Interior Point Methods for Optimal Power Flow: Linear Algebra Goodies. OPF contingency generation
|
|
- Terence Farmer
- 5 years ago
- Views:
Transcription
1 Interior Point Methods for Optimal Power Flow: Linear Algebra Goodies and Contingency Generation (joint work with Nai Yuan Chiang, Argonne National Lab) School of Mathematics, University of Edinburgh IMA Numerical Analysis 2014, 3-5 September, Birmingham T H E U N I V E R S I T Y O H F E D I N B U R G
2 USA August 2003 before 4.05pm after 4.10pm 50 million people disconnected within 5 min
3 US-Canada Power System Outage Task Force: Interim Report: Causes of the August 14 th Blackout in the United States and Canada, November 2003
4 US-Canada Power System Outage Task Force: Interim Report: Causes of the August 14 th Blackout in the United States and Canada, November 2003
5 Challenges for the Energy Industry Power Systems operation faces new challenges Competition/increasingly guided by market principles Increasing integration of renewables (uncertainty) Expansion of distributed generation/smart grid Transmission capacity does not keep up, expansion is politically contentious. Secure operation of networks becomes increasingly important!
6 Challenges for the Energy Industry Power Systems operation faces new challenges Competition/increasingly guided by market principles Increasing integration of renewables (uncertainty) Expansion of distributed generation/smart grid Transmission capacity does not keep up, expansion is politically contentious. Secure operation of networks becomes increasingly important! Power System operation needs to be designed robustly Traditionally achieved by use of safety margins Increasing need to take network contingencies into account explicitly Security constrained Optimal Power Flow
7 Challenges for the Energy Industry Power Systems operation faces new challenges Competition/increasingly guided by market principles Increasing integration of renewables (uncertainty) Expansion of distributed generation/smart grid Transmission capacity does not keep up, expansion is politically contentious. Secure operation of networks becomes increasingly important! Security Constrained Optimal Power Flow (SCOPF) Important both in its own right and as a subproblem for Unit Commitment Transmission switching etc
8 Overview The Problem Power systems 101 Optimal Power Flow & Security constraints AC OPF vs DC OPF Linear Algebra Goodies Interior Point Methods Compact factorization Iterative methods & preconditioners Contingency Generation Motivation IPM, warmstarting & theory Results
9 Optimal Power Flow
10 Security Constrained Optimal Power Flow Optimal Power Flow (OPF) Optimal Power Flow is the problem of deciding on (cost) optimal electricity generator outputs to meet demand without overloading the transmission network Solved at a given time for known demand
11 Security Constrained Optimal Power Flow Optimal Power Flow (OPF) Optimal Power Flow is the problem of deciding on (cost) optimal electricity generator outputs to meet demand without overloading the transmission network Solved at a given time for known demand Need to model all lines in the network Power flows are AC: represented by complex flows (or real and reactive components) nonlinear network constraints
12 Security Constrained Optimal Power Flow Optimal Power Flow (OPF) Optimal Power Flow is the problem of deciding on (cost) optimal electricity generator outputs to meet demand without overloading the transmission network Solved at a given time for known demand Need to model all lines in the network Power flows are AC: represented by complex flows (or real and reactive components) nonlinear network constraints Unlike other transportation networks, operator has no control over routing. Routing is determined by physics! Kirchhoffs Laws.
13 Power Systems Operation 101
14 Power System Operation Network b B Buses l = (bb ) L Lines g G Generators (at bus o g ) Power flows are AC. Described by real and reactive flows over lines, voltage and phase angle at buses Variables v b Voltage level at bus b δ b Phase angle at bus b p bb,q bb Real and reactive power flow on line l = (bb ) pg G, qg G Real and reactive power output at generator g
15 Power System Operation Network b B Buses l = (bb ) L Lines g G Generators (at bus o g ) Parameters of the model are: line/bus characteristics, real/reactive demands, limits on power flow and voltages Parameters G bb,b bb C b P D b,qd b conductance and susceptance of line l (reciprocals of resistance and reactance) bus susceptance real and reactive power demand at bus b
16 Power System Operation Operator decides on real generation level and voltages at generators. Power flows and reactive generation arrange themselves so as to satisfy power flow equations (Kirchhoff Laws) Constraints Kirchhoff Voltage Law (KVL) p L bb = v b[g bb (v b v b cos(δ i δ j )) + B bb v b sin(δ b δ b )] q L bb = v b[ G bb v b sin(δ i δ j ) + B bb (v b cos(δ b δ b ) v b )] Kirchhoff Current Law (KCL) pg G PD b = g o g=b g o g=b q G g Q D b = (b,b ) L (b,b ) L p bb, b B, q bb + C b v b 2, b B
17 Power System Operation Operator decides on real generation level and voltages at generators. Power flows and reactive generation arrange themselves so as to satisfy power flow equations (Kirchhoff Laws) Constraints Kirchhoff Voltage Law (KVL) p L bb = v b[g bb (v b v b cos(δ i δ j )) + B bb v b sin(δ b δ b )] q L bb = v b[ G bb v b sin(δ i δ j ) + B bb (v b cos(δ b δ b ) v b )] Kirchhoff Current Law (KCL) pg G PD b = g o g=b g o g=b q G g Q D b = (b,b ) L (b,b ) L p bb, b B, q bb + C b v b 2, b B Note: p L bb p L b b,ql bb q L b b due to line losses!
18 Power System Operation Line flows and generator reactive output should satisfy Operational Limits Line Flow Limits at both ends of each line (p bb ) 2 + (q bb ) 2 f l 2, (pb b) 2 + (q b b) 2 f l 2 Voltage limits at buses V min v b V max reactive generation limits at generators Q min g q G g Q max g
19 Power System Operation The variables of the OPF model can be divided into control and state variables Control u (set by the system operator) pg G real power output at generators v g voltage levels at generation buses State x (determined by Kirchhoff s laws) v b voltage levels at non-generating buses qg G reactive power output at generators δ b phase angles p bb,q bb real and reactive power flows over lines OPF model min u U f (u) s.t. KL(u,x) = 0 (Kirchhoff s laws) g(x) 0 (Operational limits)
20 Power System Operation The variables of the OPF model can be divided into control and state variables Control u (set by the system operator) pg G real power output at generators v g voltage levels at generation buses State x (determined by Kirchhoff s laws) v b voltage levels at non-generating buses qg G reactive power output at generators δ b phase angles p bb,q bb real and reactive power flows over lines OPF model min u U f (u) s.t. KL(u,x) = 0 (Kirchhoff s laws) g(x) 0 (Operational limits) Nonlinear! nonconvex! May have local solutions!
21 Security Constrained Optimal Power Flow Robustification of OPF Things go wrong: Lines do fail Security-constrained OPF (SCOPF) Find a (cost optimal) generation schedule that is feasible with respect to network limits (line flows, bus voltages) even if any one line should fail (while meeting given demand)
22 Security Constrained Optimal Power Flow Robustification of OPF Things go wrong: Lines do fail Security-constrained OPF (SCOPF) Find a (cost optimal) generation schedule that is feasible with respect to network limits (line flows, bus voltages) even if any one line should fail (while meeting given demand) Contingency Scenarios Typically consider all (single) line and bus (node) failures (n 1) secure operation Many operators require (n 2). Becomes computationally very expensive!
23 Security Constrained Optimal Power Flow Robustification of OPF Things go wrong: Lines do fail Security-constrained OPF (SCOPF) Find a (cost optimal) generation schedule that is feasible with respect to network limits (line flows, bus voltages) even if any one line should fail (while meeting given demand) Two-Stage Setup (like Stochastic Programming) First stage decides on generation levels for all generators Second stage corresponds to contingency scenarios (evaluate consequences of line/bus failures)
24 Security Constrained Optimal Power Flow Robustification of OPF Things go wrong: Lines do fail Security-constrained OPF (SCOPF) Find a (cost optimal) generation schedule that is feasible with respect to network limits (line flows, bus voltages) even if any one line should fail (while meeting given demand) Two-Stage Setup (like Stochastic Programming) First stage decides on generation levels for all generators Second stage corresponds to contingency scenarios (evaluate consequences of line/bus failures) Scenarios only evaluate feasibility of first stage decisions. No objective contribution! No recourse action!
25 Security Constrained Optimal Power Flow Robustification of OPF Things go wrong: Lines do fail Security-constrained OPF (SCOPF) Find a (cost optimal) generation schedule that is feasible with respect to network limits (line flows, bus voltages) even if any one line should fail (while meeting given demand) Two-Stage Setup (like Stochastic Programming) First stage decides on generation levels for all generators Second stage corresponds to contingency scenarios (evaluate consequences of line/bus failures) Scenarios only evaluate feasibility of first stage decisions. No objective contribution! No recourse action! Observation Only a few contingency scenarios are needed/active to determine the solution. How to find them?
