A Decomposition Based Approach for Solving a General Bilevel Linear Programming

Size: px
Start display at page:

Download "A Decomposition Based Approach for Solving a General Bilevel Linear Programming"

Transcription

1 A Decomposition Based Approach for Solving a General Bilevel Linear Programming Xuan Liu, Member, IEEE, Zuyi Li, Senior Member, IEEE Abstract Bilevel optimization has been widely used in decisionmaking process. However, there still lacks an efficient algorithm to determine an optimal solution of a bilevel optimization problem, especially for a large-size problem. To bridge the gap, this paper proposes an efficient decomposition algorithm for a general bilevel linear programming(gblp). The simulation results on large-size testing system demonstrate its correctness and efficiency. Index Terms bilevel linear programming, benders decomposition, general bilevel linear programming, power systems. s slack variable vector S shift factor matrix of the power grid U bus-generator incidence matrix V bus-load incidence matrix W bus-line incidence matrix X branch reactance matrix ρ, μ, μ Lagrangian vector x variable vector in the lower level y, y variable vector in the upper level Note that represents incremental change and symbols in bold represent vectors or matrices. U, U V, V U r, U r V r ε τ i, j k K h k max L k u z lower z upper c, d e, f D D A, b E, F, G h J L L max P P max NOMENCLATURE sets of extreme points sets of extreme rays reduced sets of extreme points reduced sets of extreme rays given value for gap given maximum percentage of load uncertainty subscript: index for lagrangian multipliers subscript: index for lines objective value the lower level optimization problem physical flow of line k rating of line k loading level of line k lower bound of the GBLP upper bound of the GBLP coefficient vector for the objective function in the upper level coefficient vector for the objective function in the lower level load vector false data injection vector into load measurements coefficient matrices in the upper level coefficient matrices in the lower level physical line flow vector load shedding vector line flow vector line rating vector generator output vector maximum generation output vector B I. INTRODUCTION ILEVEL optimization has attracted a lot of research attentions in recent years[1]-[7]. In general, a bilevel optimization problem can be casted into a decider-follower problem. In the upper level, a decision is determined. Then, the follower in the lower makes a best response according to the determined decision. For example, the power grid interdiction[7] is formulated as a bilevel max-min problem. In the upper level, the attacker determines the optimal set of lines to be attacked. In the lower level, the operator minimizes the load shedding given the set of attacked lines determined in the upper level. The most popular methods to solve a bilevel optimization problem are the Karush-Kuhn-Tucker (KKT) based approach and duality based method. In the KKT based approach, the lower level optimization problem is replaced by its KKT optimality conditions. To linearize the nonlinear complimentary constraints, additional binary variables will be introduced to form the so called big-m constraints, which limit the computation efficiency. In the duality based approach, the lower level is transformed into its dual problem [8]. However, the resulting nonlinear terms in the strong duality condition make the whole problem hard to solve, especially for a largesize system. Thus, it is necessary for us to develop a novel algorithm to get the optimal or suboptimal solution of a bilevel optimization problem. A little efforts [9]-[11] has been devoted to apply some decomposition techniques to solve a bilevel optimization problem. However, we notice that these methods can be only applied to a special class of the bilevel linear programming with the same objectives in the lower and upper levels. So far, how to solve a GBLP with different objectives in the lower and upper levels efficiently is still an open question. In this paper, we propose a benders decomposition based approach to

2 solve a GBLP with different objective functions in the lower and upper levels. Different from the traditional benders decomposition approach, the subproblem consists of two sequential LPs. In the first stage, the first LP is solved to get the optimal objective. Then the constraint of the objective function will be inserted into the second LP to get the dual variables used to generate benders cuts. The rest of this paper is organized as follows. Section II proposes an decomposition algorithm to solve a GBLP. Section III demonstrates the proposed model with the IEEE 118-bus system. Section IV concludes the paper. II. DECOMPOSITION METHODOLOGY OF GBLP In this section, we propose a decomposition algorithm to solve a GBLP. A. Decomposition Method for GBLP Consider the general bilevel linear program(gblp) (1)-(4) as follows.. (GBLP) min c T x + d T y (1) Ay b (2) min e T x + f T y (3) Ex + Fy G (4) where variables x, y are continuous variables. Note that the objectives in the lower and upper levels could be different, that is c T x e T x w where w is a scalar. This characteristic poses a huge challenge for developing an efficient algorithm for solving it. Note that for a fixed y, the lower level optimization problem becomes a linear programming. Rewrite the lower level optimization problem (3)-(4) as (SP): min e T x + f T y (5) Ex G Fy μ (6) Since the term f T y is a constant, we have (LP1) K = min e T x (7) Constraint (6) As LP1 is a LP whose optimal value can be determined at one of its extreme points. Note that the goal of the bilevel optimization problem is to determine a best y that minimizes the objective value of LP3: (LP3) min c T x + f T y (8) min e T x (9) Constraint (6) Note that the bilevel optimization problem has a special structure in which only variable x is transmitted to the upper level for a given y. For a given y, the GBLP can be solved by solving two sequential LPs: LP1 and LP2. (LP2): min c T x (10) e T x = K ρ (11) Ex G Fy μ (12) where K is the objective value of the lower optimization problem for a given y. The dual problem of (10)-(12) is max ρk + (μ ) T (G Fy ) (13) [e E T ] [ ρ μ ] c (14) Let S denote the feasible region of the dual problem, S = {(ρ, μ ) [e E T ] [ ρ μ ] c} (15) The region S has two good chatteristics: 1) It is independent with the value of the variable y in the upper level and the value of K; 2) It is a fixed polygon with a finite number of extreme points and extreme rays. Let U, V denote the sets of all the extreme points and extreme rays of the feasible region S, respectively. U = {u 1, u 2,, u n } V = {v 1, v 2,, v q } According to [12], the optimization problem is equivalent to (16)-(17): max { ρ i K + (μ i )T (G Fy ) (ρ i, μ i ) U } (16) ρ j K + (μ j )T (G Fy ) 0 (ρ j, μ j ) V (17) Constraint (17) holds for ensuring the bound of the dual problem (13)-(14). Similarly, for a fixed y, the optimization problem (5)-(6) is a LP. Thus, its dual problem is written as max(μ) T (G Fy ) (18) E T μ c (19) Let T denote the feasible region of (18)-(19) T = {(μ) E T μ c} (20) It can be seen that the region T is also independent with the value of the variable y in the upper level and has a finite number of extreme points and extreme rays. U = {u 1 1, u 2 1,, u m 1 } V = {v 1 1, v 2 1,, v p 1 } Since the strong duality condition can be satisfied, we have

