Benders decomposition applied to security constrained unit commitment: Initialization of the algorithm
- Autores
- Alemany, Juan Manuel; Magnago, Fernando
- Año de publicación
- 2015
- Idioma
- inglés
- Tipo de recurso
- artículo
- Estado
- versión publicada
- Descripción
- Benders decomposition has been broadly used for security constrained unit commitment problems, despite the fact that it may present convergence difficulties due to instabilities and to the mixed integer nature of the unit commitment problem. The initialization of Benders decomposition has been recognized as a prominent feature for the algorithm enhancement. In this work, a new Benders decomposition initialization methodology is proposed. The objective of the initialization is to include inexpensive network signals that can be added during the initial unit commitment master problem. Numerical simulations using the IEEE-118 and RTS-96 systems are performed to illustrate the benefits of the proposed initialization methodology. Results suggest that the initialization of Benders decomposition applied to security constrained unit commitment problems improves the overall convergence of the algorithm.
Fil: Alemany, Juan Manuel. Universidad Nacional de Río Cuarto; Argentina. Universidad Nacional de Río Cuarto. Facultad de Ingeniería. Departamento de Electricidad y Electrónica; Argentina
Fil: Magnago, Fernando. Nexant Inc; Estados Unidos. Universidad Nacional de Río Cuarto. Facultad de Ingeniería. Departamento de Electricidad y Electrónica; Argentina - Materia
-
Benders Decomposition
Initialization Methodology
Mixed Integer Linear Programming
Security Constrained Unit Commitment - Nivel de accesibilidad
- acceso abierto
- Condiciones de uso
- https://creativecommons.org/licenses/by-nc-sa/2.5/ar/
- Repositorio
- Institución
- Consejo Nacional de Investigaciones Científicas y Técnicas
- OAI Identificador
- oai:ri.conicet.gov.ar:11336/59354
Ver los metadatos del registro completo
id |
CONICETDig_ff3c4b49ea35f25513ff54e6881795e4 |
---|---|
oai_identifier_str |
oai:ri.conicet.gov.ar:11336/59354 |
network_acronym_str |
CONICETDig |
repository_id_str |
3498 |
network_name_str |
CONICET Digital (CONICET) |
spelling |
Benders decomposition applied to security constrained unit commitment: Initialization of the algorithmAlemany, Juan ManuelMagnago, FernandoBenders DecompositionInitialization MethodologyMixed Integer Linear ProgrammingSecurity Constrained Unit Commitmenthttps://purl.org/becyt/ford/2.2https://purl.org/becyt/ford/2Benders decomposition has been broadly used for security constrained unit commitment problems, despite the fact that it may present convergence difficulties due to instabilities and to the mixed integer nature of the unit commitment problem. The initialization of Benders decomposition has been recognized as a prominent feature for the algorithm enhancement. In this work, a new Benders decomposition initialization methodology is proposed. The objective of the initialization is to include inexpensive network signals that can be added during the initial unit commitment master problem. Numerical simulations using the IEEE-118 and RTS-96 systems are performed to illustrate the benefits of the proposed initialization methodology. Results suggest that the initialization of Benders decomposition applied to security constrained unit commitment problems improves the overall convergence of the algorithm.Fil: Alemany, Juan Manuel. Universidad Nacional de Río Cuarto; Argentina. Universidad Nacional de Río Cuarto. Facultad de Ingeniería. Departamento de Electricidad y Electrónica; ArgentinaFil: Magnago, Fernando. Nexant Inc; Estados Unidos. Universidad Nacional de Río Cuarto. Facultad de Ingeniería. Departamento de Electricidad y Electrónica; ArgentinaElsevier2015-03info:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionhttp://purl.org/coar/resource_type/c_6501info:ar-repo/semantics/articuloapplication/pdfapplication/pdfapplication/pdfhttp://hdl.handle.net/11336/59354Alemany, Juan Manuel; Magnago, Fernando; Benders decomposition applied to security constrained unit commitment: Initialization of the algorithm; Elsevier; International Journal of Electrical Power & Energy Systems; 66; 3-2015; 53-660142-0615CONICET DigitalCONICETenginfo:eu-repo/semantics/altIdentifier/doi/10.1016/j.ijepes.2014.10.044info:eu-repo/semantics/altIdentifier/url/https://www.sciencedirect.com/science/article/pii/S0142061514006474info:eu-repo/semantics/openAccesshttps://creativecommons.org/licenses/by-nc-sa/2.5/ar/reponame:CONICET Digital (CONICET)instname:Consejo Nacional de Investigaciones Científicas y Técnicas2025-09-03T10:09:54Zoai:ri.conicet.gov.ar:11336/59354instacron:CONICETInstitucionalhttp://ri.conicet.gov.ar/Organismo científico-tecnológicoNo correspondehttp://ri.conicet.gov.ar/oai/requestdasensio@conicet.gov.ar; lcarlino@conicet.gov.arArgentinaNo correspondeNo correspondeNo correspondeopendoar:34982025-09-03 10:09:54.855CONICET Digital (CONICET) - Consejo Nacional de Investigaciones Científicas y Técnicasfalse |
dc.title.none.fl_str_mv |
Benders decomposition applied to security constrained unit commitment: Initialization of the algorithm |
title |
Benders decomposition applied to security constrained unit commitment: Initialization of the algorithm |
spellingShingle |
Benders decomposition applied to security constrained unit commitment: Initialization of the algorithm Alemany, Juan Manuel Benders Decomposition Initialization Methodology Mixed Integer Linear Programming Security Constrained Unit Commitment |
