Next Article in Journal
Minimum Energy Control of Quadrotor UAV: Synthesis and Performance Analysis of Control System with Neurobiologically Inspired Intelligent Controller (BELBIC)
Next Article in Special Issue
Convex-Optimization-Based Power-Flow Calculation Method for Offshore Wind Systems
Previous Article in Journal
Predicting Scale Thickness in Oil Pipelines Using Frequency Characteristics and an Artificial Neural Network in a Stratified Flow Regime
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Novel Interval Programming Method and Its Application in Power System Optimization Considering Uncertainties in Load Demands and Renewable Power Generation

1
College of Electrical and Information Engineering, Hunan University, Changsha 410082, China
2
Academic Affairs Office, Nanya Wangcheng School, Changsha 410019, China
*
Author to whom correspondence should be addressed.
Energies 2022, 15(20), 7565; https://doi.org/10.3390/en15207565
Submission received: 5 September 2022 / Revised: 29 September 2022 / Accepted: 10 October 2022 / Published: 13 October 2022

Abstract

:
This paper expresses the output power of renewable generators and load demand as interval data and develops the interval economic dispatch (IED), as well as interval reactive power optimization (IRPO) models. The two models are generalized into a specific type of linear interval programming (LIP) and nonlinear interval programming (NLIP), respectively. A security limits method (SLM) is proposed to solve LIP and NLIP problems. As for the LIP, the maximum radii of the interval variables are first calculated by the optimizing-scenarios method (OSM) for defining security limits, and the LIP is transformed into deterministic linear programming (LP), for which its constraints are the security limits, which can be solved by the simplex method. As for the NLIP, Monte Carlo simulations were used to obtain the maximum radii of the interval variables, and the average interval ratio of the interval variables is defined to compute the security limits for transforming the NLIP to deterministic nonlinear programming (NLP), which can be solved by using the interior point method. Finally, the IED and IRPO are used to verify the effectiveness and engineering of the proposed SLM.

1. Introduction

The development and utilization of renewable energy are important measures for reducing carbon emissions and confronting the energy crisis [1]. However, there is high uncertainty in the output of wind power and photovoltaic power, as well as the load demand that will affect the stable operation of the electric power system (EPS) [2,3]. Therefore, it is necessary to study the economic and stable operation of the EPS by incorporating renewable power generation. Two important optimization problems in the EPS are active power economic dispatch and reactive power optimization [4,5]. The former dispatches the active power output of the generator so as to minimize the operation cost of the power grid [6]. The latter aims to minimize the active power loss so as to keep the voltage of the entire power grid within security constraints [7].
The aforementioned two EPS optimization models can be generalized into the LP and NLP models, which both consist of the objective function, decision variables, equality, and inequality constraints. The equality constraint is the power flow equation, which is based on a certain value of power injection in order to obtain the voltage and the line power flow [8,9,10]. The value of power injection becomes uncertain due to the fluctuation in power generation and load demand with the renewable energy connected to the EPS [11]. The original optimization problem is transformed into solving a special type of uncertain LP and NLP models; i.e., the value of power injection is uncertain on the right side of the power flow equation [12,13,14].
There are two main approaches for solving uncertain LP and NLP problems, i.e., stochastic programming (SP) and robust programming (RP) [15,16]. As for the SP, it is required that the probability distribution or the probability of scenario occurrence of the uncertain parameters should be given in advance. The aforementioned two types of data are counted and simulated based on massive historical data, which are quite difficult to achieve in practical engineering due to various reasons such as data confidentiality and the great cost of data collection [17]. In contrast, the RP uses uncertain sets to represent uncertainties in LP and NLP models without obtaining the probability distribution. However, the RP is available only for solving convex models, and the equality constraints posed by linear and nonlinear equations in the LP and NLP models should be convexified prior. This leads to the limited applicability of the RP [18].
To address the abovementioned problems associated with SP and RP approaches, interval programming (IP) is proposed and applied to solve the LP and NLP models with uncertainties. The IP represents uncertainties as intervals, and there is no need to assume the probability distribution function or uncertainty sets of the uncertainties [19]. A large number of research studies have been conducted on LIP and NLIP problems [20,21]. In the research of the LIP, Mráz [22] first introduced the concept of the LIP and emphasized that it is an NP-hard problem of a two-layer programming model because the linear equation is solved for each set of coefficients in the right coefficient vector interval and coefficient matrix interval. Mráz [23] solved LP problems with interval parameters by obtaining the maximum and minimum values of the objective function, and two extreme constraints were used for substitution when dealing with constraints. In detail, linear programming was constructed to find the upper and lower bounds of each interval variable, and it combined them into an interval vector; the shell of the solution set of linear interval equations was then obtained. In the research of the NLIP, Chen [24] studied the NLP model with all variables as intervals, and its objective and constraint functions are expanded into functions about the middle point and the radius of the state variable by using Taylor’s formula. Jiang [25] studied methods for solving NLP problems with interval parameters in both the objective function and the constraints. Wu [26] derived Wolfe’s duality theory in interval optimization, and the optimality conditions for the models of four types of NLIP problems were given. Wu [27] provided the Karush–Kuhn–Tucker (KKT) optimality condition with interval parameters in the objective function. Hosseinzade [28] proposed and proved the corresponding KKT optimality conditions theoretically for multi-objective optimization problems with interval parameters in both objective and constraint functions. However, existing IP methods still have some problems in solving LIP and NLIP models. As for the LIP, the existing research mainly focuses on the LIP model with a few interval parameters, and the sensitivity analysis method is generally chosen for solving the LIP model. Although sensitivity analyses perform well in solving the LIP model with few interval parameters, it is not effective in dealing with LIP problems and includes many interval parameters because of great approximation errors. With respect to the NLIP, KKT optimality conditions are not suitable for handling NLIP with wider ranges of interval parameters, which restricts the KKT optimality condition-based methods to solving a few NLIP models with narrow interval parameters. Meanwhile, the intelligent algorithms (e.g., the particle swarm optimization methods and the genetic algorithm) applied for solving the NILP problems are not applicable to large-scale NLIP problems due to their poor solution efficiency.
To overcome the aforementioned problems of the existent IP methods in solving LP and NLP models, the SLM is proposed for solving a special type of LIP and NLIP problems in this paper. Specifically, the present study proposes an SLM and a modified SLM (MSLM), which can transform the LIP and NLIP into deterministic models that can be easily solved using linear and nonlinear programming methods. As to the LIP problem, first, the radii of the interval variables are determined using the OSM to define security limits. Second, the LIP model is transformed into a deterministic LP model with security limits as constraints, which can be solved using the simplex method. As to the NLIP problem, first, Monte Carlo simulations are used in NLIP to obtain the radii of interval variables. Next, the position ratio of the interval variables is defined to compute the security limits for converting the NLIP to a deterministic model that can be solved by using interior point method. At the end of this paper, the proposed SLM and MSLM are separately tested using the interval economic dispatch and the interval reactive power optimization in the EPS. Our contributions to this paper are as follows:
  • The SLM is proposed to solve a specific type of LIP and NLIP model with a determined system of equations. The SLM first defines the security limits to switch the LIP and the NLIP to deterministic LP and NLP models, respectively, and then the switched models are solved by traditional optimization approaches to obtain the optimal control variables (i.e., real-valued variable), which are able to ensure the feasibility of interval variables residing in the LIP and the NLIP models.
  • The MLSM is established to reduce the conservatism of the SLM in solving the NLIP. To expand the feasible domain of the switched deterministic model in the SLM, the interval position rate is defined to redefine the less conservative security limits of the NLIP model. Meanwhile, a predictor-corrector procedure is applied here to ensure the effectiveness of the redefined security limits so as to guarantee the feasibility of the SLM and to reduce conservatism.
  • Two cases in the EPS are tested to demonstrate the effectiveness of the SLM in solving the LIP and the MSLM in solving the NLIP. In detail, the SLM is applied to solve the IED model of the IEEE 118-bus test system, and the MSLM is utilized to solve the IRPO model of the IEEE 14-bus test system.
The rest part of the paper has the following structure. The mathematical models of the LIP and the NLIP are introduced in Section 2. Section 3 presents the optimization procedure of the SLM for the LIP and the NLIP. Section 4 describes the applications and the numerical simulations. Finally, conclusions are presented in Section 5.