3 K = max(μ) T (G Fy ) (21) Introducing (21) into (16), which gives max ρ i (max(μ) T (G Fy )) + (μ i )T (G Fy ) (22) It can be verified that (22) is equivalent to max{ρ i (μ j T (G Fy )) + (μ i )T (G Fy ) = max (ρ i μ j T + (μ i )T ) (G Fy ) (ρ i, μ i ) U, μ j U} (23) Constraint (17) Note that LP2 is feasible as long as LP1 is feasible, so constraint (17) can be replaced by (μ j ) T (G Fy ) 0 μ j V (24) Thus, the optimization problem GBLP is equivalent to (25): (DMP): min z (25) z (ρ i μ j T + (μ i )T )(G Fy) + d T y (ρ i, μ i ) U, μ j U (26) B. Algorithm Constraints (2), (24) As discussed, the original GBLP can be transformed into a single level optimization problem DMP if we can enumerate all its extreme points and extreme rays. In practice, however, it is very difficult to enumerate all the extreme points and extreme rays for a feasible region. In particular, the size of problem becomes large. To overcome the computation difficulty, Benders in [12] developed an iterative algorithm to determine the optimal solution by adding a subset of extreme points and extreme rays. Define the restricted master problem(rmp) as follows: (RMP): min z (27) z (ρ i μ j T + (μ i )T )(G Fy) + d T y (ρ i, μ i ) U r, μ j U r (28) (μ j ) T (g Ex ) 0, (μ j ) V r (29) Constraints (2) where U r, U r, V r are the reduced sets of U 2, U 1, V 1. Thus, the RMP determines an upper bound for the optimal objective of the dual problem DMP. Theorem 1: Suppose that y, z is the optimal solution of the RMP. If g and ρ, (μ ) are the optimal objective value of the subproblem and corresponding dual variables, then we have 1) if z > g, then ρ, (μ ) is the new extreme point that will be added into the master problem; 2) if z = g, then y, z is the optimal solution of the DMP; 3) if the subproblem is unbounded, then ρ, (μ ) is the new extreme ray that will be added into the master problem. Initial z lower, z upper, ε, y Solve LP1 to get K Feasible? Solve LP2 and update z lower Solve RMP and update z upper Converged? Stop Yes Yes Add infeasibility cuts No Add Optimality cuts No Fig.1 Flowchart of decomposition algorithm for GBLP Proof: Since g and ρ, (μ ) are the optimal objective value of the subproblem and corresponding dual variables, we have g = ρ K + (G Fy ) T (μ ) + d T y (30) To ensure the bound of the subproblem, constraint (31) must hold, ρ K + (G Fy ) T (μ ) + d T y 0 (ρ, μ ) V (31) z is the optimal solution of the RMP, so z = min{ρ K + (G Fy ) T (μ ) + d T y } (32) Combining (30) and (32), we have f T y + z f T y + min {ρ K + (G Fy ) T (μ ) + d T y } So, If z > g,then f T y + g (33) z g (34) z > g = ρ K + (G Fy ) T (μ ) + d T y (35) Together with (32), which gives min{ρ K + (G Fy ) T (μ ) + d T y } > ρ K + (G F y ) T (μ ) + d T y (36) This indicates that (ρ, μ ) U (37) It is a new extreme point. If z = g, then we have g min{ρ K + (G Fy ) T (μ ) + d T y } ρk + (G Fy ) + d T y (38)

4 Together with (31), we can see that (y, z ) is a feasible point of the dual problem. Consider MP is relaxed to RMP, z RMP z MP (39) Thus, (y, z ) is the optimal solution of the dual master problem. Finally, if the subproblem is unbounded. That is, the primal problem is infeasible. In this case, ρ K + (G Fy ) T (μ ) + d T y < 0 (40) As all the existing extreme rays in the RMP satisfy the following constraint ρ K + (G Fy ) T (μ ) + d T y 0 (41) Thus, It is a new generated extreme ray. (ρ, μ ) V (42) Theorem 2: The optimal solution of the DMP can be determined by solving the RMP a finite number of times. Proof: The total number of the combinations of extreme points or extreme rays in U, U, V, V is N = (m + p)(n + q) According to Theorem 1, at each iteration, one new combination of extreme points or extreme rays will be added into the master problem. Thus, the program will stop in a finite number of iterations. It should be pointed that the algorithm can find the optimal solution in N iterations in the worst case. Luckily, the iterations in practice is far less than N, which garatte the efficiency of the algorithm. This will be verified in the test cases. According to the analysis above, the entire algorithm can be described as follows: Step 1: Initial the tolerance ε, z lower =, z upper = + and the initialy = y 0 ; Step 2: For the given y, solve the optimization problem (43): min 1 T s (43) Ex s G Fy π (44) s 0 The optimization problem is used to the feasibility of y. If the objective of the optimal problem is zero, then y is feasible. In this case, go to Step 3. If the objective of the optimal problem is greater than zero, then the subproblem (5)-(6) is infeasible. In this case, we need to introduce an infeasibility cut into the master problem. π T (G Fy ) 0 (45) Step 3: Solve LP1 to get the value of K. (LP1) K = min e T x (7) Constraint (6) Step 4: Solve LP2. Suppose the optimal solution is [μ j ρ i μ i ] T, then an upper bound of the BLP is determined z lower = (ρ i μ j T + (μ i )T )(G Fy ) + d T y (46) Step 5: If the following constraint is satisfied, stop; z upper z lower z lower ε (47) Otherwise, add the following cut into the master problem z (ρ i μ j T + (μ i )T )(G Fy) + d T y (48) Step 6: Solve the master problem to update the variable y. The upper bound of BLP is the objective value of z upper = min z (49) Constraints (2), (28)-(29) and then go to Step 2. The advantage of the proposed algorithm is to reduce the execute time by solving a small number of LPs. III. CASE STUDY In this section, we test the proposed decomposition algorithm using the IEEE 118-bus system[13].the testing model is described in section A. Simulations are carried out on a 3.4GHz personal computer with 8GB of RAM. The model and algorithm are implemented in MATLAB. A. Modeling The security constrained economic dispatch(sced) is performed every 5-15 minutes based on the forecasted loads and received real-time measurements. However, the high integration of renewables and malicious false data attacks significantly increases the uncertainty of forecasted loads and real-time measurements. It has been show that the uncertainty of these data could lead to the overloading of some lines. If these line overloads cannot be mitigated immediately, severe consequences, such as cascading failures, might occur. To ensure the secure operation of a power system, it is very essential for an operator to identify these lines whose power flows could exceed the flow limits after SCED. This is done by solving the GBLP below: max u (50) u = h k /L k max (51) h = S (U P V (D J)) (52) 1 T D = 0 (53) τd d D d τd d (0 < τ < 1) (54) min c g T P + c d T J (55) 1 T P = 1 T (D J) (56) L = S U P S V (D + D J) (57) P min P P max (58) L max L L max (59)

