Skip to main content
U.S. Department of Energy
Office of Scientific and Technical Information

A tutorial description of an interior point method and its applications to security-constrained economic dispatch

Journal Article · · IEEE Transactions on Power Systems (Institute of Electrical and Electronics Engineers); (United States)
DOI:https://doi.org/10.1109/59.260862· OSTI ID:5738899

This paper deals with the use of Successive Linear Programming (SLP) for the solution of the Security-Constrained Economic Dispatch (SCED) problem. The authors tutorially describe an Interior Point Method (IPM) for the solution of Linear Programming (LP) problems, discussing important implementation issues that really make this method far superior to the simplex method. A study of the convergence of the SLP technique and a practical criterion to avoid oscillatory behavior in the iteration process are also proposed. A comparison of the proposed method with an efficient simplex code (MINOS) is carried out by solving SCED problems on two standard IEEE systems. The results show that the interior point technique is reliable, accurate and more than two times faster than the simplex algorithm.

OSTI ID:
5738899
Journal Information:
IEEE Transactions on Power Systems (Institute of Electrical and Electronics Engineers); (United States), Journal Name: IEEE Transactions on Power Systems (Institute of Electrical and Electronics Engineers); (United States) Vol. 8:3; ISSN 0885-8950; ISSN ITPSEG
Country of Publication:
United States
Language:
English

Similar Records

The quadratic interior point method solving power system optimization problems
Journal Article · Mon Aug 01 00:00:00 EDT 1994 · IEEE Transactions on Power Systems (Institute of Electrical and Electronics Engineers); (United States) · OSTI ID:6843864

A fast algorithm for power system optimization problems using an interior point method
Journal Article · Fri May 01 00:00:00 EDT 1992 · IEEE Transactions on Power Systems (Institute of Electrical and Electronics Engineers); (United States) · OSTI ID:5141540

Network constrained security control using an interior point algorithm
Journal Article · Sun Aug 01 00:00:00 EDT 1993 · IEEE Transactions on Power Systems (Institute of Electrical and Electronics Engineers); (United States) · OSTI ID:5676693