2. State of the Problem

The LIP and NLIP models with a determined system of equations are formulated in this section. The interval is expressed in two kinds of forms as [ A ¯ , A ¯ ] and [ A L , A U ] , where A ¯ and A L denote the upper boundaries of the variables, and A ¯ and A U denote the lower boundaries. In addition, subtraction, multiplication, and division of interval operations are provided in the literature [29].
The LIP model is given as follows [30]:
min   f ( X ) s . t . { B X   +   C u   =   [ h - , h - ] X min     X     X max u min     u     u max ,
where
  • X is an n-dimensional state variable with an interval value;
  • u is the control variable including only the discontinuous real number value;
  • B and C are coefficient matrices of X and u , respectively;
  • f is the objective function, which is a linear function of X ;
  • B X + C u = [ h - , h - ] is the linear equality constraint;
    the values of the objective function are interval values instead of real numbers for each specific X .
The NLIP model is given as follows [25]:
min f ( X , u ) s . t .   { h ( X , u ) = [ h - , h - ] X min X X max u min u u max ,
where
  • X is an n-dimensional state variable with an interval value;
  • u is the control variable with the discrete real number value;
  • f and h are the objective function and constraint, respectively, and they are both nonlinear functions of X and u ;
    the values of the objective function are interval values instead of real numbers for each specific X .

3. Solutions of the LIP and NLIP

3.1. Solution of the LIP Using the SLM

To solve the LIP model, we proposed an SLM in this section. In detail, we firstly compute the maximum radii and midpoints of the interval variables. Then, the security limits of the interval variables are defined based on the results of the interval variable’s maximum radii. By performing these steps, the LIP model is transformed into a deterministic LP model, which is solved by the simplex method. Furthermore, the solution of the transformed deterministic LP is verified as a feasible solution of the LIP by using a simple example. Finally, the computational procedures of the proposed SLM for solving the LIP are provided at the end of this section.

3.1.1. Definition of the Security Limits for the LIP

For defining the security limits of the interval variables, it is required that the maximum radii should be known in advance. Notice that maximum radii and midpoints of the LIP’s interval variables are fixed because the equations of the LIP model are linear. Therefore, we have the following propositions.
Proposition 1.
The maximum radius of an interval variable X i is a constant in the LIP model denoted by Equation (1):
Δ X i , max = max u min u u max { Δ X i | B X + C u = [ h - , h - ] } = constant ,
where X i is an interval variable of X under a given u i ; Δ X i denotes the radius of an interval variable X i ; Δ X i , max is the maximum radius of an interval variable X i under all u   [ u min , u max ] .
Proof of Proposition 1.
We first convert the constraint equation B X + C u = [ h - , h - ] of Equation (1) to the following:
X = | B 1 | (   [ h - , h - ] C u ) = | B 1 |   [ h - , h - ] | B 1 | C u ,
where |·| represents an arithmetic for switching all elements of a matrix to their absolute value. Obviously, | B 1 |   C u   is a real-valued vector, and | B 1 |   [ h - , h - ] is an interval-valued vector. Thereafter, it is concluded that u   only affects the upper and lower boundary values of the interval variable X and not the interval’s widths. That is, the radii of X are only related to the radii of the interval [ h - , h - ] , for which its values are constant. Therefore, the maximum radii of X in the LIP are constant, and Proposition 1 is proven. □
Proposition 2.
The real-valued vector X C calculated by the constraint equation B X C   +   C u 0   = ( h - + h - ) / 2 is the midpoint of the interval-valued vector X .
Proof of Proposition 2.
According to Proposition 1, u   does not affect the widths of the interval variable X , and here, the value of u   is set as u 0   = u min + u max 2 . The solution of the deterministic constraint Equation (6) is denoted as X C , which is a real-valued vector. To show the relationship between X and X C , we list the interval equation constraints and the deterministic equation constraints as follows, respectively.
B   X   + C u   = [ h - , h - ] ,
B   X C + C u 0 = ( h - + h - ) / 2 .
The difference between Equations (5) and (6) will produce the following.
B   ( X     X C ) + C ( u     u 0 ) = [ h - , h - ] ( h - + h - ) / 2 ,
By setting u = u 0 , Equation (7) is rewritten as follows:
B   ( X     X C ) = [ Δ h , Δ h ] ,
X     X C = | B 1 | [ Δ h , Δ h ] ,
where Δ h   =   (   h - h -   ) / 2 , which represents the maximum radii of the input interval [ h - , h - ] . The midpoint of ( X X C ) is equal to zero, because the midpoint of | B 1 | [ Δ h , Δ h ] is zero. Therefore, X C is the midpoint of the interval variable X , and Proposition 2 is proven. □
According to Propositions 1 and 2, we define the security limits of the LIP as follows:
A X min = X min   +   Δ X ,
A X max = X max     Δ X ,
where Δ X is the vector composed of all interval variables’ maximum radii. A X min and A X max represent lower and upper security limits, respectively, and they will be adopted to define the state variables’ limits of the switched deterministic LP.