5 0 J D + D (60) Constraint (52) gives the power flows of line k after attacks. Note that the injected false data D is not included since it is not a physical load. Without loss of generality, the maximum allowable attacking amount at a bus is set to 50% of its load. The injected false data D is summed to zero (53). Constraint (56) represents the lower power balance equation. The line flow under the interruption of false data D is determined by constraint (57). Constraints (58)-(60) represent the lower and upper bound constraints of generation, line flow, and load shedding, respectively. The upper level of the above bilevel problem simulates the attacker s attacking strategy, which is to determine the injected false data D that maximizes the potential flow of line k (51). The lower level simulates the system operator s operation strategy, which is essentially an SCED problem that minimizes the total generation cost and load shedding cost (55). B. Results The GBLP (1)-(4) is tested on the IEEE 118-bus system[13], which consists of 118 buses and 186 lines. The uncertainty of load power injection is assumed to be 50% of its actual data due to the interruption of cyber attacks. And the minimum outputs of generators are set to zeros. Without loss of generality, we only report the simulation results of the selected ten lines below. TABLE 1 TESTING RESULT FOR THE IEEE 118-BUS SYSTEM Line u gap Iterations t(s) % % % % % % % % % % In Table 1, the second column gives the line overloading level for each line. The third column represents the existing gap between the primal and dual problems. And the last two columns give the iterations and run times for the decomposition algorithm. It can be seen that lines 11-12, would be overloaded due to the uncertainty of forecasted loads and received measurements after SCED. These line are identified as high-risk lines that need to be strongly monitored for ensuring the secure operation of a power system. And the optimal solution of the GBLP can be determined fast. For example, the average run time for the IEEE 118-bus system is 0.1s. However, the KKT based approach did not converge for most lines after 5 hours. The small gap guarantees the required accuracy of the obtained solution. In addition, the algorithm converges in a small number of iterations. For instance, the maximum iterations for the IEEE 118-bus system is 10, far less than the iterations in the worst case. This verifies the computation efficiency of the proposed decomposition algorithm. IV. CONCLUSIONS AND FUTURE WORK This paper proposes an efficient decomposition algorithm to solve a GBLP. This is achieved by decomposing the GBLP into one master problem and a subproblem. The master problem is solved to update the decision variable in the upper level. And the subproblem is solved by solving two sequential LPs to generate the necessary cut added into the master problem. The simulation results on the large-size testing systems demonstrate its efficiency of the proposed decomposition algorithm. In the next work, we are going to develop a decomposition approach for bilevel mixed integer linear programming that includes some integer variables in the lower level. The difficult part is the strong duality condition might not be satisfied due to the existing integer variables. REFERENCES [1] L. P. Garces, A. J. Conejo, R. Garcia-Bertrand and R. Romero, "A bilevel approach to transmission expansion planning within a market environment", IEEE Trans. Power Syst., vol. 24, no. 3, pp , [2] Y. Yuan, Z. Li, and K. Ren, Modeling load redistribution attacks in power systems, IEEE Transaction on Smart Grid, vol. 2, no. 2, pp , Jun [3] K. C. Almeida and F. S. Senna, "Optimal active-reactive power dispatch under competition via bilevel programming", IEEE Trans. Power Syst., vol. 26, no. 4, pp , [4] X.Liu, Z.Li, X.Liu, and Z.Li Masking Transmission Line Outages via False Data Injection Attacks, IEEE Trans. IEEE Transactions on Information Forensics and Security, vol. 11, no. 7, pp , [5] T. Li and M. Shahidehpour, "Strategic bidding of transmission-constrained GENCOs with incomplete information", IEEE Trans. Power Syst., vol. 20, no. 1, pp , [6] S. Fliscounakis, P. Panciatici, F. Capitanescu and L. Wehenkel, "Contingency ranking with respect to overloads in very large power systems taking into account uncertainty, preventive, corrective actions", IEEE Trans. Power Syst., vol. 28, no. 4, pp , [7] J. M. Arroyo and F. D. Galiana, On the solution of the bilevel programming formulation of the terrorist threat problem, IEEE Trans. Power Syst., vol. 20, no. 2, pp , May [8] A. L. Motto, J. M. Arroyo, and F. D. Galiana, A mixed-integer LP procedure for the analysis of electric grid security under disruptive threat, IEEE Trans. Power Syst., vol. 20, no. 3, pp , Aug [9] A. Delgadillo, J. Arroyo, and N. Alguacil, Analysis of electric grid interdiction with line switching, IEEE Trans. Power Syst., vol. 25, no.2, pp , May [10] J. Salmeron, K. Wood, and R. Baldick, Analysis of electric grid security under terrorist threat, IEEE Trans. Power Syst., vol. 19, no. 2, pp , May [11] C. Losada, M. Scaparra, and J.R. Hamley Optimizing system resilience: A facility protection model with recovery time, European Journal of Operational Research., vol. 217, no.2, pp , Mar [12] J. F. Benders, Partitioning procedures for solving mixed-variables programming problems, Numer. Math., vol. 4, no. 1, pp ,Dec [13] R. D. Zimmerman, C. E. Murillo-Sánchez, and R. J. Thomas, MATPOWER: Steady-state operations, planning and analysis tools for power systems research and education, IEEE Transactions on Power Systems, vol. 26, no. 1, pp , Feb Xuan Liu received the B.S. and M.S degrees from Sichuan University, China, in 2008 and 2011, and Ph.D. degree from Illinois Institute of Technology, USA, in 2015, respectively. He is currently a senior research associate at the Robert Gavin Electric Innovation Center, Illinois Institute of Technology. His research interests include smart grid security, operation and economics of power systems.

Decomposition Techniques in Mathematical Programming

Decomposition Techniques in Mathematical Programming Antonio J. Conejo Enrique Castillo Roberto Minguez Raquel Garcia-Bertrand Decomposition Techniques in Mathematical Programming Engineering and Science Applications Springer Contents Part I Motivation and

More information

A Benders Decomposition Approach to Corrective Security Constrained OPF with Power Flow Control Devices

A Benders Decomposition Approach to Corrective Security Constrained OPF with Power Flow Control Devices A Benders Decomposition Approach to Corrective Security Constrained OPF with Power Flow Control Devices Javad Mohammadi, Gabriela Hug, Soummya Kar Department of Electrical and Computer Engineering Carnegie

More information

Proper Security Criteria Determination in a Power System with High Penetration of Renewable Resources

Proper Security Criteria Determination in a Power System with High Penetration of Renewable Resources Proper Security Criteria Determination in a Power System with High Penetration of Renewable Resources Mojgan Hedayati, Kory Hedman, and Junshan Zhang School of Electrical, Computer, and Energy Engineering

More information

SIGNIFICANT increase in amount of private distributed

SIGNIFICANT increase in amount of private distributed 1 Distributed DC Optimal Power Flow for Radial Networks Through Partial Primal Dual Algorithm Vahid Rasouli Disfani, Student Member, IEEE, Lingling Fan, Senior Member, IEEE, Zhixin Miao, Senior Member,

More information

A three-level MILP model for generation and transmission expansion planning

A three-level MILP model for generation and transmission expansion planning A three-level MILP model for generation and transmission expansion planning David Pozo Cámara (UCLM) Enzo E. Sauma Santís (PUC) Javier Contreras Sanz (UCLM) Contents 1. Introduction 2. Aims and contributions

