4.4 Article

Numerical polynomial homotopy continuation method to locate all the power flow solutions

期刊

IET GENERATION TRANSMISSION & DISTRIBUTION
卷 10, 期 12, 页码 2972-2980

出版社

INST ENGINEERING TECHNOLOGY-IET
DOI: 10.1049/iet-gtd.2015.1546

关键词

load flow; power system transient stability; polynomials; numerical polynomial homotopy continuation method; power flow solutions; power flow equations; nonlinear system-of-algebraic equations; transient stability analysis; voltage stability assessment; gamma-trick; security assessments

资金

  1. DARPA YFA award
  2. NSF-ECCS award [1509036, 1508666]
  3. MIT/Skoltech and Masdar Initiative, Ministry of Education and Science of Russian Federation [14.615.21.0001, RFMEFI61514X0001]
  4. Vietnam Education Foundation
  5. Div Of Electrical, Commun & Cyber Sys
  6. Directorate For Engineering [1508666] Funding Source: National Science Foundation

向作者/读者索取更多资源

The manuscript addresses the problem of finding all solutions of power flow equations or other similar non-linear system of algebraic equations. This problem arises naturally in a number of power systems contexts, most importantly the direct methods for transient stability analysis and voltage stability assessment. Here, the authors introduce a novel form of homotopy continuation method called the numerical polynomial homotopy continuation method that is mathematically guaranteed to find all the solutions without ever encountering a bifurcation. Since finding real solutions is much more challenging, first the authors embed the real form of power flow equation in complex space, and then track the generally unphysical solutions with complex values of real and imaginary parts of the voltages. The solutions converge to physical real form in the end of the homotopy. The so-called gamma-trick mathematically rigorously ensures that all the paths are well-behaved along the paths, so unlike other continuation approaches, no special handling of bifurcations is necessary. The method is embarrassingly parallelisable. The authors demonstrate the technique performance by solving several test cases up to the 14 buses. Finally, they discuss possible strategies for scaling the method to large size systems, and propose several applications for security assessments.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.4
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据