Quadratic programming approach for security constrained optimal power flow

Rony Seto Wibowo, Rendhi Maulana, Annisaa Taradini, Feby A. Pamuji, Adi Soeprijanto, Ontoseno Penangsang

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

10 Citations (Scopus)

Abstract

This paper proposes an approach for optimal power flow considering several contingency states. Initially, contingency selection is conducted to measure how much a specific contingency may affect the operation cost. Then, some severe contingencies are incorporated into optimal power flow problem. All considered states, normal and contingency states, are simulated simultaneously. Thus, if contingency occurs, it can be ensured that all constraints such as generation limit, transmission limit and ramp rate will be satisfied. To solve the problem, quadratic programming is applied. IEEE 30 bus system is used as test system to show the ability of the proposed approach.

Original languageEnglish
Title of host publicationProceedings - 2015 7th International Conference on Information Technology and Electrical Engineering
Subtitle of host publicationEnvisioning the Trend of Computer, Information and Engineering, ICITEE 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages200-203
Number of pages4
ISBN (Electronic)9781467378635
DOIs
Publication statusPublished - 2015
Event7th International Conference on Information Technology and Electrical Engineering, ICITEE 2015 - Chiang Mai, Thailand
Duration: 29 Oct 201530 Oct 2015

Publication series

NameProceedings - 2015 7th International Conference on Information Technology and Electrical Engineering: Envisioning the Trend of Computer, Information and Engineering, ICITEE 2015

Conference

Conference7th International Conference on Information Technology and Electrical Engineering, ICITEE 2015
Country/TerritoryThailand
CityChiang Mai
Period29/10/1530/10/15

Keywords

  • optimal power flow
  • quadratic programming
  • security constraint

Fingerprint

Dive into the research topics of 'Quadratic programming approach for security constrained optimal power flow'. Together they form a unique fingerprint.

Cite this