More information

Cyber Attacks, Detection and Protection in Smart Grid State Estimation

Cyber Attacks, Detection and Protection in Smart Grid State Estimation 1 Cyber Attacks, Detection and Protection in Smart Grid State Estimation Yi Zhou, Student Member, IEEE Zhixin Miao, Senior Member, IEEE Abstract This paper reviews the types of cyber attacks in state estimation

More information

THE electric power system is a complex cyber-physical

THE electric power system is a complex cyber-physical Implication of Unobservable State-and-topology Cyber-physical Attacks Jiazi Zhang, Student Member, IEEE, Lalitha Sankar, Senior Member, IEEE arxiv:509.00520v [cs.sy] Sep 205 Abstract This paper studies

More information

SINGLE OBJECTIVE RISK- BASED TRANSMISSION EXPANSION

SINGLE OBJECTIVE RISK- BASED TRANSMISSION EXPANSION Vol.2, Issue.1, Jan-Feb 2012 pp-424-430 ISSN: 2249-6645 SINGLE OBJECTIVE RISK- BASED TRANSMISSION EXPANSION V.Sumadeepthi 1, K.Sarada 2 1 (Student, Department of Electrical and Electronics Engineering,

More information

Power Grid State Estimation after a Cyber-Physical Attack under the AC Power Flow Model

Power Grid State Estimation after a Cyber-Physical Attack under the AC Power Flow Model Power Grid State Estimation after a Cyber-Physical Attack under the AC Power Flow Model Saleh Soltan, Gil Zussman Department of Electrical Engineering Columbia University, New York, NY Email: {saleh,gil}@ee.columbia.edu

More information

Mixed Integer Linear Programming Formulation for Chance Constrained Mathematical Programs with Equilibrium Constraints

Mixed Integer Linear Programming Formulation for Chance Constrained Mathematical Programs with Equilibrium Constraints Mixed Integer Linear Programming Formulation for Chance Constrained Mathematical Programs with Equilibrium Constraints ayed A. adat and Lingling Fan University of outh Florida, email: linglingfan@usf.edu

More information

Benders Decomposition

Benders Decomposition Benders Decomposition Yuping Huang, Dr. Qipeng Phil Zheng Department of Industrial and Management Systems Engineering West Virginia University IENG 593G Nonlinear Programg, Spring 2012 Yuping Huang (IMSE@WVU)

More information

Benders' Method Paul A Jensen

Benders' Method Paul A Jensen Benders' Method Paul A Jensen The mixed integer programming model has some variables, x, identified as real variables and some variables, y, identified as integer variables. Except for the integrality

More information

526 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 27, NO. 1, FEBRUARY 2012

526 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 27, NO. 1, FEBRUARY 2012 526 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL 27, NO 1, FEBRUARY 2012 A Systematic Method for Constructing Feasible Solution to SCUC Problem With Analytical Feasibility Conditions Hongyu Wu, Xiaohong Guan,

More information

Sensitivity-Based Line Outage Angle Factors

Sensitivity-Based Line Outage Angle Factors Sensitivity-Based Line Outage Angle Factors Kai E. Van Horn, Alejandro D. Domínguez-García, and Peter W. Sauer Department of Electrical and Computer Engineering University of Illinois at Urbana-Champaign

More information

Optimal Load Shedding in Electric Power Grids

Optimal Load Shedding in Electric Power Grids ARGONNE NATIONAL LABORATORY 9700 South Cass Avenue Argonne, Illinois 60439 Optimal Load Shedding in Electric Power Grids Fu Lin Chen Chen Mathematics Computer Science Division Preprint ANL/MCS-P5408-0915

More information

OPTIMAL POWER FLOW (OPF) is a tool that has been

OPTIMAL POWER FLOW (OPF) is a tool that has been IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 20, NO. 2, MAY 2005 773 Cumulant-Based Probabilistic Optimal Power Flow (P-OPF) With Gaussian and Gamma Distributions Antony Schellenberg, William Rosehart, and

More information

Linear Programming: Simplex

Linear Programming: Simplex Linear Programming: Simplex Stephen J. Wright 1 2 Computer Sciences Department, University of Wisconsin-Madison. IMA, August 2016 Stephen Wright (UW-Madison) Linear Programming: Simplex IMA, August 2016

More information

Capacity Planning with uncertainty in Industrial Gas Markets

Capacity Planning with uncertainty in Industrial Gas Markets Capacity Planning with uncertainty in Industrial Gas Markets A. Kandiraju, P. Garcia Herreros, E. Arslan, P. Misra, S. Mehta & I.E. Grossmann EWO meeting September, 2015 1 Motivation Industrial gas markets

More information

Transmission expansion with smart switching under demand uncertainty and line failures

Transmission expansion with smart switching under demand uncertainty and line failures Energy Syst DOI 10.1007/s12667-016-0213-9 ORIGINAL PAPER Transmission expansion with smart switching under demand uncertainty and line failures Kathryn M. Schumacher 1 Richard Li-Yang Chen 3 Amy E. M.

More information

A DC Power Flow Extension

A DC Power Flow Extension 2013 4th IEEE PES Innovative Smart Grid Technologies Europe (ISGT Europe), October 6-9, Copenhagen 1 A DC Power Flow Extension Theodoros Kyriakidis, Rachid Cherkaoui, Maher Kayal Electronics Laboratory

More information

Solving Bilevel Mixed Integer Program by Reformulations and Decomposition

Solving Bilevel Mixed Integer Program by Reformulations and Decomposition Solving Bilevel Mixed Integer Program by Reformulations and Decomposition June, 2014 Abstract In this paper, we study bilevel mixed integer programming (MIP) problem and present a novel computing scheme

More information

Optimal Locating and Sizing of TCPST for Congestion Management in Deregulated Electricity Markets

Optimal Locating and Sizing of TCPST for Congestion Management in Deregulated Electricity Markets Optimal Locating and Sizing of TCPST for Congestion Management in Deregulated Electricity Markets M. Joorabian Shahid Chamran University, Ahwaz, Iran mjoorabian@yahoo.com M. Saniei Shahid Chamran University,

More information

Analysis of Coupling Dynamics for Power Systems with Iterative Discrete Decision Making Architectures

Analysis of Coupling Dynamics for Power Systems with Iterative Discrete Decision Making Architectures Analysis of Coupling Dynamics for Power Systems with Iterative Discrete Decision Making Architectures Zhixin Miao Department of Electrical Engineering, University of South Florida, Tampa FL USA 3362. Email:

More information

Tight and Compact MILP Formulation for the Thermal Unit Commitment Problem

Tight and Compact MILP Formulation for the Thermal Unit Commitment Problem Online Companion for Tight and Compact MILP Formulation for the Thermal Unit Commitment Problem Germán Morales-España, Jesus M. Latorre, and Andres Ramos Universidad Pontificia Comillas, Spain Institute