3.1.2. Transformation of the LIP into a Deterministic LP

Based on the results of the security limits, the next process is that the LIP model is transformed into a deterministic LP model, and the detailed transformation mainly includes two aspects. Firstly, the security limits obtained by Equations (10) and (11) are set as the new inequality constraint of the deterministic variable x in the LP. Secondly, ( h - + h - ) / 2 is taken as the input value of the deterministic equality constraint. By performing these steps, the LIP model is transformed into a deterministic LP model:
min   f ( x ) s . t .   { A x + B u = ( h - + h - ) / 2 A X min x A X max   u min u u max ,
where x is a solution of the deterministic constraint equation A x + B u = ( h - + h - ) / 2 , for which its value is a real-valued vector. ( h - + h - ) / 2 is the midpoint value of the input interval [ h - , h - ] , and ( h - + h - ) / 2 can be taken as the input value of the deterministic constraint equation because of Proposition 2. By solving Equation (12) by using the simplex algorithm, an optimal solution is obtained, and it has been proven as an optimal solution for the LIP by Propositions 1 and 2.

3.1.3. The Procedures of the SLM in Solving the LIP

After introducing the two processes in Section 3.1.1 and Section 3.1.2, the SLM is constructed and proposed for solving the LIP model. In detail, the solving process of LIP is divided into four steps:
  • Step 1: Input data of the LIP and set the parameters of the SLM;
  • Step 2: Calculate the radii of the interval state variable by the OSM [31] and compute the security limits by Equations (10) and (11);
  • Step 3: Set the security limits as the constraints of the deterministic state variable and transform the LIP model (i.e., (1)) into a deterministic LP model (i.e., Equation (12));
  • Step 4: Apply the simplex method to solve Equation (12) and obtain the control variables and state variables, which have been proven as an optimal solution for the LIP.

3.1.4. A Simple Example for Testing the Effectiveness of the SLM

To test the effectiveness and facilitate the understanding of the SLM, a simple example of a three-variable LIP model is introduced here. The expressions of this example are given as follows:
min   X 2   +   X 3 { x 1   +   X 2   +   2 X 3 = [ 4 , 6 ] x 1   +   2 X 2   +   X 3 = [ 8 , 10 ] 0 x 1 3 2.5 X 2 5 1.5 X 3 1 ,
where X 2 and X 3 are the state variables with interval values, and x 1 is the control variable with a real-valued number.
We first obtain the maximum interval radii of X 2 and X 3 by the OSM, and the results are Δ X 2 = 1 and Δ X 3 = 1 , which support Proposition 1. As shown in Figure 1a, the values of X 2 and X 3 enclose a central symmetric graph, and the four central symmetric figures’ center points can be obtained when the input value takes the midpoint (5, 9), which supports Proposition 2. According to the results of the maximum interval radii, the upper security limits of x 2 and x 3 are obtained by subtracting the maximum radii from the upper bounds of X 2 and X 3 , while the lower limits are obtained by adding the maximum radii to the lower bounds. Based on the results of the security limits shown in Figure 1b, the original LIP model is transformed into a deterministic LP model:
min   x 2 + x 3 { x 1 + x 2 + 2 x 3 = 5 x 1 + 2 x 2 + x 3 = 9 0 x 1 3 3.5 x 2 4 0.5 x 3 0 .
where x 2 and x 3 are deterministic state variables with real-valued numbers. Equation (14) can be solved by the simplex method on the platform MATLAB R2018b.

3.2. Solution of the NLIP Using the MSLM

As for the NLIP, Propositions 1 and 2 suitable for the LIP are not applicable anymore, because its nonlinearity will affect the radii and midpoint of the interval variables, which leads to the ineffectiveness of the security limits defined by Equations (10) and (11).
Hence, an MSLM is proposed to solve the aforementioned problems. The MSLM first defines a special type of security limit, denoted as the absolute security limits, for keeping the feasibility of the interval variables to deal with the nonlinearity of the NLIP. To reduce the conservativeness of absolute security limits, the proposed MSLM redefines the modified security limits by applying the average interval ratio in the absolute security limits, and a predictor-corrector procedure is used to correct the modified security limits and to ensure optimized interval variables within their original limits. By performing these steps, the NLIP model is transformed into a deterministic NLP model, which can be solved by the interior point method. The detailed processes of the proposed MSLM in solving the NLIP are introduced in the following section.