title_short |
Benders decomposition applied to security constrained unit commitment: Initialization of the algorithm |
title_full |
Benders decomposition applied to security constrained unit commitment: Initialization of the algorithm |
title_fullStr |
Benders decomposition applied to security constrained unit commitment: Initialization of the algorithm |
title_full_unstemmed |
Benders decomposition applied to security constrained unit commitment: Initialization of the algorithm |
title_sort |
Benders decomposition applied to security constrained unit commitment: Initialization of the algorithm |
dc.creator.none.fl_str_mv |
Alemany, Juan Manuel Magnago, Fernando |
author |
Alemany, Juan Manuel |
author_facet |
Alemany, Juan Manuel Magnago, Fernando |
author_role |
author |
author2 |
Magnago, Fernando |
author2_role |
author |
dc.subject.none.fl_str_mv |
Benders Decomposition Initialization Methodology Mixed Integer Linear Programming Security Constrained Unit Commitment |
topic |
Benders Decomposition Initialization Methodology Mixed Integer Linear Programming Security Constrained Unit Commitment |
purl_subject.fl_str_mv |
https://purl.org/becyt/ford/2.2 https://purl.org/becyt/ford/2 |
dc.description.none.fl_txt_mv |
Benders decomposition has been broadly used for security constrained unit commitment problems, despite the fact that it may present convergence difficulties due to instabilities and to the mixed integer nature of the unit commitment problem. The initialization of Benders decomposition has been recognized as a prominent feature for the algorithm enhancement. In this work, a new Benders decomposition initialization methodology is proposed. The objective of the initialization is to include inexpensive network signals that can be added during the initial unit commitment master problem. Numerical simulations using the IEEE-118 and RTS-96 systems are performed to illustrate the benefits of the proposed initialization methodology. Results suggest that the initialization of Benders decomposition applied to security constrained unit commitment problems improves the overall convergence of the algorithm. Fil: Alemany, Juan Manuel. Universidad Nacional de Río Cuarto; Argentina. Universidad Nacional de Río Cuarto. Facultad de Ingeniería. Departamento de Electricidad y Electrónica; Argentina Fil: Magnago, Fernando. Nexant Inc; Estados Unidos. Universidad Nacional de Río Cuarto. Facultad de Ingeniería. Departamento de Electricidad y Electrónica; Argentina |
description |
Benders decomposition has been broadly used for security constrained unit commitment problems, despite the fact that it may present convergence difficulties due to instabilities and to the mixed integer nature of the unit commitment problem. The initialization of Benders decomposition has been recognized as a prominent feature for the algorithm enhancement. In this work, a new Benders decomposition initialization methodology is proposed. The objective of the initialization is to include inexpensive network signals that can be added during the initial unit commitment master problem. Numerical simulations using the IEEE-118 and RTS-96 systems are performed to illustrate the benefits of the proposed initialization methodology. Results suggest that the initialization of Benders decomposition applied to security constrained unit commitment problems improves the overall convergence of the algorithm. |
publishDate |
2015 |
dc.date.none.fl_str_mv |
2015-03 |
dc.type.none.fl_str_mv |
info:eu-repo/semantics/article info:eu-repo/semantics/publishedVersion http://purl.org/coar/resource_type/c_6501 info:ar-repo/semantics/articulo |
format |
article |
status_str |
publishedVersion |
dc.identifier.none.fl_str_mv |
http://hdl.handle.net/11336/59354 Alemany, Juan Manuel; Magnago, Fernando; Benders decomposition applied to security constrained unit commitment: Initialization of the algorithm; Elsevier; International Journal of Electrical Power & Energy Systems; 66; 3-2015; 53-66 0142-0615 CONICET Digital CONICET |
url |
http://hdl.handle.net/11336/59354 |
identifier_str_mv |
Alemany, Juan Manuel; Magnago, Fernando; Benders decomposition applied to security constrained unit commitment: Initialization of the algorithm; Elsevier; International Journal of Electrical Power & Energy Systems; 66; 3-2015; 53-66 0142-0615 CONICET Digital CONICET |
dc.language.none.fl_str_mv |
eng |
language |
eng |
dc.relation.none.fl_str_mv |
info:eu-repo/semantics/altIdentifier/doi/10.1016/j.ijepes.2014.10.044 info:eu-repo/semantics/altIdentifier/url/https://www.sciencedirect.com/science/article/pii/S0142061514006474 |
dc.rights.none.fl_str_mv |
info:eu-repo/semantics/openAccess https://creativecommons.org/licenses/by-nc-sa/2.5/ar/ |
eu_rights_str_mv |
openAccess |
rights_invalid_str_mv |
https://creativecommons.org/licenses/by-nc-sa/2.5/ar/ |
dc.format.none.fl_str_mv |
application/pdf application/pdf application/pdf |
dc.publisher.none.fl_str_mv |
Elsevier |
publisher.none.fl_str_mv |
Elsevier |
dc.source.none.fl_str_mv |
reponame:CONICET Digital (CONICET) instname:Consejo Nacional de Investigaciones Científicas y Técnicas |
reponame_str |
CONICET Digital (CONICET) |
collection |
CONICET Digital (CONICET) |
instname_str |
Consejo Nacional de Investigaciones Científicas y Técnicas |
repository.name.fl_str_mv |
CONICET Digital (CONICET) - Consejo Nacional de Investigaciones Científicas y Técnicas |
repository.mail.fl_str_mv |
dasensio@conicet.gov.ar; lcarlino@conicet.gov.ar |
_version_ |
1842270098684903424 |
score |
13.13397 |