More information

Interior-Point Methods for Linear Optimization

Interior-Point Methods for Linear Optimization Interior-Point Methods for Linear Optimization Robert M. Freund and Jorge Vera March, 204 c 204 Robert M. Freund and Jorge Vera. All rights reserved. Linear Optimization with a Logarithmic Barrier Function

More information

Spatial and Topological Interdiction for Transmission Systems

Spatial and Topological Interdiction for Transmission Systems JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, NOVEMBER 2018 1 Spatial and Topological Interdiction for Transmission Systems Kaarthik Sundar, Sidhant Misra, Russell Bent, Feng Pan a arxiv:1904.08330v1 [math.oc]

More information

Citation for the original published paper (version of record):

Citation for the original published paper (version of record): http://www.diva-portal.org This is the published version of a paper published in SOP Transactions on Power Transmission and Smart Grid. Citation for the original published paper (version of record): Liu,

More information

WITH the increasing integration of real-time monitoring,

WITH the increasing integration of real-time monitoring, 1 Vulnerability Analysis and Consequences of False Data Injection Attac on Power System State Estimation Jingwen Liang, Student Member, IEEE, Lalitha Sanar, Member, IEEE, and Oliver Kosut, Member, IEEE

More information

Mixed-integer Bilevel Optimization for Capacity Planning with Rational Markets

Mixed-integer Bilevel Optimization for Capacity Planning with Rational Markets Mixed-integer Bilevel Optimization for Capacity Planning with Rational Markets Pablo Garcia-Herreros a, Lei Zhang b, Pratik Misra c, Sanjay Mehta c, and Ignacio E. Grossmann a a Department of Chemical

More information

3.10 Lagrangian relaxation

3.10 Lagrangian relaxation 3.10 Lagrangian relaxation Consider a generic ILP problem min {c t x : Ax b, Dx d, x Z n } with integer coefficients. Suppose Dx d are the complicating constraints. Often the linear relaxation and the

More information

Real Time Voltage Control using Genetic Algorithm

Real Time Voltage Control using Genetic Algorithm Real Time Voltage Control using Genetic Algorithm P. Thirusenthil kumaran, C. Kamalakannan Department of EEE, Rajalakshmi Engineering College, Chennai, India Abstract An algorithm for control action selection

More information

Minimization of load shedding by sequential use of linear programming and particle swarm optimization

Minimization of load shedding by sequential use of linear programming and particle swarm optimization Turk J Elec Eng & Comp Sci, Vol.19, No.4, 2011, c TÜBİTAK doi:10.3906/elk-1003-31 Minimization of load shedding by sequential use of linear programming and particle swarm optimization Mehrdad TARAFDAR

More information

A preventive control model for static voltage stability considering the active power transfer capabilities of weak branches

A preventive control model for static voltage stability considering the active power transfer capabilities of weak branches A preventive control model for static voltage stability considering the active power transfer capabilities of weak branches Xiuqiong Hu 1,2, Zhouyang Ren 2, Yiming Li 2 (1) School of Information and Electric

More information

Thermal Unit Commitment Problem

Thermal Unit Commitment Problem Thermal Unit Commitment Problem Moshe Potsane, Luyanda Ndlovu, Simphiwe Simelane Christiana Obagbuwa, Jesal Kika, Nadine Padayachi, Luke O. Joel Lady Kokela, Michael Olusanya, Martins Arasomwa, Sunday

More information

Local Cyber-physical Attack with Leveraging Detection in Smart Grid

Local Cyber-physical Attack with Leveraging Detection in Smart Grid Local Cyber-physical Attack with Leveraging Detection in Smart rid Hwei-Ming Chung, Wen-Tai Li, Chau Yuen, Wei-Ho Chung, and Chao-Kai Wen Research Center for Information Technology Innovation, Academia

More information

Reliable Power System Planning and Operations through Robust Optimization

Reliable Power System Planning and Operations through Robust Optimization University of South Florida Scholar Commons Graduate Theses and Dissertations Graduate School January 2015 Reliable Power System Planning and Operations through Robust Optimization Wei Yuan University

More information

Congestion and Price Prediction in Locational Marginal Pricing Markets Considering Load Variation and Uncertainty

Congestion and Price Prediction in Locational Marginal Pricing Markets Considering Load Variation and Uncertainty The Department of Electrical Engineering and Computer Science Congestion and Price Prediction in Locational Marginal Pricing Markets Considering Load Variation and Uncertainty Dissertation Defense Rui

More information

Introduction to Mathematical Programming

Introduction to Mathematical Programming Introduction to Mathematical Programming Ming Zhong Lecture 22 October 22, 2018 Ming Zhong (JHU) AMS Fall 2018 1 / 16 Table of Contents 1 The Simplex Method, Part II Ming Zhong (JHU) AMS Fall 2018 2 /

More information

NAVAL POSTGRADUATE SCHOOL THESIS

NAVAL POSTGRADUATE SCHOOL THESIS NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS DEFENDING ELECTRICAL POWER GRIDS by Robert W. Rose March 2007 Thesis Advisor: Second Reader: Javier Salmeron R. Kevin Wood Approved for public release;

More information

Part 4: Active-set methods for linearly constrained optimization. Nick Gould (RAL)

Part 4: Active-set methods for linearly constrained optimization. Nick Gould (RAL) Part 4: Active-set methods for linearly constrained optimization Nick Gould RAL fx subject to Ax b Part C course on continuoue optimization LINEARLY CONSTRAINED MINIMIZATION fx subject to Ax { } b where

More information

Analyzing the Effect of Loadability in the

Analyzing the Effect of Loadability in the Analyzing the Effect of Loadability in the Presence of TCSC &SVC M. Lakshmikantha Reddy 1, V. C. Veera Reddy 2, Research Scholar, Department of Electrical Engineering, SV University, Tirupathi, India 1

More information

A MIXED INTEGER DISJUNCTIVE MODEL FOR TRANSMISSION NETWORK EXPANSION

A MIXED INTEGER DISJUNCTIVE MODEL FOR TRANSMISSION NETWORK EXPANSION A MIXED INTEGER DISJUNCTIVE MODEL FOR TRANSMISSION NETWORK EXPANSION Laura Bahiense*, Gerson C. Oliveira (PUC/Rio), Mario Pereira*, Member, Sergio Granville*, Member Abstract: The classical non-linear

More information

Optimality, Duality, Complementarity for Constrained Optimization

Optimality, Duality, Complementarity for Constrained Optimization Optimality, Duality, Complementarity for Constrained Optimization Stephen Wright University of Wisconsin-Madison May 2014 Wright (UW-Madison) Optimality, Duality, Complementarity May 2014 1 / 41 Linear

More information

Benders Decomposition Methods for Structured Optimization, including Stochastic Optimization

Benders Decomposition Methods for Structured Optimization, including Stochastic Optimization Benders Decomposition Methods for Structured Optimization, including Stochastic Optimization Robert M. Freund April 29, 2004 c 2004 Massachusetts Institute of echnology. 1 1 Block Ladder Structure We consider

