Lagrangian Decomposition Approach Based Voltage Security Constrained Unit Commitment

Abstract

As the electrical industry increases many problems arises in controlling the generating units. Unit commitment decides which unit to operate during a certain period time. The objective of the unit commitment is to find a unit commitment schedule that minimizes the commitment and the dispatch costs of meeting the forecast system load taking into account various constraints. The problem will become voltage security constrained when the constraints are imposed to ensure voltage flow does not exceed chosen limit following a contingency. Lagrangian Decomposition Approach method which approximates a difficult problem of constrained optimization by a simpler method is proposed. The proposed Lagrangian Decomposition Approach is flexible in dealing with different types of constraints such as reactive power constraint, minimum up time constraint, minimum down time constraint, fuel constraint, start-up constraint and voltage constraint. A five generating unit in IEEE-14 bus network have been taken and the proposed algorithm is applied to solve it for the SCUC with voltage constraints to demonstrate the efficiency of the proposed method. In the proposed method the production cost is minimized and the voltage is maintained at a secure level in the power system. The performance of the proposed model is verified using MATLAB Software.

Authors and Affiliations

Ms. S. Adhitya, Mr. S. Purushotham

Keywords

Related Articles

Review Paper to increase the throughput in WiMax by solving the bottleneck problem of a network

Wi-MAX is a wireless data transmission technology which is used to transmit the data at very high speed over a large distance. The WiMax methodology provides 72 Mega Bits per second without any requirement of physically...

Performance Comparison of Cryptanalysis Techniques over DES

The primary requirement of a good encryption technique is that it is either impossible or difficult to deduce the plaintext out of a ciphertext without the knowledge of key. Cryptanalysis is the technique that violates...

Security Threats in MANETS

Mobile ad hoc networks (MANETs) are one of the fastest growing areas of research. They are an attractive technology for many applications such as rescue and tactical operation. due to the flexibility provided by the dyn...

Implementation of an efficient low complexity method for wireless CE using a BEM for the wireless channel taps.

The matrix representation of the signal model of MIMO-OFDM systems, which clearly describes the relation of signals in frequency domain and time domain and expressing operations like adding CP and removing CP as matrix...

Sixth Normal Form

Sixth Normal Form (6NF) is a term used in relational database theory by Christopher Date to describe databases which decompose relational variables to irreducible elements. While this form may be unimportant for non-tem...

Download PDF file
  • EP ID EP23160
  • DOI http://doi.org/10.22214/ijraset.2017.2071
  • Views 276
  • Downloads 5

How To Cite

Ms. S. Adhitya, Mr. S. Purushotham (2017). Lagrangian Decomposition Approach Based Voltage Security Constrained Unit Commitment. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 5(2), -. https://europub.co.uk/articles/-A-23160