Benders Decomposition Applied to Security Constrained Unit Commitment

Autores
Alemany, Juan Manuel; Moitre, Diego Carlos Alberto; Magnago, Fernando
Año de publicación
2013
Idioma
español castellano
Tipo de recurso
artículo
Estado
versión publicada
Descripción
Security Constrained Unit Commitment is a large scale optimization problem of fundamental application in modern power system operation control centers. Benders decomposition is one of the most applied methodologies on the Security Constrained Unit Commitment Problem. One of the related drawbacks with this methodology is its oscilating behaivior wich in turns affects the convergence of the algorithm. In this work several options to improve the convergence of the Benders algorithm are presented.
Fil: Alemany, Juan Manuel. Universidad Nacional de Rio Cuarto; Argentina. Consejo Nacional de Investigaciones Científicas y Técnicas; Argentina
Fil: Moitre, Diego Carlos Alberto. Universidad Nacional de Rio Cuarto; Argentina
Fil: Magnago, Fernando. Universidad Nacional de Rio Cuarto; Argentina. Consejo Nacional de Investigaciones Científicas y Técnicas; Argentina
Materia
Optimización
Metodos de Descomposición
Predespacho Con Restricciones de Red
Nivel de accesibilidad
acceso abierto
Condiciones de uso
https://creativecommons.org/licenses/by-nc-sa/2.5/ar/
Repositorio
CONICET Digital (CONICET)
Institución
Consejo Nacional de Investigaciones Científicas y Técnicas
OAI Identificador
oai:ri.conicet.gov.ar:11336/22777

id CONICETDig_aa7cd9e9f7d5bc0a006c4a14ce31d468
oai_identifier_str oai:ri.conicet.gov.ar:11336/22777
network_acronym_str CONICETDig
repository_id_str 3498
network_name_str CONICET Digital (CONICET)
spelling Benders Decomposition Applied to Security Constrained Unit CommitmentAlemany, Juan ManuelMoitre, Diego Carlos AlbertoMagnago, FernandoOptimizaciónMetodos de DescomposiciónPredespacho Con Restricciones de Redhttps://purl.org/becyt/ford/2.2https://purl.org/becyt/ford/2Security Constrained Unit Commitment is a large scale optimization problem of fundamental application in modern power system operation control centers. Benders decomposition is one of the most applied methodologies on the Security Constrained Unit Commitment Problem. One of the related drawbacks with this methodology is its oscilating behaivior wich in turns affects the convergence of the algorithm. In this work several options to improve the convergence of the Benders algorithm are presented.Fil: Alemany, Juan Manuel. Universidad Nacional de Rio Cuarto; Argentina. Consejo Nacional de Investigaciones Científicas y Técnicas; ArgentinaFil: Moitre, Diego Carlos Alberto. Universidad Nacional de Rio Cuarto; ArgentinaFil: Magnago, Fernando. Universidad Nacional de Rio Cuarto; Argentina. Consejo Nacional de Investigaciones Científicas y Técnicas; ArgentinaInstitute of Electrical and Electronics Engineers2013-04info:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionhttp://purl.org/coar/resource_type/c_6501info:ar-repo/semantics/articuloapplication/pdfapplication/pdfapplication/pdfhttp://hdl.handle.net/11336/22777Alemany, Juan Manuel; Moitre, Diego Carlos Alberto; Magnago, Fernando; Benders Decomposition Applied to Security Constrained Unit Commitment; Institute of Electrical and Electronics Engineers; IEEE Latin America Transactions; 11; 1; 4-2013; 421-4251548-0992CONICET DigitalCONICETspainfo:eu-repo/semantics/altIdentifier/doi/10.1109/TLA.2013.6502840info:eu-repo/semantics/altIdentifier/url/http://ieeexplore.ieee.org/document/6502840/info:eu-repo/semantics/openAccesshttps://creativecommons.org/licenses/by-nc-sa/2.5/ar/reponame:CONICET Digital (CONICET)instname:Consejo Nacional de Investigaciones Científicas y Técnicas2025-09-03T09:50:40Zoai:ri.conicet.gov.ar:11336/22777instacron:CONICETInstitucionalhttp://ri.conicet.gov.ar/Organismo científico-tecnológicoNo correspondehttp://ri.conicet.gov.ar/oai/requestdasensio@conicet.gov.ar; lcarlino@conicet.gov.arArgentinaNo correspondeNo correspondeNo correspondeopendoar:34982025-09-03 09:50:40.756CONICET Digital (CONICET) - Consejo Nacional de Investigaciones Científicas y Técnicasfalse
dc.title.none.fl_str_mv Benders Decomposition Applied to Security Constrained Unit Commitment
title Benders Decomposition Applied to Security Constrained Unit Commitment
spellingShingle Benders Decomposition Applied to Security Constrained Unit Commitment
Alemany, Juan Manuel
Optimización
Metodos de Descomposición
Predespacho Con Restricciones de Red