More information

Section Notes 9. Midterm 2 Review. Applied Math / Engineering Sciences 121. Week of December 3, 2018

Section Notes 9. Midterm 2 Review. Applied Math / Engineering Sciences 121. Week of December 3, 2018 Section Notes 9 Midterm 2 Review Applied Math / Engineering Sciences 121 Week of December 3, 2018 The following list of topics is an overview of the material that was covered in the lectures and sections

More information

Stochastic Unit Commitment with Topology Control Recourse for Renewables Integration

Stochastic Unit Commitment with Topology Control Recourse for Renewables Integration 1 Stochastic Unit Commitment with Topology Control Recourse for Renewables Integration Jiaying Shi and Shmuel Oren University of California, Berkeley IPAM, January 2016 33% RPS - Cumulative expected VERs

More information

Network Flows. 6. Lagrangian Relaxation. Programming. Fall 2010 Instructor: Dr. Masoud Yaghini

Network Flows. 6. Lagrangian Relaxation. Programming. Fall 2010 Instructor: Dr. Masoud Yaghini In the name of God Network Flows 6. Lagrangian Relaxation 6.3 Lagrangian Relaxation and Integer Programming Fall 2010 Instructor: Dr. Masoud Yaghini Integer Programming Outline Branch-and-Bound Technique

More information

A new primal-dual framework for European day-ahead electricity auctions

A new primal-dual framework for European day-ahead electricity auctions A new primal-dual framework for European day-ahead electricity auctions Mehdi Madani*, Mathieu Van Vyve** *Louvain School of management, ** CORE Catholic University of Louvain Mathematical Models and Methods

More information

Topology-Driven Performance Analysis of Power Grids

Topology-Driven Performance Analysis of Power Grids Topology-Driven Performance Analysis of Power Grids Hale Çetinay, Yakup Koç, Fernando A. Kuipers, Piet Van Mieghem Abstract Direct connections between nodes usually result in efficient transmission in

More information

An Adaptive Partition-based Approach for Solving Two-stage Stochastic Programs with Fixed Recourse

An Adaptive Partition-based Approach for Solving Two-stage Stochastic Programs with Fixed Recourse An Adaptive Partition-based Approach for Solving Two-stage Stochastic Programs with Fixed Recourse Yongjia Song, James Luedtke Virginia Commonwealth University, Richmond, VA, ysong3@vcu.edu University

More information

Multi-Area Stochastic Unit Commitment for High Wind Penetration

Multi-Area Stochastic Unit Commitment for High Wind Penetration Multi-Area Stochastic Unit Commitment for High Wind Penetration Workshop on Optimization in an Uncertain Environment Anthony Papavasiliou, UC Berkeley Shmuel S. Oren, UC Berkeley March 25th, 2011 Outline

More information

minimize x subject to (x 2)(x 4) u,

minimize x subject to (x 2)(x 4) u, Math 6366/6367: Optimization and Variational Methods Sample Preliminary Exam Questions 1. Suppose that f : [, L] R is a C 2 -function with f () on (, L) and that you have explicit formulae for

More information

Smart Grid State Estimation by Weighted Least Square Estimation

Smart Grid State Estimation by Weighted Least Square Estimation International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 8958, Volume-5, Issue-6, August 2016 Smart Grid State Estimation by Weighted Least Square Estimation Nithin V G, Libish T

More information

Robustness Analysis of Power Grid under False Data Attacks Against AC State Estimation

Robustness Analysis of Power Grid under False Data Attacks Against AC State Estimation Robustness Analysis of Power Grid under False Data Attacks Against AC State Estimation Presenter: Ming Jin INFORMS 2017 Ming Jin, Prof Javad Lavaei, and Prof Karl Johansson 1 Power system resilience against

More information

Contingency Ranking With Respect to Overloads in Very Large Power Systems Taking Into Account Uncertainty, Preventive, and Corrective Actions

Contingency Ranking With Respect to Overloads in Very Large Power Systems Taking Into Account Uncertainty, Preventive, and Corrective Actions IEEE TRANSACTIONS ON POWER SYSTEMS 1 Contingency Ranking With Respect to Overloads in Very Large Power Systems Taking Into Account Uncertainty, Preventive, and Corrective Actions Stéphane Fliscounakis,

More information

Multi-Area Interchange Scheduling under Uncertainty

Multi-Area Interchange Scheduling under Uncertainty 1 Multi-Area Interchange Scheduling under Uncertainty Yuting Ji, Student Member, IEEE, and Lang Tong, Fellow, IEEE arxiv:1611.05012v1 [math.oc] 15 Nov 2016 Abstract The problem of multi-area interchange

More information

Power Grid Security Analysis : An Optimization Approach

Power Grid Security Analysis : An Optimization Approach Power Grid Security Analysis : An Optimization Approach by Abhinav Verma Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Graduate School of Arts and Sciences

More information

Appendix A Taylor Approximations and Definite Matrices

Appendix A Taylor Approximations and Definite Matrices Appendix A Taylor Approximations and Definite Matrices Taylor approximations provide an easy way to approximate a function as a polynomial, using the derivatives of the function. We know, from elementary

More information

Behavior of Power System Equilibrium Points in Dynamic Available Transfer Capability Calculation

Behavior of Power System Equilibrium Points in Dynamic Available Transfer Capability Calculation Behavior of Power System Equilibrium Points in Dynamic Available Transfer Capability Calculation Mohamed Shaaban * Department of Electrical and Electronic Engineering, Faculty of Engineering, Universiti

More information

Decision making under uncertainty in power system using Benders decomposition

Decision making under uncertainty in power system using Benders decomposition Graduate Theses and Dissertations Graduate College 2008 Decision making under uncertainty in power system using Benders decomposition Yuan Li Iowa State University Follow this and additional works at:

More information

SHort-term power systems operation and control (e.g. from

SHort-term power systems operation and control (e.g. from 1 Cautious operation planning under uncertainties Florin Capitanescu, Stéphane Fliscounakis, Patrick Panciatici, and Louis Wehenkel Abstract This paper deals with day-ahead power systems security planning

More information

Robustness Adjustment of Two-Stage Robust Security-Constrained Unit Commitment

Robustness Adjustment of Two-Stage Robust Security-Constrained Unit Commitment Robustness Adjustment of Two-Stage Robust Secury-Constrained Un Commment Ping Liu MISSISSIPPI STATE UNIVERSITY U.S.A October 23, 204 Challenges in smart grid Integration of renewable energy and prediction

More information

Quantifying Cyber Security for Networked Control Systems

Quantifying Cyber Security for Networked Control Systems Quantifying Cyber Security for Networked Control Systems Henrik Sandberg ACCESS Linnaeus Centre, KTH Royal Institute of Technology Joint work with: André Teixeira, György Dán, Karl H. Johansson (KTH) Kin

