Electrical Power and Energy Systems 66 (2015) 53–66
Contents lists available at ScienceDirect
Electrical Power and Energy Systems journal homepage: www.elsevier.com/locate/ijepes
Benders decomposition applied to security constrained unit commitment: Initialization of the algorithm J. Alemany a,⇑, F. Magnago a,b a b
Department of Electrical and Electronic Engineering, Universidad Nacional de Río Cuarto, Argentina Nexant Inc., AZ, USA
a r t i c l e
i n f o
Article history: Received 5 December 2013 Received in revised form 3 August 2014 Accepted 12 October 2014
Keywords: Benders decomposition Initialization methodology Mixed integer linear programming Security constrained unit commitment
a b s t r a c t Benders decomposition has been broadly used for security constrained unit commitment problems, despite the fact that it may present convergence difficulties due to instabilities and to the mixed integer nature of the unit commitment problem. The initialization of Benders decomposition has been recognized as a prominent feature for the algorithm enhancement. In this work, a new Benders decomposition initialization methodology is proposed. The objective of the initialization is to include inexpensive network signals that can be added during the initial unit commitment master problem. Numerical simulations using the IEEE-118 and RTS-96 systems are performed to illustrate the benefits of the proposed initialization methodology. Results suggest that the initialization of Benders decomposition applied to security constrained unit commitment problems improves the overall convergence of the algorithm. Ó 2014 Elsevier Ltd. All rights reserved.
Introduction The unit commitment (UC) calculation is extensively used in daily power system operation. The UC is an exercise of large-scale, time-varying, non-convex, mixed-integer modeling and optimization. Security constrained unit commitment (SCUC) is an extension of conventional UC with the inclusion of system network constraints, in both normal and contingency operation states. The main objectives of the SCUC are to ensure not only the economic operation but also the security of the system [1,2]. These two different objectives can be separately solved as a two-level optimization problem. It is a common practice to define a master level, which includes the UC calculation, and the sub-problem level, which checks the network security constraints. Benders Decomposition (BD) is an algorithm that has been broadly used for large-scale optimization problems, particularly for power systems [3,4]. BD has three main advantages: modularity, flexibility and robustness. With regard to modularity, master and sub-problems can be separately solved by specialized algorithms, thus providing speed and efficiency on the overall performance of the global optimization process. Additionally, Benders flexibility is mainly supported by the different existing power system applications. For example, it is possible to find its application in areas like security constrained economic dispatch ⇑ Corresponding author. E-mail address:
[email protected] (J. Alemany). http://dx.doi.org/10.1016/j.ijepes.2014.10.044 0142-0615/Ó 2014 Elsevier Ltd. All rights reserved.
[5], generation–transmission planning [6,7], hydrothermal coordination [8,9], and optimal power flow [10,11]. Finally, in relation to robustness, despite the different nature of the master and the sub-problems in SCUC applications, both are essentially solved using Linear Programming (LP) algorithms. This is an important feature because LP algorithms are considered to be among the most mature methodologies in optimization techniques [12]. Nevertheless, since BD is a cutting-plane method [13], it may present instabilities which are translated into delays of the algorithm convergence [14,8]. In addition, since the master level is formulated as a mixed integer linear problem (MILP), the convergence time is strongly affected by the high computational burden of the master problem [15]. Therefore, there are many research efforts regarding BD improvements [16]. Among the different suggested possibilities, having a better initialization of BD is recognized by several authors as one of the most important enhancements, concluding that it could have a significant effect on BD performance. Several initialization methodologies have been developed. In [17] an initial set of cuts is constructed from routes of an aircraft routing model. The author concluded that the initial cuts are advisable to be used with any network, since there is a reduction in the total computation time. Furthermore, in [18] a strategy to initialize BD with the addition of a series of valid inequalities is developed. The initialization procedure is applied to a fixed charge network problem, and different variants of refinery systems are studied.
54
J. Alemany, F. Magnago / Electrical Power and Energy Systems 66 (2015) 53–66
Nomenclature T G B N L b t g l
scheduling horizon number of generation units number of piece-wise blocks number of buses number of branches power block index hour index unit index branch index contingency scenario loop iteration out of service lapse initial hour production cost startup cost piece-wise power block active power relaxation variable load supplying capability MW bus injection state binary variable power block binary variable start-up binary variable shut-down binary variable generation vector
m k
s Cpgt Cagt dbgt pgt slack
q pbt ugt jbgt sgt hgt p
f puc h Kg s cg Fbg Trbg Dt MUTg and MDTg off Ton g and Tg Pg and Pg RULg and RDLg k peak alb k cs cT D D f and f P and P
c S
The aim of this paper is to propose a new BD initialization methodology applied to SCUC problems. The initialization methodology is based on the combination of three main concepts: a fast UC resolution, a redundant constraint elimination, and the obtainment of upgraded cuts within a range of load bounds. The remaining sections are outlined as follows. Section ‘Benders decomposition based SCUC’ gives a general background on BD. Section ‘Outline of the initialization methodology’ provides a detailed description of the proposed initialization strategy. This section includes a detailed description of the model and concepts in which the Benders initialization is based. In Section ‘Computational results’, numerical results are presented and discussed. Finally, Section ‘Conclusion’ presents the most relevant conclusions.
branch flow vector UC generation level vector bus voltage angle vector start-up cost for step s fix cost power block slope min–max power block limits hourly system demand min on/off service times initial on/off hours of service max–min power limits up–down fixed ramp limits iterative demand linear sensitivity factors load participation factors vector infeasibility cost vector dispatch costs vector demand vector allowed MW deviation vector max–min flow limit vectors generation bound vectors branch susceptances matrix branch-bus incidence matrix (0 is transpose)
8bgt
ðTrbg Trb1;g Þjbgt 6 dbgt
ð6Þ
8bgt
dbgt 6 ðTrbg Trb1;g Þjb1;gt
ð7Þ
dBgt P 0 8gt
ð8Þ
8gt
dBgt 6 ðPg TrB1;g ÞjB1;gt Cagt P Kgs ugt
s X
ð9Þ
!
