We use cookies to ensure that we give you the best experience on our website. By continuing to browse this repository, you give consent for essential cookies to be used. You can read more about our Privacy and Cookie Policy.

Durham Research Online
You are in:

Efficient secure AC OPF for network generation capacity assessment.

Dent, C. J. and Ochoa, L. F. and Harrison, G. P. and Bialek, J. W. (2010) 'Efficient secure AC OPF for network generation capacity assessment.', IEEE transactions on power systems., 25 (1). pp. 575-583.


This paper presents a novel method for determining the capacity of a network to accommodate new generation under network security constraints. The assessment is performed by maximizing the total generation capacity in an optimal power flow model; this is solved by gradually adding limited numbers of line outage contingencies, until a solution to the complete problem is obtained. The limit on the number of contingencies added is key to the method's efficiency, as it reduces the size of the optimization problems encountered. Moreover, varying this limit on contingencies added provides a simple and highly efficient means of searching for multiple local optima of the nonlinear optimization problem. The method has been tested on a modified version of the highly meshed IEEE Reliability Test System with N-1 security, where a significant reduction in the system's capacity for new generation is seen when security constraints are imposed. The method is generic and may be applied at any voltage level, for other security models and for other similarly structured problems such as the analysis of multiple resource availability scenarios.

Item Type:Article
Keywords:Load flow analysis, Optimization methods, Power generation planning.
Full text:(VoR) Version of Record
Download PDF
Publisher Web site:
Publisher statement:©2010 IEEE. This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
Record Created:08 Mar 2010 13:35
Last Modified:06 Jun 2017 14:43

Social bookmarking: del.icio.usConnoteaBibSonomyCiteULikeFacebookTwitterExport: EndNote, Zotero | BibTex
Look up in GoogleScholar | Find in a UK Library