More information

State Estimation and Power Flow Analysis of Power Systems

State Estimation and Power Flow Analysis of Power Systems JOURNAL OF COMPUTERS, VOL. 7, NO. 3, MARCH 01 685 State Estimation and Power Flow Analysis of Power Systems Jiaxiong Chen University of Kentucky, Lexington, Kentucky 40508 U.S.A. Email: jch@g.uky.edu Yuan

More information

Stable interconnection of continuous-time price-bidding mechanisms with power network dynamics

Stable interconnection of continuous-time price-bidding mechanisms with power network dynamics Stable interconnection of continuous-time price-bidding mechanisms with power network dynamics Tjerk Stegink, Ashish Cherukuri, Claudio De Persis, Arjan van der Schaft and Jorge Cortés Jan C. Willems Center

More information

Primal-Dual Interior-Point Methods for Linear Programming based on Newton s Method

Primal-Dual Interior-Point Methods for Linear Programming based on Newton s Method Primal-Dual Interior-Point Methods for Linear Programming based on Newton s Method Robert M. Freund March, 2004 2004 Massachusetts Institute of Technology. The Problem The logarithmic barrier approach

More information

Lagrange duality. The Lagrangian. We consider an optimization program of the form

Lagrange duality. The Lagrangian. We consider an optimization program of the form Lagrange duality Another way to arrive at the KKT conditions, and one which gives us some insight on solving constrained optimization problems, is through the Lagrange dual. The dual is a maximization

More information

Reduced MIP Formulation for Transmission Topology Control

Reduced MIP Formulation for Transmission Topology Control Reduced MIP Formulation for Transmission Topology Control Pablo A. Ruiz, Aleksandr Rudkevich, Michael C. Caramanis, Evgenyi Goldis, Elli Ntakou, and C. Russ Philbrick. Abstract The standard optimal power

More information

CE 191: Civil & Environmental Engineering Systems Analysis. LEC 17 : Final Review

CE 191: Civil & Environmental Engineering Systems Analysis. LEC 17 : Final Review CE 191: Civil & Environmental Engineering Systems Analysis LEC 17 : Final Review Professor Scott Moura Civil & Environmental Engineering University of California, Berkeley Fall 2014 Prof. Moura UC Berkeley

More information

i.e., into a monomial, using the Arithmetic-Geometric Mean Inequality, the result will be a posynomial approximation!

i.e., into a monomial, using the Arithmetic-Geometric Mean Inequality, the result will be a posynomial approximation! Dennis L. Bricker Dept of Mechanical & Industrial Engineering The University of Iowa i.e., 1 1 1 Minimize X X X subject to XX 4 X 1 0.5X 1 Minimize X X X X 1X X s.t. 4 1 1 1 1 4X X 1 1 1 1 0.5X X X 1 1

More information

Contents Economic dispatch of thermal units

Contents Economic dispatch of thermal units Contents 2 Economic dispatch of thermal units 2 2.1 Introduction................................... 2 2.2 Economic dispatch problem (neglecting transmission losses)......... 3 2.2.1 Fuel cost characteristics........................

More information

ECE Optimization for wireless networks Final. minimize f o (x) s.t. Ax = b,

ECE Optimization for wireless networks Final. minimize f o (x) s.t. Ax = b, ECE 788 - Optimization for wireless networks Final Please provide clear and complete answers. PART I: Questions - Q.. Discuss an iterative algorithm that converges to the solution of the problem minimize

More information

Part 4. Decomposition Algorithms

Part 4. Decomposition Algorithms In the name of God Part 4. 4.4. Column Generation for the Constrained Shortest Path Problem Spring 2010 Instructor: Dr. Masoud Yaghini Constrained Shortest Path Problem Constrained Shortest Path Problem

More information

Mohd Jamil Khan and 2 Yogesh Kumar. Churu, Raj., India.

Mohd Jamil Khan and 2 Yogesh Kumar. Churu, Raj., India. International Journal of Mathematics Research. ISSN 0976-5840 Volume 8, Number 3 (2016), pp. 251-263 International Research Publication House http://www.irphouse.com Optimal Power Flow (OPF) formulation

More information

Support Vector Machines: Maximum Margin Classifiers

Support Vector Machines: Maximum Margin Classifiers Support Vector Machines: Maximum Margin Classifiers Machine Learning and Pattern Recognition: September 16, 2008 Piotr Mirowski Based on slides by Sumit Chopra and Fu-Jie Huang 1 Outline What is behind

More information

Accelerating the Convergence of MIP-based Unit Commitment Problems

Accelerating the Convergence of MIP-based Unit Commitment Problems Accelerating the Convergence of MIP-based Unit Commitment Problems The Impact of High Quality MIP Formulations ermán Morales-España, Delft University of Technology, Delft, The Netherlands Optimization

More information

Primal/Dual Decomposition Methods

Primal/Dual Decomposition Methods Primal/Dual Decomposition Methods Daniel P. Palomar Hong Kong University of Science and Technology (HKUST) ELEC5470 - Convex Optimization Fall 2018-19, HKUST, Hong Kong Outline of Lecture Subgradients

More information

Column Generation for Extended Formulations

Column Generation for Extended Formulations 1 / 28 Column Generation for Extended Formulations Ruslan Sadykov 1 François Vanderbeck 2,1 1 INRIA Bordeaux Sud-Ouest, France 2 University Bordeaux I, France ISMP 2012 Berlin, August 23 2 / 28 Contents

More information

Duality Methods in Portfolio Allocation with Transaction Constraints and Uncertainty

Duality Methods in Portfolio Allocation with Transaction Constraints and Uncertainty Duality Methods in Portfolio Allocation with Transaction Constraints and Uncertainty Christopher W. Miller Department of Mathematics University of California, Berkeley January 9, 2014 Project Overview

More information

Lagrangean relaxation

Lagrangean relaxation Lagrangean relaxation Giovanni Righini Corso di Complementi di Ricerca Operativa Joseph Louis de la Grange (Torino 1736 - Paris 1813) Relaxations Given a problem P, such as: minimize z P (x) s.t. x X P

More information

15-780: LinearProgramming

15-780: LinearProgramming 15-780: LinearProgramming J. Zico Kolter February 1-3, 2016 1 Outline Introduction Some linear algebra review Linear programming Simplex algorithm Duality and dual simplex 2 Outline Introduction Some linear

More information

Multiobjective Mixed-Integer Stackelberg Games

Multiobjective Mixed-Integer Stackelberg Games Solving the Multiobjective Mixed-Integer SCOTT DENEGRE TED RALPHS ISE Department COR@L Lab Lehigh University tkralphs@lehigh.edu EURO XXI, Reykjavic, Iceland July 3, 2006 Outline Solving the 1 General

More information

Solving Dual Problems

Solving Dual Problems Lecture 20 Solving Dual Problems We consider a constrained problem where, in addition to the constraint set X, there are also inequality and linear equality constraints. Specifically the minimization problem

More information

Interior Point Methods. We ll discuss linear programming first, followed by three nonlinear problems. Algorithms for Linear Programming Problems