8gt
ug;tn
ð10Þ
n¼1
Cagt P 0 8gt s:t: :
G X pgt ¼ Dt
ð11Þ
8t
ð12Þ
g¼1 t X
8g 8t 2 MUTg þ 1; T
sgi 6 ugt
ð13Þ
i¼tMUTg þ1
Benders decomposition based SCUC In this section BD methodology applied to SCUC problem is formulated [1]. Additional information about BD can be found in the Appendix. Master problem – the decision stage
t X
hgt 6 1 ugt
8g 8t 2 MDTg þ 1; T
ð14Þ
i¼tMDTg þ1 i6Ton g
X
1 ugi ¼ 0 8g 8t ¼ 0
ð15Þ
ugi ¼ 0 8g 8t ¼ 0
ð16Þ
i¼0 off
The master problem is the single-bus UC without security constraints. The thermal UC model can be formulated as follows:
min z ¼
T X G X
Cpgt þ Cagt
ð1Þ
t¼1 g¼1
Cpgt ¼ ugt cg þ
B X Fbg dbgt
8gt
ð2Þ
b¼1
pgt ¼ ugt Pg þ
B X dbgt
i6Tg
X i¼0
ugt Pg 6 pgt 6 ugt Pg
8gt
ð17Þ
pgt pg;t1 6 RULg
8g 8t P 0
ð18Þ
pg;t1 pgt 6 RDLg
8g 8t P 0
ð19Þ
8gt
ð20Þ
sgt hgt ¼ ugt ug;t1
8gt
ð3Þ
b¼1
pgt P 0 8gt ðTr1g Pg Þj1gt 6 d1gt 6 ðTr1g Pg Þugt
ð4Þ
8gt
ð5Þ
sgt þ hgt 6 1 8gt
ð21Þ
jbgt ; ugt ; sgt ; hgt 2 f0; 1g 8bgt
ð22Þ
Benders cutstm
8t m
ð23Þ
55
J. Alemany, F. Magnago / Electrical Power and Energy Systems 66 (2015) 53–66
min w ¼
N X cs slack
ð24Þ
s:t: : Sf slack 6 puc D
pd1
Sf slack 6 puc þ D
ð25Þ
pd2
ð26Þ
0
f cS h ¼ 0
ð27Þ
f 6 f pf 1 f 6 f
ð28Þ ð29Þ
pf 2
0 6 slack 6 D
ps
ð30Þ
The associated costs cs are usually set to one. After solving the problem represented by Eqs. (24)–(30), relaxing the balance constraints (slack), one Benders cut is created for each hour of a network scenario as follows:
w þ
pd1 pd2 puc puc 6 0
ð31Þ
In the next section an initialization methodology applied to BD based SCUC is presented.
Outline of the initialization methodology The main motivation to develop an initialization methodology applied to BD based SCUC is to improve the convergence rate of the Benders decomposition. The core of the initialization methodology is to provide a set of inexpensive cuts to be added in the initial master problem, in order to provide early signals of the network to the UC calculation. The proposed initialization methodology comprises six different steps:
Fig. 1. MIL algorithm.
Fig. 2. Relaxed horizon scheme.
Eq. (1) is the objective function that accounts for the total operational day-ahead costs. Eq. (2) represents the production costs. Eqs. (3)–(9) are the piece-wise linearization of production costs. Eqs. (10) and (11) represents the step-wise start-up costs. Eq. (12) is the total energy balance. Eqs. (13)–(16) represent min up–down times. Eq. (17) represent the generator operational limits. Eqs. (18) and (19) are the ramp limits. Eqs. (20)–(22) represent the logic among binary variables. The last term stands for the eventual Benders cuts. Sub-problem – the feasibility stage The coupling between the master and the sub-problems is done through the variable puc , which is the solution of problem represented by Eqs. (1)–(22). The sub-problem can be formulated as:
1. Calculation of the Load Supplying Capability (LSC) [19]. The LSC is an upper bound of network infeasibility that allows forming the cuts. 2. Calculation of the Minimal Infeasible Load (MIL). The MIL is a lower bound of network infeasibility that allows forming the cuts. 3. Calculation of a Relaxed Horizon single-bus UC (RHUC) [20] for the LSC demand peak. The calculation is carried out in order to get the MWs dispatch levels. 4. Pre-processing of redundant network constraints [21]. Redundant security constraints are eliminated with a network preprocessing method. 5. Calculation of the Linear Load Flow with Rescheduling (LLFR) [22] for the given MWs UC levels and the LSC demand peak. The calculation is carried out to check network infeasibility in order to form a cut. 6. Upgrading of Benders cuts [23]. The cut in Step 5 is upgraded for every demand level within the range delimited by the LSC and MIL bounds. In the following sections, detailed information about each step is provided.
Table 1 Two generation units system. Item
Value
Variable cost Start up cost Fix demand Max power Min power B var R var
1, 2 3, 2 30, 31, 40 50, 20 10, 5 ugt ; sgt ; hgt pgt
56
J. Alemany, F. Magnago / Electrical Power and Energy Systems 66 (2015) 53–66
Table 2 Variable pattern.
Fig. 4. Inactive constraints set.
Calculation of the load supplying capability
Table 3 Relaxed horizon UC results. Iter problem 0 RMILP
1 MILP 2 MILP
3 MILP 4 MILP
The LSC of a given system is the maximum load that can be supplied with all branches and generators operating, and considering the participation factors of each load bus with respect to the total load. The concept of the LSC is to stress the network to a maximum, that is, to calculate the maximum load that can be supplied without system overloads. The LSC is the upper bound of the range within which it is possible to form a set of initial cuts. Mathematically it can be formulated as the solution of the following LP problem:
Model item
Stats.
z value
Rows Cols. Non 0 Z cols. Relaxed cols. Fixed cols.
16 25 53 0 18 0
103.4
Z cols. Relaxed cols.
6 12
111
Z cols. Relaxed cols. Fixed cols.
6 6 6
109
Z cols. Fixed cols.
6 12
109
where q is a scalar that represents the total system demand.
Z cols.
18
104
Calculation of the minimal infeasible load
max LSC ¼ q cS0 h þ p ¼ k q jShj 6 f =c
ð32Þ
06p6P
ð35Þ
ð33Þ ð34Þ
The MIL represents the minimum load that can be economically supplied without network overload. The MIL is the lower bound of the range within which a set of initial cuts can be formed. Mathematically it can be formulated as the solution of the following LP problems:
min x ¼ cT p
ð36Þ
G X k p peak P 0
ð37Þ
06p6P
ð38Þ
min y ¼ slack
ð39Þ
G X cS0 h þ p þ slack ¼ k peakk
ð40Þ
jShj 6 f=c slack P 0 Fig. 3. 3 Buses system.
ð41Þ ð42Þ
The above LP problems need to be iteratively solved. The algorithm is described next:
57
J. Alemany, F. Magnago / Electrical Power and Energy Systems 66 (2015) 53–66
Input: LSC k
Initialization: ub = LSC, lb = 0, peak = ub, k = 0 loop k Solve (36)–(38) then (39)–(41) if y > 0 then k
ub = peak
peak = ub- ub—lb 2 else if y 6 0 then k
k
lb = peak
k peak = ub- ub—lb 2 end if k¼kþ1 if ub–lb 6 then Stop MIL=ub end if end loop Output: MIL
Fig. 5. LSC-MIL range.