3.2.1. Definition of the Absolute Security Limits for the NLIP

To define the absolute security limits, we first determine the maximum radii of the interval variables; here, the maximum radius of X i is given as follows:
Δ X i max = max u min u u max { Δ X i | h ( X , u ) = [ h L , h U ] } ,
where X i is the i t h dimension of X , and Δ X i max is the maximum radius of X i , which can be obtained by using a Monte Carlo simulation under all control variables u satisfying u min u u max . Obviously, there is a control variable u ( i ) satisfying equation h ( X i , u ( i ) ) = [ h L , h U ] , which ensures that the radius of an interval variable X i is at the maximum. For the sake of simplicity, we denote Δ X - as a vector consisting of the maximum radii of all the intervals variables in X :
Δ X - = ( Δ X 1 max ,   Δ X 2 max , ,   Δ X p max ) ,
where p is the length of the vector X .
Based on the results of the interval variables’ maximum radii, the absolute security limits are defined as follows:
A X min = X min   +   2 Δ X - ,
A X max = X max     2 Δ X - ,
where A X max and A X min are the upper and lower absolute security limits, respectively, and they will be adopted to define the state variable’s limits of the switched deterministic NLP. To demonstrate the effectiveness of Equations (17) and (18), a simple derivation for defining the absolute security limits is given. Given a fixed u ( i ) and ξ [ h L , h U ] , the following equations are obtained:
h ( X , u ( i ) ) = [ h L , h U ] ,
h ( x , u ( i ) ) = ξ ,   ( ξ [ h L , h U ] ,
where ξ is an arbitrary vector of [ h L , h U ] , and x is a deterministic real-valued variable satisfying x X . Obviously, [ x 2 Δ X -   ,   x + 2 Δ X - ] X due to Δ X - Δ X . If [ x 2 Δ X -   ,   x + 2 Δ X - ] satisfies X min [ x     2 Δ X -   ,   x   + 2 Δ X - ] X max , it is guaranteed that X satisfies constraint X min X X max .
Intuitively, Figure 2 exhibits the upper and lower absolute security limits expressed by Equations (17) and (18), and the interval variable results after being optimized. As shown in Figure 2, the upper bound of the optimized interval variables X exceeded the absolute security limit A X max but did not exceed limit X max , and this is because x obtained by the deterministic NLP model is within the absolute security limits. Observe also that the width between the upper (or lower) absolute security limit and the upper (or lower) bound X max is 2 Δ X - , which ensures that x ( x X ) in addition to the width of the optimized interval variable X is within [ X min , X max ] .

3.2.2. Reducing the Conservativeness of the Absolute Security Limits

Obviously, a conservative problem resides in the absolute security limits obtained by Equations (17) and (18), because [ x     2 Δ X -   ,   x   + 2 Δ X - ] represents the worst-case fluctuation ranges of interval variables. To solve this problem, we first adopt the smaller radii Δ X 0 instead of Δ X - and then define a special parameter k I named as the “average interval ratio” to reduce the conservativeness of security limits in Equations (17) and (18). The modified security limits are given as follows:
S X min = X min   +   2 k I Δ X 0 ,
S X max = X max     2 ( 1     k I ) Δ X 0 ,
where S X max and S X min are the upper and lower modified security limits, respectively, and the division operation is a point division operation of vectors. Δ X 0 denotes the radii of X 0 = [ X 0 - , X 0 - ] , and their values are obtained when control variables are set at the midpoint of the variation ranges, i.e., u 0 = ( u min   +   u max ) / 2 and h ( X 0 , u 0 ) = [ h L , h U ] . k I denotes the average interval ratio, and its expressions are as follows:
k I = x 0     X 0 - X 0 -     X 0 - ,
where x 0 denotes the solutions of the equations h   ( x 0 , u 0 ) = ( h L   +   h U ) / 2 . Notice that x 0 ( X 0 - + X 0 - ) / 2 under most conditions because h   ( x 0 , u 0 ) is a nonlinear equation. k I complies with the constraint 0 k I 1 , and k I = 0.5 when x 0 = ( X 0 - + X 0 - ) / 2 .
Although Equations (21) and (22) are defined to limit the control variables, there still exists a situation in which the optimized interval variable X exceeds constraints [ X min , X max ] . This problem occurs mainly because the average interval ratio is fixed at u 0 = ( u min + u max ) / 2 , while the value of k I is not the same under different values of u . Therefore, a predictor-corrector procedure is applied to solve the aforementioned problem by squeezing the original modified security limits, and the corrected security limits are given as follows:
S X min = S X min   + δ l X ,
S X max = S X max     δ u X ,
where S X min and S X max are the corrected lower and upper security limits. δ u X and δ l X are the magnitude of the interval variable X exceeding the upper security limit and the lower security limit, respectively, and the values of δ u X i or δ l X i are set as 0 when an interval variable X i in X does not exceed upper or lower constraints. Notice that the predictor-corrector operation will repeat until the optimized interval variable X is within [ X min , X max ] .

3.2.3. Transformation of the NLIP into a Deterministic NLP

To solve the NLIP problem, the NLIP model should be transformed into an NLP model, and the transformation is completed by the following three steps. Firstly, the modified security limits obtained by Equations (21) and (22) are set as new constraints of the deterministic state variable x in the NLIP. Secondly, ( h L   +   h U ) / 2 is set as the input value of the equality constraint in the deterministic NLP. Finally, the NLIP model is transformed into a deterministic NLP model, which is expressed as follows:
min   f ( x , u ) s . t .   { h ( x , u 0 ) = ( h L   +   h U ) / 2 S X min x S X max   u min u u max ,
where u 0 = ( u min   +   u max ) / 2 , and f ( x , u ) is assumed to be the midpoint value of f ( X , u ) [32]. It is verified by a large number of arithmetic cases that the difference between f ( x , u ) and the actual midpoint value of f ( X , u ) is small [2]. Equation (26) is an NLP problem that can be solved by the interior point method [33]. Notice that new constraints of x in Equation (26) are constructed from corrected security limits S X min and S X max , when X obtained by the deterministic NLP model exceeds [ X min , X max ] .

3.2.4. The Procedures of the MSLM in Solving the NLIP

Based on the aforementioned introduction of MSLM in solving the NLIP model, its solution procedures are introduced as follows:
  • Step 1: Input data of the NLIP and set parameters of the interior point method. The parameters of the interior point method include the convergence precision and the central parameters.
  • Step 2: Obtain the maximum radius Δ X - of the interval variable X under all control variables u min u u max by the Monte Carlo simulation. Compute the average interval ratios by (23) and the modified security limits by Equations (21) and (22). Here, values of the deterministic state variables are calculated by solving the equation h ( x 0   ,   u 0 ) = ( h L   +   h U ) / 2 when computing the average interval ratio by Equation (23).
  • Step 3: Transform the NLIP model into a deterministic NLP model, which is solved by the interior point method, and obtain the optimal control variables. Use the OSM to calculate the intervals of the state variables X and the value of the objective function under the optimal control variables.
  • Step 4: Judge whether state variables satisfy the constraints or not. If the interval variable X does not exceed the limits, the optimization result is printed out and the procedures are completed. Otherwise, compute the amount by which the interval variables exceed the modified security limits and correct the security limits by Equations (24) and (25), and then switch to step 3.
According to the above procedures, the flow chart of the MSLM for solving the NLIP model is described in Figure 3.

