Benders decomposition applied to security constrained unit commitment: Initialization of the algorithm

Autores
Alemany, Juan Manuel; Magnago, Fernando
Año de publicación
2015
Idioma
inglés
Tipo de recurso
artículo
Estado
versión publicada
Descripción
Benders decomposition has been broadly used for security constrained unit commitment problems, despite the fact that it may present convergence difficulties due to instabilities and to the mixed integer nature of the unit commitment problem. The initialization of Benders decomposition has been recognized as a prominent feature for the algorithm enhancement. In this work, a new Benders decomposition initialization methodology is proposed. The objective of the initialization is to include inexpensive network signals that can be added during the initial unit commitment master problem. Numerical simulations using the IEEE-118 and RTS-96 systems are performed to illustrate the benefits of the proposed initialization methodology. Results suggest that the initialization of Benders decomposition applied to security constrained unit commitment problems improves the overall convergence of the algorithm.
Fil: Alemany, Juan Manuel. Universidad Nacional de Río Cuarto; Argentina. Universidad Nacional de Río Cuarto. Facultad de Ingeniería. Departamento de Electricidad y Electrónica; Argentina
Fil: Magnago, Fernando. Nexant Inc; Estados Unidos. Universidad Nacional de Río Cuarto. Facultad de Ingeniería. Departamento de Electricidad y Electrónica; Argentina
Materia
Benders Decomposition
Initialization Methodology
Mixed Integer Linear Programming
Security Constrained Unit Commitment
Nivel de accesibilidad
acceso abierto
Condiciones de uso
https://creativecommons.org/licenses/by-nc-sa/2.5/ar/
Repositorio
CONICET Digital (CONICET)
Institución
Consejo Nacional de Investigaciones Científicas y Técnicas
OAI Identificador
oai:ri.conicet.gov.ar:11336/59354

id CONICETDig_ff3c4b49ea35f25513ff54e6881795e4
oai_identifier_str oai:ri.conicet.gov.ar:11336/59354
network_acronym_str CONICETDig
repository_id_str 3498
network_name_str CONICET Digital (CONICET)
spelling Benders decomposition applied to security constrained unit commitment: Initialization of the algorithmAlemany, Juan ManuelMagnago, FernandoBenders DecompositionInitialization MethodologyMixed Integer Linear ProgrammingSecurity Constrained Unit Commitmenthttps://purl.org/becyt/ford/2.2https://purl.org/becyt/ford/2Benders decomposition has been broadly used for security constrained unit commitment problems, despite the fact that it may present convergence difficulties due to instabilities and to the mixed integer nature of the unit commitment problem. The initialization of Benders decomposition has been recognized as a prominent feature for the algorithm enhancement. In this work, a new Benders decomposition initialization methodology is proposed. The objective of the initialization is to include inexpensive network signals that can be added during the initial unit commitment master problem. Numerical simulations using the IEEE-118 and RTS-96 systems are performed to illustrate the benefits of the proposed initialization methodology. Results suggest that the initialization of Benders decomposition applied to security constrained unit commitment problems improves the overall convergence of the algorithm.Fil: Alemany, Juan Manuel. Universidad Nacional de Río Cuarto; Argentina. Universidad Nacional de Río Cuarto. Facultad de Ingeniería. Departamento de Electricidad y Electrónica; ArgentinaFil: Magnago, Fernando. Nexant Inc; Estados Unidos. Universidad Nacional de Río Cuarto. Facultad de Ingeniería. Departamento de Electricidad y Electrónica; ArgentinaElsevier2015-03info:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionhttp://purl.org/coar/resource_type/c_6501info:ar-repo/semantics/articuloapplication/pdfapplication/pdfapplication/pdfhttp://hdl.handle.net/11336/59354Alemany, Juan Manuel; Magnago, Fernando; Benders decomposition applied to security constrained unit commitment: Initialization of the algorithm; Elsevier; International Journal of Electrical Power & Energy Systems; 66; 3-2015; 53-660142-0615CONICET DigitalCONICETenginfo:eu-repo/semantics/altIdentifier/doi/10.1016/j.ijepes.2014.10.044info:eu-repo/semantics/altIdentifier/url/https://www.sciencedirect.com/science/article/pii/S0142061514006474info:eu-repo/semantics/openAccesshttps://creativecommons.org/licenses/by-nc-sa/2.5/ar/reponame:CONICET Digital (CONICET)instname:Consejo Nacional de Investigaciones Científicas y Técnicas2025-09-03T10:09:54Zoai:ri.conicet.gov.ar:11336/59354instacron:CONICETInstitucionalhttp://ri.conicet.gov.ar/Organismo científico-tecnológicoNo correspondehttp://ri.conicet.gov.ar/oai/requestdasensio@conicet.gov.ar; lcarlino@conicet.gov.arArgentinaNo correspondeNo correspondeNo correspondeopendoar:34982025-09-03 10:09:54.855CONICET Digital (CONICET) - Consejo Nacional de Investigaciones Científicas y Técnicasfalse
dc.title.none.fl_str_mv Benders decomposition applied to security constrained unit commitment: Initialization of the algorithm
title Benders decomposition applied to security constrained unit commitment: Initialization of the algorithm
spellingShingle Benders decomposition applied to security constrained unit commitment: Initialization of the algorithm
Alemany, Juan Manuel
Benders Decomposition
Initialization Methodology
Mixed Integer Linear Programming