Table 4 First UC master results.
Calculation of a relaxed horizon unit commitment
Fixed variable sub-period (Dark Grey). Active variable sub-period (White). Relaxed variable sub-period (Light Grey). The binary variables within the fixed variable sub-period are fixed using the previous iteration values. The binary variables within the active variable sub-period are treated as integer variables. Finally, the binary variables within the relaxed variable sub-period are treated as continuous variables. Thus, as the iterations progress, the fixed variable sub-period increases while the relaxed variable sub-period decreases. At the final iteration the whole scheduling horizon is treated as a complete MILP. In this final stage, after two rounds without significant improvement of the objective value the algorithm stops. A simple example is presented to illustrate this strategy. Let’s consider a small system with two identical generators. Table 1 shows the data used for the simulations. Without loosing generality, from the full set of operational constraints, only balance, binary logic and power limit constraints are included into the UC formulation. The relaxed horizon unit commitment is formulated as follows:
8t
ugt ug;t1 6 sgt hgt
ð43Þ
ð45Þ
8gt
30 31 40
p2 [MW] 0 0 0
ð46Þ
104
Table 2 shows the relaxed horizon pattern used for the simulations. Table 3 shows the results after the simulations. This relaxation strategy does not affect the solution space because at the last iterations a full MILP problem is solved. The objective of this relaxation strategy is to provide a fast feasible solution that can be used to check network infeasibility. Nevertheless, some parameters of the algorithm need to be tuned before good performance is obtained. For general purpose application, default parameter values are recommended only for large scale UC problems. Pre-processing of redundant network constraints Power systems are not expected to operate out of limits [21], therefore, in general it is necessary to deal with only a small subset of security constraints at any stage. Based on this observation, several redundant network constraints can be eliminated prior to the LLF calculations. The aim of the strategy is to reduce the size of the LLF problem in the base case, provided the solution space is not affected because the eliminated constraints are redundant to the feasible region. This is demonstrated using a simple example next. Let’s consider again the 2 units system of Table 1 into the 3-bus network described in Fig. 3 serving 30 MW load. Fig. 4 represents the feasible region corresponding to the system of Fig. 3. The gray zone is the feasible region which is limited by restrictions P2 6 14.9, P2 P 5, the balance equation P1 + P2 = 30, and the lower limit P1 P 10. It can be seen that only 1 out of 6 security Table 5 LLFR results for LSC demand. Hour
p
1 2 3
30 31 40
p1 [MW]
ð44Þ
0 6 pgt 6 ugt P 8gt
1 2 3 Objective value
The strategy is based on sequentially fixing, relaxing and activating different subsets of the binary variables. At each iteration only a portion of the simulation horizon is considered as a MILP problem, while the remaining part is either fixed using values from a previous iteration, or relaxed in its integrality at the current iteration. Fig. 2 illustrates a general scheme for this methodology. For each iteration, the scheduling horizon is further divided into three sub-periods:
G X pgt ¼ Dt
puc p1 [MW]
The algorithm is basically based on the bisection search method [13]. Fig. 1 outlines the proposed MIL approach.
T X G X min z ¼ ðCpgt pgt þ Cagt sgt Þ
Hour
w [MW] p2 [MW] 0 2 20
0 2 20
58
J. Alemany, F. Magnago / Electrical Power and Energy Systems 66 (2015) 53–66
Table 6 LLFR sensitivities. Sens
Hour 1
2
3
0 1
0 1
0 1
pr
p1 p2
pg
p1
0
0
0
p2
1
1
1
b2 b3
0 0
1 2
1 2
pd
Table 7 Final UC master results. Hour
puc p1 [MW]
1 2 3
30 26 20
Objective value
p2 [MW]
Fig. 8. Demand 3 network status.
0 5 20 131
Fig. 9. Demand 2 network with cut.
Fig. 6. Demand 1 network status.
Fig. 10. Demand 3 network with cut.
Fig. 7. Demand 2 network status.
constraints are non-redundant. The redundant security constraints have no influence on the feasible region of the problem and can thus be eliminated from the SCUC problem. Relaxation techniques are very important when only few of a large set of inequality constraints become binding [24]. The redundant constraints can be obtained considering the following LP problem:
59
J. Alemany, F. Magnago / Electrical Power and Energy Systems 66 (2015) 53–66
zlt ¼ max
N X
alb pbt
8lt
ð47Þ
b¼1 N X
N X alb pbt slack 6 f l þ alb Dbt
b¼1 N X
8l
ð48Þ
b¼1
pbt ¼ Dt
8t
ð49Þ
Table 9 118-bus Line set [%]. Hour
Non-redundant lines
Total lines [%]
1, 3, 7, 9,
16 15 14 17
8.6 8.1 7.5 9.1
2, 8, 15, 17, 18, 19, 21, 24 4, 5, 6, 22 23 10, 11, 12, 13, 14, 16, 20
b¼1
0 6 pbt 6 Pb
8t 8g 2 b
ð50Þ
slack P 0
ð51Þ
where zlt measures the power flow of each branch. Eq. (47) denotes the maximum possible power flow over a transmission branch provided that power balance, Eq. (49), and unit restrictions, Eq. (50), are satisfied. Eq. (48), monitors which branches are redundant or not. Whenever a branch overload occurs, slack assumes some positive value and the security constraint is labeled as non-redundant. Generators are dispatched to supply the system load; the more sensitive the branch is with respect to the unit, the more weight it will have on the objective function. This process, therefore, allows the monitoring of branches in order to prevent overloading during the given period. For this step, a series of LP problems (l t) need to be solved in order to detect which network constraints are redundant in the feasible region; nevertheless, this is a pre-processing step.