26 (n-1) secure OPF In case of equipment (line/bus) failure, power flows will rearrange themselves according to the power flow equations Control variables u = (p G g,v g) same for all contingencies, Each contingency has its own set of state variables x c = (v b,c,q G b,c,δ b,c,p bb,c,q bb,c) determined by Kirchhoff s laws for the reduced network (KL c ) Seek a setting of control variables that does not lead to violation of operational limits in any contingency SCOPF model min u U f (u) s.t. KL c (u,x c ) = 0 c C g c (x c ) 0 c C
27 Structure of SCOPF problem SCOPF model min u U f (u) s.t. KL c (u,x c ) = 0 c C g c (x c ) 0 c C Structure of Jacobian KL 1 x 1 KL c u g 1 x KL C KL C x C u g C x C 0
28 Structure of SCOPF problem SCOPF model min u U Structure of Jacobian f (u) s.t. KL c (u,x c ) = 0 c C g c (x c ) 0 c C KL 1 KL c x 1 u g 1 x 1 T0 1 W KL C KL C x C u g C x C 0 W C T C Bordered block-diagonal matrix.
29 The DC OPF problem The OPF model can simplified under the following assumptions: Voltage level at all buses is the same: v b = 1, b B. The resistance of each line is small compared to reactance: B bb G bb assume G bb = 0. Phase angle difference across each line is small sin(δ 1 δ 2 ) δ 1 δ 2,cos(δ 1 δ 2 ) 1, q L bb = 0. DC -OPF model Kirchhoff Voltage Law p L bb = B bb (δ b δ b ), Kirchhoff Current Law pg G = g o g=b (b,b ) L Line Flow Limits: f l p L l f l, p L (b,b ) + PD b, l L (bb ) L b B
30 The DC OPF problem The OPF model can simplified under the following assumptions: Voltage level at all buses is the same: v b = 1, b B. The resistance of each line is small compared to reactance: B bb G bb assume G bb = 0. Phase angle difference across each line is small sin(δ 1 δ 2 ) δ 1 δ 2,cos(δ 1 δ 2 ) 1, q L bb = 0. DC -OPF model Kirchhoff Voltage Law p L bb = B bb (δ b δ b ), Kirchhoff Current Law pg G = g o g=b (b,b ) L Line Flow Limits: f l p L l f l, p L (b,b ) + PD b, l L (bb ) L b B DC OPF is a linear programming problem
31 Structure of DC OPF problem the DC-OPF problem can be written as DC-OPF where min c p G s.t. R p L +A δ = 0 A p L J p G = P D bus/generator incidence matrix J IR B G node/arc incidence matrix A IR B L R = diag(1/b 1,...,1/B L )
32 Structure of DC OPF problem the DC-OPF problem can be written as DC-OPF where min c p G s.t. R p L +A δ = 0 A p L J p G = P D bus/generator incidence matrix J IR B G node/arc incidence matrix A IR B L R = diag(1/b 1,...,1/B L ) Augmented system like structure!
33 Structure of (n-1) secure DC OPF SCOPF (DC version) min c p G p G,p L,δ s.t. Rp1 L +A 1 δ 1 = 0 A 1 p1 L Jp G = P D.... =. Rp C G +A C δ C = 0 A C p C G Jp G = P D
34 Structure of (n-1) secure DC OPF SCOPF (DC version) min c p G p G,p L,δ s.t. Rp1 L +A 1 δ 1 = 0 A 1 W p1 L 1 T Jp 1 G = P D.... =. Rp C G +A C δ C = 0 A C W p C G C T Jp C G = P D Bordered block-diagonal matrix.
35 whistle stop tour of Interior Point Methods
36 Interior Point Methods (for LP) Linear Program KKT Conditions minc x s.t. Ax = b x 0 c A λ s = 0 Ax = b XSe = 0 x,s X = diag(x), S = diag(s) 0 (LP) (KKT)
37 Interior Point Methods (for LP) Barrier Problem minc x µ lnx i s.t. Ax = b x 0 (LP µ ) KKT Conditions c A λ s = 0 Ax = b XSe = µe x,s 0 (KKT µ ) Introduce logarithmic barriers for x 0
38 Interior Point Methods (for LP) Barrier Problem minc x µ lnx i s.t. Ax = b x 0 (LP µ ) KKT Conditions c A λ s = 0 Ax = b XSe = µe x,s 0 (KKT µ ) Introduce logarithmic barriers for x 0 (LP µ ) is strictly convex System (KKT µ ) can be solved per Newton-Method
39 Interior Point Methods (for LP) Barrier Problem minc x µ lnx i s.t. Ax = b x 0 (LP µ ) KKT Conditions c A λ s = 0 Ax = b XSe = µe x,s 0 (KKT µ ) Introduce logarithmic barriers for x 0 (LP µ ) is strictly convex System (KKT µ ) can be solved per Newton-Method For µ 0 solution of (LP µ ) converges to solution of (LP)
40 Interior Point Methods (for LP) KKT conditions c A λ s = 0 Ax = b XSe = µe x,s 0 (KKT µ )
41 Interior Point Methods (for LP) KKT conditions c A λ s = 0 Ax = b XSe = µe x,s 0 (KKT µ ) Newton-Step 0 A I A 0 0 S 0 X x λ s = ξ c ξ b r xs := c A λ s b Ax µ + e XSe
42 Interior Point Methods (for LP) KKT conditions c A λ s = 0 Ax = b XSe = µe x,s 0 (KKT µ ) Newton-Step 0 A I A 0 0 S 0 X x λ s = ξ c ξ b r xs := c A λ s b Ax µ + e XSe Newton Step (reduced) [ Θ A A 0 ][ x y ] [ ξc X = 1 r xs where Θ = X 1 S, X = diag(x), S = diag(s) ξ b ]
43 Solving NLP by Interior Point Method NLP min f (x) s.t. g(x) 0 (NLP )
44 Solving NLP by Interior Point Method NLP minf (x) µ lnz i s.t. g(x) + z = 0 z 0 (NLP µ )
45 Solving NLP by Interior Point Method NLP minf (x) µ lnz i s.t. g(x) + z = 0 z 0 (NLP ) Optimality conditions Newton Step [ ][ ] Q(x,y) A(x) x A(x) Θ y where f (x) A(x) y = 0 g(x) + z = 0 XZe = µe x,z 0 = Q(x,y) = 2 xx (f (x) + y g(x)), [ f (x) A(x) y g(x) µy 1 e A(x) = g(x) Θ = X 1 Z, X = diag(x), Z = diag(z) ]
46 Linear Algebra of IPMs Main work: solve [ ] Q Θ A A 0 }{{} Φ (QP) [ ] x = y [ ] r h or [ ] Q(x,y) A(x) A(x) Θ }{{} Φ (NLP) [ ] x = y [ ] r h for several right-hand-sides at each iteration Two stage solution procedure factorize Φ = LDL backsolve(s) to compute direction ( x, y) + corrections Φ changes numerically but not structurally at each iteration Key to efficient implementation is exploiting structure of Φ in these two steps
47 Structure of matrices A and Q for SCOPF: Matrix A W 1 W 2 W C T 1 T 2 T C Matrix Q Q 1 Q 2 Q C Q 0
48 Structures of A and Q imply structure of Φ: Q 1 Q 2 W 1 W 2 Q C Q0 T 1 T 2 W C T C ( Q A A 0 W 1 W 2 T 1 T 2 ) W C T C Q 1 W1 W 1 Q 2 W2 W 2 T 1 T 2 ( Q A P A 0 Q C W C W C T 1 T 2 T C T C Q 0 ) P 1
49 Structures of A and Q imply structure of Φ: Q 1 Q 2 W 1 W 2 Q C Q0 T 1 T 2 W C T C ( Q A A 0 W 1 W 2 T 1 T 2 ) W C T C Φ 1 Φ 2... B 1 B 2. Φ C B C B 1 B 2 B C ( ) Q A P P A 0 1 Φ 0 Bordered block-diagonal structure in Augmented System!