4. Simulation Results

In this section, the IED model and the IRPO model in the EPS are established and tested to demonstrate the effectiveness and applicability of the proposed SLM and MSLM. In the first case, the SLM is applied to solve the IED model of the IEEE 118-bus test system. In the second case, the MSLM is utilized to solve the IRPO model of the IEEE 14-bus test system.

4.1. Simulation Results of the SLM in Solving the IED Model

4.1.1. The IED Model

The reactive power demand of loads in the IED model comprises intervals denoted as [ P L i , t - , P L i , t - ] , and then the IED model of the LIP problem can be given as follows [34]:
min C ( P G ) = t = 1 T i S G ( a i P G i , t + c i ) ,
s.t.
{ j S B i j θ j , t = P G i , t [ P L i , t - , P L i , t - ] P G i min P G i , t P G i max P d , G i P G i , t P G i , t 1 P u , G i   P i j min B i j ( θ i , t θ j , t ) P i j max ,
where S G is the set of thermal power electric generators. a and c are the cost coefficients of the generators. T = 24   h , and P G i , t denotes the active power output of the generators. B i j and θ j , t are the bus admittance matrix’s elements and the phase angle, respectively. P d , G i , P u , G i , P i j max , and P i j min are the downward climb rate, upward climb rate, the maximum transmitted power, and the minimum transmitted power, respectively. All variables of the IED are classified as state variables (denoted by X , which include θ j , t and P G i , t ) and control variables (denoted by u , which include the active power output of the generators). Then, the IED model can be simplified as Equation (1), and it can be solved by the procedures for solving the LIP model proposed in Section 3.1.

4.1.2. Simulation Result

This section discusses the results of solving the IEEE 118-bus test system [35]. As shown in Figure 4, the IEEE 118-bus system contains 54 generators, 64 load buses, 178 branches including 169 transmission lines and 9 transformers, and 9 capacitors. Parameters of nine capacitors are revealed in Table 1, and transformer ratios are all limited within the interval [0.9, 1.1], with a variation step of 0.05. A tolerance of ±10% is assumed in the active load power demand. Input data mainly include generator parameters, load parameters, transformer parameters, and line parameters. Moreover, all variables are valued in the per-unit system.
The results of the SLM when solving the IED model for the IEE-118 bus system are presented in Figure 5, Figure 6 and Figure 7. Figure 5 shows the power flow of 178 branches at 24 time periods before and after optimization. The transmission power constraint for each branch at different periods is calculated by the OSM [36], and the upper and lower limits of line transmission power are ±1.8 MW [2]. In Figure 5a, it is obvious that not all branches satisfy the upper and lower limits of transmission power before the IED optimization. In contrast, the optimized transmission power of each branch at 24 time periods is obtained in Figure 5b, which shows that all optimized line transmission power satisfies the upper and lower constraints. Figure 6 represents the total load curve at 24 time periods, and the load is divided into three types, i.e., peak load, valley load, and flat load, according to the value of total load in different periods of the day. The 24 periods of a day were divided into valley periods, peak periods, and flat periods according to the load value shown in Figure 6. Figure 7 illustrates the generator’s active output power at peak and valley periods and the generator’s cost factors. Valley periods and peak periods are selected to analyze scheduling effects because the economic dispatch is mainly for cutting the peak load and valley filling. In the valley load period, the output of four generators is relatively large, while in the peak load period, two other generators have relatively large output power in addition to the above four units. This is because the cost coefficients of the aforementioned six generators are relatively small.
In summary, the power dispatch schedule obtained by the proposed SLM is able to guarantee the transmission power of each branch within the upper and lower limits under the interval uncertainty, and the cost of power generation is minimized. Therefore, it is concluded that the proposed SLM is effective in solving the LIP model.

4.2. Simulation Results of the MSLM in Solving the IRPO Model

4.2.1. The IRPO Model

The IRPO model only considers the uncertainties of the input data in the active power generation and load demand, which are described as intervals, i.e., [ P G i L , P G i U ] , [ P L i L , P L i U ] , and [ Q L i L , Q L i U ] . Note that the active and reactive power loads of slack and generator buses are assumed as deterministic values, because they are mainly derived from power plants. Thus, the IRPO model can be expressed as follows:
min P l o s s = i S j S V i V j G i j cos θ i j ,
s.t.
{ [ P G i L , P G i U ] [ P L i L , P L i U ] V i j S V j ( G i j cos θ i j   +   B i j sin θ i j ) = 0 ,   i S G   Q G i [ Q L i L , Q L i U ] V i j S V j ( G i j sin θ i j     B i j cos θ i j ) = 0 ,   i S G ,
{ [ P L i L , P L i U ]     V i j S V j ( G i j cos θ i j   +   B i j sin θ i j ) = 0 ,   i S L Q C i     [ Q L i L , Q L i U ]     V i j S V j ( G i j sin θ i j     B i j cos θ i j ) = 0 ,   i S L ,
{ V i min V i V i max ,   i S G S L Q G i min Q G i Q G i max ,   i S G T l min T l T l max ,   l S T   Q C i min Q C i Q C i max ,   i S C ,
where S , S G , S G , S L , S C , and S T are the indexed sets of system buses, generator buses, non-balance generator buses, load buses, load buses with static VAR compensators, and transformer branches, respectively. Equation (29) represents real power losses; Equations (30) and (31) are power flow equations; Equation (32) represents the security and system operational constraints, which include the limits of the reactive power generation of generators, static VAR compensators outputs, voltage magnitudes (except for the slack bus), and transformer ratios. θ i , V i , Q C i , and Q G i are the bus angle, voltage magnitude, reactive power compensator output, and reactive power generation, respectively. θ i j = θ i θ j , and T l is the ratio of the l t h transformer. G = { G i j } and B = { B i j } are real and imaginary components of the admittance matrix [26].
All variables of the IRPO are classified as state variables and control variables. In detail, the state variable X includes load bus voltage magnitudes, the reactive power generation of generator buses, the bus angles of non-balance buses, and the active power generation of the balance generator (assuming that the active output constraint of the balance generator is not considered). The control variable u includes transformer ratios, reactive power compensations, and generator terminal voltages. Then, the IRPO model can be simplified as Equation (2), and it can be solved by the procedures for solving the NLIP proposed in Section 3.2.