Table 10 RTS-96 network after pre-processing. Hour
Line 2 13 77 78
3 107
6 20 43 109 69
14 24 26 30 44 60 71 85
32 103
36 37
75 76 82
1 11 12 29 31 41 42 47 52 65 68 70 80 90 106 108 118 119 120
0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0
1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 0 0 1
11111001 11111001 11111001 11111101 11111001 11111001 01111011 01101011 01101011 01101011 01111011 01101011 00000010 00001010 01001010 01101010 01101011 01111011 01111001
1 1 1 1 1 1 1 1 0 1 1 0 0 0 0 0 0 1 1
0 0 1 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 1 1 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
Calculation of linear load flow with rescheduling Given the single-bus UC pattern, puc , calculated in Section ‘Calculation of a relaxed horizon unit commitment’, a LLFR is obtained. The objective of the LLFR, provided that network infeasibility exists, is to obtain the cut corresponding to the LSC demand level. In order to form this cut, it is necessary to minimize the system infeasibility, w, taking into account the coupling between the UC pattern, puc , and the network constrained dispatch p. Mathematically, the LLFR is formulated as follows:
Table 8 118-bus network after pre-processing. Hour
1, 2 3, 4 5, 6 7 8 9 10, 11 12, 13 14 15 16 17, 18 19 20 21 22 23 24
Line 14 39
44 50 112 115 119 129 136 162 163 165 168
63 106
120 123 127 133 166
10 10 10 10 1 01 01 01 01 01 01 01 01 01 01 1 10 10
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
1 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1
00011 00001 00001 00011 00111 1 1 1 1 01111 1 11110 11110 1 01111 00011 00011 00011
1 2 3 4, 5, 6, 7 8 9 10 11 12 13 14, 15, 16 17 18 19 20 21 22 23 24
Table 11 RTS-96 line set [%]. Hour
Non-redundant lines
Total lines [%]
1 2 3 4, 5, 6, 7 8 9 10, 23, 14, 15, 16 11, 13 12, 17, 22 18 19 20 21 24
34 37 43 44 39 32 27 26 24 20 21 22 23 31
28.3 30.8 35.8 36.7 32.5 26.7 22.5 21.7 20.0 16.7 17.5 18.3 19.2 25.8
60
J. Alemany, F. Magnago / Electrical Power and Energy Systems 66 (2015) 53–66
Table 12 Initial UC comparison. Load pattern
LSC [%]
Winter
60 80
Summer
60 80
min w ¼
N X
IEEE-118 time [s]
RTS-96 time [s]
UC RHUC UC RHUC
1.20 1.60 2.34 1.87
146 29 27 14
UC RHUC UC RHUC
1.18 1.72 1.90 1.75
235 56 64 34
slack
ð52Þ
b¼1
cS0 h þ p ¼ D pd jShj 6 f =c pf 0 6 p 6 P pg
p p þ slack 6 D uc
ð53Þ
Fig. 11. Summer: IEEE-118 LSC-MIL range.
ð54Þ ð55Þ
pr
ð56Þ
Here the variable slack is a vector of slack variables which correspond to the gap between UC and LLF generation levels. The resolution of the LLFR provides the sensitivities pd ; pg ; pf , and pr . (Simplex multipliers associated to the Eqs. (52)–(56).) These sensitivities are necessary not only to form the LSC cut but also to upgrade the subsequent cuts within the LSC-MIL range. This step is explained in the next section. Upgrading of Benders cuts The feasibility cut resulting from Eqs. (52)–(56), is described by:
w þ pr puc puc 6 0
ð57Þ
Fig. 12. Winter: IEEE-118 LSC-MIL range.
This cut can be upgraded to accommodate deviations between the forecasted and actual demand, as mentioned in [4]. As a consequence, the cut could also be valid for other time steps. Before the cut can be upgraded, the feasibility cut should also accommodate changes in system configuration due to changes in the UC. Then, the upgraded cuts within the LSC-MIL range are:
w þ pr puc puc þ pg p puc þ pd ðDt Dlsc Þ 6 0
ð58Þ
where w is the optimal solution value of Eqs. (52)–(56) for the LSC demand level, Dlsc is indeed the LSC demand level, and Dt correspond to the demand levels within the LSC-MIL range. The third term of Eq. (58) represents UC changes and the fourth term represents demand changes. Fig. 5 illustrates a generic demand curve and the LSC-MIL range. The upgraded cuts represented by Eq. (58) and the LSC cut given by Eq. (57), are added to the initial master UC in order to initialize the BD algorithm. Again, a simple example is presented to illustrate this strategy. Let’s consider the small system of Table 1 and Fig. 3. Solving problems of Sections ‘Calculation of the load supplying capability and Calculation of the minimal infeasible load’ the LSC and MIL of this system are 40 and 30 MW respectively. Table 4 shows the results of the first UC master. Pre-processing of network is not applied.
Fig. 13. Summer: RTS-96 LSC-MIL range.
Table 5 shows the results after the problem resolution of Section ‘Calculation of linear load flow with rescheduling’ for the LSC demand level and Table 6 shows the sensitivities of that problem. Therefore, the LSC cut and the upgraded cuts are as follows:
Upgraded cut for t ¼ 1 puc 2 P 0
Table 13 Calculation of LSC-MIL bounds. Bound
IEEE-118 time [s]
RTS-96 time [s]
LSC MIL
0.562 3.790
0.436 1.284
ð59Þ
Upgraded cut for t ¼ 2 puc 2 P 2
ð60Þ
LSC cut for t ¼ 3 puc 2 P 20
ð61Þ
Adding the cuts (59)–(61) to the master and resolving the UC, Table 7 is obtained.
J. Alemany, F. Magnago / Electrical Power and Energy Systems 66 (2015) 53–66
Fig. 14. Winter: RTS-96 LSC-MIL range.
Table 14 Calculation of LLFR for LSC demand level. System
Load pattern
LSC [%]
Peak [h]
Infeasibility [MW]
Time [s]
IEEE118
Winter
60
18
112
0.49
Summer
80 60 80
12
365 112 363
0.54 0.51 0.50
117 197 140 275
0.43 0.44 0.42 0.44
RTS-96
Winter Summer
60 80 60 80
12 10
Fig. 15. IEEE118 – summer and winter: 80% LSC.
Table 15 IEEE-118: 80% LSC – summer and winter load patterns. Iter
Time [s]
Ini master cost
Summer Classic BD Initialized BD Improvement (%)
8 6 33
73.95 48.39 54
1,172,407 1,175,594
Winter Classic BD Initialized BD Improvement (%)
8 6 33
70.73 51.20 37
1,172,289 1,184,209
Table 16 IEEE-118: 60% LSC – summer and winter load patterns. Iter
Time [s]
Ini master cost
Summer Classic BD Initialized BD Improvement (%)
6 5 20
48.02 37.85 30
837,328 837,909
Winter Classic BD Initialized BD Improvement (%)
6 5 20
49.87 39.34 28
838,272 840,665
Finally, Figs. 6–8 show the network for the first master solution and Figs. 9 and 10 show the network after the cut signals in the master solution. The next section will describe numerically the proposed methodology.
Fig. 16. IEEE118 – summer and winter: 60% LSC.
