Benders Decomposition Applied to Security Constrained Unit Commitment
- Autores
- Alemany, Juan Manuel; Moitre, Diego Carlos Alberto; Magnago, Fernando
- Año de publicación
- 2013
- Idioma
- español castellano
- Tipo de recurso
- artículo
- Estado
- versión publicada
- Descripción
- Security Constrained Unit Commitment is a large scale optimization problem of fundamental application in modern power system operation control centers. Benders decomposition is one of the most applied methodologies on the Security Constrained Unit Commitment Problem. One of the related drawbacks with this methodology is its oscilating behaivior wich in turns affects the convergence of the algorithm. In this work several options to improve the convergence of the Benders algorithm are presented.
Fil: Alemany, Juan Manuel. Universidad Nacional de Rio Cuarto; Argentina. Consejo Nacional de Investigaciones Científicas y Técnicas; Argentina
Fil: Moitre, Diego Carlos Alberto. Universidad Nacional de Rio Cuarto; Argentina
Fil: Magnago, Fernando. Universidad Nacional de Rio Cuarto; Argentina. Consejo Nacional de Investigaciones Científicas y Técnicas; Argentina - Materia
-
Optimización
Metodos de Descomposición
Predespacho Con Restricciones de Red - Nivel de accesibilidad
- acceso abierto
- Condiciones de uso
- https://creativecommons.org/licenses/by-nc-sa/2.5/ar/
- Repositorio
- Institución
- Consejo Nacional de Investigaciones Científicas y Técnicas
- OAI Identificador
- oai:ri.conicet.gov.ar:11336/22777
Ver los metadatos del registro completo
id |
CONICETDig_aa7cd9e9f7d5bc0a006c4a14ce31d468 |
---|---|
oai_identifier_str |
oai:ri.conicet.gov.ar:11336/22777 |
network_acronym_str |
CONICETDig |
repository_id_str |
3498 |
network_name_str |
CONICET Digital (CONICET) |
spelling |
Benders Decomposition Applied to Security Constrained Unit CommitmentAlemany, Juan ManuelMoitre, Diego Carlos AlbertoMagnago, FernandoOptimizaciónMetodos de DescomposiciónPredespacho Con Restricciones de Redhttps://purl.org/becyt/ford/2.2https://purl.org/becyt/ford/2Security Constrained Unit Commitment is a large scale optimization problem of fundamental application in modern power system operation control centers. Benders decomposition is one of the most applied methodologies on the Security Constrained Unit Commitment Problem. One of the related drawbacks with this methodology is its oscilating behaivior wich in turns affects the convergence of the algorithm. In this work several options to improve the convergence of the Benders algorithm are presented.Fil: Alemany, Juan Manuel. Universidad Nacional de Rio Cuarto; Argentina. Consejo Nacional de Investigaciones Científicas y Técnicas; ArgentinaFil: Moitre, Diego Carlos Alberto. Universidad Nacional de Rio Cuarto; ArgentinaFil: Magnago, Fernando. Universidad Nacional de Rio Cuarto; Argentina. Consejo Nacional de Investigaciones Científicas y Técnicas; ArgentinaInstitute of Electrical and Electronics Engineers2013-04info:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionhttp://purl.org/coar/resource_type/c_6501info:ar-repo/semantics/articuloapplication/pdfapplication/pdfapplication/pdfhttp://hdl.handle.net/11336/22777Alemany, Juan Manuel; Moitre, Diego Carlos Alberto; Magnago, Fernando; Benders Decomposition Applied to Security Constrained Unit Commitment; Institute of Electrical and Electronics Engineers; IEEE Latin America Transactions; 11; 1; 4-2013; 421-4251548-0992CONICET DigitalCONICETspainfo:eu-repo/semantics/altIdentifier/doi/10.1109/TLA.2013.6502840info:eu-repo/semantics/altIdentifier/url/http://ieeexplore.ieee.org/document/6502840/info:eu-repo/semantics/openAccesshttps://creativecommons.org/licenses/by-nc-sa/2.5/ar/reponame:CONICET Digital (CONICET)instname:Consejo Nacional de Investigaciones Científicas y Técnicas2025-09-03T09:50:40Zoai:ri.conicet.gov.ar:11336/22777instacron:CONICETInstitucionalhttp://ri.conicet.gov.ar/Organismo científico-tecnológicoNo correspondehttp://ri.conicet.gov.ar/oai/requestdasensio@conicet.gov.ar; lcarlino@conicet.gov.arArgentinaNo correspondeNo correspondeNo correspondeopendoar:34982025-09-03 09:50:40.756CONICET Digital (CONICET) - Consejo Nacional de Investigaciones Científicas y Técnicasfalse |
dc.title.none.fl_str_mv |
Benders Decomposition Applied to Security Constrained Unit Commitment |
title |
Benders Decomposition Applied to Security Constrained Unit Commitment |
spellingShingle |
Benders Decomposition Applied to Security Constrained Unit Commitment Alemany, Juan Manuel Optimización Metodos de Descomposición Predespacho Con Restricciones de Red |
title_short |
Benders Decomposition Applied to Security Constrained Unit Commitment |