4.2.2. Simulation Results

This section tests the convergence effect of the algorithm under different injected power data fluctuations to verify the engineering application capability of the proposed MSLM, and the IEEE 14-bus system shown in Figure 8 is adopted. The IEEE 14-bus system includes five power generators, one capacitor, and three transformers. The voltage magnitude of the generator buses and load buses are limited in [0.9, 1.1] and [0.95, 1.05], respectively. The transformer ratio is considered to be limited to [0.9, 1.1] with a variation step of 0.05, as shown in Table 2. The reactive power generation variables are all constrained to interval [−2.0, 3.0], and initial penalty factors of the penalty function for the interior point method to handle discrete variables are set to v b C ( 0 ) = 5 , v b T ( 0 ) = 2 , and V b max = 500 . Tolerances of ±10%, ±15%, and ±20% are assumed in the load power demand and active power generation to verify the ability of the algorithm in handling variations in the input data. The iteration’s precisions of the interior point method are set as ε = 10 6 . All variables are valued in the per-unit system.
The results of the MSLM when solving the IRPO model for the IEE-14 bus system are presented in Figure 9, Figure 10 and Figure 11. Figure 9 shows midpoints of real power loss with different tolerances. Observe that the midpoints of real power losses are the smallest when the input data tolerance is ±10%, and this is because the feasible regions of the state variable, i.e., the widths of the security limits, is the largest among the three input data tolerances. In detail, the widths of the state variable’s security limits depend on the interval variables’ radii, and the radius is the smallest when the fluctuation interval of the input power data is ±10%. Figure 10 represents the security limits and optimized interval bounds of the load voltage magnitudes at different input data tolerances, while Figure 11 represents the reactive power generation of the generators. It is shown that the optimized intervals of the state variables are all within the limits. Observe also that the larger the data tolerance, the narrower the range of the security limits. In other words, the smaller the fluctuation range of the injected power data, the wider the security limits of the state variables.
These results indicate that all variable intervals are subject to their security limits, which demonstrates that the proposed MSLM is effective. Therefore, it is concluded from the above analysis that the present MSLM has good applicability to large-scale grids, and it provides a solution with good robustness relative to various tolerances of input data.
Furthermore, the EPS, which has different sizes, is tested to evaluate the efficiency of the MSLM, including the IEEE 14-bus system, IEEE 30-bus system, IEEE 57-bus system, IEEE 118-bus system, IEEE 300-bus system, and C703-bus system (from an actual system of Southern Power Grid in China). Then, the execution time of the algorithm and the time to obtain the maximum radius are counted shown in Table 3, while the number of Monte Carlo simulations in the algorithm during the test is the same, which is 10. The computation time of the algorithm increases sharply when the number of system buses increases to 300, as observed in Table 1. The fact causing drastic changes in computation time is that the algorithm uses the interval power flow algorithm to obtain the maximum radius of the state variables, and the computation time of the interval power flow algorithm is closely related to the number of buses in EPS [31]. Thus, it is necessary to investigate and reduce the computation time needed when obtaining the interval maximum radii of the state variables and to meet the requirement of engineering online applications.
As far as the computational information is concerned, all tests are realized using MATLAB R2018b on a CPU i5-2.4GHz with 16 GB of RAM and eight cores.

5. Conclusions

In this paper, the SLM is proposed to solve a specific type of interval linear and nonlinear programming problems with equality constraints posed by linear and nonlinear equations, respectively. As for the LIP model, the radii of the interval variables are first calculated by the OSM for defining security limits, and the LIP model is transformed into a deterministic LP model for which its constraints include security limits, which can be solved using the simplex method. As to the NLIP, the Monte Carlo simulation is used to obtain the radii of the interval variables, and the position ratio of the interval variables is defined to compute the security limits for transforming the NLIP model to a deterministic NLP model that can be solved by the interior point method. Furthermore, the IED and the IRPO in the EPS are used to verify the effectiveness of the proposed SLM and MSLM. Firstly, the numerical simulation results of the IED solved by the SLM are obtained for the IEEE 118-bus test system, and the proposed SLM ensures that the line power flow is within constraints. Similarly, the analysis demonstrates the advantages and effectiveness of the proposed SLM. Secondly, the numerical simulation consequences of the IRPO with different input data tolerances are gained by the proposed MSLM for the IEEE 14-bus test system, which shows that midpoints of real power losses are the smallest when the input data tolerance is ±10%. It is concluded that the MSLM algorithm is able to solve the large-scale EPS with different input power data tolerances and has good robustness and engineering application capability.

Author Contributions

D.W.: Conceptualization, data curation, methodology, software, validation, visualization, and writing—original draft. C.Z.: Conceptualization, methodology, and funding acquisition. W.J.: Resources. Q.L.: Visualization. L.C.: Resources. H.Y.: Software. Y.L.: Data curation. N.K.: Data curation and validation. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the National Natural Science Foundation of China (Grant No. 52007056) and in part by the Natural Science Foundation of Hunan Province, China (Grant No. 2020JJ5077).

Data Availability Statement

No new data were created or analyzed in this study. Data sharing is not applicable to this article.

Conflicts of Interest

The authors declare no conflict of interest. The funders had no role in the design of the study; in the collection, analysis, and/or interpretation of data; in the writing of the manuscript; and in the decision to publish the results.