61
62
J. Alemany, F. Magnago / Electrical Power and Energy Systems 66 (2015) 53–66
Table 17 RTS-96: 80% LSC – summer and winter load patterns. Iter
Time [s]
Ini master cost
Summer Classic BD Initialized BD Improvement (%)
15 13 15
294 239 23
5,546,510 5,563,205
Winter Classic BD Initialized BD Improvement (%)
14 12 17
271 226 20
5,368,409 5,364,254
Table 18 RTS-96: 60% LSC – summer and winter load patterns. Iter
Time [s]
Ini master cost
Summer Classic BD Initialized BD Improvement (%)
9 8 13
211 173 22
3,228,775 3,236,432
Winter Classic BD Initialized BD Improvement (%)
9 7 29
215 172 25
3,175,159 3,179,984
Fig. 18. RTS96 – summer and winter: 60% LSC.
in [25,26]. Two hourly load patterns are used, summer and winter, corresponding to the week-day patterns presented in [26]. Two different load peaks are tested, 80% and 60% of LSC, respectively. The IEEE 118-bus system has 54 units and 186 branches. The RTS-96 system has 96 units and 120 branches. The UC gaps for the initial master and for the subsequent masters are set to 5% and 1%, respectively. The network infeasibility tolerance is set to 1 MW. The Benders gaps illustrated in Figs. 15– 18 are defined as:
Benders gap ¼ Upper bound Lower bound Upper bound ¼ Master UC solution þ 1T
T X Subproblem LLF solutions
Lower bound ¼ Master UC solution It is important to remark that both upper and lower bounds are costs, and that is why vector 1T is necessary. In addition, the solution refers to the optimal value of the objective function, the total cost for the UC and the hourly network infeasibility for the subproblems.
Pre-processing results
Fig. 17. RTS96 – summer and winter: 80% LSC.
Computational results Numerical examples are presented in this section to show the benefits of BD initialization for SCUC calculation. For the sake of simplicity, only base scenario is tested, no contingencies are considered. All the numerical tests are implemented in GAMS, the problem is solved with CPLEX 11.0 solver on a PC with an Intel i5-2310 CPU at 2.90 GHz and 4.00 GB RAM memory. The IEEE 118-bus and the RTS-96 systems are studied, the data are given
Table 8 summarizes the results after the pre-processing step (Section ‘Pre-processing of redundant network constraints’) on the IEEE 118-bus network. This table illustrates the pattern of non-redundant lines in relation to the total set of lines. The total number of network constraints are 4464 (186 lines 24 h), only 383 are non-zero elements which represents 8.6% of the total number of network constraints. Table 9 illustrates the percentage of non-redundant lines at each hour, in relation to the total set of 186 lines. The non-redundant subset spans from 14 to 17 lines, representing at the most 9.1% of the total set of lines. Table 10 summarizes the pre-processing on the RTS-96 network. The total number of network constraints are 2880 (120 lines 24 h), only 737 are non-zero elements which represents 25.6% of the total number of network constraints. Table 11 illustrates the percentage of non-redundant lines at each hour, in relation to the total set of 120 lines.
63
J. Alemany, F. Magnago / Electrical Power and Energy Systems 66 (2015) 53–66
RHUC results Table 12 compares the results between the relaxed horizon UC resolution (Section ‘Calculation of a relaxed horizon unit commitment’) and the standard UC resolution that conforms the initial master problem on both the IEEE-118 and RTS-96 systems. In this work, a 1/4 of the scheduling horizon to each sub-period is used. It is important to note that the relaxed UC resolution performance is not as effective as expected in small scale generation systems. The practical experience with this technique allows to conclude that their biggest impact it is performed in large scale or complex generation systems. The results reported for the RTS-96 confirm that the relaxed horizon UC strategy is more convenient for complex generation systems. LSC-MIL bounds results For the base case, the LSC of the IEEE 118-bus system is 5416 MW and the MIL is 1458 MW. The LSC of the RTS-96 system is 9825 MW and the MIL is 1228 MW. Table 13 presents the computing times for the calculation of the LSC-MIL bounds of the systems. In Figs. 11 and 12 the IEEE-118 LSC-MIL range in relation to summer and winter week-day load patterns is showed. In Figs. 13 and 14 the RTS-96 LSC-MIL range is illustrated. LLFR and Benders cuts upgrading results Table 14 presents computing times for the calculation of LLFR for the LSC demand levels for both IEEE-118 and RTS-96 systems. Benders cuts upgrading consists in the building of cuts by Ec. (58). This process do not posses a significant computing impact in relation to the other steps of BD initialization. Therefore, these computing times are not presented.
the number of iterations. Finally, the overall convergence patterns illustrated in Figs. 15–18 show the faster entrance into the pre-specified gap tolerance. Tables 19 and 20 illustrate how each initialization step impacts the global performance of BD based SCUC calculation, excluding the network pre-processing. The results presented here are consistent with previous work done in other study areas. [16,27] reported the improved general performance of BD with network problems. Additionally, [28] reported similar experience with facility location problems. Furthermore, [17] reported the reduction in the total computation time with aircraft networks. Finally, [18] reported the decrease in the number of iterations with fixed charge network problems. To summarize, it is important to remark that all the simulation instances did improve the convergence of BD algorithm. Although the results are preliminary, they seem to be very promissory and may support the development of more sophisticated initialization strategies applied to SCUC based BD.
