4.4 Article

Numerical polynomial homotopy continuation method to locate all the power flow solutions

Journal

IET GENERATION TRANSMISSION & DISTRIBUTION
Volume 10, Issue 12, Pages 2972-2980

Publisher

INST ENGINEERING TECHNOLOGY-IET
DOI: 10.1049/iet-gtd.2015.1546

Keywords

load flow; power system transient stability; polynomials; numerical polynomial homotopy continuation method; power flow solutions; power flow equations; nonlinear system-of-algebraic equations; transient stability analysis; voltage stability assessment; gamma-trick; security assessments

Funding

  1. DARPA YFA award
  2. NSF-ECCS award [1509036, 1508666]
  3. MIT/Skoltech and Masdar Initiative, Ministry of Education and Science of Russian Federation [14.615.21.0001, RFMEFI61514X0001]
  4. Vietnam Education Foundation
  5. Div Of Electrical, Commun & Cyber Sys
  6. Directorate For Engineering [1508666] Funding Source: National Science Foundation

Ask authors/readers for more resources

The manuscript addresses the problem of finding all solutions of power flow equations or other similar non-linear system of algebraic equations. This problem arises naturally in a number of power systems contexts, most importantly the direct methods for transient stability analysis and voltage stability assessment. Here, the authors introduce a novel form of homotopy continuation method called the numerical polynomial homotopy continuation method that is mathematically guaranteed to find all the solutions without ever encountering a bifurcation. Since finding real solutions is much more challenging, first the authors embed the real form of power flow equation in complex space, and then track the generally unphysical solutions with complex values of real and imaginary parts of the voltages. The solutions converge to physical real form in the end of the homotopy. The so-called gamma-trick mathematically rigorously ensures that all the paths are well-behaved along the paths, so unlike other continuation approaches, no special handling of bifurcations is necessary. The method is embarrassingly parallelisable. The authors demonstrate the technique performance by solving several test cases up to the 14 buses. Finally, they discuss possible strategies for scaling the method to large size systems, and propose several applications for security assessments.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.4
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available