
may be believed. This also corroborates Peschon's opinion
about the efficiency of a specialized program for two
reasons: on the one hand, in the GRG-differential injections algorithm, special additions and short-cuts exist
which make it much more efficient; on the other hand it
is applied only to the physical control variables of the
problem. This shows that our field of study may sometimes
be useful to more general applied mathematics; the most
unfortunate thing being that circumstances prevented
Peschon and the author having direct contact.
Peschon did not limit himself to the usual optimal power
flows but altered the program to perform optimal load
curtailment under emergency conditions, which is an application which deserves the greatest attention.
, z S d / 7Id2p
' [ ~ ] ' A/t= 0
(25)
(26)
l~-~oI7 ,Art
Au ~< 3,k
[ du o ]
10
11
12
References
Kuhn, H W and Tucker, A W 'Non linear programming' Proc. 2nd Berkeley Symposium on Mathematics,
Statistics and Probability University of California
Press, Berkeley, California (1951)
2
m~thode du gradient r~duit de Wolfe au cas de contraintes non lin&aires' Proc. 4th IFORS Meeting
Boston (1966)
10 Dopazo, J F, Klitin, O A, Stagg, G W and Watson, M
'An optimization technique for real and reactive power
allocation' Proc. IEEE Vol 65 (1967), pp 1877-1885
11 Wells, D W 'Method for economic secure loading of a
power system' Proc. lEE Vol 115, No 8 (August 1968}
pp 1190-1194
12 Dommel, H W and Tinney, W F 'Optimal power flow
solutions' IEEE Trans. PAS Vol 87 (1968) pp 18661876
13 Sasson, A M 'Nonlinear programming applications to
power systems' Proc. Symposium Helors-IFORS
Athens (1968)
13
Fink, L H 'Economic dispatch of generation via valvepoint loading' IEEE Trans. Vol PAS-88, No 6 (June
1969), pp 805-811
31
14
52 Wollenberg, B F and Stadlin, W O 'A real time optimizer for security dispatch' IEEE Trans. PAS
(September -October 1974), pp 1640-1649
53 Sjelvgren, D V and Bubenko, J A 'Decomposition
techniclue in a security related optimal power flow'
Proc. PSCC 5 (1975)
54
64 Adler, R B and Fischl R, 'Security constrained economic dispatch with participation factors based on
worst case bus load variations' IEEE Trans. PAS-96
(March-April 1977), pp 347-356
58
59
76
15