Table 19 Initialization steps impact on global performance for IEEE-118. Step calculation
Load pattern
LSC [%]
Time [s]
Relative to initialized BD [%]
IEEE-118 LSC
Winter
60 80 60 80
0.56
1.43 1.10 1.48 1.16
60 80 60 80
3.79
9.25 7.12 9.73 7.55
60 80 60 80
1.60 1.87 1.72 1.75
4.07 3.65 4.54 3.62
60 80 60 80
0.49 0.54 0.51 0.50
1.25 1.05 1.35 1.03
Summer MIL
Winter Summer
Global results RHUC
Tables 15 and 16 summarize the results for summer and winter load patterns at 80% and 60% of LSC for the IEEE-118. Figs. 15 and 16 illustrate the convergence of Benders algorithm on the IEEE-118 for both summer and winter load patterns at 80% and 60% of LSC respectively. Tables 17 and 18 summarize the results for summer and winter load patterns at 80% and 60% of LSC for the RTS-96. Figs. 17 and 18 illustrate the convergence of Benders algorithm on the RTS-96 for both summer and winter load patterns at 80% and 60% of LSC. Computing times labeled as Initialized BD reported in Tables 15–18 include the time spent by the initialization procedure. Computing times, both Classic and Initialized BD, do not include the time spent by the pre-processing of redundant network constraints step, due to this is an external step. In addition, the network preprocessing and LSC-MIL bounds are applied to both, classic and initialized BD. Improvements in Tables 15–18 are calculated as the relation between Classic and Initialized BD, for both parameters, number of iterations and total time. Results of Benders based SCUC were validated against results calculated using PSSÒE. The comparisons are shown in Tables B.21 and B.22 in Appendix B. Also, Tables C.24 and C.25 of Appendix C correspond to iterative results of SCUC patterns. The results suggest that the initialization of Benders decomposition applied to SCUC problems has the possibility to improve the overall convergence of the algorithm. The percentage improvements reported in Tables 15–18 reveal the impact of the initialization upon the performance of BD algorithm. Additionally, the computing times reported in Tables 15–18 show the reduction in the total CPU solution times. Furthermore, the iterations reported in Tables 15–18 illustrate the decrease in
Winter Summer
LLFR
Winter Summer
Table 20 Initialization steps impact on global performance for RTS-96. Step calculation
Load pattern
LSC [%]
Time [s]
Relative to Initialized BD [%]
RTS-96 LSC
Winter
60 80 60 80
0.44
0.26 0.19 0.25 0.18
60 80 60 80
1.88
1.09 0.83 1.09 0.79
60 80 60 80
29 14 56 34
16.9 6.19 32.4 14.2
60 80 60 80
0.43 0.44 0.42 0.44
0.25 0.19 0.24 0.18
Summer MIL
Winter Summer
RHUC
Winter Summer
LLFR
Winter Summer
64
J. Alemany, F. Magnago / Electrical Power and Energy Systems 66 (2015) 53–66 Table B.21 Branch loading checking: initial master.
Conclusion In this work, a new BD initialization methodology applied to SCUC problems has been proposed. The initialization was based on the addition of inexpensive cuts to the initial UC master problem. The initial cuts were obtained after the application of the following steps: calculation of LSC, calculation of MIL, calculation of relaxed horizon UC, elimination of redundant network constraints, calculation of LLF with rescheduling, and upgrading of Benders cuts. The results obtained by the application of the initialization methodology to the IEEE-118 and the RTS-96 systems have been presented. Based on these results, it is confirmed the possibility of improving the overall convergence of Benders algorithm. From a computational standpoint, it can be concluded that the procedure offers the potential for reducing the number of iterations, as well as the computing time required to reach a SCUC solution.
Load pattern
LSC [%]
Bus from
To
Loading [MW]
Rating [MW]
Perc. [%]
Classic BD Winter
60
5 17 26 5 17 23 26 37
8 30 30 8 30 25 30 38
232.0 197.9 220.1 271.2 247.2 160.4 252.4 230.4
175 175 175 175 175 140 175 175
132.5 113.1 125.8 154.9 141.2 114.6 144.2 131.7
5 17 26 5 30 23 26 37
8 30 30 8 247.2 25 30 38
231.9 198.7 212.6 271.2 175 160.4 252.4 230.4
175 175 175 175 141.2 140 175 175
132.5 113.5 121.5 154.9
5 17 26 5 17 23 26 37
8 30 30 8 30 25 30 38
221.3 196.4 210.6 268.4 235.7 158.5 239.0 214.2
175 175 175 175 175 140 175 175
126.4 112.2 120.3 153.4 134.7 113.2 136.6 122.4
5 17 26 5 17 23 26 37
8 30 30 8 30 25 30 38
221.3 196.4 210.6 268.4 235.7 158.3 238.7 214.2
175 175 175 175 175 140 175 175
126.4 112.2 120.3 153.4 134.7 113.1 136.4 122.4
80
Summer
60
80 17
Acknowledgements This work was funded by CONICET and SECyT-UNRC, to whom grateful acknowledgment is due.
Initialized BD Winter 60
Benders decomposition
80
In this appendix BD methodology is reviewed. Additional information about BD can be found in [3]. A general two-level optimization problem can be formulated mathematically as follows: Summer
min cT1 x1 þ cT2 x2
60
x1 ;x2
A1 x1 ¼ b1 B1 x1 þ A2 x2 ¼ b2
ðA:1Þ
where x1 is the vector of integer variables considered at the first level, and x2 is the vector of continuous variables considered at the second level. A1 ; A2 , and B1 are real matrices, c1 ; c2 ; b1 , and b2 are real vectors. An example of this kind of problem formulation is the SCUC, which is a large-scale optimization problem that must provide optimal decisions subject to unit, system and network constraints. Decomposition methods were proposed to solve this kind of optimization problems in an efficient way. These methods take advantage of the special structure of the problem solving iteratively smaller problems. Although they are general methods, the application of them depends mainly on the type of problem; if the problem is the variables or the restrictions. BD is normally applied when the problem is the restrictions. Hence, for SCUC problems BD method is the most used one. The BD method decomposes the two-level SCUC problem into a master problem and a sub-problem. The unit commitment master problem is represented in the first optimization level, and the network signals, known as cuts, derive from the sub-problems in the second optimization level. There are two main applications of Benders: when variables x1 make the problem too complex, and/or when the master and the sub-problems are different in nature. Mathematically, Eq. (A.1) can be reformulated as follows:
min x1 ;h2
cT1 x1
80
114.6 144.2 131.7
Table B.22 Branch loading checking: final master. Load pattern Classic BD Winter
Summer
LSC [%]
Bus from
To
Loading [MW]
Rating [MW]
Perc. [%]
60 80
17 8 17 30 37
30 30 30 38 38
175.1 175.5 179.9 187.0 180.2
175 175 175 175 175
100.1 100.3 102.8 106.9 103.0
60
17 26 5
30 30 8
175.4 176.7 175.2
175 175 175
100.2 101.0 100.1
60 80
17 17 26 37
30 30 30 38
175.1 175.6 177.0 178.9
175 175 175 175
100.1 100.3 101.2 102.3
60
5 17 5 37
8 30 8 38
175.2 175.3 176.4 175.8
175 175 175 175
100.1 100.2 100.8 100.4
80 Initialized BD Winter
Summer
80
þ h2 ðx1 Þ ðA:2Þ
A1 x1 ¼ b1 The function h2 ðx1 Þ represents the objective function of the following sub-problem:
h2 ðx1 Þ ¼ mincT2 x2 x2
A 2 x2 ¼ b 2 B 1 x1 : p 2
ðA:3Þ
Table C.23 Mapping between units and buses. Bus Unit
10 4
25 10
27 12
59 24
61 25
80 36
92 43
99 44
100 45
113 53
65
J. Alemany, F. Magnago / Electrical Power and Energy Systems 66 (2015) 53–66 Table C.24 Initialized Benders status. Gen
Hr 10
it1 4 10 12 24 25 36 43 44 45 53 it2 4 10 12 24 25 36 43 44 45 53 it3 4 10 12 24 25 36 43 44 45 53 it4 4 10 12 24 25 36 43 44 45 53 it5 4 10 12 24 25 36 43 44 45 53
Table C.25 Classic Benders status.