Security Constrained Unit Commitment
title_short Benders decomposition applied to security constrained unit commitment: Initialization of the algorithm
title_full Benders decomposition applied to security constrained unit commitment: Initialization of the algorithm
title_fullStr Benders decomposition applied to security constrained unit commitment: Initialization of the algorithm
title_full_unstemmed Benders decomposition applied to security constrained unit commitment: Initialization of the algorithm
title_sort Benders decomposition applied to security constrained unit commitment: Initialization of the algorithm
dc.creator.none.fl_str_mv Alemany, Juan Manuel
Magnago, Fernando
author Alemany, Juan Manuel
author_facet Alemany, Juan Manuel
Magnago, Fernando
author_role author
author2 Magnago, Fernando
author2_role author
dc.subject.none.fl_str_mv Benders Decomposition
Initialization Methodology
Mixed Integer Linear Programming
Security Constrained Unit Commitment
topic Benders Decomposition
Initialization Methodology
Mixed Integer Linear Programming
Security Constrained Unit Commitment
purl_subject.fl_str_mv https://purl.org/becyt/ford/2.2
https://purl.org/becyt/ford/2
dc.description.none.fl_txt_mv Benders decomposition has been broadly used for security constrained unit commitment problems, despite the fact that it may present convergence difficulties due to instabilities and to the mixed integer nature of the unit commitment problem. The initialization of Benders decomposition has been recognized as a prominent feature for the algorithm enhancement. In this work, a new Benders decomposition initialization methodology is proposed. The objective of the initialization is to include inexpensive network signals that can be added during the initial unit commitment master problem. Numerical simulations using the IEEE-118 and RTS-96 systems are performed to illustrate the benefits of the proposed initialization methodology. Results suggest that the initialization of Benders decomposition applied to security constrained unit commitment problems improves the overall convergence of the algorithm.
Fil: Alemany, Juan Manuel. Universidad Nacional de Río Cuarto; Argentina. Universidad Nacional de Río Cuarto. Facultad de Ingeniería. Departamento de Electricidad y Electrónica; Argentina
Fil: Magnago, Fernando. Nexant Inc; Estados Unidos. Universidad Nacional de Río Cuarto. Facultad de Ingeniería. Departamento de Electricidad y Electrónica; Argentina
description Benders decomposition has been broadly used for security constrained unit commitment problems, despite the fact that it may present convergence difficulties due to instabilities and to the mixed integer nature of the unit commitment problem. The initialization of Benders decomposition has been recognized as a prominent feature for the algorithm enhancement. In this work, a new Benders decomposition initialization methodology is proposed. The objective of the initialization is to include inexpensive network signals that can be added during the initial unit commitment master problem. Numerical simulations using the IEEE-118 and RTS-96 systems are performed to illustrate the benefits of the proposed initialization methodology. Results suggest that the initialization of Benders decomposition applied to security constrained unit commitment problems improves the overall convergence of the algorithm.
publishDate 2015
dc.date.none.fl_str_mv 2015-03
dc.type.none.fl_str_mv info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
http://purl.org/coar/resource_type/c_6501
info:ar-repo/semantics/articulo
format article
status_str publishedVersion
dc.identifier.none.fl_str_mv http://hdl.handle.net/11336/59354
Alemany, Juan Manuel; Magnago, Fernando; Benders decomposition applied to security constrained unit commitment: Initialization of the algorithm; Elsevier; International Journal of Electrical Power & Energy Systems; 66; 3-2015; 53-66
0142-0615
CONICET Digital
CONICET
url http://hdl.handle.net/11336/59354
identifier_str_mv Alemany, Juan Manuel; Magnago, Fernando; Benders decomposition applied to security constrained unit commitment: Initialization of the algorithm; Elsevier; International Journal of Electrical Power & Energy Systems; 66; 3-2015; 53-66
0142-0615
CONICET Digital
CONICET
dc.language.none.fl_str_mv eng
language eng
dc.relation.none.fl_str_mv info:eu-repo/semantics/altIdentifier/doi/10.1016/j.ijepes.2014.10.044
info:eu-repo/semantics/altIdentifier/url/https://www.sciencedirect.com/science/article/pii/S0142061514006474
dc.rights.none.fl_str_mv info:eu-repo/semantics/openAccess
https://creativecommons.org/licenses/by-nc-sa/2.5/ar/
eu_rights_str_mv openAccess
rights_invalid_str_mv https://creativecommons.org/licenses/by-nc-sa/2.5/ar/
dc.format.none.fl_str_mv application/pdf
application/pdf
application/pdf
dc.publisher.none.fl_str_mv Elsevier
publisher.none.fl_str_mv Elsevier
dc.source.none.fl_str_mv reponame:CONICET Digital (CONICET)
instname:Consejo Nacional de Investigaciones Científicas y Técnicas
reponame_str CONICET Digital (CONICET)
collection CONICET Digital (CONICET)
instname_str Consejo Nacional de Investigaciones Científicas y Técnicas
repository.name.fl_str_mv CONICET Digital (CONICET) - Consejo Nacional de Investigaciones Científicas y Técnicas
repository.mail.fl_str_mv dasensio@conicet.gov.ar; lcarlino@conicet.gov.ar
_version_ 1842270098684903424
score 13.13397