50 OOPS: Object Oriented Parallel Solver OOPS OOPS is an IPM implementation, that can exploit (nested) block structures through object oriented linear algebra Solved (multistage) stochastic programming problems from portfolio management with over 10 9 variables ( 2h on 1280 processors) Primal Block Angular Structure Dual Block Angular Structure D1 Primal Block Angular Structure D11 D12 D10 B11 B12 D21 D22 D23 D20 B21 B22 B23 D2 A C31 C32 D 30
51 Exploiting Structure in IPM Block-Factorization of Augmented System Matrix 0 Φ 1 B x 1 b B C B. C = B. Φ n Bn x n b n A B 1 B n Φ 0 x 0 b 0 {z } {z } {z } Φ x b Solution of Block-system by Schur-complement The solution to Φx = b is x 0 = C 1 b 0, b 0 = b 0 i B iφ 1 i b i x i = Φ 1 i (b i Bi x 0 ), i = 1,...,n where C is the Schur-complement n C = Φ 0 B i Φ 1 i Bi i=1 only need to factor Φ i, not Φ
52 Exploiting Structure in IPM Solution of Block-system by Schur-complement The solution to Φx = b is x 0 = C 1 b 0, b 0 = b 0 i B iφ 1 i b i x i = Φ 1 i (b i Bi x 0 ), i = 1,...,n where C is the Schur-complement n C = Φ 0 B i Φ 1 i Bi Bottlenecks in this process are Factorization of the Φ i Assembling n i=1 B iφ 1 i B i i=1
53 Structure of Augmented System Matrix Bottlenecks in this process are Factorization of the Φ i, Φ 1 B1 Φ 2 B2 Φ =.... Φ n Bn B 1 B 2 B n Φ 0 Assembling n i=1 B iφ 1 i B i [ X 1, Φ i = i S i Wi T W i 0 ] For DC-OPF W i = [ R A T i A i 0 ] [, Bi 0 = J ], where J IR B i G i : bus-generator incidence matrix A i IR B i L i : node-arc incidence matrix for contingency i R = diag( V 2 /B 1,...,V 2 /B L ): resistances > 0
54 Block-Factorization for DC-OPF Structure of Φ i for DC-OPF [ X 1 Φ i = i S i Wi T W i 0 ], W i = [ R A T i A i 0 ] [, Bi 0 = J ], Solve Φ i x = b: W i is invertible and constant throughout IPM iterations To solve Φ i x = b only need to factorize W i : [ X 1 i S i Wi ][ ] [ ] x (0) b (0) = W i 0 x (1) b (1) x (1) = W 1 i b (1), x (0) = X i S 1 i (b (0) Wi x (1) ) To build B i Φ 1 i Bi B i Φ 1 i Bi = J W i X i S 1 i = V i X 1 i S i Vi, W 1 i J V i = W 1 i J
55 Exploiting Structure in IPM Solution of block-system by Schur-complement The solution to Φx = b is x 0 = C 1 b0, b0 = b 0 i B iφ 1 i b i n C = Φ 0 + V i X 1 i S i Vi, Vi = W 1 i J i=1 Forming V i X 1 i S i Vi T and factorizing C is (still) expensive
56 Exploiting Structure in IPM Solution of block-system by Schur-complement The solution to Φx = b is x 0 = C 1 b0, b0 = b 0 i B iφ 1 i b i n C = Φ 0 + V i X 1 i S i Vi, Vi = W 1 i J i=1 Forming V i X 1 i S i Vi T Solve Cx 0 = b 0 by iterative method and factorizing C is (still) expensive Use (preconditioned) iterative method (e.g. PCG/GMRES) Evaluating matrix-vector products C x is cheap: C x = Φ 0 x + J W i X 1 i S i W 1 Jx Multiplication with J is trivial: J is 0-1 matrix. W i has been factorized i
57 Possible preconditioners Single (base) contingency (Qiu, Flueck 05) M = Φ 0 + nv 0 X 1 0 S 0 V 0 Sample Average Approximation (Anitescu, Petra 12) M = Φ 0 + n S i S V i X 1 i S i Vi where S = random selection of contingency scenarios Active Contingencies (Chiang, G. 13) M = Φ 0 + i A V i X 1 i S i Vi where A = set of contingencies considered active
58 Active Contingency Preconditioner Active Contingencies (Chiang, G. 13) M = Φ 0 + i A V i X 1 i S i Vi where A = set of contingencies considered active. Based on the observation V i X 1 i S i Vi V i = J W i constant X = diag(x), x = vector of slacks Large contribution X 1 i S i small slack x i active contingency Concentrate on active contingencies.
59 Active Contingency Preconditioner Active Contingencies (Chiang, G. 13) M = Φ 0 + i A V i X 1 i S i Vi where A = set of contingencies considered active. Based on the observation V i X 1 i S i Vi V i = J W i constant X = diag(x), x = vector of slacks Large contribution X 1 i S i small slack x i active contingency Concentrate on active contingencies. Which contingencies should be considered active?
60 Active Contingency Preconditioner: Theoretical Result Convergence speed of an iterative scheme with system matrix C and preconditioner M, is determined by the distribution of eigenvalues of M 1 C Aim: All close to unity Small numbers of clusters Theorem For a given δ > 0 let A consist of all contingencies i for which any x i,j < 1/δ. Then all eigenvalues λ i of M 1 C satisfy λ i (M 1 C) 1 = O(δ) Related to Active Set Preconditioners (Forsgren, Gill, Griffin 07)
61 Test Problem Buses Gen Cont Variables Constraints Nonzeros ,630 2,626 7, ,648 10,642 31, ,811 53, , , , ,542 iceland ,725 28,691 77, ,344 50, , , , , , ,460 1,635, , ,240 2,960, ,389,194 1,389,070 4,674,974
62 Results Results for Active Contingency preconditioner: #Bus #Scenarios Time(s) Iters A 3 3 < iceland Base case preconditioner only works for smallest two problems
63 Results Default Direct Iterative buses time(s) memory time(s) memory time(s) memory 3 < MB < MB < MB MB MB MB MB MB MB MB MB MB MB iceland MB MB MB MB MB MB MB MB MB MB MB MB MB MB MB MB MB
64 Contingency Generation
65 Contingency Generation
66 Contingency Generation n-1 - (or even n-2 -security) requires the inclusion of many contingency scenarios. Pan-European system has nodes and lines Resulting SCOPF model would have variables. Only a few contingencies are critical for operation of the system (but which ones)? Contingency Generation Generate contingency scenarios dynamically when needed
67 Contingency Generation Prototype Algorithm: Set up the model with a few base contingency scenarios Solve model to obtain optimal controls u k repeat Check for violated contingency scenarios. Add violated scenarios to the model Re-solve model to obtain new controls u k+1. until no more violated contingencies
68 Contingency Generation Prototype Algorithm: Set up the model with a few base contingency scenarios Solve model to obtain optimal controls u k repeat Check for violated contingency scenarios. Add violated scenarios to the model Re-solve model to obtain new controls u k+1. until no more violated contingencies Can we do this with Interior Point Methods? Interior Point Methods are efficient for large scale (AC)OPF. IPMs are bad at resolving a modified problem instance (warmstarting) attempt to dynamically add contingencies into the partially solved OPF.
69 Warmstarting Interior Point Methods Aim: Use information from solution process of minc x s.t. Ax = b x 0 (LP) to construct a starting point for (nearby problem) min c x s.t. Ãx = b x 0 ( LP) where à A, b b, c c It is not a good idea to use the solution of (LP) to start ( LP). Unlike for the Simplex/Active Set Method!
70 Interior Point Methods (for NLP) Nonlinear Problem min f (x) s.t. g(x) = 0 x 0 (NLP) KKT Conditions c(x) g(x) λ s = 0 g(x) = 0 XSe = 0 x,s 0 (KKT µ ) Introduce logarithmic barriers for x 0 System (KKT µ ) can be solved per Newton-Method For µ 0 solution of (NLP µ ) converges to solution of (NLP)
71 Interior Point Methods (for NLP) Barrier Problem minf (x) µ lnx i s.t. g(x) = 0 x 0 (NLP µ ) KKT Conditions c(x) g(x) λ s = 0 g(x) = 0 XSe = µe x,s 0 (KKT µ ) Introduce logarithmic barriers for x 0 System (KKT µ ) can be solved per Newton-Method For µ 0 solution of (NLP µ ) converges to solution of (NLP)
72 Interior Point Methods (for NLP) KKT conditions c(x) g(x) λ s = 0 g(x) = 0 XSe = µe x,s 0 (KKT µ ) Central Path The set of all solutions to (KKT µ ) for all µ > 0. Central Path joins the analytical center (for µ= ) with the NLP solution (for µ = 0). Neighbourhood of the central path (as used by IPOPT) N(κ) := {(x,λ,s) : E µ (x,λ,s) κµ} where { f (x) g(x)λ s E µ (x,λ,s) := max, g(x), s d } XS µe s c
73 Path Following Methods (for NLP) choose x 0,λ 0,s 0 > 0,µ 0 = x 0 s 0/n,k = 0 Outer iteration update µ: µ + = σ x + s+ n, 0 < σ < 1, k k + 1 Inner iteration compute Newton step ( x, s, λ) for (KKT µ) and given µ k. Do line search with merit function or filter to compute stepsizes and take step in Newton direction until E µk (x k,λ k,s k ) κµ k
74 Why? Hippolito (1993): Search direction is parallel to nearby constraints Modified Problem Original Problem
75 Why? Hippolito (1993): Search direction is parallel to nearby constraints Modified Problem Original Problem only small step in search direction can be taken
76 Warmstarting Heuristics Idea: Start close to the (new) central path, not close to the (old) solution Modified Problem Original Problem Start from a previous iterate and do additional modification step. Ok, as long as change to problem is small (compared to µ)
77 Interior Point Warmstarts: Theoretical Results A typical warmstart results is (Assume à = A): Lemma (based on Gondzio/G. 03) Let (x,λ,s) N (γ 0 ) for problem (LP) then a full modification step ( x, λ, s) in the perturbed problem ( LP) is feasible and (x + x,λ + λ,s + s) Ñ (γ) provided that γ0 γ δ bc γ 0 µ 3/2 2B 2 small δ bc, large µ where δ bc := c à T y s 2 + à T (Ãà T ) 1 ( b Ãx) 2 := P c à T y s (s) + P b Ãx (x) is the orthogonal distance of the warmstart point from primal-dual feasibility in the perturbed problem
78 Contingency Generation Prototype Algorithm: Set up the model with a few base scenarios Solve model to obtain optimal controls u 0. repeat Check for violated contingency scenarios. Add violated scenarios to the model Re-solve model to obtain new controls u k+1. until no more violated contingencies
79 Contingency Generation Prototype Algorithm: Set up the model with a few base scenarios. Solve model to obtain controls u 0. repeat Check for violated contingency scenarios. Add violated scenarios to the model. Re-solve model to obtain new controls u k+1. until no more violated contingencies
80 Contingency Generation Prototype Algorithm: Set up the model with a few base scenarios. µ 0 = µ, k = 0. Solve model to obtain µ 0 -center. controls u µ0. repeat Check for violated contingency scenarios. Add violated scenarios to the model. Choose µ k+1 : 0 < µ k+1 < µ k, k k + 1 Warmstart and iterate to find µ k -center. controls u µk. until no more violated contingencies
81 Contingency Generation Prototype Algorithm: Set up the model with a few base scenarios. µ 0 = µ, k = 0. Solve model to obtain µ 0 -center. controls u µ0. repeat Check for violated contingency scenarios. for all violated scenarios do Set up single scenario problem with u = u µk and solve for µ k -center end for Add violated scenarios to the model. Patch together warmstart point for expanded problem. Choose µ k+1 : 0 < µ k+1 < µ k, k k + 1 Warmstart and iterate to find µ k -center. controls u µk. until no more violated contingencies
82 Contingency Generation Prototype Algorithm: Set up the model with a few base scenarios. µ 0 = µ, k = 0. Solve model to obtain µ 0 -center. controls u µ0. repeat Check for violated contingency scenarios. for all violated scenarios do Set up single scenario problem with u = u µk and solve for µ k -center end for Add violated scenarios to the model. Patch together warmstart point for expanded problem. Choose µ k+1 : 0 < µ k+1 < µ k, k k + 1 Warmstart and iterate to find µ k -center. controls u µk. until no more violated contingencies Claim We can ensure that the assembled warmstart point is in the neighbourhood N(κ) IPM convergence not negatively affected (warmstart successful)
83 Derivation of Algorithm IPM applied to SCOPF model min u,xc,s c f (u) µ c C i lns c,i s.t. KL c (u,x c ) = 0 c C g c (x c ) + s c = 0 c C Partially decompose: C = C 0 C 0 where min u,x c,s c f (u) µ c C 0 i lns c,i + c C 0 V c,µ (u) s.t. KL c (u,x c ) = 0 c C 0 g c (x c ) + s c = 0 c C 0 V c,µ (u) = min µ x i lns c,i c,s c s.t. KL c (u,x c ) = 0 g c (x c ) + s c = 0 c C 0
84 Active/Inactive contingencies KKT conditions for contingency problem (V c,µ (u)) primal feasibility KL c (u,x c )=0 g c (x c ) + s c =0 dual feasibility x KL c (u,x c ) λ c + g c (x c ) ν c =0 centrality s c,i ν c,i =µe s c,ν c 0
85 Active/Inactive contingencies KKT conditions for contingency problem (V c,µ (u)) primal feasibility KL c (u,x c )=0 g c (x c ) + s c =0 dual feasibility x KL c (u,x c ) λ c + g c (x c ) ν c =0 centrality s c,i ν c,i =µe s c,ν c 0 s c,i ν c,i = µ ν c,i = µ/s c,i if contingency c is never active then s c,i s c,i > 0 and thus ν c = O(µ) 0 λ c = O(µ) 0
86 Active/Inactive contingencies KKT conditions for contingency problem (V c,µ (u)) primal feasibility KL c (u,x c )=0 g c (x c ) + s c =0 dual feasibility x KL c (u,x c ) λ c + g c (x c ) ν c =0 centrality s c,i ν c,i =µe s c,ν c 0 s c,i ν c,i = µ ν c,i = µ/s c,i if contingency c is never active then s c,i sc,i > 0 and thus ν c = O(µ) 0 λ c = O(µ) 0 if contingency is active at solution then ν c νc > 0 λ c λ c > 0
87 Combined point is in neighbourhood N(κ) Neighbourhood of the Central Path N(κ) := {(x,λ,s) : E µ (x,λ,s) κµ} where E µ (x, λ, s) := max f (x) g(x)λ s, g(x), XS µe }{{}}{{}}{{} dual feasibility primal feasibility centrality
88 Combined point is in neighbourhood N(κ) Neighbourhood of the Central Path N(κ) := {(x,λ,s) : E µ (x,λ,s) κµ} where E µ (x, λ, s) := max f (x) g(x)λ s, g(x), XS µe }{{}}{{}}{{} dual feasibility primal feasibility centrality Central Path conditions for SCOPF problem primal feasibility KL c (u,x c ) =0 g c (x c ) + s c =0 dual feasibility f (u) c ukl c (u,x c ) λ c =0 x KL c (u,x c ) λ c + g c (x c ) ν c =0 centrality s c,i ν c,i =µe s c,ν c 0
89 Combined point is in neighbourhood N(κ) Neighbourhood of the Central Path N(κ) := {(x,λ,s) : E µ (x,λ,s) κµ} where E µ (x, λ, s) := max f (x) g(x)λ s, g(x), XS µe }{{}}{{}}{{} dual feasibility primal feasibility centrality Central Path conditions for SCOPF problem primal feasibility KL c (u,x c ) =0 g c (x c ) + s c =0 dual feasibility f (u) c ukl c (u,x c ) λ c =0 x KL c (u,x c ) λ c + g c (x c ) ν c =0 centrality s c,i ν c,i =µe s c,ν c 0 Satisfied within κµ by construction
90 Combined point is in neighbourhood N(κ) Neighbourhood of the Central Path N(κ) := {(x,λ,s) : E µ (x,λ,s) κµ} where E µ (x, λ, s) := max f (x) g(x)λ s, g(x), XS µe }{{}}{{}}{{} dual feasibility primal feasibility centrality Central Path conditions for SCOPF problem primal feasibility KL c (u,x c ) =0 g c (x c ) + s c =0 dual feasibility f (u) c ukl c (u,x c ) λ c =0 x KL c (u,x c ) λ c + g c (x c ) ν c =0 centrality s c,i ν c,i =µe s c,ν c 0 Residual is u KL c (u,x c ) λ c for added contingency
91 Combined point is in neighbourhood N(κ) Neighbourhood of the Central Path N(κ) := {(x,λ,s) : E µ (x,λ,s) κµ} where E µ (x, λ, s) := max f (x) g(x)λ s, g(x), XS µe }{{}}{{}}{{} dual feasibility primal feasibility centrality Central Path conditions for SCOPF problem primal feasibility KL c (u,x c ) =0 g c (x c ) + s c =0 dual feasibility f (u) c ukl c (u,x c ) λ c =0 x KL c (u,x c ) λ c + g c (x c ) ν c =0 centrality s c,i ν c,i =µe s c,ν c 0 Residual is u KL c (u,x c ) λ c for added contingency ok, if added while λ c is small (compared to µ k )
92 Statement of Algorithm Choose initial contingency set C 0 C. Choose µ 0 repeat Do IPM iteration in the master problem to get approximate solution u k to (P C0,µ k). For all c C 0 solve V c,µ k(u k ) approximately to get s k c,λ k c if λ k c > 1 2 κµk for any c then set C 0 C 0 {c}. take combined solution of (P C0,µ k) and (V c,µ k(uk )) as starting point for next IPM iteration end if µ k+1 = σµ k until convergence in master problem
93 Statement of Algorithm Choose initial contingency set C 0 C. Choose µ 0 repeat Do IPM iteration in the master problem to get approximate solution u k to (P C0,µ k). For all c C 0 solve V c,µ k(u k ) approximately to get s k c,λ k c if λ k c > 1 2 κµk for any c then set C 0 C 0 {c}. take combined solution of (P C0,µ k) and (V c,µ k(uk )) as starting point for next IPM iteration end if µ k+1 = σµ k until convergence in master problem Approximate means a point in the neighbourhood N(κ)
94 Statement of Algorithm Choose initial contingency set C 0 C. Choose µ 0 repeat Do IPM iteration in the master problem to get approximate solution u k to (P C0,µ k). For all c C 0 solve V c,µ k(u k ) approximately to get s k c,λ k c if λ k c > 1 2 κµk for any c then set C 0 C 0 {c}. take combined solution of (P C0,µ k) and (V c,µ k(uk )) as starting point for next IPM iteration end if µ k+1 = σµ k until convergence in master problem Again a point in the neighbourhood N(κ). Usually only needs a single iteration in (V c,µ k(u k )) starting from the previous iterate.
95 Statement of Algorithm Choose initial contingency set C 0 C. Choose µ 0 repeat Do IPM iteration in the master problem to get approximate solution u k to (P C0,µ k). For all c C 0 solve V c,µ k(u k ) approximately to get s k c,λ k c if λ k c > 1 2 κµk for any c then set C 0 C 0 {c}. take combined solution of (P C0,µ k) and (V c,µ k(uk )) as starting point for next IPM iteration end if µ k+1 = σµ k until convergence in master problem The combined point is still in the N(κ) neighbourhood. successful warmstart of enlarged problem.
96 Regarding Convergence & Efficiency of Algorithm Issues warmstart is always successful (i.e. the patched point is in the N(κ) neighbourhood
97 Regarding Convergence & Efficiency of Algorithm Issues warmstart is always successful (i.e. the patched point is in the N(κ) neighbourhood All active contingencies will be included eventually since for active contingencies λ c λ c > 1 2 κµ 0
98 Regarding Convergence & Efficiency of Algorithm Issues warmstart is always successful (i.e. the patched point is in the N(κ) neighbourhood All active contingencies will be included eventually since for active contingencies λ c λ c > 1 2 κµ 0 Contingency subproblems can be solved efficiently Contingency subproblem is just equation solving only a single (usually) Newton step needed. FDLF
99 Regarding Convergence & Efficiency of Algorithm Issues warmstart is always successful (i.e. the patched point is in the N(κ) neighbourhood All active contingencies will be included eventually since for active contingencies λ c λ c > 1 2 κµ 0 Contingency subproblems can be solved efficiently Contingency subproblem is just equation solving only a single (usually) Newton step needed. FDLF Only a very small fraction of contingencies needed only check for contingencies periodically. pre-screen and discard contingencies which are likely to never be active: Contingency Screening: Ejebe, Irisarri, Mokhtari (1995), Vaahedi, Fuchs, Xu, Mansour (1999), Capitanescu, Wehenkel (2007, 2008), Dent, Ochoa, Harrison, Bialek (2010)
100 Contingency Generation: Results Default Contingency Generation Prob Sce time(s) iters time(s) iters ActS 6bus 2 < < IEEE IEEE IEEE IEEE IEEE > IEEE This is for the (nonlinear) (n 1) AC-SCOPF problem Work in progress: currently scans all (inactive) scenarios at every iteration.
101 Conclusions & Outlook Conclusions: Active Contingencies preconditioner is effective Only a few contingency scenarios are active at the solution Contingency generation Contingencies can be added throughout IPM iterations without leaving safe neighbourhood.
102 Conclusions & Outlook Conclusions: Active Contingencies preconditioner is effective Only a few contingency scenarios are active at the solution Contingency generation Contingencies can be added throughout IPM iterations without leaving safe neighbourhood. Extension: Much further scope for efficiency gains (contingency screening, efficient load flow solver for subproblems) Transmission constraints and security planning will become increasingly important in future with decentralised and intermittent generation. Many operational and planning models in power systems (unit commitment, transmission switching/islanding) should take contingency constraints into account but currently do not (due to algorithmic complexity).
103 Thank You!
104 Bibliography M. Colombo, A. Grothey: A decomposition-based warm-start method for stochastic programming, Computational Optimization and Applications, Volume 55, Issue 2 (2013), Page N.-Y. Chiang, A. Grothey: Solving Security Constrained Optimal Power Flow Problems by a Structure Exploiting Interior Point Method. Optimization and Engineering, published online February N.-Y. Chiang: Structure-Exploiting Interior Point Methods for Security Constrained Optimal Power Flow Problems, PhD Thesis, University of Edinburgh (2013).
Interior Point Methods for Convex Quadratic and Convex Nonlinear Programming
School of Mathematics T H E U N I V E R S I T Y O H F E D I N B U R G Interior Point Methods for Convex Quadratic and Convex Nonlinear Programming Jacek Gondzio Email: J.Gondzio@ed.ac.uk URL: http://www.maths.ed.ac.uk/~gondzio
More informationAn MINLP approach to forming secure islands in electricity networks
An MINLP approach to forming secure islands in electricity networks Waqquas Bukhsh, Jacek Gondzio, Andreas Grothey, Ken McKinnon, Paul Trodden School of Mathematics University of Edinburgh GOR 2012, 4-7
More informationSoftware for Integer and Nonlinear Optimization
Software for Integer and Nonlinear Optimization Sven Leyffer, leyffer@mcs.anl.gov Mathematics & Computer Science Division Argonne National Laboratory Roger Fletcher & Jeff Linderoth Advanced Methods and
More informationLinear Algebra in IPMs
School of Mathematics H E U N I V E R S I Y O H F E D I N B U R G Linear Algebra in IPMs Jacek Gondzio Email: J.Gondzio@ed.ac.uk URL: http://www.maths.ed.ac.uk/~gondzio Paris, January 2018 1 Outline Linear
More informationInfeasibility Detection and an Inexact Active-Set Method for Large-Scale Nonlinear Optimization
Infeasibility Detection and an Inexact Active-Set Method for Large-Scale Nonlinear Optimization Frank E. Curtis, Lehigh University involving joint work with James V. Burke, University of Washington Daniel
More informationA DECOMPOSITION PROCEDURE BASED ON APPROXIMATE NEWTON DIRECTIONS
Working Paper 01 09 Departamento de Estadística y Econometría Statistics and Econometrics Series 06 Universidad Carlos III de Madrid January 2001 Calle Madrid, 126 28903 Getafe (Spain) Fax (34) 91 624
More informationSecond-order cone programming
Outline Second-order cone programming, PhD Lehigh University Department of Industrial and Systems Engineering February 10, 2009 Outline 1 Basic properties Spectral decomposition The cone of squares The
More informationImprovements to Benders' decomposition: systematic classification and performance comparison in a Transmission Expansion Planning problem
Improvements to Benders' decomposition: systematic classification and performance comparison in a Transmission Expansion Planning problem Sara Lumbreras & Andrés Ramos July 2013 Agenda Motivation improvement
More informationSF2822 Applied Nonlinear Optimization. Preparatory question. Lecture 10: Interior methods. Anders Forsgren. 1. Try to solve theory question 7.
SF2822 Applied Nonlinear Optimization Lecture 10: Interior methods Anders Forsgren SF2822 Applied Nonlinear Optimization, KTH 1 / 24 Lecture 10, 2017/2018 Preparatory question 1. Try to solve theory question
More informationAlgorithms for nonlinear programming problems II
Algorithms for nonlinear programming problems II Martin Branda Charles University Faculty of Mathematics and Physics Department of Probability and Mathematical Statistics Computational Aspects of Optimization
More informationAn Inexact Sequential Quadratic Optimization Method for Nonlinear Optimization
An Inexact Sequential Quadratic Optimization Method for Nonlinear Optimization Frank E. Curtis, Lehigh University involving joint work with Travis Johnson, Northwestern University Daniel P. Robinson, Johns
More informationUsing Interior-Point Methods within Mixed-Integer Nonlinear Programming
Using Interior-Point Methods within Mixed-Integer Nonlinear Programming. Hande Y. Benson Drexel University IMA - MINLP - p. 1/34 Motivation: Discrete Variables Motivation: Discrete Variables Interior-Point
More informationA Benders Decomposition Approach to Corrective Security Constrained OPF with Power Flow Control Devices
A Benders Decomposition Approach to Corrective Security Constrained OPF with Power Flow Control Devices Javad Mohammadi, Gabriela Hug, Soummya Kar Department of Electrical and Computer Engineering Carnegie
More informationNew Formulations of the Optimal Power Flow Problem
New Formulations of the Optimal Power Flow Problem Prof. Daniel Kirschen The University of Manchester 2010 D. Kirschen and The University of Manchester 1 2010 D. Kirschen and The University of Manchester
More informationSMO vs PDCO for SVM: Sequential Minimal Optimization vs Primal-Dual interior method for Convex Objectives for Support Vector Machines
vs for SVM: Sequential Minimal Optimization vs Primal-Dual interior method for Convex Objectives for Support Vector Machines Ding Ma Michael Saunders Working paper, January 5 Introduction In machine learning,
More informationHot-Starting NLP Solvers
Hot-Starting NLP Solvers Andreas Wächter Department of Industrial Engineering and Management Sciences Northwestern University waechter@iems.northwestern.edu 204 Mixed Integer Programming Workshop Ohio
More informationPenalty and Barrier Methods General classical constrained minimization problem minimize f(x) subject to g(x) 0 h(x) =0 Penalty methods are motivated by the desire to use unconstrained optimization techniques
More informationInterior Point Methods for Linear Programming: Motivation & Theory
School of Mathematics T H E U N I V E R S I T Y O H F E D I N B U R G Interior Point Methods for Linear Programming: Motivation & Theory Jacek Gondzio Email: J.Gondzio@ed.ac.uk URL: http://www.maths.ed.ac.uk/~gondzio
More informationInterior Point Algorithms for Constrained Convex Optimization
Interior Point Algorithms for Constrained Convex Optimization Chee Wei Tan CS 8292 : Advanced Topics in Convex Optimization and its Applications Fall 2010 Outline Inequality constrained minimization problems
More informationAn Inexact Newton Method for Nonlinear Constrained Optimization
An Inexact Newton Method for Nonlinear Constrained Optimization Frank E. Curtis Numerical Analysis Seminar, January 23, 2009 Outline Motivation and background Algorithm development and theoretical results
More information10 Numerical methods for constrained problems
10 Numerical methods for constrained problems min s.t. f(x) h(x) = 0 (l), g(x) 0 (m), x X The algorithms can be roughly divided the following way: ˆ primal methods: find descent direction keeping inside
More informationDistributed and Real-time Predictive Control
Distributed and Real-time Predictive Control Melanie Zeilinger Christian Conte (ETH) Alexander Domahidi (ETH) Ye Pu (EPFL) Colin Jones (EPFL) Challenges in modern control systems Power system: - Frequency
More informationA Decomposition Based Approach for Solving a General Bilevel Linear Programming
A Decomposition Based Approach for Solving a General Bilevel Linear Programming Xuan Liu, Member, IEEE, Zuyi Li, Senior Member, IEEE Abstract Bilevel optimization has been widely used in decisionmaking
More informationA Benders Algorithm for Two-Stage Stochastic Optimization Problems With Mixed Integer Recourse
A Benders Algorithm for Two-Stage Stochastic Optimization Problems With Mixed Integer Recourse Ted Ralphs 1 Joint work with Menal Güzelsoy 2 and Anahita Hassanzadeh 1 1 COR@L Lab, Department of Industrial
More information5 Handling Constraints
5 Handling Constraints Engineering design optimization problems are very rarely unconstrained. Moreover, the constraints that appear in these problems are typically nonlinear. This motivates our interest
More informationPower grid vulnerability analysis
Power grid vulnerability analysis Daniel Bienstock Columbia University Dimacs 2010 Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs 2010 1 Background: a power grid is three
More informationSolving Dual Problems
Lecture 20 Solving Dual Problems We consider a constrained problem where, in addition to the constraint set X, there are also inequality and linear equality constraints. Specifically the minimization problem
More informationNonlinear Optimization Solvers
ICE05 Argonne, July 19, 2005 Nonlinear Optimization Solvers Sven Leyffer leyffer@mcs.anl.gov Mathematics & Computer Science Division, Argonne National Laboratory Nonlinear Optimization Methods Optimization
More informationIntroduction to Nonlinear Stochastic Programming
School of Mathematics T H E U N I V E R S I T Y O H F R G E D I N B U Introduction to Nonlinear Stochastic Programming Jacek Gondzio Email: J.Gondzio@ed.ac.uk URL: http://www.maths.ed.ac.uk/~gondzio SPS
More informationLinear Programming: Simplex
Linear Programming: Simplex Stephen J. Wright 1 2 Computer Sciences Department, University of Wisconsin-Madison. IMA, August 2016 Stephen Wright (UW-Madison) Linear Programming: Simplex IMA, August 2016
More informationPrimal-Dual Interior-Point Methods
Primal-Dual Interior-Point Methods Lecturer: Aarti Singh Co-instructor: Pradeep Ravikumar Convex Optimization 10-725/36-725 Outline Today: Primal-dual interior-point method Special case: linear programming
More informationWhat s New in Active-Set Methods for Nonlinear Optimization?
What s New in Active-Set Methods for Nonlinear Optimization? Philip E. Gill Advances in Numerical Computation, Manchester University, July 5, 2011 A Workshop in Honor of Sven Hammarling UCSD Center for
More informationProper Security Criteria Determination in a Power System with High Penetration of Renewable Resources
Proper Security Criteria Determination in a Power System with High Penetration of Renewable Resources Mojgan Hedayati, Kory Hedman, and Junshan Zhang School of Electrical, Computer, and Energy Engineering
More informationInterior Point Methods. We ll discuss linear programming first, followed by three nonlinear problems. Algorithms for Linear Programming Problems
AMSC 607 / CMSC 764 Advanced Numerical Optimization Fall 2008 UNIT 3: Constrained Optimization PART 4: Introduction to Interior Point Methods Dianne P. O Leary c 2008 Interior Point Methods We ll discuss
More informationPart 4: Active-set methods for linearly constrained optimization. Nick Gould (RAL)
Part 4: Active-set methods for linearly constrained optimization Nick Gould RAL fx subject to Ax b Part C course on continuoue optimization LINEARLY CONSTRAINED MINIMIZATION fx subject to Ax { } b where
More informationNonlinear optimization
Nonlinear optimization Anders Forsgren Optimization and Systems Theory Department of Mathematics Royal Institute of Technology (KTH) Stockholm, Sweden evita Winter School 2009 Geilo, Norway January 11
More informationApplications of Linear Programming
Applications of Linear Programming lecturer: András London University of Szeged Institute of Informatics Department of Computational Optimization Lecture 9 Non-linear programming In case of LP, the goal
More informationInterior-Point Methods for Linear Optimization
Interior-Point Methods for Linear Optimization Robert M. Freund and Jorge Vera March, 204 c 204 Robert M. Freund and Jorge Vera. All rights reserved. Linear Optimization with a Logarithmic Barrier Function
More informationPart 5: Penalty and augmented Lagrangian methods for equality constrained optimization. Nick Gould (RAL)
Part 5: Penalty and augmented Lagrangian methods for equality constrained optimization Nick Gould (RAL) x IR n f(x) subject to c(x) = Part C course on continuoue optimization CONSTRAINED MINIMIZATION x
More informationA Stochastic-Oriented NLP Relaxation for Integer Programming
A Stochastic-Oriented NLP Relaxation for Integer Programming John Birge University of Chicago (With Mihai Anitescu (ANL/U of C), Cosmin Petra (ANL)) Motivation: The control of energy systems, particularly
More informationAlgorithms for constrained local optimization
Algorithms for constrained local optimization Fabio Schoen 2008 http://gol.dsi.unifi.it/users/schoen Algorithms for constrained local optimization p. Feasible direction methods Algorithms for constrained
More informationCoupled Optimization Models for Planning and Operation of Power Systems on Multiple Scales
Coupled Optimization Models for Planning and Operation of Power Systems on Multiple Scales Michael C. Ferris University of Wisconsin, Madison Computational Needs for the Next Generation Electric Grid,
More informationAlgorithms for nonlinear programming problems II
Algorithms for nonlinear programming problems II Martin Branda Charles University in Prague Faculty of Mathematics and Physics Department of Probability and Mathematical Statistics Computational Aspects
More informationLarge-Scale Nonlinear Optimization with Inexact Step Computations
Large-Scale Nonlinear Optimization with Inexact Step Computations Andreas Wächter IBM T.J. Watson Research Center Yorktown Heights, New York andreasw@us.ibm.com IPAM Workshop on Numerical Methods for Continuous
More informationECE 476. Exam #2. Tuesday, November 15, Minutes
Name: Answers ECE 476 Exam #2 Tuesday, November 15, 2016 75 Minutes Closed book, closed notes One new note sheet allowed, one old note sheet allowed 1. / 20 2. / 20 3. / 20 4. / 20 5. / 20 Total / 100
More informationMohd Jamil Khan and 2 Yogesh Kumar. Churu, Raj., India.
International Journal of Mathematics Research. ISSN 0976-5840 Volume 8, Number 3 (2016), pp. 251-263 International Research Publication House http://www.irphouse.com Optimal Power Flow (OPF) formulation
More informationGeneration and Representation of Piecewise Polyhedral Value Functions
Generation and Representation of Piecewise Polyhedral Value Functions Ted Ralphs 1 Joint work with Menal Güzelsoy 2 and Anahita Hassanzadeh 1 1 COR@L Lab, Department of Industrial and Systems Engineering,
More informationPrimal-Dual Interior-Point Methods. Ryan Tibshirani Convex Optimization /36-725
Primal-Dual Interior-Point Methods Ryan Tibshirani Convex Optimization 10-725/36-725 Given the problem Last time: barrier method min x subject to f(x) h i (x) 0, i = 1,... m Ax = b where f, h i, i = 1,...
More informationAn Inexact Newton Method for Optimization
New York University Brown Applied Mathematics Seminar, February 10, 2009 Brief biography New York State College of William and Mary (B.S.) Northwestern University (M.S. & Ph.D.) Courant Institute (Postdoc)
More informationPOWER SYSTEMS in general are currently operating
TO APPEAR IN IEEE TRANSACTIONS ON POWER SYSTEMS 1 Robust Optimal Power Flow Solution Using Trust Region and Interior-Point Methods Andréa A. Sousa, Geraldo L. Torres, Member IEEE, Claudio A. Cañizares,
More information1 Computing with constraints
Notes for 2017-04-26 1 Computing with constraints Recall that our basic problem is minimize φ(x) s.t. x Ω where the feasible set Ω is defined by equality and inequality conditions Ω = {x R n : c i (x)
More informationLecture 13: Constrained optimization
2010-12-03 Basic ideas A nonlinearly constrained problem must somehow be converted relaxed into a problem which we can solve (a linear/quadratic or unconstrained problem) We solve a sequence of such problems
More informationRole of Synchronized Measurements In Operation of Smart Grids
Role of Synchronized Measurements In Operation of Smart Grids Ali Abur Electrical and Computer Engineering Department Northeastern University Boston, Massachusetts Boston University CISE Seminar November
More informationMultidisciplinary System Design Optimization (MSDO)
Multidisciplinary System Design Optimization (MSDO) Numerical Optimization II Lecture 8 Karen Willcox 1 Massachusetts Institute of Technology - Prof. de Weck and Prof. Willcox Today s Topics Sequential
More informationSensitivity-Based Line Outage Angle Factors
Sensitivity-Based Line Outage Angle Factors Kai E. Van Horn, Alejandro D. Domínguez-García, and Peter W. Sauer Department of Electrical and Computer Engineering University of Illinois at Urbana-Champaign
More informationA Data-driven Voltage Control Framework for Power Distribution Systems
A Data-driven Voltage Control Framework for Power Distribution Systems Hanchen Xu, Alejandro D. Domínguez-García, and Peter W. Sauer arxiv:1711.04159v1 [math.oc] 11 Nov 2017 Abstract In this paper, we
More informationModeling Uncertainty in Linear Programs: Stochastic and Robust Linear Programming
Modeling Uncertainty in Linear Programs: Stochastic and Robust Programming DGA PhD Student - PhD Thesis EDF-INRIA 10 November 2011 and motivations In real life, Linear Programs are uncertain for several
More informationThe DC Optimal Power Flow
1 / 20 The DC Optimal Power Flow Quantitative Energy Economics Anthony Papavasiliou The DC Optimal Power Flow 2 / 20 1 The OPF Using PTDFs 2 The OPF Using Reactance 3 / 20 Transmission Constraints Lines
More informationPrimal-Dual Interior-Point Methods for Linear Programming based on Newton s Method
Primal-Dual Interior-Point Methods for Linear Programming based on Newton s Method Robert M. Freund March, 2004 2004 Massachusetts Institute of Technology. The Problem The logarithmic barrier approach
More informationControlling variability in power systems
Daniel APAM Nov 17 2017 A simple example: 100 100 A simple example: 100 100 Only one solution: 200 100 200 100 100 100 A simple example: 100 100 Only one solution: 200 100 200 100 100 100 But what if the
More information15-780: LinearProgramming
15-780: LinearProgramming J. Zico Kolter February 1-3, 2016 1 Outline Introduction Some linear algebra review Linear programming Simplex algorithm Duality and dual simplex 2 Outline Introduction Some linear
More informationDual Decomposition.
1/34 Dual Decomposition http://bicmr.pku.edu.cn/~wenzw/opt-2017-fall.html Acknowledgement: this slides is based on Prof. Lieven Vandenberghes lecture notes Outline 2/34 1 Conjugate function 2 introduction:
More informationCourse notes for EE394V Restructured Electricity Markets: Locational Marginal Pricing
Course notes for EE394V Restructured Electricity Markets: Locational Marginal Pricing Ross Baldick Copyright c 2013 Ross Baldick www.ece.utexas.edu/ baldick/classes/394v/ee394v.html Title Page 1 of 132
More informationLecture: Algorithms for LP, SOCP and SDP
1/53 Lecture: Algorithms for LP, SOCP and SDP Zaiwen Wen Beijing International Center For Mathematical Research Peking University http://bicmr.pku.edu.cn/~wenzw/bigdata2018.html wenzw@pku.edu.cn Acknowledgement:
More informationSTATE ESTIMATION IN DISTRIBUTION SYSTEMS
SAE ESIMAION IN DISRIBUION SYSEMS 2015 CIGRE Grid of the Future Symposium Chicago (IL), October 13, 2015 L. Garcia-Garcia, D. Apostolopoulou Laura.GarciaGarcia@ComEd.com Dimitra.Apostolopoulou@ComEd.com
More informationA Branch-and-Refine Method for Nonconvex Mixed-Integer Optimization
A Branch-and-Refine Method for Nonconvex Mixed-Integer Optimization Sven Leyffer 2 Annick Sartenaer 1 Emilie Wanufelle 1 1 University of Namur, Belgium 2 Argonne National Laboratory, USA IMA Workshop,
More informationOptimization. Yuh-Jye Lee. March 28, Data Science and Machine Intelligence Lab National Chiao Tung University 1 / 40
Optimization Yuh-Jye Lee Data Science and Machine Intelligence Lab National Chiao Tung University March 28, 2017 1 / 40 The Key Idea of Newton s Method Let f : R n R be a twice differentiable function
More informationWHEN studying distributed simulations of power systems,
1096 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL 21, NO 3, AUGUST 2006 A Jacobian-Free Newton-GMRES(m) Method with Adaptive Preconditioner and Its Application for Power Flow Calculations Ying Chen and Chen
More informationAppendix A Solving Systems of Nonlinear Equations
Appendix A Solving Systems of Nonlinear Equations Chapter 4 of this book describes and analyzes the power flow problem. In its ac version, this problem is a system of nonlinear equations. This appendix
More informationAn Introduction to Algebraic Multigrid (AMG) Algorithms Derrick Cerwinsky and Craig C. Douglas 1/84
An Introduction to Algebraic Multigrid (AMG) Algorithms Derrick Cerwinsky and Craig C. Douglas 1/84 Introduction Almost all numerical methods for solving PDEs will at some point be reduced to solving A
More informationSemidefinite Relaxation of Optimal Power Flow for ac-dc Grids
Semidefinite Relaxation of Optimal Power Flow for ac-dc Grids Shahab Bahrami, Student Member, IEEE, Francis Therrien, Member, IEEE, Vincent W.S. Wong, Fellow, IEEE, and Juri Jatsevich, Senior Member, IEEE
More informationPOWER flow studies are the cornerstone of power system
University of Wisconsin-Madison Department of Electrical and Computer Engineering. Technical Report ECE-2-. A Sufficient Condition for Power Flow Insolvability with Applications to Voltage Stability Margins
More informationAn Adaptive Partition-based Approach for Solving Two-stage Stochastic Programs with Fixed Recourse
An Adaptive Partition-based Approach for Solving Two-stage Stochastic Programs with Fixed Recourse Yongjia Song, James Luedtke Virginia Commonwealth University, Richmond, VA, ysong3@vcu.edu University
More informationMinimum cost transportation problem
Minimum cost transportation problem Complements of Operations Research Giovanni Righini Università degli Studi di Milano Definitions The minimum cost transportation problem is a special case of the minimum
More informationDevelopment of the new MINLP Solver Decogo using SCIP - Status Report
Development of the new MINLP Solver Decogo using SCIP - Status Report Pavlo Muts with Norman Breitfeld, Vitali Gintner, Ivo Nowak SCIP Workshop 2018, Aachen Table of contents 1. Introduction 2. Automatic
More informationSIGNIFICANT increase in amount of private distributed
1 Distributed DC Optimal Power Flow for Radial Networks Through Partial Primal Dual Algorithm Vahid Rasouli Disfani, Student Member, IEEE, Lingling Fan, Senior Member, IEEE, Zhixin Miao, Senior Member,
More informationApplications. Stephen J. Stoyan, Maged M. Dessouky*, and Xiaoqing Wang
Introduction to Large-Scale Linear Programming and Applications Stephen J. Stoyan, Maged M. Dessouky*, and Xiaoqing Wang Daniel J. Epstein Department of Industrial and Systems Engineering, University of
More informationImproving an interior-point algorithm for multicommodity flows by quadratic regularizations
Improving an interior-point algorithm for multicommodity flows by quadratic regularizations Jordi Castro Jordi Cuesta Dept. of Stat. and Operations Research Dept. of Chemical Engineering Universitat Politècnica
More informationThe Q Method for Symmetric Cone Programmin
The Q Method for Symmetric Cone Programming The Q Method for Symmetric Cone Programmin Farid Alizadeh and Yu Xia alizadeh@rutcor.rutgers.edu, xiay@optlab.mcma Large Scale Nonlinear and Semidefinite Progra
More informationSF2822 Applied nonlinear optimization, final exam Wednesday June
SF2822 Applied nonlinear optimization, final exam Wednesday June 3 205 4.00 9.00 Examiner: Anders Forsgren, tel. 08-790 7 27. Allowed tools: Pen/pencil, ruler and eraser. Note! Calculator is not allowed.
More informationSINGLE OBJECTIVE RISK- BASED TRANSMISSION EXPANSION
Vol.2, Issue.1, Jan-Feb 2012 pp-424-430 ISSN: 2249-6645 SINGLE OBJECTIVE RISK- BASED TRANSMISSION EXPANSION V.Sumadeepthi 1, K.Sarada 2 1 (Student, Department of Electrical and Electronics Engineering,
More informationApplication of Monte Carlo Simulation to Multi-Area Reliability Calculations. The NARP Model
Application of Monte Carlo Simulation to Multi-Area Reliability Calculations The NARP Model Any power system reliability model using Monte Carlo simulation consists of at least the following steps: 1.
More information= V I = Bus Admittance Matrix. Chapter 6: Power Flow. Constructing Ybus. Example. Network Solution. Triangular factorization. Let
Chapter 6: Power Flow Network Matrices Network Solutions Newton-Raphson Method Fast Decoupled Method Bus Admittance Matri Let I = vector of currents injected into nodes V = vector of node voltages Y bus
More informationOn Generalized Primal-Dual Interior-Point Methods with Non-uniform Complementarity Perturbations for Quadratic Programming
On Generalized Primal-Dual Interior-Point Methods with Non-uniform Complementarity Perturbations for Quadratic Programming Altuğ Bitlislioğlu and Colin N. Jones Abstract This technical note discusses convergence
More informationarxiv: v1 [math.na] 8 Jun 2018
arxiv:1806.03347v1 [math.na] 8 Jun 2018 Interior Point Method with Modified Augmented Lagrangian for Penalty-Barrier Nonlinear Programming Martin Neuenhofen June 12, 2018 Abstract We present a numerical
More informationPrimal-Dual Interior-Point Methods. Ryan Tibshirani Convex Optimization
Primal-Dual Interior-Point Methods Ryan Tibshirani Convex Optimization 10-725 Given the problem Last time: barrier method min x subject to f(x) h i (x) 0, i = 1,... m Ax = b where f, h i, i = 1,... m are
More informationEfficient robust optimization for robust control with constraints Paul Goulart, Eric Kerrigan and Danny Ralph
Efficient robust optimization for robust control with constraints p. 1 Efficient robust optimization for robust control with constraints Paul Goulart, Eric Kerrigan and Danny Ralph Efficient robust optimization
More informationA full-newton step infeasible interior-point algorithm for linear programming based on a kernel function
A full-newton step infeasible interior-point algorithm for linear programming based on a kernel function Zhongyi Liu, Wenyu Sun Abstract This paper proposes an infeasible interior-point algorithm with
More informationInterior Point Methods for LP
11.1 Interior Point Methods for LP Katta G. Murty, IOE 510, LP, U. Of Michigan, Ann Arbor, Winter 1997. Simplex Method - A Boundary Method: Starting at an extreme point of the feasible set, the simplex
More informationLP. Kap. 17: Interior-point methods
LP. Kap. 17: Interior-point methods the simplex algorithm moves along the boundary of the polyhedron P of feasible solutions an alternative is interior-point methods they find a path in the interior of
More informationTutorial 2: Modelling Transmission
Tutorial 2: Modelling Transmission In our previous example the load and generation were at the same bus. In this tutorial we will see how to model the transmission of power from one bus to another. The
More informationInexact Newton Methods and Nonlinear Constrained Optimization
Inexact Newton Methods and Nonlinear Constrained Optimization Frank E. Curtis EPSRC Symposium Capstone Conference Warwick Mathematics Institute July 2, 2009 Outline PDE-Constrained Optimization Newton
More informationStochastic Unit Commitment with Topology Control Recourse for Renewables Integration
1 Stochastic Unit Commitment with Topology Control Recourse for Renewables Integration Jiaying Shi and Shmuel Oren University of California, Berkeley IPAM, January 2016 33% RPS - Cumulative expected VERs
More informationAlgorithms for Constrained Optimization
1 / 42 Algorithms for Constrained Optimization ME598/494 Lecture Max Yi Ren Department of Mechanical Engineering, Arizona State University April 19, 2015 2 / 42 Outline 1. Convergence 2. Sequential quadratic
More informationFINDING PARALLELISM IN GENERAL-PURPOSE LINEAR PROGRAMMING
FINDING PARALLELISM IN GENERAL-PURPOSE LINEAR PROGRAMMING Daniel Thuerck 1,2 (advisors Michael Goesele 1,2 and Marc Pfetsch 1 ) Maxim Naumov 3 1 Graduate School of Computational Engineering, TU Darmstadt
More informationLecture 15 Newton Method and Self-Concordance. October 23, 2008
Newton Method and Self-Concordance October 23, 2008 Outline Lecture 15 Self-concordance Notion Self-concordant Functions Operations Preserving Self-concordance Properties of Self-concordant Functions Implications
More informationNotes on Dantzig-Wolfe decomposition and column generation
Notes on Dantzig-Wolfe decomposition and column generation Mette Gamst November 11, 2010 1 Introduction This note introduces an exact solution method for mathematical programming problems. The method is
More informationThe convergence of stationary iterations with indefinite splitting
The convergence of stationary iterations with indefinite splitting Michael C. Ferris Joint work with: Tom Rutherford and Andy Wathen University of Wisconsin, Madison 6th International Conference on Complementarity
More informationHomework 4. Convex Optimization /36-725
Homework 4 Convex Optimization 10-725/36-725 Due Friday November 4 at 5:30pm submitted to Christoph Dann in Gates 8013 (Remember to a submit separate writeup for each problem, with your name at the top)
More informationInterior-Point Methods
Interior-Point Methods Stephen Wright University of Wisconsin-Madison Simons, Berkeley, August, 2017 Wright (UW-Madison) Interior-Point Methods August 2017 1 / 48 Outline Introduction: Problems and Fundamentals
More information