Interior Point Methods. We ll discuss linear programming first, followed by three nonlinear problems. Algorithms for Linear Programming Problems AMSC 607 / CMSC 764 Advanced Numerical Optimization Fall 2008 UNIT 3: Constrained Optimization PART 4: Introduction to Interior Point Methods Dianne P. O Leary c 2008 Interior Point Methods We ll discuss

More information

Decomposition methods in optimization

Decomposition methods in optimization Decomposition methods in optimization I Approach I: I Partition problem constraints into two groups: explicit and implicit I Approach II: I Partition decision variables into two groups: primary and secondary

More information

Two-Layer Network Equivalent for Electromagnetic Transients

Two-Layer Network Equivalent for Electromagnetic Transients 1328 IEEE TRANSACTIONS ON POWER DELIVERY, VOL. 18, NO. 4, OCTOBER 2003 Two-Layer Network Equivalent for Electromagnetic Transients Mohamed Abdel-Rahman, Member, IEEE, Adam Semlyen, Life Fellow, IEEE, and

More information

Power Grid Vulnerability to Geographically Correlated Failures - Analysis and Control Implications

Power Grid Vulnerability to Geographically Correlated Failures - Analysis and Control Implications Power Grid Vulnerability to Geographically Correlated Failures - Analysis and Control Implications Andrey Bernstein 1, Daniel Bienstock 2, David Hay 3, Meric Uzunoglu 4, Gil Zussman 5 1 Computer and Communication

More information

Applied Lagrange Duality for Constrained Optimization

Applied Lagrange Duality for Constrained Optimization Applied Lagrange Duality for Constrained Optimization February 12, 2002 Overview The Practical Importance of Duality ffl Review of Convexity ffl A Separating Hyperplane Theorem ffl Definition of the Dual

More information

Cascading Outages in Power Systems. Rui Yao

Cascading Outages in Power Systems. Rui Yao Cascading Outages in Power Systems Rui Yao yaorui.thu@gmail.com Outline Understanding cascading outages Characteristics of cascading outages Mitigation of cascading outages Understanding cascading outages

More information

Column Generation. ORLAB - Operations Research Laboratory. Stefano Gualandi. June 14, Politecnico di Milano, Italy

Column Generation. ORLAB - Operations Research Laboratory. Stefano Gualandi. June 14, Politecnico di Milano, Italy ORLAB - Operations Research Laboratory Politecnico di Milano, Italy June 14, 2011 Cutting Stock Problem (from wikipedia) Imagine that you work in a paper mill and you have a number of rolls of paper of

More information

"SYMMETRIC" PRIMAL-DUAL PAIR

SYMMETRIC PRIMAL-DUAL PAIR "SYMMETRIC" PRIMAL-DUAL PAIR PRIMAL Minimize cx DUAL Maximize y T b st Ax b st A T y c T x y Here c 1 n, x n 1, b m 1, A m n, y m 1, WITH THE PRIMAL IN STANDARD FORM... Minimize cx Maximize y T b st Ax

More information

Parallel PIPS-SBB Multi-level parallelism for 2-stage SMIPS. Lluís-Miquel Munguia, Geoffrey M. Oxberry, Deepak Rajan, Yuji Shinano

Parallel PIPS-SBB Multi-level parallelism for 2-stage SMIPS. Lluís-Miquel Munguia, Geoffrey M. Oxberry, Deepak Rajan, Yuji Shinano Parallel PIPS-SBB Multi-level parallelism for 2-stage SMIPS Lluís-Miquel Munguia, Geoffrey M. Oxberry, Deepak Rajan, Yuji Shinano ... Our contribution PIPS-PSBB*: Multi-level parallelism for Stochastic

More information

In the original knapsack problem, the value of the contents of the knapsack is maximized subject to a single capacity constraint, for example weight.

In the original knapsack problem, the value of the contents of the knapsack is maximized subject to a single capacity constraint, for example weight. In the original knapsack problem, the value of the contents of the knapsack is maximized subject to a single capacity constraint, for example weight. In the multi-dimensional knapsack problem, additional

More information

Minimal Impact Corrective Actions in Security-Constrained Optimal Power Flow via Sparsity Regularization

Minimal Impact Corrective Actions in Security-Constrained Optimal Power Flow via Sparsity Regularization SUBMITTED TO IEEE TRANSACTIONS ON POWER SYSTEMS, JULY 2014 1 Minimal Impact Corrective Actions in Security-Constrained Optimal Power Flow via Sparsity Regularization Dzung T. Phan and Xu Andy Sun Abstract

More information

Review of Optimization Basics

Review of Optimization Basics Review of Optimization Basics. Introduction Electricity markets throughout the US are said to have a two-settlement structure. The reason for this is that the structure includes two different markets:

More information

Lecture #21. c T x Ax b. maximize subject to

Lecture #21. c T x Ax b. maximize subject to COMPSCI 330: Design and Analysis of Algorithms 11/11/2014 Lecture #21 Lecturer: Debmalya Panigrahi Scribe: Samuel Haney 1 Overview In this lecture, we discuss linear programming. We first show that the

More information

Motivation. Lecture 2 Topics from Optimization and Duality. network utility maximization (NUM) problem:

Motivation. Lecture 2 Topics from Optimization and Duality. network utility maximization (NUM) problem: CDS270 Maryam Fazel Lecture 2 Topics from Optimization and Duality Motivation network utility maximization (NUM) problem: consider a network with S sources (users), each sending one flow at rate x s, through

More information

Reliability-Security Constrained Unit Commitment with Hybrid Optimization Method

Reliability-Security Constrained Unit Commitment with Hybrid Optimization Method Reliability-Security Constrained Unit Commitment with Hybrid Optimization Method Ahmad Heidari 1, Mohammad Reza Alizadeh Pahlavani 2, Hamid Dehghani 3 1, 2, 3 Malek-Ashtar University of Technology (MUT),

More information

MEDIUM-TERM HYDROPOWER SCHEDULING BY STOCHASTIC DUAL DYNAMIC INTEGER PROGRAMMING: A CASE STUDY

MEDIUM-TERM HYDROPOWER SCHEDULING BY STOCHASTIC DUAL DYNAMIC INTEGER PROGRAMMING: A CASE STUDY MEDIUM-TERM HYDROPOWER SCHEDULING BY STOCHASTIC DUAL DYNAMIC INTEGER PROGRAMMING: A CASE STUDY Martin Hjelmeland NTNU Norwegian University of Science and Technology, Trondheim, Norway. martin.hjelmeland@ntnu.no

More information

Improvements to Benders' decomposition: systematic classification and performance comparison in a Transmission Expansion Planning problem

Improvements to Benders' decomposition: systematic classification and performance comparison in a Transmission Expansion Planning problem Improvements to Benders' decomposition: systematic classification and performance comparison in a Transmission Expansion Planning problem Sara Lumbreras & Andrés Ramos July 2013 Agenda Motivation improvement

More information