1 0 0 1 1 1 1 1 1 0
0 1 0 1 1 1 1 1 1 0
1 0 0 1 1 1 1 1 1 0
1 0 0 1 1 1 1 1 1 1
1 0 0 1 1 1 1 1 1 1
Gen 11 1 0 0 1 1 1 1 1 1 0
0 1 0 1 1 1 1 1 1 0
1 0 0 1 1 1 1 1 1 0
1 0 0 1 1 1 1 1 1 1
1 0 0 1 1 1 1 1 1 1
12 1 0 0 1 1 1 1 1 1 0
0 1 0 1 1 1 1 1 1 0
1 0 0 1 1 1 1 1 1 0
1 0 0 1 1 1 1 1 1 1
1 0 0 1 1 1 1 1 1 1
13 1 0 0 1 1 1 1 1 1 0
14 1 0 0 1 1 1 1 1 1 0
0 1 0 1 1 1 1 1 1 0
0 1 0 1 1 1 1 1 1 0
1 0 0 1 1 1 1 1 1 0
1 0 0 1 1 1 1 1 1 0
1 0 0 1 1 1 1 1 1 1
1 0 0 1 1 1 1 1 1 1
1 0 0 1 1 1 1 1 1 1
1 0 0 1 1 1 1 1 1 1
15 1 0 0 1 1 1 1 1 1 0
0 1 0 1 1 1 1 1 1 0
1 0 0 1 1 1 1 1 1 0
1 0 0 1 1 1 1 1 1 1
1 0 0 1 1 1 1 1 1 1
16 1 0 0 1 1 1 1 1 1 0
0 1 0 1 1 1 1 1 1 0
1 0 0 1 1 1 1 1 1 0
1 0 0 1 1 1 1 1 1 1
1 0 0 1 1 1 1 1 1 1
17 1 0 0 1 1 1 1 1 1 0
0 1 0 1 1 1 1 1 1 0
1 0 0 1 1 1 1 1 1 0
1 0 0 1 1 1 1 1 1 1
1 0 0 1 1 1 1 1 1 1
18 1 0 0 1 1 1 1 1 1 0
0 1 0 1 1 1 1 1 1 0
1 0 0 1 1 1 1 1 1 0
1 0 0 1 1 1 1 1 1 1
1 0 0 1 1 1 1 1 1 1
19 1 0 0 1 1 1 1 1 1 0
0 1 0 1 1 1 1 1 1 0
1 0 0 1 1 1 1 1 1 0
1 0 0 1 1 1 1 1 1 0
1 0 0 1 1 1 1 1 1 0
20 1 0 0 1 1 1 1 1 1 0
0 1 0 1 1 1 1 1 1 0
1 0 0 1 1 1 1 1 1 0
1 0 0 1 1 1 1 1 1 0
1 0 0 1 1 1 1 1 1 0
21 1 0 0 1 1 1 1 1 1 0
0 1 0 1 1 1 1 1 1 0
1 0 0 1 1 1 1 1 1 0
1 0 0 1 1 1 1 1 1 0
1 0 0 1 1 1 1 1 1 0
22 1 0 0 1 1 1 1 1 1 0
0 1 0 1 1 1 1 1 1 0
1 0 0 1 1 1 1 1 1 0
1 0 0 1 1 1 1 1 1 0
1 0 0 1 1 1 1 1 1 0
where p2 are the constraints dual variables (known as shadow prices). Then, the original two-level problem represented by Eq. (A.1) can be reformulated as follows:
min cT1 x1 þ h2 x1 ;h2
A1 x1 ¼ b1 T
h2 P ðb2 B1 x1 Þ : p12 ... T
h2 P ðb2 B1 x1 Þ : pm2
ðA:4Þ
Hr 10
11
12
13
14
15
16
17
18
19
20
21
22
it1 4 5 10 24 25 36 43 44 45 53
1 1 1 1 1 1 1 1 1 0
1 1 1 1 1 1 1 1 1 0
1 1 1 1 1 1 1 1 1 0
1 1 1 1 1 1 1 1 1 0
1 1 1 1 1 1 1 1 1 0
1 1 1 1 1 1 1 1 1 0
1 1 1 1 1 1 1 1 1 0
1 1 1 1 1 1 1 1 1 0
1 1 1 1 1 1 1 1 1 0
1 1 1 1 1 1 1 1 1 0
1 1 1 1 1 1 1 1 1 0
1 1 1 1 1 1 1 1 1 0
1 1 1 1 1 1 1 1 1 0
it2 4 5 10 24 25 36 43 44 45 53
1 1 1 1 1 1 1 1 1 0
1 1 1 1 1 1 1 1 1 0
1 1 1 1 1 1 1 1 1 0
1 1 1 1 1 1 1 1 1 0
1 1 1 1 1 1 1 1 1 0
1 1 1 1 1 1 1 1 1 0
1 1 1 1 1 1 1 1 1 0
1 1 1 1 1 1 1 1 1 0
1 1 1 1 1 1 1 1 1 0
1 1 1 1 1 1 1 1 1 0
1 1 1 1 1 1 1 1 1 0
1 1 1 1 1 1 1 1 1 0
1 1 1 1 1 1 1 1 1 0
it3 4 5 10 24 25 36 43 44 45 53
0 1 1 1 1 1 1 1 1 0
0 1 1 1 1 1 1 1 1 0
0 1 1 1 1 1 1 1 1 0
0 1 1 1 1 1 1 1 1 0
0 1 1 1 1 1 1 1 1 0
0 1 1 1 1 1 1 1 1 0
0 1 1 1 1 1 1 1 1 0
0 1 1 1 1 1 1 1 1 0
0 1 1 1 1 1 1 1 1 0
0 1 1 1 1 1 1 1 1 0
0 1 1 1 1 1 1 1 1 0
0 1 1 1 1 1 1 1 1 0
0 1 1 1 1 1 1 1 1 0
it4 4 5 10 24 25 36 43 44 45 53
0 1 0 1 1 1 1 1 1 0
0 1 0 1 1 1 1 1 1 0
0 1 0 1 1 1 1 1 1 0
0 1 0 1 1 1 1 1 1 0
0 1 0 1 1 1 1 1 1 0
0 1 0 1 1 1 1 1 1 0
0 1 0 1 1 1 1 1 1 0
0 1 0 1 1 1 1 1 1 0
0 1 0 1 1 1 1 1 1 0
0 1 0 1 1 1 1 1 1 0
0 1 0 1 1 1 1 1 1 0
0 1 0 1 1 1 1 1 1 0
0 1 0 1 1 1 1 1 1 0
it5 4 5 10 24 25 36 43 44 45 53
1 1 0 1 1 1 1 1 1 0
1 1 0 1 1 1 1 1 1 0
1 1 0 1 1 1 1 1 1 0
1 1 0 1 1 1 1 1 1 0
1 1 0 1 1 1 1 1 1 0
1 1 0 1 1 1 1 1 1 0
1 1 0 1 1 1 1 1 1 0
1 1 0 1 1 1 1 1 1 0
1 1 0 1 1 1 1 1 1 0
1 1 0 1 1 1 1 1 1 0
1 1 0 1 1 1 1 1 1 0
1 1 0 1 1 1 1 1 1 0
1 1 0 1 1 1 1 1 1 0
it6 4 5 10 24 25 36 43 44 45 53
1 1 0 1 1 1 1 1 1 1
1 1 0 1 1 1 1 1 1 1
1 1 0 1 1 1 1 1 1 1
1 1 0 1 1 1 1 1 1 1
1 1 0 1 1 1 1 1 1 1
1 1 0 1 1 1 1 1 1 1
1 1 0 1 1 1 1 1 1 1
1 1 0 1 1 1 1 1 1 1
1 1 0 1 1 1 1 1 1 1
1 1 0 1 1 1 1 1 1 0
1 1 0 1 1 1 1 1 1 0
1 1 0 1 1 1 1 1 1 0
1 1 0 1 1 1 1 1 1 0
where m is the maximum number of cuts. Eqs. (A.4) represent the complete master problem since contains all possible cuts. Instead of including all cuts at the same time in the master problem, the BD algorithm permits including one cut per iteration.