title_short Benders Decomposition Applied to Security Constrained Unit Commitment
title_full Benders Decomposition Applied to Security Constrained Unit Commitment
title_fullStr Benders Decomposition Applied to Security Constrained Unit Commitment
title_full_unstemmed Benders Decomposition Applied to Security Constrained Unit Commitment
title_sort Benders Decomposition Applied to Security Constrained Unit Commitment
dc.creator.none.fl_str_mv Alemany, Juan Manuel
Moitre, Diego Carlos Alberto
Magnago, Fernando
author Alemany, Juan Manuel
author_facet Alemany, Juan Manuel
Moitre, Diego Carlos Alberto
Magnago, Fernando
author_role author
author2 Moitre, Diego Carlos Alberto
Magnago, Fernando
author2_role author
author
dc.subject.none.fl_str_mv Optimización
Metodos de Descomposición
Predespacho Con Restricciones de Red
topic Optimización
Metodos de Descomposición
Predespacho Con Restricciones de Red
purl_subject.fl_str_mv https://purl.org/becyt/ford/2.2
https://purl.org/becyt/ford/2
dc.description.none.fl_txt_mv Security Constrained Unit Commitment is a large scale optimization problem of fundamental application in modern power system operation control centers. Benders decomposition is one of the most applied methodologies on the Security Constrained Unit Commitment Problem. One of the related drawbacks with this methodology is its oscilating behaivior wich in turns affects the convergence of the algorithm. In this work several options to improve the convergence of the Benders algorithm are presented.
Fil: Alemany, Juan Manuel. Universidad Nacional de Rio Cuarto; Argentina. Consejo Nacional de Investigaciones Científicas y Técnicas; Argentina
Fil: Moitre, Diego Carlos Alberto. Universidad Nacional de Rio Cuarto; Argentina
Fil: Magnago, Fernando. Universidad Nacional de Rio Cuarto; Argentina. Consejo Nacional de Investigaciones Científicas y Técnicas; Argentina
description Security Constrained Unit Commitment is a large scale optimization problem of fundamental application in modern power system operation control centers. Benders decomposition is one of the most applied methodologies on the Security Constrained Unit Commitment Problem. One of the related drawbacks with this methodology is its oscilating behaivior wich in turns affects the convergence of the algorithm. In this work several options to improve the convergence of the Benders algorithm are presented.
publishDate 2013
dc.date.none.fl_str_mv 2013-04
dc.type.none.fl_str_mv info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
http://purl.org/coar/resource_type/c_6501
info:ar-repo/semantics/articulo
format article
status_str publishedVersion
dc.identifier.none.fl_str_mv http://hdl.handle.net/11336/22777
Alemany, Juan Manuel; Moitre, Diego Carlos Alberto; Magnago, Fernando; Benders Decomposition Applied to Security Constrained Unit Commitment; Institute of Electrical and Electronics Engineers; IEEE Latin America Transactions; 11; 1; 4-2013; 421-425
1548-0992
CONICET Digital
CONICET
url http://hdl.handle.net/11336/22777
identifier_str_mv Alemany, Juan Manuel; Moitre, Diego Carlos Alberto; Magnago, Fernando; Benders Decomposition Applied to Security Constrained Unit Commitment; Institute of Electrical and Electronics Engineers; IEEE Latin America Transactions; 11; 1; 4-2013; 421-425
1548-0992
CONICET Digital
CONICET
dc.language.none.fl_str_mv spa
language spa
dc.relation.none.fl_str_mv info:eu-repo/semantics/altIdentifier/doi/10.1109/TLA.2013.6502840
info:eu-repo/semantics/altIdentifier/url/http://ieeexplore.ieee.org/document/6502840/
dc.rights.none.fl_str_mv info:eu-repo/semantics/openAccess
https://creativecommons.org/licenses/by-nc-sa/2.5/ar/
eu_rights_str_mv openAccess
rights_invalid_str_mv https://creativecommons.org/licenses/by-nc-sa/2.5/ar/
dc.format.none.fl_str_mv application/pdf
application/pdf
application/pdf
dc.publisher.none.fl_str_mv Institute of Electrical and Electronics Engineers
publisher.none.fl_str_mv Institute of Electrical and Electronics Engineers
dc.source.none.fl_str_mv reponame:CONICET Digital (CONICET)
instname:Consejo Nacional de Investigaciones Científicas y Técnicas
reponame_str CONICET Digital (CONICET)
collection CONICET Digital (CONICET)
instname_str Consejo Nacional de Investigaciones Científicas y Técnicas
repository.name.fl_str_mv CONICET Digital (CONICET) - Consejo Nacional de Investigaciones Científicas y Técnicas
repository.mail.fl_str_mv dasensio@conicet.gov.ar; lcarlino@conicet.gov.ar
_version_ 1842269046473490432
score 13.13397