Académique Documents
Professionnel Documents
Culture Documents
fefly ~ (COTO) Hg cy ANY nonbasie vartables that are candidates to become rw superbasics will be sccepted if thelr associated multiplier value exceeds a certain threshold value A 'Condensed Fiow chart of "the. reauced eradlent atgrttha fe show n'Flg 3 It shoud be ngtad that advantase, {5 taken of the special” structure. ofthe problen in» the Computations involved at the éifferent steps of the aTgoritia. The network structure permitts the basis mein of the sys- tem to be represented as a spanning tree, cf.(?]. An example of spanning tree, for abo rescrvotr, three hour’ oxample’ Se shown Sh fig. 4 as The objective of (P2) fs dominated by. the polynomial” functions involving turbine. discharge Warlables, as defined in (7) ana f(2) should thrertore Be" comer: “there might stil) gecur noncconveatties due othe terns "introciced in order’ to. account for head essen, ""Nowevery, the. convergence of tne solution algori'twe fe" not significantly affected ty" this since the min dependence of the cbjective function ts on Die uroine aiscnarges st gradient ont Terai dot seston C4)! Sinwee dy Taree Uplate of sltion tat Be Ltrs regret, mae 2 bests phot Fig. 3. Flowchart for the reduced gradfent a1gori tuna HOUR 1 our 2 Resenvore J RESERVOIR 1 Sea Fig. 4. Spanning tree for a two raservoir three hour ample varvables Dashed ares represent out oF bats HANDLING OF SECURITY conSTRAINTS ‘he security constraints (14) are of non-network type and Spoctel techniques must be developed for hands Ting ‘oF these consgraints. in erder not to. loose the desireable’ network Tow properties: of” the optimization foal be renrbnten in thetdosre introdeced Sete nslaons (oD) ey 5 $2 eet (25) A restateeent of (P2) with security contratnts cated thus Fests tm sin ¢( 010) subject 0 (na) (A) 00 = (0) fod* OD ge) edt {a} < 03) < (8), 0) «a hers 2 {8 the munber of security constratets. The Tonstratat sot of ipa) fsa platute of network lov Eanstraints ang genere), Vinear inequl ity” onstrates Sepresenting Ue security restrictions that are Imposed fn’ the optinal hydro schedule. An inportant observation fo be mide Ts tet only a subset oF the security com Straints wil normally be binding, “ee. (a where TI[K]) $8 a set of Indices describing binding constraints at the point [i]. an active constraint set inethodalogy ig therdfore proposed for solving (?3)- An Dutline of the method will be given below. es te 1) (2s ‘ay feasible perturbation around the current solu- tion point [X] must with respect to active snequality Eonatfatnts S2ttsty (ot fx] co, te 118) (ny rtitioning of relation (27) In correspondence 4 wien (15P and by using eqs (I) wilt resin te (Caf - Cai]$ (81ASD [as <0, te 10) (2) The problem of finding the steepest descent Alrection from the point [2] can be defines a6 sin ae = (org wag ject to (4) fx) = (0) (opI* fox) £0, te (0) lox] ea" (seo) By substituting eas. (17), (22) and (28) An (sro),"a Feauced optiatzation préblew with respect. t2 ‘the free superbasice 1s obtained win at yt tS 1eigty subject to [ret (ons 9, te (03) (ns#0) [argc 28 ere (rg) = (os -(00)US1* fal, (20) Mlustratton of the cone Fig. 5 spanned ty the hegative constraint’ normals, the. provectod radtent and the steepest descent. directionhe, negative of the active security constraint normals ([01'Span 2 convex’ cone & such that = CODE DD seg Mr 2 OF} Fenty MET 2 Let the vector [p] be the projection of the reduced Gradient on cone Ee rigurd'Ssuth thot the deans Bctveen [p] and (n} fe winieized, oe sin tfo) - (n} [ble c It can be, shown, ref. [8], that (RESD) fs solved ty the Heetpstectoon sce ONY, Wine on (ax), + (2) Eq. (31) can