66
J. Alemany, F. Magnago / Electrical Power and Energy Systems 66 (2015) 53–66
Results validation Tables B.21 and B.22 correspond to results of Benders based SCUC calculated using PSSÒE. SCUC patterns Table C.23 shows the mapping between buses and units. Tables C.24 and C.25 correspond to results of Benders based SCUC patterns for the summer 60% LSC. Patterns fully 0 or 1 are not presented. Hour 10–22, where the load peak is, are presented. References [1] Pinto H et al. Security constrained unit commitment: network modeling and solution issues. In: Power systems conference and exposition. IEEE PES; 2006. p. 1759–66. [2] Samiee M et al. Security constrained unit commitment of power systems by a new combinatorial solution strategy composed of enhanced harmony search algorithm and numerical optimization. Int J Electr Power Energy Syst 2013;44(1):471–81. [3] Conejo A et al. Decomposition techniques in mathematical programming: engineering and science applications. Berlin: Springer-Verlag; 2006. [4] Granville S. Mathematical decomposition techniques for power system expansion planning: decomposition methods and uses. In: Electric Power Research Institute and Stanford University, Systems Optimization Laboratory. The Institute Publisher; 1988. [5] Parastegari M et al. AC constrained hydro-thermal generation scheduling problem: application of Benders decomposition method improved by BFPSO. Int J Electr Power Energy Syst 2013;49:199–212. [6] Pereira M et al. A decomposition approach to automated generation/ transmission expansion planning. IEEE Trans Power Ap Syst 1985;PAS104(11):3074–83. [7] Asadamongkol S. Transmission expansion planning with AC model based on generalized Benders decomposition. Int J Electr Power Energy Syst 2013;47:402–7. [8] Sifuentes W et al. Hydrothermal scheduling using Benders decomposition: accelerating techniques. IEEE Trans Power Syst 2007;22(3):1351–9. [9] Sifuentes W et al. Short-term hydrothermal coordination considering an AC network modeling. Int J Electr Power Energy Syst 2007;29(6):488–96. [10] Alguacil N et al. Multiperiod optimal power flow using Benders decomposition. IEEE Trans Power Syst 2000;15(1):196–201.
[11] Kim M et al. An optimal pricing scheme in electricity markets by parallelizing security constrained optimal power flow based market-clearing model. Int J Electr Power Energy Syst 2013;48:161–71. [12] Bixby R et al. MIP: theory and practice – closing the gap. In: System modelling and optimization: methods, theory and applications. Kluwer Academic Publishers; 2000. [13] Bonnans F et al. Numerical optimization: theoretical and practical aspects. 2nd ed. Springer; 2006. [14] Pinto H, et al. Dual maximization methods for Lagrangian relaxation-based SCUC. In: Bulk power system dynamics and control conference in, VIII IREP; August 2010. [15] Alemany J et al. Symmetry issues in mixed integer programming based unit commitment. Int J Electr Power Energy Syst 2014;54:86–90. [16] Magnanti T. Accelerating Benders decomposition: algorithmic enhancement and model selection criteria. Oper Res 1981;29(3):464–84. [17] Richardson R. An optimization approach to routing aircraft. Transport Sci 1976;10(1):52–71. [18] Saharidis G et al. Initialization of the Benders master problem using valid inequalities applied to fixed-charge network problems. Expert Syst Appl 2011;38(6):6627–36. [19] Pereira M et al. Application of sensitivity analysis of load supplying capability to interactive transmission expansion planning. IEEE Trans Power Ap Syst 1985;PAS-104(2):381–9. [20] Le K et al. Rolling horizon method: a new optimization technique for generation expansion studies. IEEE Trans Power Ap Syst 1982;PAS101(9):3112–6. [21] Stott B et al. Linear programming for power system network security applications. IEEE Trans Power Ap Syst 1979;PAS-98(3):837–48. [22] Monticelli A et al. Security-constrained optimal power flow with postcontingency corrective rescheduling. IEEE Trans Power Syst 1987;2(1):175–80. [23] Granville S, et al. Mathematical decomposition techniques for power system expansion planning: security-constrained optimal power flow with postcontingency corrective rescheduling. In: EPRI EL-5299, Project 2473-6, Final Report, vol. 4; February 1988. [24] Stott B, et al. Review of linear programming applied to power system rescheduling. In: Power industry computer applications conference, PICA-79, IEEE conference proceedings; May 1979. p. 142–54. [25] motor.ece.iit.edu/data/JEAS_IEEE118.doc. [26] http://www.ee.washington.edu/research/pstca/rts/pg_tcarts.htm. [27] Mevert P. 1977. Fixed charge network flow problems: applications and methods of solution. In: Large scale and hierarchical systems workshop. Brussels; May 1977. [28] Geoffrion A et al. Multicommodity distribution system design by Benders decomposition. Manage Sci 1974;5:822–44.