References

  1. Abdollahipour, A.; Sayyaadi, H. Optimal Design of a Hybrid Power Generation System Based on Integrating PEM Fuel Cell and PEM Electrolyzer as a Moderator for Micro-Renewable Energy Systems. Energy 2022, 260, 124944. [Google Scholar] [CrossRef]
  2. Zhang, C. Models and Algorithms of Reactive Power Optimization Considering Uncertainties Based on Interval Theory. Ph.D. Thesis, South China University of Technology, Guangzhou, China, 2018. [Google Scholar]
  3. Fu, X. Statistical Machine Learning Model for Capacitor Planning Considering Uncertainties in Photovoltaic Power. Prot. Control. Mod. Power Syst. 2022, 7, 1–13. [Google Scholar] [CrossRef]
  4. Sarhan, S.; Shaheen, A.; El-Sehiemy, R.; Gafar, M. A Multi-Objective Teaching–Learning Studying-Based Algorithm for Large-Scale Dispatching of Combined Electrical Power and Heat Energies. Mathematics 2022, 10, 2278. [Google Scholar] [CrossRef]
  5. Shaheen, A.M.; El-Sehiemy, R.A.; Farrag, S.M. Optimal Reactive Power Dispatch Using Backtracking Search Algorithm. Aust. J. Electr. Electron. Eng. 2016, 13, 200–210. [Google Scholar] [CrossRef]
  6. Ginidi, A.; Elsayed, A.; Shaheen, A.; Elattar, E.; El-Sehiemy, R. An Innovative Hybrid Heap-Based and Jellyfish Search Algorithm for Combined Heat and Power Economic Dispatch in Electrical Grids. Mathematics 2021, 9, 2053. [Google Scholar] [CrossRef]
  7. Shaheen, A.M.; Elsayed, A.M.; El-Sehiemy, R.A.; Ginidi, A.R.; Elattar, E. Optimal Management of Static Volt-Ampere-Reactive Devices and Distributed Generations with Reconfiguration Capability in Active Distribution Networks. Int. Trans. Electr. Energy Syst. 2021, 31, e13126. [Google Scholar] [CrossRef]
  8. Almunif, A.; Fan, L. Optimal PMU Placement for Modeling Power Grid Observability with Mathematical Programming Methods. Int. Trans. Electr. Energy Syst. 2020, 30, e12182. [Google Scholar] [CrossRef]
  9. Theodorakatos, N.P.; Lytras, M.; Babu, R. Towards Smart Energy Grids: A Box-Constrained Nonlinear Underdetermined Model for Power System Observability Using Recursive Quadratic Programming. Energies 2020, 13, 1724. [Google Scholar] [CrossRef] [Green Version]
  10. Shaheen, A.; Ginidi, A.; El-Sehiemy, R.; Elsayed, A.; Elattar, E.; Dorrah, H.T. Developed Gorilla Troops Technique for Optimal Power Flow Problem in Electrical Power Systems. Mathematics 2022, 10, 1636. [Google Scholar] [CrossRef]
  11. Theodorakatos, N.P. A Nonlinear Well-Determined Model for Power System Observability Using Interior-Point Methods. Measurement 2020, 152, 107305. [Google Scholar] [CrossRef]
  12. Theodorakatos, N.P.; Manousakis, N.M.; Korres, G.N. Optimal Placement of Phasor Measurement Units with Linear and Non-Linear Models. Electr. Power Compon. Syst. 2015, 43, 357–373. [Google Scholar] [CrossRef]
  13. Vanderbei, R.J. Linear Programming; Springer: Berlin/Heidelberg, Germany, 2020. [Google Scholar]
  14. Bigi, G.; Castellani, M.; Pappalardo, M.; Passacantando, M. Nonlinear Programming Techniques for Equilibria; Springer: Berlin/Heidelberg, Germany, 2019. [Google Scholar]
  15. Mansouri, S.; Ahmarinejad, A.; Ansarian, M. Stochastic Planning and Operation of Energy Hubs Considering Demand Response Programs Using Benders Decomposition Approach. Int. J. Electr. Power Energy Syst. 2020, 120, 106030. [Google Scholar] [CrossRef]
  16. Deng, X.; Lv, T. Power System Planning with Increasing Variable Renewable Energy: A Review of Optimization Models. J. Clean. Prod. 2020, 246, 118962. [Google Scholar] [CrossRef]
  17. Jithendranath, J.; Das, D. Stochastic Planning of Islanded Microgrids with Uncertain Multi-Energy Demands and Renewable Generations. IET Renew. Power Gener. 2020, 14, 4179–4192. [Google Scholar] [CrossRef]
  18. Nazari-Heris, M.; Mohammadi-Ivatloo, B. Application of Robust Optimization Method to Power System Problems. In Classical and Recent Aspects of Power System Optimization; Academic Press: Cambridge, MA, USA, 2018; pp. 19–32. [Google Scholar] [CrossRef]
  19. Kou, X.; Li, F. Interval Optimization for Available Transfer Capability Evaluation Considering Wind Power Uncertainty. IEEE Trans. Sustain. Energy 2018, 11, 250–259. [Google Scholar] [CrossRef]
  20. Cao, M.; Huang, G. Scenario-Based Methods for Interval Linear Programming Problems. J. Environ. Inform. 2011, 17, 65–74. [Google Scholar] [CrossRef]
  21. Hu, B.Q.; Wang, S. A Novel Approach in Uncertain Programming Part II: A Class of Constrained Nonlinear Programming Problems with Interval Objective Functions. J. Ind. Manag. Optim. 2006, 2, 373. [Google Scholar]
  22. Mráz, F. The Exact Lower Bound of Optimal Values in Interval LP. Math. Res. 1996, 90, 214–220. [Google Scholar]
  23. Mráz, F. Calculating the Exact Bounds of Optimal Valuesin LP with Interval Coefficients. Ann. Oper. Res. 1998, 81, 51–62. [Google Scholar] [CrossRef]
  24. Chen, S.H.; Wu, J.; Chen, Y.D. Interval Optimization for Uncertain Structures. Finite Elem. Anal. Des. 2004, 40, 1379–1398. [Google Scholar] [CrossRef]
  25. Jiang, C.; Han, X.; Liu, G.; Liu, G. A Nonlinear Interval Number Programming Method for Uncertain Optimization Problems. Eur. J. Oper. Res. 2008, 188, 1–13. [Google Scholar] [CrossRef]
  26. Wu, H.-C. On Interval-Valued Nonlinear Programming Problems. J. Math. Anal. Appl. 2008, 338, 299–316. [Google Scholar] [CrossRef] [Green Version]
  27. Wu, H.-C. The Karush–Kuhn–Tucker Optimality Conditions in Multiobjective Programming Problems with Interval-Valued Objective Functions. Eur. J. Oper. Res. 2009, 196, 49–60. [Google Scholar] [CrossRef]
  28. Hosseinzade, E.; Hassanpour, H. The Karush-Kuhn-Tucker Optimality Conditions in Interval-Valued Multiobjective Programming Problems. J. Appl. Math. Inform. 2011, 29, 1157–1165. [Google Scholar]
  29. Xu, J.; Wu, Z.; Yu, X. An Interval Arithmetic-Based State Estimation Framework for Power Distribution Networks. IEEE Trans. Ind. Electron. 2019, 66, 8509–8520. [Google Scholar] [CrossRef]