title_full |
Benders Decomposition Applied to Security Constrained Unit Commitment |
title_fullStr |
Benders Decomposition Applied to Security Constrained Unit Commitment |
title_full_unstemmed |
Benders Decomposition Applied to Security Constrained Unit Commitment |
title_sort |
Benders Decomposition Applied to Security Constrained Unit Commitment |
dc.creator.none.fl_str_mv |
Alemany, Juan Manuel Moitre, Diego Carlos Alberto Magnago, Fernando |
author |
Alemany, Juan Manuel |
author_facet |
Alemany, Juan Manuel Moitre, Diego Carlos Alberto Magnago, Fernando |
author_role |
author |
author2 |
Moitre, Diego Carlos Alberto Magnago, Fernando |
author2_role |
author author |
dc.subject.none.fl_str_mv |
Optimización Metodos de Descomposición Predespacho Con Restricciones de Red |
topic |
Optimización Metodos de Descomposición Predespacho Con Restricciones de Red |
purl_subject.fl_str_mv |
https://purl.org/becyt/ford/2.2 https://purl.org/becyt/ford/2 |
dc.description.none.fl_txt_mv |
Security Constrained Unit Commitment is a large scale optimization problem of fundamental application in modern power system operation control centers. Benders decomposition is one of the most applied methodologies on the Security Constrained Unit Commitment Problem. One of the related drawbacks with this methodology is its oscilating behaivior wich in turns affects the convergence of the algorithm. In this work several options to improve the convergence of the Benders algorithm are presented. Fil: Alemany, Juan Manuel. Universidad Nacional de Rio Cuarto; Argentina. Consejo Nacional de Investigaciones Científicas y Técnicas; Argentina Fil: Moitre, Diego Carlos Alberto. Universidad Nacional de Rio Cuarto; Argentina Fil: Magnago, Fernando. Universidad Nacional de Rio Cuarto; Argentina. Consejo Nacional de Investigaciones Científicas y Técnicas; Argentina |
description |
Security Constrained Unit Commitment is a large scale optimization problem of fundamental application in modern power system operation control centers. Benders decomposition is one of the most applied methodologies on the Security Constrained Unit Commitment Problem. One of the related drawbacks with this methodology is its oscilating behaivior wich in turns affects the convergence of the algorithm. In this work several options to improve the convergence of the Benders algorithm are presented. |
publishDate |
2013 |
dc.date.none.fl_str_mv |
2013-04 |
dc.type.none.fl_str_mv |
info:eu-repo/semantics/article info:eu-repo/semantics/publishedVersion http://purl.org/coar/resource_type/c_6501 info:ar-repo/semantics/articulo |
format |
article |
status_str |
publishedVersion |
dc.identifier.none.fl_str_mv |
http://hdl.handle.net/11336/22777 Alemany, Juan Manuel; Moitre, Diego Carlos Alberto; Magnago, Fernando; Benders Decomposition Applied to Security Constrained Unit Commitment; Institute of Electrical and Electronics Engineers; IEEE Latin America Transactions; 11; 1; 4-2013; 421-425 1548-0992 CONICET Digital CONICET |
url |
http://hdl.handle.net/11336/22777 |
identifier_str_mv |
Alemany, Juan Manuel; Moitre, Diego Carlos Alberto; Magnago, Fernando; Benders Decomposition Applied to Security Constrained Unit Commitment; Institute of Electrical and Electronics Engineers; IEEE Latin America Transactions; 11; 1; 4-2013; 421-425 1548-0992 CONICET Digital CONICET |
dc.language.none.fl_str_mv |
spa |
language |
spa |
dc.relation.none.fl_str_mv |
info:eu-repo/semantics/altIdentifier/doi/10.1109/TLA.2013.6502840 info:eu-repo/semantics/altIdentifier/url/http://ieeexplore.ieee.org/document/6502840/ |
dc.rights.none.fl_str_mv |
info:eu-repo/semantics/openAccess https://creativecommons.org/licenses/by-nc-sa/2.5/ar/ |
eu_rights_str_mv |
openAccess |
rights_invalid_str_mv |
https://creativecommons.org/licenses/by-nc-sa/2.5/ar/ |
dc.format.none.fl_str_mv |
application/pdf application/pdf application/pdf |
dc.publisher.none.fl_str_mv |
Institute of Electrical and Electronics Engineers |
publisher.none.fl_str_mv |
Institute of Electrical and Electronics Engineers |
dc.source.none.fl_str_mv |
reponame:CONICET Digital (CONICET) instname:Consejo Nacional de Investigaciones Científicas y Técnicas |
reponame_str |
CONICET Digital (CONICET) |
collection |
CONICET Digital (CONICET) |
instname_str |
Consejo Nacional de Investigaciones Científicas y Técnicas |
repository.name.fl_str_mv |
CONICET Digital (CONICET) - Consejo Nacional de Investigaciones Científicas y Técnicas |
repository.mail.fl_str_mv |
dasensio@conicet.gov.ar; lcarlino@conicet.gov.ar |
_version_ |
1842269046473490432 |
score |
13.13397 |