be wettten as sin ({9) = {n])* (Ce) ~ (41) (ay Ie} ec Slnce [0], is cevired to be 4 mater of the set ¢ as defined” by (3D), Te. can be expressed az 2" linear Combination of the’ vectors [-ry |. Substituting for {9} fn'(33) hence Tead to’ the followlng quadratic prograa in 4 fa]* (9) (a) + fa} fa] wr are vere (a) = 2 (e]* ¢e) on (a) = -2 (a)* [n) (8) ane |] 15,30 array of cotunnvestors [ors] a5 defined By" (29). Top) Is small program remember’ tnet ony 3 flow of te security constraints are active) that cat be solved at a minor expence of CPU tine. The covfficients a4 can be interpreted a¢ ostimater of the ‘CagrangemuTthpiiers assoctated with binding Security constraints, At an optimal” solution. paint 9 {P30 Ge olution “sori provides correct values for the Lagrange mitighicrs. since the following necessary condt lon thane Satietied if Ol = gape brah ate 0 Te expression (24) for the mitipliers associated with the bound sonetewsntots fv the presence of active SoSurity constraints modified a Del B+ a hegayhs (oily ~ CAPA 99)) on (38) Imcive constraints ave continuously. checked using! Relation it) inv oder Go" avahd ofbing a Tints “Contratns tet econ pining ave aed to he bie’ st The Set at currently aetive constraints is wont- tore te, eect IF" insravaes cout bcos ronebingiog and thy con be deleted row the set 1([4)). An Aneteation on this ts provi dea by a zero Hidden he ASSSG Rye ingens! ais fn intial feasible solution to (P3)_ is obtained in two Stops First, feasible: solution with respect to ‘he hydrological. constraints fs determined by solving ¢ ure, inear network Flow prablen. Next, the nedwork Flow solution is made feasible with respect to. vielated security constraints by decreating ‘turbine discharges and'"ineressing”“spiTlages.. Non-zera SpiTlage vartasTes fare given the status of superoasice in the redsced: grat tent aigoei te, TEST RESULTS ANO coveLUSIONS Poa te Sect taer anaes ee te He al aac Me Talat Haus ay sour Meth e Bese ied Sh Ot eas aetna ae Beer outa STS Ae Bu esl’ GAC eat Sol te, soy Sic Beets Bae et eee Ke ad er sent i ESS SE Sates att sei ate te, Ue at OLE SE SS emia sett dat ata Fee i Be lla te ata ai IY Dre Se Src te Sete sce ear Bess Wo. variabies No. hydrological constraints No. security constraints Tverage no. superbasies Table 1. charac36 Fig. 6 = Hlustration_ of the effects of securtty con Etraints on’ the hydro power production a (4) (5) (5) a (2) (9) acrenences Branelund, H. ef-a1. “Optimal. short tern ope tion planning oF hydrothermal power system © Part Tir" otution’ techniques”, “Proc of PSCC, Helsinct, pp. 320-355, 1988. Merlin, Arvet al. "peinization of short term Scheu ing. of EOF Tydraulte valleys with: coupling Eonstraints: The Ovide model", Proc. "of PSSCy Lausanne, pp. 245-354, 196i Branniund,”H. et al; "Optima short term opera tion" planning of 3 Tange, hydratherma) “power sfs fm based" on a nontincer network Flow’ concept”, Paper 8 fae 050-9, IEEE “PES winter “meeting, 1388 Branlund, W., ‘Wetwork Programing applied to ‘operation plating of hydrothermal power systems, Pho" ‘thesis, tne "Rayal” Institute of Techtology, Stockhotm, i986 Mortaugh A. and. Saunders, MR, “Large scale Vinearly’ constratned™ optiaizatton", athenatical programming, 14, pp. 41-72, 1978. Ba Rene surge we aalrigne; Ma. “Practical optimization’, feadesie Press, 1381. Kennington, JL and Helgoson, CV-, *ADgorsthes for network ‘progranaing", om Wiley. & Sons. Mew orc 1981 Aerial, M: "Nontinear programming, inetrods", Prentice-tall. ine; Giniy Pd, ong harvay. Mey *Safequarded steplength Sigerfthns' "for optimization using. descent Inethads"y ations) Physical Laboratury report no. W'37, i978 analysis and