  30. WANG, S.; WANG, D. An interval linear programming method for optimal economic dispatch of microgrid considering uncertainty. Autom. Electr. Power Syst. 2014, 38, 5–11. [Google Scholar] [CrossRef]
  31. Ding, T.; Guo, Q. Inter-Area Economic Dispatch Model Considering Wind Power Uncertainty and Spatial Branch Delimitation Method. Proc. CSEE 2014, 34, 3707–3714. [Google Scholar]
  32. Zhang, C.; Chen, H.; Liang, Z. Reactive Power Optimization under Interval Uncertainty by the Linear Approximation Method and Its Modified Method. IEEE Trans. Smart Grid 2017, 9, 4587–4600. [Google Scholar] [CrossRef]
  33. Zhang, C.; Chen, H.; Guo, M.; Wang, X.; Liu, Y.; Hua, D. DC Power Flow Analysis Incorporating Interval Input Data and Network Parameters through the Optimizing-Scenarios Method. Int. J. Electr. Power Energy Syst. 2018, 96, 380–389. [Google Scholar] [CrossRef]
  34. Zhang, C.; Liu, Q.; Huang, S.; Zhou, B.; Cheng, L.; Gao, L.; Li, J. Reactive Power Optimization under Interval Uncertainty of Renewable Power Generation Based on a Security Limits Method. Int. J. Electr. Power Energy Syst. 2021, 130, 106894. [Google Scholar] [CrossRef]
  35. Christie, R. Power Systems Test Case Archive-UWEE. Available online: http://labs.ece.uw.edu/pstca/ (accessed on 15 April 2022).
  36. Zhang, C.; Chen, H.; Shi, K.; Qiu, M.; Hua, D.; Ngan, H. An Interval Power Flow Analysis through Optimizing-Scenarios Method. IEEE Trans. Smart Grid 2017, 9, 5217–5226. [Google Scholar] [CrossRef]
Figure 1. (a) Regions of state variable values under different control variable values; (b) feasible regions of state variables in the LIP and the LP models.
Figure 1. (a) Regions of state variable values under different control variable values; (b) feasible regions of state variables in the LIP and the LP models.
Energies 15 07565 g001
Figure 2. Absolute security limits and optimized interval variable results.
Figure 2. Absolute security limits and optimized interval variable results.
Energies 15 07565 g002
Figure 3. The procedure of the MSLM for solving the NLIP.
Figure 3. The procedure of the MSLM for solving the NLIP.
Energies 15 07565 g003
Figure 4. The IEEE 118-bus test system.
Figure 4. The IEEE 118-bus test system.
Energies 15 07565 g004
Figure 5. Power flow of 178 branches at 24 periods before and optimization.
Figure 5. Power flow of 178 branches at 24 periods before and optimization.
Energies 15 07565 g005
Figure 6. Total load curve at 24 time periods.
Figure 6. Total load curve at 24 time periods.
Energies 15 07565 g006
Figure 7. Generator active output power at peak and valley periods and generator cost factors.
Figure 7. Generator active output power at peak and valley periods and generator cost factors.
Energies 15 07565 g007
Figure 8. IEEE 14-bus test system.
Figure 8. IEEE 14-bus test system.
Energies 15 07565 g008
Figure 9. Midpoints of real power loss with different tolerances.
Figure 9. Midpoints of real power loss with different tolerances.
Energies 15 07565 g009
Figure 10. Load voltage magnitudes obtained at different tolerances.
Figure 10. Load voltage magnitudes obtained at different tolerances.
Energies 15 07565 g010
Figure 11. Reactive power generation of generator buses at different tolerances.
Figure 11. Reactive power generation of generator buses at different tolerances.
Energies 15 07565 g011
Table 1. The capacitor parameters of the IEEE 118-bus test system.
Table 1. The capacitor parameters of the IEEE 118-bus test system.
Control Variable TypeLocationLower RangeUpper RangeStep Size
Reactive compensation capacitorBus 5−0.500.1
Bus 1700.10.02
Bus 3700.20.04
Bus 44−0.300.06
Bus 4500.20.04
Bus 4800.20.04
Bus 7900.30.06
Bus 8200.30.06
Bus 8300.20.04
Table 2. The capacitor and transformer parameters of the IEEE 14-bus test system.
Table 2. The capacitor and transformer parameters of the IEEE 14-bus test system.
Control Variable TypeLocationLower RangeUpper RangeStep Size
Reactive compensation capacitorBus 900.50.1
Transformer ratioBranch 4–70.91.10.05
Branch 4–90.91.10.05
Branch 5–60.91.10.05
Table 3. The IRPO algorithm based on the MSLM to test the calculation time of different EPS.
Table 3. The IRPO algorithm based on the MSLM to test the calculation time of different EPS.
Test SystemsAlgorithm Execution
Time (s)
The Computation Time of the Maximum Interval Radii of the State Variables (s)
IEEE141.551.08
IEEE308.46.4
IEEE5757.955
IEEE118502.7500
IEEE30030022990
C70323,25023,200
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Wang, D.; Zhang, C.; Jia, W.; Liu, Q.; Cheng, L.; Yang, H.; Luo, Y.; Kuang, N. A Novel Interval Programming Method and Its Application in Power System Optimization Considering Uncertainties in Load Demands and Renewable Power Generation. Energies 2022, 15, 7565. https://doi.org/10.3390/en15207565

AMA Style

Wang D, Zhang C, Jia W, Liu Q, Cheng L, Yang H, Luo Y, Kuang N. A Novel Interval Programming Method and Its Application in Power System Optimization Considering Uncertainties in Load Demands and Renewable Power Generation. Energies. 2022; 15(20):7565. https://doi.org/10.3390/en15207565

Chicago/Turabian Style

Wang, Dapeng, Cong Zhang, Wanqing Jia, Qian Liu, Long Cheng, Huaizhi Yang, Yufeng Luo, and Na Kuang. 2022. "A Novel Interval Programming Method and Its Application in Power System Optimization Considering Uncertainties in Load Demands and Renewable Power Generation" Energies 15, no. 20: 7565. https://doi.org/10.3390/en15207565

APA Style

Wang, D., Zhang, C., Jia, W., Liu, Q., Cheng, L., Yang, H., Luo, Y., & Kuang, N. (2022). A Novel Interval Programming Method and Its Application in Power System Optimization Considering Uncertainties in Load Demands and Renewable Power Generation. Energies, 15(20), 7565. https://doi.org/10.3390/en15207565

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop