SECURITY CONSTRAINT OPTIMAL POWER FLOW (安全约束的优化潮流)
《运筹学》英文单词
![《运筹学》英文单词](https://img.taocdn.com/s3/m/1036d66a58fafab069dc0229.png)
《运筹学》英语单词10-1 programming problem0-1规划问题2Artificial variable人工变量3Assignment problem分派问题4Augmenting path增广路5Bases基6Basic feasible solution基可行解7Basic solution基解8Basic variable基变量9Big-M method大M法10Bipartite graph二分图11Branch-and-bound method分枝定界法12Capacity容量13Chinese postman problem中国邮递员问题14Circuit回路15Combinatorial optimal problem组合优化问题16Cone锥17Connected graph连通图18Constraint约束19Convergence收敛20Convex programming problem凸规划问题 21Cut edge截边22Cutting plane method切平面法23Cycle圈24Cycling循环25Decision variable决策变量26Degenerate退化27Degree次28Directed arc有向弧29Discrete optimal problem离散优化问题30Dual problem对偶问题31Dual simplex algorithm对偶单纯形算法32Dynamic programming动态规划33Edge边34Euler tour欧拉迹35Feasible flow可行流36Fesible region可行域37Flow conservation constraint流量守恒条件38Flow value流量39Global optimal solution全局最有解40Goal programming目标规划41Hyperplane超平面42Initial solution初始解43Integer programming problem整数规划问题 44Labeling algorithm标号算法45Linear programming problem线性规划问题46Local optimal solution局部最有解47Mathematical programming problem数学规划问题 48Mathematical programming problem数学规划问题 49Maximal flow最大流50Network flow problem网络流问题51Nonbasic matrix非基矩阵52Nonlinear programming problem非线性规划问题53Northwest corner rule西北角法54Objective function目标函数55Optimal solution最优解56Optimality criterion最优性准则57Optimization最优化58Parametric analysis参数分析59Path路60Pivot column旋转行61Pivot element旋转元62Pivot row旋转列63Pivoting转轴运算64Polyhedral convex set凸多面体65Potential势66Preflow初始流67Primal problem原问题68Quadratic programming problem二次规划问题69Rank秩70Revised simplex algorithm修正单纯形算法71Revised simplex method改进单纯形法72Saturated arc饱和弧73Sensitivity analysis灵敏度分析74Shadow prices影子价格 75Shortest path最短路76Simple path简单路77Simplex algorithm单纯形算法78Simplex multipliers单纯形乘子79Simplex tableau单纯形表80Sink汇点81Slack constraint松约束82Slack variable松弛变量83Slackness Condition松弛条件 84Smallest subscript rule最小下标规则85Souce源点86Spanning tree支撑树87Standard form标准型 88Strong theorem of complementary slackness强对偶定理89Subgraph子图90Surplus variable剩余变量 91Tight constraint紧约束92Tourism promblem旅行商问题93Transportation problem运输问题 94Tree树95Two-Phase Method两阶段法96Unbounded solution无界解97Vertex顶点98Walk路99Weak theorem of complementary slackness弱对偶定理100Weighted graph赋权图。
多节点协同中继信道容量分析及功率分配
![多节点协同中继信道容量分析及功率分配](https://img.taocdn.com/s3/m/58784f3fa4e9856a561252d380eb6294dd88220e.png)
多节点协同中继信道容量分析及功率分配黄英;魏急波;雷菁【摘要】基于译码—转发(DF)模式,在信道状态信息未知,源节点发射功率与各中继节点发射总功率分别受限于P1、P2的假设下,针对带直传(DT)和不带直传2种模型的多节点协同中继,进行了信道容量上下限的分析和推导.在功率限固定的情况下,分析了容量与中继节点数目之间的关系,给出了容量随中继节点数目增加而提高所需的条件.在功率限之和受限的情况下,获得了2个功率限的最佳分配.理论分析和仿真结果都表明:源到中继的信道条件较好时,只有当增加的新链路性能优于现有链路的平均值时才能提高容量;2种中继模型在功率限最佳分配下可获得最大容量.%Based on DF mode,and under the power constraint P1 (source transmission) and P2 (total relay transmission) ,the capacity of multi-node cooperative relay without CSI was analyzed,which is divided into two models: with DT and without DT. Given the fixed power constraint,the relationship between the capacity and the number of relay was achieved . The condition to improve the capacity as relay number increasing was proposed. When the sum of P1 and P2 was subject to another power constraint, the optimal power allocation was achieved. Theoretical analysis and simulation shows that when the channel condition between the source and the relay is better,the capacity increases only when the new link is better than the average existing links. The capacity is maximum at the optimal power allocation at two models.【期刊名称】《解放军理工大学学报(自然科学版)》【年(卷),期】2012(013)002【总页数】5页(P119-123)【关键词】中继信道;译码-转发;信道容量;直传;信道状态信息【作者】黄英;魏急波;雷菁【作者单位】国防科技大学电子科学与工程学院,湖南长沙410073;国防科技大学电子科学与工程学院,湖南长沙410073;国防科技大学电子科学与工程学院,湖南长沙410073【正文语种】中文【中图分类】TN929.5协同中继使在特定区域内只有单根天线的一些中继或终端形成了一个虚拟天线阵,从而达到了空间分级的效果,显著提高了用户的服务质量和系统的吞吐量。
第一章运筹学绪论和线性规划
![第一章运筹学绪论和线性规划](https://img.taocdn.com/s3/m/2aee9da5bceb19e8b8f6ba59.png)
The srandard Form of the Model:
max(min) s.t. z =c1x1 + c2x2 +…+ cnxn (1.1) a11x1 + a12x2 +…+ a1nxn ( = , ) b1 a21x1 + a22x2 +…+ a2nxn ( = , ) b2 … … (1.2) am1x1 + am2x2 +…+ amnxn ( = , ) bm x1,x2,…,xn 0 (1.3)
(3)An very effective method of finding the optimal distribution under the scarcity, to obtain the maximum profit or minimum cost
1.1The simplification of Prototype Example: The WYNDOR GLASS CO. produces a high-quality glass products and wants to launch two new products. It has 3 plants and product 1 need plants 1 and 3, while products 2 needs plants 2 and 3.All the products (1 and 2) can be sold and table 3.1 on page 27 summarizes the data gathered by the OR team. The goal of the company is to get the maximum profit from the sold products 1 and 2.
power control
![power control](https://img.taocdn.com/s3/m/711368876529647d27285220.png)
11. System Model
In this section we describe the system model and some relevant results needed for the analysis. We discuss power control for the uplink (from terminal to base) only. For the downlink (from base to terminal) all the results in this paper are valid with appropriate changes in the notation. We consider a cellular radio system with a finite channel set of size N (where a channel could be a frequency or time slot). The number of terminals using the same channel is denoted by M. We assume that the channels are orthogonal i.e. terminals on different channels do not interfere with each other. We denote the transmitter power of the ith terminal communicating with the ith base station by Pi. The gain on the radio link from terminal j to base i is denoted by G i j . All the Gij’s are positive and can take values in the range (0,1]. U , denotes the receiver noise at the ith base. The link quality is measured by the carrier to interference ratio(C1R). The CIR of the ith terminal a t its base is given by
机械设计专业术语的英语翻译1
![机械设计专业术语的英语翻译1](https://img.taocdn.com/s3/m/043ec5ca5901020206409ce3.png)
机械设计专业术语的英语翻译1机械设计专业术语的英语翻译1 柔性自动化flexibleautomation 润滑油膜lubricantfilm润滑装置lubricationdevice润滑lubrication润滑剂lubricant三角形花键serrationspline三角形螺纹vthreadscrew三维凸轮three - dimensionalcamto stheorem 三心定理kennedy砂轮越程槽grindingwheelgroove砂漏hour glass少齿差行星传动planetarydrivewithsmallteethdifference设计方法学designmethodology设计变量designvariable设计约束designconstraints深沟球轴承deepgrooveballbearing生产阻力productiveresistance升程rise升距lift实际廓线camprofile十字滑块联轴器doubleslidercoupling oldham'scoupling矢量vector输出功outputwork输出构件outputlink输出机构outputmechanism输出力矩outputtorque输出轴outputshaft输入构件inputlink数学模型mathematicmodel实际啮合线actuallineofaction双滑块机构double - slidermechanism, ellipsograph双曲柄机构doublecrankmechanism双曲面齿轮hyperboloidgear双头螺柱studs双万向联轴节constant - velocityordoubleuniversaljoint 双摇杆机构doublerockermechanism双转块机构oldhamcoupling双列轴承doublerowbearing双向推力轴承double - directionthrustbearing松边slack side顺时针clockwise瞬心instantaneouscenter死点deadpoint四杆机构four - barlinkage速度velocity速度不均匀波动系数coefficientofspeedfluctuation速度波动speedfluctuation速度曲线velocitydiagram速度瞬心instantaneouscenterofvelocity塔轮steppulley踏板pedal台钳、虎钳vice太阳轮sungear弹性滑动elasticityslidingmotion弹性联轴器elasticcoupling flexiblecoupling弹性套柱销联轴器rubber - cushionedsleevebearingcoupling 套筒sleeve梯形螺纹acmethreadform特殊运动链specialkinematicchain特性characteristics替代机构equivalentmechanism调节modulation, regulation调心滚子轴承self - aligningrollerbearing调心球轴承self - aligningballbearing调心轴承self - aligningbearing调速speedgoverning调速电动机adjustablespeedmotors调速系统speedcontrolsystem调压调速variablevoltagecontrolGovernor regulator, governorFerromagnetic fluid seals ferrofluidseal Parking phase, stoppingphaseStopping dwellSynchronous belt Synchronousbelt Synchronous belt drive synchronousbeltdrive Convex body convexCam camCam reverse mechanism inversecammechanism Cam mechanism cam, CamMechanismCam profile camprofileCam profile drawing layoutofcamprofile Theoretical profile of cam pitchcurve Flange coupling flangecouplingAtlas and Atlas AtlasGraphical method graphicalmethodPushing distance riseThrust ball bearing thrustballbearing Thrust bearing thrustbearingCutter toolwithdrawalgrooveAnnealed annealGyroscope gyroscopeV band VbeltExternal force externalforceOuter ring outerringOutline size boundarydimensionUniversal coupling Hookscoupling universalcoupling External gear externalgearBending stress beadingstressBending moment bendingmomentWrist wristReciprocating reciprocatingmotionReciprocating seal reciprocatingsealDesign on-netdesign online, ONDInching screw mechanism differentialscrewmechanism Displacement displacementDisplacement curve displacementdiagramPose pose, positionandorientationStable operation stage, steadymotionperiodRobust design robustdesignWorm wormWorm drive mechanism WormgearingNumber of worm heads numberofthreadsDiameter coefficient of worm diametralquotient Worm and worm gear wormandwormgearWorm cam stepping mechanism wormcamintervalmechanism Worm rotation handsofwormWorm gear wormgearPower spring powerspringStepless speed change device steplessspeedchangesdevices Infinity infiniteTie crankarm, planetcarrierField balancing fieldbalancingRadial bearing radialbearingCentripetal force centrifugalforceRelative velocity relativevelocityRelative motion relativemotionRelative clearance relativegapQuadrant quadrantClay plasticineFine tooth thread finethreadsPin pinConsuming consumptionPinion pinionPath minordiameterRubber spring balataspringModified trapezoidal acceleration motion law modifiedtrapezoidalaccelerationmotionCorrection of motion law of sinusoidal accelerationmodifiedsineaccelerationmotionHelical gear HelicalGearCross key, hook head wedge key taperkeyLeakage leakageHarmonic gear harmonicgearHarmonic drive harmonicdrivingHarmonic generator harmonicgeneratorEquivalent spur gear of helical gear equivalentspurgearofthehelicalgearMandrel spindleTravel speed variation factorcoefficientoftravelspeedvariationTravel speed ratio coefficient advance-toreturn-timeratio Planetary gear unit planetarytransmissionPlanet gear planetgearPlanetary gear change gear planetaryspeedchangingdevices Planetary gear train planetarygeartrainForm closed cam mechanismpositive-driveorform-closedcammechanismVirtual reality virtualrealityVirtual reality technology virtualrealitytechnology, VRT Virtual reality design, virtualrealitydesign, VRDVirtual constraint redundantorpassiveconstraintAllowable imbalance quantity allowableamountofunbalance Allowable pressure angle allowablepressureangleAllowable stress allowablestress, permissiblestressCantilever structure cantileverstructureCantilever beam cantileverbeamCyclic power flow circulatingpowerloadRotational torque runningtorqueRotary seal rotatingsealRotational motion rotarymotionType selection typeselectionPressure pressurePressure center centerofpressureCompressor compressorCompressive stress compressivestressPressure angle pressureangleInlay couplings jawteethpositive-contactcouplingJacobi matrix JacobimatrixRocker rockerHydraulic transmission hydrodynamicdriveHydraulic coupler hydrauliccouplersLiquid spring liquidspringHydraulic stepless speed change hydraulicsteplessspeedchanges Hydraulic mechanism hydraulicmechanismGeneralized kinematic chain generalizedkinematicchainMoving follower reciprocatingfollowerMobile sub prismaticpair, slidingpairMobile joints prismaticjointMoving cam wedgecamProfit and loss work incrementordecrementworkStress amplitude stressamplitudeStress concentration stressconcentrationStress concentration factor factorofstressconcentration Stress diagram stressdiagramStress strain diagram stress-straindiagramOptimum design optimaldesignOilbottle cupI oilcanOil groove seal oilyditchsealHarmful resistance uselessresistanceBeneficial resistance usefulresistanceEffective pull effectivetensionEffective circumferential force effectivecircleforce Harmful resistance detrimentalresistanceCosine acceleration motion cosineaccelerationorsimpleharmonicmotionPreload preloadPrime mover primermoverRound belt roundbeltBelt drive roundbeltdriveArc tooth thickness circularthicknessCircular cylindrical worm hollowflankwormRounded radius filletradiusDisc friction clutch discfrictionclutchDisc brake discbrakePrime mover primemoverOriginal mechanism originalmechanismCircular gear circulargearCylindrical roller cylindricalrollerCylindrical roller bearings cylindricalrollerbearingCylindrical pair cylindricpairCylindrical cam stepping motion mechanism barrelcylindriccamCylindrical helical tension spring cylindroidhelical-coilextensionspringCylindrical helical torsion spring cylindroidhelical-coiltorsionspringCylindrical helical compression spring cylindroidhelical-coilcompressionspringCylindrical cam cylindricalcamCylindrical worm cylindricalwormCylindrical coordinate manipulator cylindricalcoordinatemanipulator Conical spiral torsion springconoidhelical-coilcompressionspringTapered roller taperedrollerTapered roller bearing taperedrollerbearingBevel gear mechanism bevelgearsTaper angle coneangleThe original drivinglinkBound constraintConstraint constraintconditionConstraint reaction force constrainingforceJump jerkJump curve jerkdiagramInversion of motion, kinematicinversionMotion scheme design kinematicpreceptdesign Kinematic analysis kinematicanalysisKinematic pair kinematicpairMoving component movinglinkKinematic diagram kinematicsketchKinematic chain kinematicchainMotion distortion undercuttingKinematic design kinematicdesignMotion cycle cycleofmotionKinematic synthesis kinematicsynthesisUneven coefficient of operation coefficientofvelocityfluctuationKinematic viscosity kenematicviscosityLoad loadLoad deformation curve load - DEFORMATIONCURVE Load deformation diagram load - deformationdiagram Narrow V band narrowVbeltFelt ring seal feltringsealThe generating method of generatingTensioning force tensionTensioner tensionpulleyVibration vibrationVibration torque shakingcoupleVibration frequency frequencyofvibration Amplitude amplitudeofvibrationTangent mechanism tangentmechanismForward kinematics directforwardkinematics Sinusoidal mechanism sinegenerator, scotchyoke Loom loomNormal stress and normal stress normalstress Brake brakeSpur gear SpurGearStraight bevel gear straightbevelgearRight triangle righttriangleCartesian coordinate manipulator CartesiancoordinatemanipulatorCoefficient of diameter diametralquotient Diameter series diameterseriesStraight profile hourglass worm gear hindleyworm Linear motion linearmotionStraight axis straightshaftMass massCentroid centerofmassExecution component executivelink workinglinkProduct of mass and diameter mass-radiusproduct Intelligent design, intelligentdesign, IDIntermediate plane mid-planeCenter distance centerdistanceVariation of center distance centerdistancechange Center wheel centralgearMedium diameter meandiameterTerminate the meshing point finalcontact, endofcontact Week Festival pitchPeriodic velocity fluctuation periodicspeedfluctuation Epicyclic gear train epicyclicgeartrainElbow mechanism togglemechanismAxis shaftBearing cap bearingcupBearing alloy bearingalloyBearing block bearingblockBearing height bearingheightBearing width bearingwidthBearing bore bearingborediameterBearing life bearinglifeBearing ring bearingringBearing outer diameter bearingoutsidediameterJournal JournalBush and bearing lining bearingbushShaft end retaining ring shaftendringCollar shaftcollarShoulder ShaftShoulderAxial angle shaftangleAxial axialdirectionAxial profile axialtoothprofileAxial equivalent dynamic load dynamicequivalentaxialload Axial equivalent static load staticequivalentaxialload Axial basic rated dynamic load basicdynamicaxialloadrating Axial basic rated static load basicstaticaxialloadrating Axial contact bearing axialcontactbearingAxial plane axialplaneAxial clearance axialinternalclearanceAxial load AxialLoadAxial load factor axialloadfactorAxial component axialthrustloadActive component, drivinglinkDriving gear drivinggearDriving pulley drivingpulleyRotating guide rod mechanism whitworthmechanismRevolute pair revoluteturningpairThe speed is swivelingspeed rotatingspeedRotating joint revolutejoint Rotating shaft revolvingshaftRotor rotorRotor balance balanceofrotor Assembly condition assemblycondition Bevel gear bevelgearCone top commonapexofconeCone distance conedistanceCone wheel bevelpulley bevelwheel。
SonarQube规则之漏洞类型
![SonarQube规则之漏洞类型](https://img.taocdn.com/s3/m/90ccf975793e0912a21614791711cc7931b778a7.png)
SonarQube规则之漏洞类型漏洞类型:1、"@RequestMapping" methods should be "public"漏洞阻断标注了RequestMapping是controller是处理web请求。
既使⽅法修饰为private,同样也能被外部调⽤,因为spring通过反射调⽤⽅法,没有检查⽅法可视度,2、"enum" fields should not be publicly mutable漏洞次要枚举类域不应该是public,也不应该进⾏set3、"File.createTempFile" should not be used to create a directory漏洞严重File.createTempFile不应该被⽤来创建⽬录4、"HttpServletRequest.getRequestedSessionId()" should not be used漏洞严重HttpServletRequest.getRequestedSessionId()返回客户端浏览器会话id不要⽤,⽤HttpServletRequest.getSession().getId()5、"javax.crypto.NullCipher" should not be used for anything other than testing漏洞阻断NullCipher类提供了⼀种“⾝份密码”,不会以任何⽅式转换或加密明⽂。
因此,密⽂与明⽂相同。
所以这个类应该⽤于测试,从不在⽣产代码中。
6、"public static" fields should be constant漏洞次要public static 域应该 final7、Class variable fields should not have public accessibility漏洞次要类变量域应该是private,通过set,get进⾏操作8、Classes should not be loaded dynamically漏洞严重不应该动态加载类,动态加载的类可能包含由静态类初始化程序执⾏的恶意代码.Class clazz = Class.forName(className); // Noncompliant9、Cookies should be "secure"漏洞次要Cookie c = new Cookie(SECRET, secret); // Noncompliant; cookie is not secureresponse.addCookie(c);正:Cookie c = new Cookie(SECRET, secret);c.setSecure(true);response.addCookie(c);10、Credentials should not be hard-coded漏洞阻断凭证不应该硬编码11、Cryptographic RSA algorithms should always incorporate OAEP (Optimal Asymmetric Encryption Padding)漏洞严重加密RSA算法应始终包含OAEP(最优⾮对称加密填充)12、Default EJB interceptors should be declared in "ejb-jar.xml"漏洞阻断默认EJB拦截器应在“ejb-jar.xml”中声明13、Defined filters should be used漏洞严重web.xml⽂件中定义的每个过滤器都应该在<filter-mapping>元素中使⽤。
基于短包通信的NOMA下行链路安全传输
![基于短包通信的NOMA下行链路安全传输](https://img.taocdn.com/s3/m/3aa8bff751e2524de518964bcf84b9d528ea2cb2.png)
第42卷第2期通信学报V ol.42No.2 2021年2月Journal on Communications February 2021 基于短包通信的NOMA下行链路安全传输孙钢灿1,2,3,赵少柯1,2,郝万明2,3,朱政宇2,3(1. 郑州大学河南先进技术研究院,河南郑州 450003;2. 郑州大学产业技术研究院,河南郑州 450001;3. 郑州大学信息工程学院,河南郑州 450001)摘 要:面向物联网业务中的低时延需求,将短包通信(SPC)和非正交多址接入(NOMA)技术相结合,针对存在窃听者的情况研究多用户NOMA系统中的安全传输问题。
以最大化弱用户的安全吞吐量为目标,考虑用户译码错误概率约束、总功率约束和功率分配约束,提出了一种低复杂度的功率分配方案实现系统安全传输。
为解决复杂的目标函数和不可靠的串行干扰消除(SIC)技术带来的问题,首先证明约束条件在取得最优解时的紧约束性,在最大译码错误概率约束下,对功率约束进行转化和计算,得到强用户发射功率范围,推导出基站向强用户的发射功率搜索集;然后利用一维搜索算法对功率进行分配,实现弱用户吞吐量最大化。
仿真结果证明,所提方案可有效提高系统中弱用户的安全吞吐量。
关键词:短包通信;非正交多址接入;安全吞吐量;功率分配中图分类号:TN929文献标识码:ADOI: 10.11959/j.issn.1000−436x.2021041Secure transmission for NOMA downlinkbased on short packet communicationSUN Gangcan1,2,3, ZHAO Shaoke1,2, HAO Wanming2,3, ZHU Zhengyu2,31. Henan Institute of Advanced Technology, Zhengzhou University, Zhengzhou 450003, China2. Industrial Technology Research Institute, Zhengzhou University, Zhengzhou 450001, China3. School of Information Engineering, Zhengzhou University, Zhengzhou 450001, ChinaAbstract: For the low-latency requirements of Internet of things (IoT) business, short packet communication (SPC) and non-orthogonal multiple access (NOMA) were combined to study the problem of secure transmission in the multi-user NOMA system with eavesdroppers. With the maximizing the secure throughput of weak uses as the objective, consider-ing the user decoding error probability constraint, total power constraint and power allocation constraint, a low-complexity power allocation algorithm was proposed to realize secure transmission. In order to solve the problem caused by complex objective function formula and unreliable serial interference cancellation (SIC) technology, the proof that the compactness of the constraints was necessary to find the optimal solution. Under the constraint of maximum de-coding error probability, the power constraint was transformed and calculated to obtain the strict limit of transmitting power for strong users, and the transmit power search set from base station to strong user was derived. Then, the one-dimensional search algorithm was used to allocate power resources to maximize the throughput of weak users. Simulation results prove that the proposed algorithm can effectively improve the security throughput of weak users in the system.Keywords: short packet communication, non-orthogonal multiple access, secure throughput, power allocation收稿日期:2020−08−06;修回日期:2020−09−25通信作者:郝万明,***************.cn基金项目:国家自然科学基金资助项目(No.61801435);河南省科技攻关基金资助项目(No.202102210119);郑州市重大科技创新专项基金资助项目(No.2019CXZX0037)Foundation Items: The National Natural Science Foundation of China (No.61801435), Science and Technology Project of Henan Province (No.202102210119), Major Science and Technology Innovation Project of Zhengzhou (No.2019CXZX0037)第2期孙钢灿等:基于短包通信的NOMA下行链路安全传输·169·1引言随着第五代移动通信(5G, fifth-generation mo-bile communication)的普及和终端设备的小型化、智能化,未来无线通信将会出现更多的人与物、物与物之间的高速连接应用,因此物联网(IoT, In-ternet of things)技术将会得到快速发展[1-2]。
Copeland金融理论与公司政策习题答案04
![Copeland金融理论与公司政策习题答案04](https://img.taocdn.com/s3/m/74ecdfd2b9f3f90f76c61bf6.png)
Chapter 4State Preference Theory1. (a)PayoffState 1 State 2 Price Security A $30 $10 P A = $5 Security B$20$40P B = $10(b) The prices of pure securities are given by the equations below:P 1Q A1 + P 2Q A2 = P A P 1Q B1 + P 2Q B2 = P BQ ij = dollar payoff of security i in state j P i = price of security i (i = A, B) P j = price of pure security j (j = 1, 2)Substituting the correct numbers,30P 1 + 10P 2 = 5 20P 1 + 40P 2 = 10Multiplying the first equation by 4 and subtracting from the second equation,20P 1 + 40P 2 = 10 1211[120P 40P 20]100P 10P .10−+=== Substituting into the first equation,20P 1 + 40P 2 = 10 2 + 40P 2 = 1040P 2 = 8 P 2 = .20 P 1 = .10 P 2 = .20Chapter 4 State Preference Theory 332. (a) The equations to determine the prices of pure securities, P 1 and P 2, are given below:P 1Q j1 + P 2Q j2 = P j P 1Q k1 + P 2Q k2 = P kwhere Q j1 is the payoff of security j in state 1; P 1 is the price of a pure security which pays $1 if state 1 occurs; and P j is the price of security j.Substitution of payoffs and prices for securities j and k in the situation given yields12P 1 + 20P 2 = 22 24P 1 + 10P 2 = 20Multiplying the first equation by two, and subtracting the second equation from the first,24P 1 + 40P 2 = 44 12[24P 10P 20]−+=230P 24= 2P 24/30.8==Substituting .8 for P 2 in the first equation,12P 1 + 20(.8) = 2212P 1 = 22 – 16 P 1 = 6/12 = .5(b) The price of security i, P i , can be determined by the payoff of i in states 1 and 2, and the prices ofpure securities for states 1 and 2. From part a) we know the prices of pure securities, P 1 = .5 and P 2 = .8. Thus,P i = P 1Q il + P 2Q i2 = .5(6) + .8(10) = 3 + 8 = $11.003. (a) The payoff table is:S 1 = Peace S 2 = War Nova Nutrients = j St. 6 St. 6 Galactic Steel = kSt. 4St. 36To find the price of pure securities, P 1 and P 2, solve two equations with two unknowns:6P 1 + 6P 2 = St. 10 4P 1 + 36P 2 = St. 2034 Copeland/Shastri/Weston • Financial Theory and Corporate Policy, Fourth EditionMultiplying the first equation by six, and subtracting it from the second equation,4P 1 + 36P 2 = St. 20 121[36P + 36P = St. 60]32P = 40−−−P 1 = St. 1.25 6(1.25) + 6P 2 = 10P 2 = .4167(b) L et n j = number of Nova Nutrients shares and n k = number of Galactic Steel shares. Thenn j = W 0/P j = 1,000/10 = 100 n k = W 0/P k = 1,000/20 = 50If he buys only Nova Nutrients, he can buy 100 shares. If he buys only Galactic Steel, he can buy50 shares.Let W 1 = his final wealth if peace prevails, and W 2 = his final wealth if war prevails.If he buys N.N.: W 1 = n j Q j1= 100(6) = 600 St. W 2 = n j Q j2 = 100(6) = 600 St.If he buys G.S.: W 1 = n k Q k1= 50(4) = 200 St. W 2 = n k Q k2= 50(36) = 1,800 St.(c) For sales of j (N.N.) and purchases of k (G.S.): If he sells –n j shares of j, he receives –n j P j , andwith his initial W 0 he will have –n j P j + W 0. With this he can buy at most (–n j P j + W 0)/P k shares of k, which will return at least [(–n j P j + W 0)/P k ]Q k1; he must pay out at most –n j Q j1. Therefore, the minimum –n j is determined byj j 0k1j j1k n P +W Q n Q P −=− −+=−j j (10n 1,000)46n 20–2n j + 200 = –6n jn j = –50 shares of j (N.N.)Chapter 4 State Preference Theory 35For sales of k and purchase of j: If he sells –n k shares of k, he receives –n k P k , and with his initial W 0 he will have –n k P k + W 0. With this he can buy at most (–n k P k + W 0)/P j shares of j, which will return at least [(–n k P k + W 0) /P j ]Q j2; he must pay out at most –n k Q k2. Therefore, the minimum –n k is determined byk k 0j2k k2j n P W Q n Q P −+=− k k (20n 1,000)636n 10−+=−–12n k + 600 = –36n kn k = –25 shares of k (G.S.)(d) L et P a = price of Astro Ammo. ThenP a = P 1Q a1 + P 2Q a2 = 1.25(28) + .4167(36) = 35 + 15 = 50 St.(e) See Figure S4.1 on the following page.(f) The slope of the budget line must equal the slope of the utility curve (marginal rate of substitution)at optimum, as given in the equation below:2112W /W [U /W U /W ]−∂∂=−∂∂÷∂∂With utility function .8.212U = W W , this equality results in.2.2.8.8112121221.8W W .2W W 4W W 4W /W −−−÷==36 Copeland/Shastri/Weston • Financial Theory and Corporate Policy,Fourth EditionFigure S4.1 State payoffs in peace and war In equilibrium,21122112W /W P /P 4W /W P /P (5/4)/(5/12)(12/4)3∂∂=====Therefore,4W 2 = 3W 1 W 1 = (4/3)W 2The wealth constraint is:W 0 = P 1W 1 + P 2W 2Substituting the correct numbers,1,000 = (5/4) (4/3)W 2 + (5/12)W 2= (20/12)W 2 + (5/12)W 2 = (25/12)W 2 W 2 = (1,000)(12/25) = $480 W 1 = (4/3)480 = $640Chapter 4 State Preference Theory 37To find optimal portfolio, solve the two simultaneous equationsW 1 = n j Q j1 + n k Q k1 W 2 = n j Q j2 + n k Q k2Substituting the correct numbers,640 = 6n j + 4n k 480 = 6n j + 36n kSubtracting the second equation from the first yields160 = –32n k n k = –5Substituting –5 for n k in equation 2 gives a value for n j :480 = 6n j – 36(5)= 6n j – 180 660 = 6n j n j = 110Hence (n j = 110, n k = –5) is the optimum portfolio; in this case the investor buys 110 shares of Nova Nutrients and issues five shares of Galactic Steel.4. et n j = the number of shares the investor can buy if she buys only j, and n k the number she can buy ifshe buys only k. Then(a)00j k j k W W 1,2001,200n 120;n 100P 10P 12====== If she buys j: W 1 = n j Q j1 = 120(10) = $1,200 final wealth in state 1W 2 = n j Q j2 = 120(12) = $1,440 final wealth in state 2If she buys k: W 1 = n k Q k1 = 100(20) = $2,000 final wealth in state 1W 2 = n k Q k2 = 100(8) = $800 final wealth in state 2(b) For sales of j and purchases of k: If she sells –n j shares of j, she receives –n j P j , and with her initialwealth W 0 she will have –n j P j + W 0; with this she can buy at most (–n j P j + W 0)/P k shares of k which will return at least [(–n j P j + W 0)/P k ]Q k2; she must pay out at most –n j Q j2. Therefore, the minimum –n j is determined by:j j 0k2j j2kn P +W (Q ) =n Q P −−j jj j j 10n 1,200(8)12n 1220n 2,40036n n 150−+=−−+=−=−38 Copeland/Shastri/Weston • Financial Theory and Corporate Policy, Fourth EditionFor sales of k and purchases of j: If she sells –n k shares of k, she receives –n k P k , and with her initialwealth W 0 she will have –n k P k + W 0; with this she can buy at most (–n k P k + W 0)/P j shares of j, which will return at least [(–n k P k + W 0)/P j ]Q j1; she must pay out at most –n k Q k1. Therefore, the minimum –n k is determined by:k k 0j1k k1j n P +W (Q )n Q P −=− −+=−k k 12n 1,200(10)20n 10=−k n 150Final wealth for sales of j and purchases of k:State 1: –150(10) + 225(20) = 3,000 State 2: –150(12) + 225(8) = 0Final wealth for sales of k and purchases of j:State 1: 300(10) – 150(20) = 0 State 2: 300(12) – 150(8) = 2,400(c) To find the price of pure securities, solve two equations for two unknowns as follows:10P 1 + 12P 2 = 10 20P 1 + 8P 2 = 12Multiplying the first equation by two, and subtracting the second equation from the first equation,20P 1 + 24P 2 = 20 1222[20P + 8P 12]16P 8 P .50−=== Substituting .50 for P 2 in equation 1,10P 1 + 12(.5) = 10P 1 = .40(d) The price of security i is given byP i = P 1Q i1 + P 2Q i2 = (.40)5 + (.50)12 = 2 + 6 = 8(e) (The state contingent payoffs of a portfolio invested exclusively in security i are plotted inFigure S4.2.)If the investor places all of her wealth in i, the number of shares she can buy is given by0i i W 1,200n =150P 8==Chapter 4 State Preference Theory 39Her wealth in state one would ben i Q i1 = 150(5) = $750Her wealth in state two would ben i Q i2 = 150(12) = $1,800If the investor sells k to purchase j, her wealth in state one will be zero. This portfolio plots as the W 2 intercept in Figure S4.2 on the following page. The W 1 intercept is the portfolio of j shares sold to buy k, resulting in zero wealth in state two.(f) Set the slope of the budget line equal to the slope of the utility curve in accordance with theequation below:2112W /W (U /W )(U /W )∂∂=∂∂÷∂∂Given utility function.6.412U W W =and substituting the correct numbers,.4.46.621221121W (.6W W )(.4W W )W 1.5W /W −−∂=÷∂=Figure S4.2 State payoffs for securities i, j, and k In equilibrium:dW 2/dW 1 = P 1/P 21.5W 2/W 1 = .4/.5 = 0.8 1.5W 2 = 0.8W 1 W 1 = 1.875W 240 Copeland/Shastri/Weston • Financial Theory and Corporate Policy, Fourth EditionWealth constraint:W 0 = P 1W 1 + P 2W 2 1,200 = .4(1.875W 2) + .5W 2W 2 = 1,200/1.25 = 960 W 1 = 1.875(960) = 1,800Optimal portfolio: Solve the two simultaneous equations for the final wealth in each state:W 1 = n j Q j1 + n k Q k1 W 2 = n j Q j2 + n k Q k2Solve for n k and n j , the number of shares of each security to be purchased.Substituting the correct numbers,W 1 = 1,800 = 10n j + 20n k W 2 = 960 = 12n j + 8n kSolving equation one for n k in terms of n j , and substituting this value into equation two:20n k = 1,800 – 10n j n k = (1,800 – 10n j ) ÷ 20 960 = 12n j + 8 [(1,800 – 10n j ) ÷ 20] 4,800 = 60n j + 3,600 – 20n j 1,200 = 40n j n j = 30n k = (1,800 – 10nj)/20 n k = 75The investor should buy 30 shares of j and 75 shares of k.5. (a) If we know the maximum payout in each state, it will be possible to determine what an equalpayout will be. If the individual uses 100 percent of his wealth to buy security j, he can buy$72090$8= shares with payout S 1 = $900, S 2 = $1,800 If he spends $720 on security k, he can obtain$72080$9= shares with payout S 1 = $2,400, S 2 = $800 Since both of these payouts lie on the budget constraint (see Figure S4.3 on page 42), we can use them to determine its equation. The equation for the line isW 2 = a + bW 1Chapter 4 State Preference Theory 41Substituting in the values of the two points, which we have already determined, we obtain two equations with two unknowns, “a” and “b.”1,800 = a + b(900) –[800 = a + b(2,400)] 1,000 = b(–1,500) 1,0002b 1,5003−==− Therefore, the slope is 23− and the intercept is1,800 = a 23−(900) a = 2,400The maximum wealth in state two is $2,400. The maximum wealth in state one is0 = 2,400 23−W 1 3/2(2,400) = W 1 = $3,600A risk-free asset is one which has a constant payout, regardless of the state of nature which occurs. Therefore, we want to find the point along the budget line where W 2 = W 1. We now have two equations and two unknowns212W 2,400W 3=−(the budget constraint) W 2 = W 1 (equal payout)Substituting the second equation into the first, the payout of the risk-free asset is112W 2,400W 3=− 122,400W $1,440W 5/3=== If you buy n j shares of asset j and n k shares of k, your payout in states one and two will beState 1: n j 10 + n k 30 = 1,440 State 2: n j 20 + n k 10 = 1,440Multiplying the first equation by 2 and subtracting, we haven j 20 + n k 60 = 2,880 j k [n 20+n 101,440]−=k n 501,440=n k = 28.8and n j = 57.642 Copeland/Shastri/Weston • Financial Theory and Corporate Policy,Fourth EditionFigure S4.3 The budget constraint(b) The risk-free portfolio contains 57.6 shares of asset j and 28.8 shares of asset k. It costs $720 andreturns $1,440 for sure. Therefore, the risk-free rate of return isff f 1,4407201r 1,4401r 2720r 100%=++=== (c) It would be impossible to find a completely risk-free portfolio in a world with more states ofnature than assets (if all assets are risky). Any attempt to solve the problem would require solving for three unknowns with only two equations. No feasible solution exists. In general, it is necessary to have at least as many assets as states of nature in order for complete capital markets to exist. 6. We to solveMax[log C + 2/3 log Q 1 + 1/3 log Q 2] (4.1)subject toC + .6Q 1 + .4Q 2 = 50,000 (4.2)We can solve for C in (4.2) and substitute for C in (4.1).Max[log (50,000 – .6Q 1 – .4Q 2) + 2/3 log Q 1 + 1/3 log Q 2]Take the partial derivative with respect to Q 1 and set it equal to zero:121.62050,000.6Q .4Q 3Q −+=−−or 1.8Q 1 = 100,000 – 1.2Q 1 – .8Q 2 (4.3)Take the partial derivative with respect to Q 2 and set it equal to zero:122.41050,000.6Q .4Q 3Q −+=−−or 1.2Q 2 = 50,000 – .6Q 1 – .4Q 2 (4.4)Chapter 4 State Preference Theory 43 Together, (4.3) and (4.4) imply1.8Q1= 2.4Q2, or Q1= 1.3333Q2Substituting into (4.3) yields2.4Q2= 50,000Q2= 20,833.33hence Q1= 27,777.78(a) The risk-averse individual will purchase 27,777.78 units of pure security 1 at $0.60 each for a totalof $16,666.67; and 20,833.33 units of pure security 2 at $0.40 each for a total of $8,333.33. (b) From (4.2) and (4.4),C = 1.2Q2 = 25,000also from (4.2), C = $50,000 – $16,666.67 – $8,333.33= $25,000Hence, the investor divides his wealth equally between current and future consumption (which we would expect since the risk-free rate is zero and there is no discounting in the utility functions), but he buys more of pure security 1 (because its price per probability is lower) than of puresecurity 2.。
KSI_eMMC5.0_HS200_Datasheet_11.5x13_V1.0_4GB_A08 _General
![KSI_eMMC5.0_HS200_Datasheet_11.5x13_V1.0_4GB_A08 _General](https://img.taocdn.com/s3/m/73c613c86137ee06eff918d2.png)
____________________________________________________________________________________________________________________CONFIDENTIAL1Flash Storage Specification©2014 Kingston Solutions Inc.Embedded Multimedia Card(e •MMC ™5.0 HS200)EMMC04G-S100-A08PreliminaryDatasheetV1.0Kingston Solutions Inc.____________________________________________________________________________________________________________________CONFIDENTIAL2Flash Storage Specification©2014 Kingston Solutions Inc.Product Features :<Common>• Packaged NAND flash memory with e•MMC™ 5.0 interface • Compliant with e•MMC ™ Specification Ver.4.4, 4.41,4.5&5.0 •Bus mode- High-speed e •MMC ™ protocol- Provide variable clock frequencies of 0-200MHz.- Ten-wire bus (clock, 1 bit command, 8 bit data bus) and a hardware reset. • Supports three different data bus widths : 1 bit(default), 4 bits, 8 bits- Data transfer rate: up to 52Mbyte/s (using 8 parallel data lines at 52 MHz) - Single data rate : up to 200Mbyte/s @ 200MHz - Dual data rate : up to 104Mbyte/s @ 52MHz• Supports (Alternate) Boot Operation Mode to provide a simple boot sequence method • Supports SLEEP/AWAKE (CMD5).• Host initiated explicit sleep mode for power saving• Enhanced Write Protection with Permanent and Partial protection options • Supports Multiple User Data Partition with Enhanced User Data Area options • Supports Background Operations & High Priority Interrupt (HPI) • Supports enhanced storage media feature for better reliability • Operating voltage range : - VCCQ = 1.8 V/3.3 V - VCC = 3.3 V• Error free memory access- Internal error correction code (ECC) to protect data communication - Internal enhanced data management algorithm- Solid protection of sudden power failure safe-update operations for data content • Security- Support secure bad block erase commands- Enhanced write Protection with permanent and partial protection options • Quality- RoHS compliant (for detailed RoHS declaration, please contact your KSI representative.) • Supports Field Firmware Update(FFU) • Enhanced Device Life time • Support Pre EOL information • Optimal Size• Supports Production State Awareness • Supports Power Off Notification for Sleep____________________________________________________________________________________________________________________CONFIDENTIAL3Flash Storage Specification©2014 Kingston Solutions Inc.Device Summary:Table 1 – Device SummaryProduct Part number NAND Density Package Operating voltage EMMC04G-S100-A088GBFBGA153VCC=3.3V,VCCQ=1.8V/3.3V1. Product DescriptionKingston e•MMC™ products follow the JEDEC e•MMC™ 5.0 standard. It is an ideal universal storage solutions for many electronic devices, including smartphones, tablet PCs, PDAs, eBook readers, digital cameras, recorders, MP3, MP4 players, electronic learning products, digital TVs and set-top boxes. E•MMC™ encloses the MLC NAND and e•MMC™ controller inside as one JEDEC standard package, providing a standard interface to the host. The e•MMC™ controller directly manages NAND flash, including ECC, wear-leveling, IOPS optimization and read sensing.1.1. e •MMC ™ Standard SpecificationThe Kingston NAND Device is fully compatible with the JEDEC Standard Specification No.JESD84-B50. This datasheet describes the key and specific features of the Kingston e •MMC ™ Device. Any additional information required interfacing the Device to a host system and all the practical methods for device detection and access can be found in the proper sections of the JEDEC Standard Specification.2. Product Specification2.1. System PerformanceTable 2 – e •MMC ™ Device PerformanceProductsTypical valueRead Sequential (MB/s) Write Sequential (MB/s)EMMC04G-S100-A08 100 12Note 1: Values given for an 8-bit bus width, running HS200 mode from KSI proprietary tool, VCC=3.3V,VCCQ=1.8V.Note 2: For performance number under other test conditions, please contact your KSI representatives. Note 3: Performance numbers might be subject to changes without notice.____________________________________________________________________________________________________________________CONFIDENTIAL4Flash Storage Specification©2014 Kingston Solutions Inc.2.2. Power ConsumptionTable 3 – e •MMC ™ Device Power ConsumptionProductsRead(mA) Write(mA) Standby(mA)Typ Typ TypEMMC04G-S100-A08 78.5 56.1 0.149Note 1; Values given for an 8-bit bus width, a clock frequency of 52MHz DDR mode, VCC= 3.3V±5%, VCCQ=3.3V±5% Note 2: Current numbers might be subject to changes without notice.2.3. User DensityTotal user density depends on device type.For example ,52MB in the SLC mode requires 104 MB in MLC. This results in decreasing2.4. Capacity according to partitionCapacity Boot partition 1Boot partition 2RPMB 4 GB4096 KB4096 KB4096 KB2.5. User DensityDeviceUser Density Size4 GB3825205248 Bytes____________________________________________________________________________________________________________________CONFIDENTIAL5Flash Storage Specification©2014 Kingston Solutions Inc.1. e •MMC ™ Device and System3.1. e •MMC ™ System OverviewThe e •MMC ™ specification covers the behavior of the interface and the Device controller. As part of this specification the existence of a host controller and a memory storage array are implied but the operation of these pieces is not fully specified.The Kingston NAND Device contains a single chip MMC controller and NAND flash memory module. The micro-controller interfaces with a host system allowing data to be written to and read from the NAND flash memory module. The controller allows the host to be independent from details of erasing and programming the flash memory.Figure 1 – e •MMC ™ System Overview3.2. Memory AddressingPrevious implementations of the e •MMC ™ specification (versions up to v4.1) are following byte addressing with 32 bit field. This addressing mechanism permitted for e •MMC ™ densities up to and including 2 GB.To support larger densities the addressing mechanism was update to support sector addresses (512 B sectors). The sector addresses shall be used for all devices with capacity larger than 2 GB. To determine the addressing mode use the host should read bit [30:29] in the OCR register.____________________________________________________________________________________________________________________CONFIDENTIAL6Flash Storage Specification©2014 Kingston Solutions Inc.3.3. e •MMC ™ Device OverviewThe e •MMC ™ device transfers data via a configurable number of data bus signals. The communication signals are:3.3.1 Clock (CLK)Each cycle of this signal directs a one bit transfer on the command and either a one bit (1x) or a two bits transfer (2x) on all the data lines. The frequency may vary between zero and the maximum clock frequency.3.3.2 Command (CMD)This signal is a bidirectional command channel used for Device initialization and transfer of commands. The CMD signal has two operation modes: open-drain for initialization mode, and push-pull for fast command transfer. Commands are sent from the e •MMC ™ host controller to the e •MMC ™ Device and responses are sent from the Device to the host.3.3.3 Input/Outputs (DAT0-DAT7)These are bidirectional data channels. The DAT signals operate in push-pull mode. Only the Device or the host is driving these signals at a time. By default, after power up or reset, only DAT0 is used for data transfer. A wider data bus can be configured for data transfer, using either DAT0-DAT3 or DAT0-DAT7, by the e •MMC ™ host controller. The e •MMC ™ Device includes internal pull-ups for data lines DAT1-DAT7. Immediately after entering the 4-bit mode, the Device disconnects the internal pull ups of lines DAT1, DAT2, and DAT3. Correspondingly, immediately after entering to the 8-bit mode the Device disconnects the internal pull-ups of lines DAT1–DAT7.____________________________________________________________________________________________________________________CONFIDENTIAL7Flash Storage Specification©2014 Kingston Solutions Inc.He signals on the e •MMC ™ interface are described in Table 4.Table 4 – e •MMC ™ InterfaceName Type 1 Description CLK I Clock DAT0 I/O/PP DataDAT1 I/O/PP Data DAT2 I/O/PP Data DAT3 I/O/PP Data DAT4 I/O/PP Data DAT5 I/O/PP DataDAT6 I/O/PP Data DAT7 I/O/PP Data CMD I/O/PP/OD Command/Response RST_n I Hardware reset VCC S Supply voltage for Core VCCQ S Supply voltage for I/O VSS S Supply voltage ground for Core VSSQ S Supply voltage ground for I/ONote1:I : input; O : output; PP : push-pull; OD : open-drain; NC : Not connected (or logical high); S : power supply.Each Device has a set of information registers (see also 0, Device Registers.)Table 5 – e •MMC ™ RegistersNameWidth(bytes)Description ImplementationCID 16 Device Identification number, an individual number for identification. MandatoryRCA 2 Relative Device Address, is the Device system address, dynamicallyassigned by the host during initialization.MandatoryDSR 2 Driver Stage Register, to configure the Device’s output drivers. OptionalCSD 16Device Specific Data, information about the Device operationconditions.Mandatory OCR 4 Operation Conditions Register. Used by a special broadcast commandto identify the voltage type of the Device.MandatoryEXT_CSD 512 Extended Device Specific Data. Contains information about the Devicecapabilities and selected modes. Introduced in standard v4.0 MandatoryThe host may reset the device by:• Switching the power supply off and back on. The device shall have its own power-on detectioncircuitry which puts the device into a defined state after the power-on Device. • A reset signal• By sending a special command3.4. Bus ProtocolAfter a power-on reset, the host must initialize the device by a special message-based e •MMC ™ bus protocol. For more details, refer to section 5.3.1 of the JEDEC Standard Specification No.JESD84-B50.____________________________________________________________________________________________________________________CONFIDENTIAL8Flash Storage Specification©2014 Kingston Solutions Inc.3.5. Bus Speed Modese •MMC ™ defines several bus speed modes. Table 6 summarizes the various modes.Table 6— Bus Speed ModesMode Name Data Rate IO Voltage Bus Width Frequency Max Data Transfer(implies x8 bus width)BackwardsCompatibility with legacy MMC card Single 3.3/1.8V 1, 4, 8 0-26MHz 26MB/s High Speed SDR Single 3.3/1.8V 4, 8 0-52MHz 52MB/s High Speed DDR Dual 3.3/1.8V 4, 8 0-52MHz 104MB/s HS200Single1.8V4, 80-200MHz200MB/s3.5.1 HS200 Bus Speed ModeThe HS200 mode offers the following features: • SDR Data sampling method• CLK frequency up to 200MHz Data rate – up to 200MB/s • 8-bits bus width supported• Single ended signaling with 4 selectable Drive Strength • Signaling levels of 1.8V•Tuning concept for Read Operations3.5.2 HS200 System Block DiagramFigure 2 shows a typical HS200 Host and Device system. The host has a clock generator, which supplies CLK to the Device. For write operations, clock and data direction are the same, write data can be transferred synchronous with CLK, regardless of transmission line delay. For read operations, clock and data direction are opposite; the read data received by Host is delayed by round-trip delay, output delay and latency of Host and Device. For reads, the Host needs to have an adjustable sampling point to reliably receive the incoming dataFigure 2 — Host and Device Block Diagram____________________________________________________________________________________________________________________CONFIDENTIAL9Flash Storage Specification©2014 Kingston Solutions Inc.2. e •MMC ™ Functional Description4.1 e •MMC ™ OverviewAll communication between host and device are controlled by the host (master). The host sends a command, which results in a device response. For more details, refer to section 6.1 of the JEDEC Standard Specification No.JESD84-B50.Five operation modes are defined for the e •MMC ™ system (hosts and devices): • Boot operation mode• Device identification mode • Interrupt mode • Data transfer mode • Inactive mode4.2 Boot Operation ModeIn boot operation mode, the master (e •MMC ™ host) can read boot data from the slave (e •MMC ™ device) by keeping CMD line low or sending CMD0 with argument + 0xFFFFFFFA, before issuing CMD1. The data can be read from either boot area or user area depending on register setting. For more details, refer to section 6.3 of the JEDEC Standard Specification No.JESD84-B50.4.3 Device Identification ModeWhile in device identification mode the host resets the device , validates operation voltage range and access mode, identifies the device and assigns a Relative device Address (RCA) to the device on the bus. All data communication in the Device Identification Mode uses the command line (CMD) only. For more details, refer to section 6.4 of the JEDEC Standard Specification No.JESD84-B50.4.4 Interrupt ModeThe interrupt mode on the e •MMC ™ system enables the master (e •MMC ™ host) to grant the transmission allowance to the slaves (Device) simultaneously. This mode reduces the polling load for the host and hence, the power consumption of the system, while maintaining adequate responsiveness of the host to a Device request for service. Supporting e •MMC ™ interrupt mode is an option, both for the host and the Device. For more details, refer to section 6.5 of the JEDEC Standard Specification No.JESD84-B50.4.5 Data Transfer ModeWhen the Device is in Stand-by State, communication over the CMD and DAT lines will be performed in push-pull mode. For more details, refer to section 6.6 of the JEDEC Standard Specification No.JESD84-B50.____________________________________________________________________________________________________________________CONFIDENTIAL10Flash Storage Specification©2014 Kingston Solutions Inc.4.5.1 Data ReadThe DAT0-DAT7 bus line levels are high when no data is transmitted. For more details, refer to section 6.6.10 of the JEDEC Standard Specification No.JESD84-B50.4.5.2 Data WriteThe data transfer format of write operation is similar to the data read. For more details, refer to section 6.6.11 of the JEDEC Standard Specification No.JESD84-B50.4.5.3 EraseIn addition to the implicit erase executed by the Device as part of the write operation, provides a host explicit erase function. For more details, refer to section 6.6.12 of the JEDEC Standard Specification No.JESD84-B50.4.5.4 TRIMThe TRIM operation is similar to the default erase operation described (See Section 6.6.12 of JESD84-B50). The TRIM function applies the erase operation to write blocks instead of erase groups. The TRIM function allows the host to identify data that is no longer required so that the Device can erase the data if necessary during background erase events. For more details, refer to section 6.6.13 of the JEDEC Standard Specification No.JESD84-B50.4.5.5 SanitizeThe Sanitize operation is a feature, in addition to TRIM and Erase that is used to remove data from the device. The use of the Sanitize operation requires the device to physically remove data from the unmapped user address space. For more details, refer to section 6.6.14 of the JEDEC Standard Specification No.JESD84-B50.4.5.6 DiscardThe Discard is similar operation to TRIM. The Discard function allows the host to identify data that is no longer required so that the device can erase the data if necessary during background erase events. For more details, refer to section 6.6.15 of the JEDEC Standard Specification No.JESD84-B50.4.5.7 Write Protect ManagementIn order to allow the host to protect data against erase or write, the e •MMC ™ shall support two levels of write protect commands. For more details, refer to section 6.6.18 of the JEDEC Standard Specification No.JESD84-B50.4.5.8 Application-Specific CommandsThe e •MMC ™ system is designed to provide a standard interface for a variety applications types. In this environment, it is anticipated that there will be a need for specific customers/applications____________________________________________________________________________________________________________________CONFIDENTIAL11Flash Storage Specification©2014 Kingston Solutions Inc.features. For more details, refer to section 6.6.23 of the JEDEC Standard Specification No.JESD84-B50.4.5.9 Sleep (CMD5)A Device may be switched between a Sleep state and a Standby state by SLEEP/AWAKE (CMD5). In the Sleep state the power consumption of the memory device is minimized. For more details, refer to section 6.6.24 of the JEDEC Standard Specification No.JESD84-B50.4.5.10 Replay Protected Memory BlockA signed access to a Replay Protected Memory Block is provided. This function provides means for the system to store data to the specific memory area in an authenticated and replay protected manner. For more details, refer to section 6.6.25 of the JEDEC Standard Specification No.JESD84-B50.4.5.11 Dual Data Rate Mode SelectionAfter the host verifies that the Device complies with version 4.4, or higher, of this standard, and supports dual data rate mode, it may enable the dual data rate data transfer mode in the Device. For more details, refer to section 6.6.26 of the JEDEC Standard Specification No.JESD84-B50.4.5.12 Dual Data Rate Mode OperationAfter the Device has been enabled for dual data rate operating mode, the block length parameter of CMD17, CMD18, CMD24, CMD25 and CMD56 automatically default to 512 bytes and cannot be changed by CMD16 (SET_BLOCKLEN) command which becomes illegal in this mode. For more details, refer to section 6.6.27 of the JEDEC Standard Specification No.JESD84-B50.4.5.13 Background OperationsDevices have various maintenance operations need to perform internally. In order to reduce latencies during time critical operations like read and write, it is better to execute maintenance operations in other times – when the host is not being serviced. For more details, refer to section 6.6.28 of the JEDEC Standard Specification No.JESD84-B50.4.5.14 High Priority Interrupt (HPI)In some scenarios, different types of data on the device may have different priorities for the host. For example, writing operation may be time consuming and therefore there might be a need to suppress the writing to allow demand paging requests in order to launch a process when requested by the user. For more details, refer to section 6.6.29 of the JEDEC Standard Specification No.JESD84-B50.4.5.15 Context ManagementTo better differentiate between large sequential operations and small random operations, and to improve multitasking support, contexts can be associated with groups of read or write____________________________________________________________________________________________________________________CONFIDENTIAL12Flash Storage Specification©2014 Kingston Solutions Inc.commands. Associating a group of commands with a single context allows the device to optimize handling of the data. For more details, refer to section 6.6.30 of the JEDEC Standard Specification No.JESD84-B50.4.5.16 Data Tag MechanismThe mechanism permits the device to receive from the host information about specific data types (for instance file system metadata, time-stamps, configuration parameters, etc.). The information is conveyed before a write multiple blocks operation at well-defined addresses. By receiving this information the device can improve the access rate during the following read and update operations and offer a more reliable and robust storage. For more details, refer to section 6.6.31 of the JEDEC Standard Specification No.JESD84-B50.4.5.17 Packed CommandsRead and write commands can be packed in groups of commands (either all read or all write) that transfer the data for all commands in the group in one transfer on the bus, to reduce overheads. For more details, refer to section 6.6.32 of the JEDEC Standard Specification No.JESD84-B50.4.5.18 Real Time Clock InformationProviding real time clock information to the device may be useful for internal maintenance operations. Host may provide either absolute time (based on UTC) if available, or relative time. This feature provides a mechanism for the host to update both real time clock and relative time updates (see CMD49). For more details, refer to section 6.6.38 of the JEDEC Standard Specification No.JESD84-B50.4.5.19 Power Off NotificationThe host should notify the device before it powers the device off. This allows the device to better prepare itself for being powered off. For more details, refer to section 6.6.39 of the JEDEC Standard Specification No.JESD84-B50.4.6 Inactive ModeThe device will enter inactive mode if either the device operating voltage range or access mode is not valid. The device can also enter inactive mode with GO_INACTIVE_STATE command (CMD15). The device will reset to Pre-idle state with power cycle. For more details, refer to section 6.1 of the JEDEC Standard Specification No.JESD84-B50.4.7 Clock ControlThe e •MMC ™ bus clock signal can be used by the host to put the Device into energy saving mode, or to control the data flow (to avoid under-run or over-run conditions) on the bus. The host is allowed to lower the clock frequency or shut it down. For more details, refer to section 6.7 of the JEDEC Standard Specification No.JESD84-B50.____________________________________________________________________________________________________________________CONFIDENTIAL13Flash Storage Specification©2014 Kingston Solutions Inc.4.8 Error ConditionsRefer to section 6.8 of the JEDEC Standard Specification No.JESD84-B50.4.9 Minimum PerformanceRefer to section 6.9 of the JEDEC Standard Specification No.JESD84-B50.4.10 CommandsRefer to section 6.10 of the JEDEC Standard Specification No.JESD84-B50.4.11 Device State Transition TableRefer to section 6.11 of the JEDEC Standard Specification No.JESD84-B50.4.12 ResponsesRefer to section 6.12 of the JEDEC Standard Specification No.JESD84-B50.4.13 TimingsRefer to section 6.15 of the JEDEC Standard Specification No.JESD84-B50.4.14 H/W Reset OperationNote1: Device will detect the rising edge of RST_n signal to trigger internal reset sequenceFigure 3 – H/W Reset Waveform____________________________________________________________________________________________________________________CONFIDENTIAL14Flash Storage Specification©2014 Kingston Solutions Inc.Table 7 – H/W Reset Timing ParametersSymbol CommentMin MaxUnit tRSTW RST_n pulse width 1 [us] tRSCA RST_n to Command time 2001[us]tRSTHRST_n high period (interval time)1[us]Note1:74 cycles of clock signal required before issuing CMD1 or CMD0 with argument 0xFFFFFFFA4.15 Noise Filtering Timing for H/W ResetDevice must filter out 5ns or less pulse width for noise immunityDevice must not detect these rising edgeFigure 4 – Noise Filtering Timing for H/W ResetDevice must not detect 5ns or less of positive or negative RST_n pulse. Device must detect more than or equal to 1us of positive or negative RST_n pulse width.4.16 Field Firmware Update(FFU)Field Firmware Updates (FFU) enables features enhancement in the field. Using this mechanism the host downloads a new version of the firmware to the e.MMC device and, following a successful download, instructs the e.MMC device to install the new downloaded firmware into the device.In order to start the FFU process the host first checks if the e.MMC device supports FFUcapabilities by reading SUPPPORTED_MODES and FW_CONFIG fields in the EXT_CSD. If the e.MMC device supports the FFU feature the host may start the FFU process. The FFU process starts byswitching to FFU Mode in MODE_CONFIG field in the EXT_CSD. In FFU Mode host should use closed-ended or open ended commands for downloading the new firmware and reading vendor proprietary data. In this mode, the host should set the argument of these commands to be as defined in FFU_ARG field.____________________________________________________________________________________________________________________CONFIDENTIAL15Flash Storage Specification©2014 Kingston Solutions Inc.In case these commands have a different argument the device behavior is not defined and the FFU process may fail. The host should set Block Length to be DATA_SECTOR_SIZE. Downloadedfirmware bundle must be DATA_SECTOR_SIZE size aligned (internal padding of the bundle might be required).Once in FFU Mode the host may send the new firmware bundle to the device using one or more write commands.The host could regain regular functionality of write and read commands by setting MODE_CONFIG field in the EXT_CSD back to Normal state. Switching out of FFU Mode may abort the firmwaredownload operation. When host switched back to FFU Mode, the host should check the FFU Status to get indication about the number of sectors which were downloaded successfully by reading theNUMBER_OF_FW_SECTORS_CORRECTLY_PROGRAMMED in the extended CSD. In case the number of sectors which were downloaded successfully is zero the host should re-start downloading the new firmware bundle from its first sector. In case the number of sectors which were downloadedsuccessfully is positive the host should continue the download from the next sector, which would resume the firmware download operation.In case MODE_OPERATION_CODES field is not supported by the device the host sets to NORMAL state and initiates a CMD0/HW_Reset/Power cycle to install the new firmware. In such case the device doesn’t need to use NUMBER_OF_FW_SECTORS_CORRECTLY_PROGRAMMED.In both cases occurrence of a CMD0/HW_Reset/Power occurred before the host successfullydownloaded the new firmware bundle to the device may cause the firmware download process to be aborted.____________________________________________________________________________________________________________________CONFIDENTIAL16Flash Storage Specification©2014 Kingston Solutions Inc.4.17 Device Life time4.17.1 DEVICE LIFE TIME SET TYB BThis field provides an estimated indication about the device life time which is reflected by the averaged wear out of memory of Type B relative to its maximum estimated device life timeTable 8 – Device life time estimation type B valueValue Description 0x00 Not defined0x01 0% - 10% device life time used 0x02 10% -20% device life time used 0x03 20% -30% device life time used 0x04 30% - 40% device life time used 0x05 40% - 50% device life time used 0x06 50% - 60% device life time used 0x07 60% - 70% device life time used 0x08 70% - 80% device life time used 0x09 80% - 90% device life time used 0x0A 90% - 100% device life time used0x0B Exceeded its maximum estimated device life timeOthersReserved4.17.2 DEVICE LIFE TIME SET TYB AThis field provides an estimated indication about the device life time which is reflected by the averaged wear out of memory of Type A relative to its maximum estimated device life timeTable 9 – Device life time estimation type A valueValue Description 0x00 Not defined0x01 0% - 10% device life time used 0x02 10% -20% device life time used 0x03 20% -30% device life time used 0x04 30% - 40% device life time used 0x05 40% - 50% device life time used 0x0650% - 60% device life time used。
APMCM历年赛题与优秀论文-2014-2014-A51651
![APMCM历年赛题与优秀论文-2014-2014-A51651](https://img.taocdn.com/s3/m/3a9162948e9951e79a8927c1.png)
1 Introduction1.1 The research background and meaningOn September 25, 1999 by the group of eight finance ministers in Washington, dc, announced the formation of the group of 20 (G20) summit, the typical international economic cooperation BBS, wide coverage of the members of the group of 20 nations, the group's GDP accounted for 90% of the global economy trade accounted for 80%, has replaced the G8 as the main national economic cooperation BBS. The g20 leaders announced that the ninth summit 2016 G20 summit will be hosted by the Chinese.On November 16, 2014 in Australia's G20 leaders encountered security scare, the ninth summit at 40 points 7 am on Australian military scrambled two f-18s fighter investigation, lifted the panic. Meanwhile, U.S. President barack Obama Brisbane marriott hotel 15, there is a suspicious man, the police took him into custody and searched his two suitcases, party rule out the suspicious of the man. World leaders gathered for the G20 summit in Brisbane, security forces on high alert all the time, some 6000 police are patrolling the streets in Brisbane, more military personnel and volunteers for their support.Ensure the security of the leaders at the G20 meeting as host of the G20 summit in 2016 China must pay attention to the problem. Based on the above situation, according to the assumption, in this paper, the host of the 11th at the G20 summit of the Shanghai yangpu district for unmanned aerial vehicle (uav), the optimal monitoring scheme research, to ensure the smooth operation of the summit held a deep going analysis research.1.2Repeat problemThe Group of Twenty (also known as the G-20 or G20) is an international forum for the governments and central bank governors from 20 major economies. The 11 th G20 meeting will be held in China two years later. We assume that the final conference center locates in the Yangpu District of Shanghai. The host city need invest plenty of manpower the stability of the order of the city. As the development of unmanned aerial vehicle (UA V), it has been used in the field of the security. Now the government hires you to design a surveillance plan for the entire borough of Yangpu by the UA Vs. The current UA Vs are relatively robust to complicated external environment, can fly up to 4 hours without need to refuel, and require no human being to monitor each of them – instead, a sophisticated computerized controller can be programmed to follow any patrol strategy of your choice. The government requires your team to accomplish the following different plans:Requirement 1: All geographic point of Yangpu District should remain observed from the air for at least 1 5 minutes in a row. How many UA Vs will you need to achieve this goal?Requirement 2: Some parts of the district are more important, e.g. the neighborhood of Fudan University and the Wanda Plaza. Such areas should be observed at least once in each 5 minutes interval. On the other hand, some roads has lower density of people, and there is no need to observe it more than once in 20 minutes. How many UA Vs will you need to provide the requested variable level of coverage?Requirement 3: Assuming that all areas are equal important and should remain regularly observed, but some UA Vs are not reliable and 30% of them become unusable. What kind of surveillance coverage will your plan provide?2 Breaking Down the ProblemThis paper based on universal uav monitoring YangPu district of Shanghai the 11th at the G20 summit set three scenarios, combining with the universal uav photogrammetry system coefficient and YangPu district area, boundary, such as the actual situation, the preliminary analysis of the number of aircraft and unmanned aerial vehicle (uav) fully monitor the yangpu district need each aircraft flight time, probably need for further in-depth research and analysis of the various plans provide logical basis.2.1The basic idea(1)Relationship between vision camera focal length and areaThere is a certain relationship between Vision camera focal length and Angle of view. Traditional size of 35 mm film camera, 35 mm is the width of the film (including perforation part), 35 mm film of the photosensitive area of 36 x 24 mm, conversion to the digital camera, the closer the diagonal length is 43.2 mm, surface, the greater the CCD/CMOS ruler in digital SLR camera, many of them are closed to 35 mm film sensitive CCD/CMOS size. Vision camera focal length and area as shown in figure 2-1(the relationship between the focal length and the area)F igure 2-1 the relationship between camera focal length and area (2) Determination the hight of aerial photographyShow the relationship between camera focal length and area, the aerial photography to determine the flying height of ground resolution aerial photography (GSD) depends on the flying height, the formula is:a f f GSL h GSD h a *=⇒=In the formula: - flying height; - the lens focal length (50 mm); Size - phase (9 microns); GSD - ground resolution.Figure 2-2 aerial photography course high figure(3) This thesis select camera lens in the photogrammetric system for unmanned aerial vehicle (uav) of 50 mm, because the photography unmanned aerial vehicle (uav) photography image to get used to make into a map scale of 1:2000 scale digital products (DEM, DOM, DLG),ground resolution aerial images (GSD) should be 20 cm, combining the above theory, the numerical calculation to obtain corresponding GSD flight height is 1100 m. Unmanned aerial vehicle (uav) monitoring scope radius:tan (/2)0.4669r h km θ=⋅=Monitoring scope: 22圆0.6849s r km π==2.1.1The analysis method of plan 1Based on material information, the current drones on the complicated external environment also lasted four hours flight, because of the above of the photogrammetric system of unmanned aerial vehicle (uav) in selected parameters, analysis and calculation, the monitoring process will monitor access to images into digital products, is the lens focal length for the unmanned aerial vehicle (uav) of 50 mm in practical monitoring in flight altitude h = 1100 m, the monitoring area of 0.6849 km 2, known in Shanghai YangPu district region covers an area of 60.61 square kilometers, slightly to estimate a drone flying at the beginning of the time required to complete a YangPu district for 1h 37. 614 min, a preliminary estimate the required number of unmanned aerial vehicle (uav) for eight or nine. Further analysis of the question, where all meet the YangPu district under the premise of not from monitoring status for more than 15 minutes, with at least a unmanned aerial vehicle (uav) to ensure the smooth convening of the 11th session of the group of 20 summit, this paper converts the problem to optimize each uav flight path, in the same way in local optimum global optimal principle, namely, calculated by using genetic algorithm (ga) draw a drone to monitor the entire YangPu district all the region of the shortest path, through the path length and the kinematics formula principle of conversion between unmanned aerial vehicle (uav) flight speed, it is concluded that the number of unmanned aerial vehicle (uav) will need at least2.1.2he analysis method of plan 2According to the overall characteristics of uneven distribution of population, the 11th during the G20, YangPu district of points around the traffic changes over the site location and environment, the location of the stream of the existing safety problems more sparsely populated place, must be more to the place where the stream of security monitoring. On the 11th of the G20 summit in safety monitoring plan 2 requests for traffic is relatively large area at least once every 5 minutes be monitored, and traffic was relatively small area of more than 20 minutes can be monitored at a time, targeted to strengthen regional security monitoring can effectively guarantee the smooth convening of the 11th at the G20 summit. Scheme 2 is different from 1, joined the traffic was a variableconstraint conditions of path planning for uav monitoring with regional population in general population density can response traffic situation, this article first to various streets of the YangPu district population density clustering analysis, the YangPu district area according to the population density is divided into three levels, the largest population density control of unmanned aerial vehicle (uav) at least once every 5 minutes to monitor, population density of the larger regional control of unmanned aerial vehicle (uav) is not 15 minutes from the monitoring status, while the population density of the smaller regional control of unmanned aerial vehicle (uav) monitoring can be more than 20 minutes at a time; based on the first plan of the proceeds of the unmanned aerial vehicle (uav) optimal control path trajectory, made up of the two dimensional plane figure as the initialization of graphics, analysis, study and using the core idea of simulated annealing algorithm, to meet different segments of the population flow level under the premise of monitoring time interval, to initialize graphics to fill each flow level area, it is concluded that the traffic density area the required number of unmanned aerial vehicle (uav), finally will add up the number of each area, namely get number of unmanned aerial vehicle (uav) needed to plan at least2.1.3The analysis method of plan 3To identify all areas as the same important, all areas that are not more than 15 minutes from monitoring status, the problem of dealing with plan 1's handling of the same, the difference is due to the failure, lead to 30% of the unmanned aerial vehicle (uav) have been unable to use, is based on the required number of unmanned aerial vehicle (uav) plan 1 calculation shows that only provide 6 drone to monitor yangpu district; 6 drone how to make the monitoring area of the largest, processing logic is similar to plan 2, based on the unmanned aerial vehicle (uav) for 15 minutes can monitor the biggest area, on the basis of YangPu district map shape, initialize the 6 shapes, the basis of the optimal still using simulated annealing algorithm, the overlap between the six basic graphics area as small as possible and position to YangPu district center, finally calculated the six basic shapes cover the size of the total area of the YangPu district is only 70% of the unmanned aerial vehicle (uav) monitoring can provide the largest range of monitoring.3 Assumptions(1)Assume that regardless of yangpu poor population of district distributi on throughout every street, that every street population density as the same everywhere(2) The unmanned aerial vehicle (uav) flight trajectory of two-dimensional infinite plane figure area close to the person flow levelthe actual required scope of monitoring area;(3) Every moment uav monitoring scope of regional gap between the negligible.4 symbols instructions4 Nomenclatures5The optimal path model of unmanned aerial vehicles(uavs) based on genetic algorithm5.1The representation of a uav flight pathUnmanned aerial vehicle (uav) flight trajectory can be expressed as a series of trajectory planning space, connected by straight line between adjacent track points, any path is actually a composition of nodes sequence{}121,,,...,,n S P P P G -S as the begin pointG as the end point121,,...,n P P P -as the middle path nodeFigure 5-4 shows a flight path planning area.Figure 5-4 flight trajectory The flight trajectory which is expressed as a series of nodes connectionwill flight trajectories nodes are as follows: the purpose of the first can be Nomenclatures symbolic基S imagesθ Basic graphics movement direction and the x axis Anglef Penalty function 0.999T = Lower temperature slowlyN flight pathpath(,)xx yy flight pathpathLThe shortest flight pathpathachieved by adjusting the node number of the flying track any expected accuracy; And the original programming problem is decomposed into a series of smaller sub-problems, in each subproblem, what the paper study is only the coordinates of a point. Examine whether the flight path satisfy the constraint conditions into consideration a point or a line whether meet the constraint condition; Finally, the path planning problem is confined to a series of flight path points, is advantageous for the realization of parallel and distributed computing [1].Yangpu district is located in the northeast of Shanghai central city, located in huangpu river downstream northwest, and the pudong new area, hongkou district in the west, north and baoshan border. On the scale of 1:2000 baidu map display as shown in figure 5-1, part of the actual area shown in the figure is 2201S kmFigure 5-1 yangpu district mapTo preprocessingly deal with figure 5-1 by MATLAB, steps are as follows:(1) First,put it in the 450 x 300 2d coordinate system, radius of uav monitoring scope.Conversion to the coordinate system of 10.3068 cm, use matlab to fitting the figure 5-1 in yangpu district boundary, namely the function of the red line;(2) Defined within the scope of the Curve fitting functions, randomly generated Randomly generated. The circle Is allowed within a certain scope of radius;(3)It will be generated in the first of a circle circle coordinates into the Cu rve fitting functions formula, is invisible to the size, judge whether the cir cle in the Curve fitting functions scope, if within the scope of the Curve fi tting functions, the center of the circle is fixed, if ever, to that point to con tinue moving;(4) After moving point is defined as the first circle, if the distance between the circle‘s center and the circle’s within the scope of , thecentre point is fixed, otherwise the centre point moving;(5) In this loop, fixed the centre point till they are equal to the total, stop t he circulation and preprocessing steps over, finally get the radius of a circ le covered the yangpu district map, as shown in figure 5-2 ;(6) To further deal with FIG. 5-2, remove the circle, marks the centre point of all circles in the figure, it is concluded that the unmanned aerial vehicle (uav) to monitor the entire yangpu district series of flight path node graph, as shown in figure 5-3:Figure 5-2 after the pretreatment of graphic Figure 5-3 monitoring flight path nodeAt this point, through the graphics, the problem of unmanned aerial vehicle (uav) monitoring flight paths satisfy all place not from monitoring state constraint conditions, more than 15 minutes into consideration uav monitoring flight path node, flight path whether meet the constraint condition; Finally, unmanned aerial vehicle (uav) flight path planning problem is confined to a flight path node, to facilitate the use of genetic algorithm on the analysis of unmanned aerial vehicle (uav), the optimal flight path planning.5.2The basic principle of genetic algorithmGenetic Algorithm (based Algorithm) is a kind of reference to the evolution rule of biology (survival of the fittest, superior bad discard Genetic mechanisms) evolved random search method. Tt is first proposed by the Professor of United States J.Holland in 1975, its main characteristic is directly on the object structure, there is no continuity of derivative and function limit; Has intrinsic implicit parallelism and global optimization ability; Using probability optimization method, which can automatically acquire and to guide the optimization of search space,adaptively adjust the search direction, do not need to make sure the rules. The properties of genetic algorithm, has been widely used in combinatorial optimization, machine learning, signal processing, adaptive control and artificial life, etc. It is a modern one of the key technologies of intelligent computing.Operation process of genetic algorithm including coding, generating initial population, fitness value evaluation testing, selection, crossover and mutation of six parts, the following respectively do a brief introduction:(1) Code: skill according to the solution space, as a form of phenotype of genetic algorithm. From phenotype to genotype map, called encoding. Genetic algorithm in searching the solution space before skill, according to genetic said into space of genotype data string structure, the different combinations of these string structure data into different points.(2)The generation of initial population:randomly generated a series of data structure, each string of data structure known as an individual, an individual constitute a group. Genetic algorithm (ga) with this string structure as the initial point iteration. Set the evolution algebra counter; Set the maximum evolution algebra; Randomly generated individuals as the initial group;(3) The fitness value evaluation tests[2]: pros and cons of fitness function indicates that an individual or a solution. To the problem of different fitness function defined in a different way. According to the specific question, calculating the fitness of the individuals in groups.(4) Choice: will select operator acting on the group, according to the size of the fitness function value, high fitness individuals selected for the next step of operation.(5) The cross: the crossover operator acting on the group, crossover operation to crossover probability random group of individuals to cross in the position of the randomly generated.(6) Variation: to mutation operator role in groups, mutation in mutation probability of randomly selected individuals based on a variation, get new individual.5.3 Unmanned aerial vehicles (uavs) based on genetic algorithm the optimal pathOperation process, based on genetic algorithm for uav monitoring shortest path model is as follows:(1) Establish the flight space modelUnmanned aerial vehicle (uav) flight refers to the physical space, from its starting point to its maximum range to reach the area. Path planning space is actually a preset area, this area is the task of the unmanned aerialvehicle (uav) monitoring area. Path planning in this paper is based on the area twice in monitoring time, the route planning for unmanned aerial vehicle, in order to meet the regional monitoring time interval conditions, make track for the best, the required number of unmanned aerial vehicle (uav) at least;(2) Select the initial pointsBy the method of Brute force in unmanned aerial vehicle (uav) flight space model select the unmanned aerial vehicle (uav) flight starting point S (the end point as well)from a series of flight path node, 121,,...,n P P P as the middle path node;(3)Arrange all of the middle path nodN toconcluded that all possible trajectories monitoring area;Figure 5-4 part of the flight path path chart(4)Getting the coordinates00(x ,y ) of the starting point of the optimal flightpath Lby comparing size thelength of all the optimal flight path N .Use the MATLAB editing genetic algorithm, itis concluded that the short est flight path is:,=209.0776L km flight path trajectory as shown in figure 5-5figure 5-5 The optimal flight path trajectory5.4The optimal path of aircraft based on unmanned aerial vehicle (uav) is calculatedRelevant data shows drone aircraft speed range in general in 0 km/h to 100 km/h, through physics kinematics formula:15L t v tnumber min ⎧=⎪⎪⎨⎪=⎪⎩The optimal path trajectory calculation length =209.0776L km on the plug type, get the least need number of drones: =8.3132number , namely all areas in YangPu district under the condition of not more than 15 minutes from monitoring state, the number of unmanned aerial vehicle (uav) will need at least nine.6The unmanned aerial vehicle (uav) to monitor regional planning mo del based on simulated annealing algorithm6.1Based on the yangpu district zoning street traffic dataPort of huangpu river tributaries poplar distributes throughout the area in the north and south, YangPu that evolution of the name. The huangpu river coastline of 15.5 kilometers (including Renaissance island), dalian road, YangPu bridge and xiang Yin road, war industry road (under construction) 3 roas tunnel and six river ferry lines connected to thepudong new area.Log in YangPu district bureau of statistics, because usually, the population density can response distribution of visitors, so the analysis of the selected data shown in the table below:Bridge street 2826328494Pingliang street road 3107530876Jiangpu street road 3145431454Siping street road 3561435720Kongjiang street road 3484834897Changbaixinchun street 2075820743Yanjixinchun street 3751736981Yinxing street road 1941619302Wuyangchang street 1557315537Wuyangchang town 1101911105Xinjiangwang street 10741187Horizontal analysis table, 2011-2012 statistical yearbook of YangPu district population density of the data in the streets, that every year the streets population density were similar, so one year selected numerical as population density, street analysis to estimate the traffic around the YangPu district and hierarchy of data on the basis of a certain scientific. Extract YangPu district administrative division table data in statistical yearbook 2012 is as follows:Table 6-2 YangPu district statistical yearbook 2012 administrative divisionStreet,town Land area(km^2)populationpopulationdensityresidentscommitteetotal 60.61 1092280 18021 307 Dinghai street road 7.02 90516 12894 19Bridge street 4.36 124236 28494 28Pingliang street road 3.44 106212 30876 29Jiangpu street road 2.39 75175 31454 24Siping street road 2.71 96801 35720 22Kongjiang street road 2.39 83403 34897 25Changbaixinchun street 3.05 63240 20734 16Yanjixinchun street 2.05 75812 36981 17Yinxing street road 7.40 142837 19302 49Wuyangchang street 7.61 118234 15537 31Wuyangchang town 9.50 105497 11105 42Xinjiangwang street 8.69 10317 1187 5(Note: the land area provided by the planning bureau of surveying and mapping data, thepopulation of data by the public security bureau.)Kmeans clustering method is based on partitioning, is one of the top ten classic data mining algorithm. Kmeans algorithm the basic idea is: through a user specified cluster number k, random selection of k objects as the initial clustering center, object classification of closest to them. Through iterative method, successive update value of each clustercenter until standard measurement function began to convergence3.With the help of MA TLAB, the streets in table 6-2 population density of kmeans clustering analysis, the results shown in figure such as 6-3:Figure 6-3 streets population density clustering analysis diagramFigure 6-3 in YangPu district the streets according to the population density is divided into bigger population density, population density and population density of small three categories, and mark out all kinds of center; Classification based on the streets, map as shown in 6-4:Figure 6-4 street zoning mapArea because of the large population density during the 11th at the G20 s ummit, the greater the visitors so targeted to the population density of the large regional regulations once every 5 minutes by unmanned aerial vehic le (uav) monitoring; large Population density of area is not out of monitor ing the status for more than 15 minutes; Small population density area ca n be monitored more than 20 minutes at a time.Based on the results of YangPu district traffic hierarchy, this paper will re search direction to how to plan the regional internal unmanned aerial vehicle (uav) to monitor the optimal trajectory, to minimize the number of un manned aerial vehicle (uav) needed for monitoring work.6.2The basic principle of simulated annealing algorithmMethod in the optimization algorithm, because of its different, so it can be divided into two kinds, one kind is to use the function of the first or second order derivative, known as the analytical method, another kind is only using the information of function value itself, called the direct method, simulated annealing algorithm (SA) belong to the optimization algorithm of the second category. It is presented in recent years, as a kind of suitable for solving large-scale combinatorial optimization problem of general effective approximate algorithm, is an extension of the local search algorithm. In theory, it is a global optimal algorithm is proposed. Simulated annealing algorithm (SA) is the result of the study of solid annealing process, the algorithm of thought is put forward by Metropolis in 1953; Kirkpatrick, in 1982 successfully applied in combinatorial optimization problem. The physical properties of solid annealing process is the physical background of simulated annealing algorithm, Metropolis accept standards make jumping out of local optimal algorithm "trap"[4]. Simulated annealing algorithm is a basic description:(1) The initialization: initial temperature T , the initial solution state S (is the starting point of iteration algorithm), every T value iteration times L ;(2) For 1k = to L , L time to do the first step (3) to (6)(3) Produce the new solution S '(4) Calculatethe incremental ()()t C S C S ''=-, C(S) as the evaluation function;(5) If 0t '>,S ' is accepted as a new current solution, or otherwise accepted S ' with probability exp(/)t T - as a new current solution;(6) If meet the termination conditions, the output current solution as the optimal solution, the end of the program. Termination conditions off for several consecutive data processing usually is not accept termination algorithm;(7) T reduce gradually, and 0T >, then go to step 2.Flow chart of 6-1:Figure 6-1 flow chart of simulated annealing algorithmThe third step is to determine whether the new is accepted, the basis of judgment is an accepted principle, the most common accepted rule is rule of Metropolis: if 0t '> , S 'is accepted as a new current solution S ,else and S 'is accept as the new current solution S with the probability exp(/)t T '-.The fourth step is when the new is sure to accept and use new to replace the current solution, this just put the current solution corresponding to produce transformation in the new parts have to be addressed, fixed objective function value at the same time. At this point, the current solution implements an iteration. Can begin to the next round of experiments based on this. While when data processing was judged to be abandoned, on the basis of the current solution is to continue to the next round of testing [5].6.3Capacity constraints analysis modelCapacity constraints, monitoring area required for uav monitoring number problem can be described as: with the time needed for regional monitoring meet each traffic class conditions, with a minimum number of unmanned aerial vehicle (uav) to monitor person flow level area, each level is an area of a certain size, unmanned aerial vehicle (uav), the optimal path of two-dimensional plane figure.YangPu district were calculated based on simulated annealing algorithm, all the places not from monitoring status for more than 15 minutes at least the number of unmanned aerial vehicle (uav) steps are as follows:On the basis of the research level of traffic zone area of graphics, artificial initialization uav optimal monitoring path constitute the basis of graphics, in a traffic rank area a random initialization m points, as thexx yy.center of the basic shapes of (,)Figure 6-2 unmanned aerial vehicle (uav) constitute the basis ofthe optimal monitoring path graph combination(1) The level of the traffic area all initialized to point coordinates of 1each element matrixT, have been a center of the graphic calculation1equation of the midline ()(:,2)(:,1)()θββθy x tan tan=⋅+-⋅, initialize the movement in each level traffic area of 25 size is 100 * 100 square, define the square center movement in the range of [1, 1], and the direction of the next movement with the x axis Angle θ, θchange in the range of[pi/2,pi/2]-;(2) The graphic matrix 1T after a movement, whether central point intraffic area within the scope of the grade, if not, then continue to point at which a mobile, if yes, then a fixed point, record the position of the center point coordinates and graphics within the area covered by the coordinates, of all points that graphic matrixT;2(3) Such as graphics overlap between matrix, the corresponding graphicsoverlap matrix elements within one to one correspondence together; (4) Recording and person flow level area overlap the area of thecorresponding graph matrix addition, it is concluded that the numerical as punishment function ;。
ETAP 7.5 中文用户手册 44-29 第二十九章 最佳电容器位置
![ETAP 7.5 中文用户手册 44-29 第二十九章 最佳电容器位置](https://img.taocdn.com/s3/m/46322784680203d8ce2f24e7.png)
第二十九章最佳电容器位置(Optimal Capacitor Placement)绪论(Introduction)大多数电力系统运行在由电感负荷及传输设备(线路和变压器)引起的一个滞后的功率因数状态下。
电力系统本身是感性的,并且需要从电网中获得额外的无功功率潮流。
但是过多的无功功率需求将导致减少系统容量,增加损耗并降低电压以及高昂费用。
并联电容器组能够补偿无功需求,但是并联电容器组的尺寸,位置,电容器控制方法和考虑成本也是重要的问题,这就需要在设计相期间最优。
一种理想的解决方案就是电容器布置能够考虑所有的因素和复合级别。
在使总的安装和操作费用为最小的同时,该解决方案也应该能为电压补偿和功率因数修正放置电容器。
ETAP现在提供了一种在它的最佳电容器位置(OCP)模块的应用。
依照IEEE标准1036-1992(IEEE并联电容应用指导),并联电容的目的是:目的收益无功补偿这将对输电系统产生一个主要的收益,并对配电系统产生一个间接收益。
电压控制这将对输电系统和配电系统同时产生一个主要的收益。
系统容量增加这将对输电系统产生一个间接收益,并对配电系统产生一个主要的收益。
系统功率损耗减小系统功率损耗减小这将对输电系统产生一个间接的收益,并对配电系统产生一个主要的收益。
费用减少列表这不适用于输电系统,但是可以得出配电系统的初步效益。
在功率系统中放置并联电容,你必须完成以下任务:•决定电容器组数•确定连接位置•确定一个控制方式•确定一个连接类型(Y型或三角形)你可以确定电容器大小和电压补偿的适当位置以及不同方式下的功率因数修正。
一个普遍的方法是基于应用“经验方法”技巧,然后通过运行多重潮流分析来微调大小和位置。
不幸的是这个方法可能不能得出最优的解决办法。
同时对于大系统它可能是费时和不切实际的。
算术地决定电容器大小和位置的同时使费用最小也是一个重要的问题。
因为这是一个最优化的观点,所以你应该使用一个最优的方法。
这也正是ETAP OCP 模块优秀的地方。
智能电网--HEMS、CEMS Community Energy Management System
![智能电网--HEMS、CEMS Community Energy Management System](https://img.taocdn.com/s3/m/90063317866fb84ae45c8d71.png)
智能电网、CEMS(Community Energy Management System)、HEMS(Home Energy Management System)的系统分析、结构设计、方式设计、原型开发以及应用型项目的实施与开发。
文献综述与回顾Evaluating the benefits of an electrical energy storage system in a future smart gridInterest in electrical energy storage systems is increasing as the opportunities for their application become more compelling in an industry with a back-drop of ageing assets, increasing distributed generation and a desire to transform networks into Smart Grids. A field trial of an energy storage system designed and built by ABB is taking place on a section of 11 kV distribution network operated by EDF Energy Networks in Great Britain. This paper reports on the findings from simulation software developed at Durham University that evaluates the benefits brought by operating an energy storage system in response to multiple events on multiple networks. The tool manages the allocation of a finite energy resource to achieve the most beneficial shared operation across two adjacent areas of distribution network. Simulations account for the key energy storage system parameters of capacity and power rating. Results for events requiring voltage control and power flow management show how the choice of operating strategy influences the benefits achieved. The wider implications of these results are discussed to provide an assessment of the role of electrical energy storage systems in future Smart Grids.Planning of community-scale renewable energy management systems in a mixed stochastic and fuzzy environmentIn this study, an interval-parameter superiority–inferiority-based two-stage programming model has been developed for supporting community-scale renewable energy management (ISITSP-CREM). This method is based on an integration of the existing interval linear programming (ILP), two-stage programming (TSP) and superiority–inferiority-based fuzzy-stochastic programming (SI-FSP). It allows uncertainties presented as both probability/possibilistic distributions and interval values to be incorporated within a general optimization framework, facilitating the reflection of multiple uncertainties and complexities during the process of renewable energy management systems planning. ISITSP-CREM can also be used for effectively addressing dynamic interrelationships between renewable energy availabilities, economic penalties and electricity-generation deficiencies within a community scale. Thus, complexities in renewable energy management systems can be systematically reflected, highly enhancing applicability of the modeling process. The developed method has then been applied to a case of long-term renewable energy management planning for three communities. Useful solutions for the planning of renewable energy management systems have been generated. Interval solutions associated with different energy availabilities and economic penalties have been obtained. They can be used for generating decision alternatives and thus help decision makers identify desired policies under various economic and system-reliability constraints. The generated solutions can also provide desired energy resource/service allocation plans with a minimizedsystem cost (or economic penalties), a maximized system reliability level and a maximized energy security. Tradeoffs between system costs and energy security can also be tackled. Higher costs will increase potential energy generation amount, while a desire for lower system costs will run into a risk of energy deficiency. They are helpful for supporting: (a) adjustment or justification of allocation patterns of renewable energy resources and services, (b) formulation of local policies regarding energy utilization, economic development and energy structure under various energy availabilities and policy interventions, and (c) analysis of interactions among economic cost, system reliability and energy-supply shortage.Community-scale renewable energy systems planning under uncertainty—An interval chance-constrained programming approachIn this study, an inexact community-scale energy model (ICS-EM) has been developed for planning renewable energy management (REM) systems under uncertainty. This method is based on an integration of the existing interval linear programming (ILP), chance-constrained programming (CCP) and mixed integer linear programming (MILP) techniques. ICS-EM allows uncertainties presented as both probability distributions and interval values to be incorporated within a general optimization framework. It can also facilitate capacity-expansion planning for energy-production facilities within a multi-period and multi-option context. Complexities in energy management systems can be systematically reflected, thus applicability of the modeling process can be highly enhanced. The developed method has then been applied to a case of long-term renewable energy management planning for three communities. Useful solutions for the planning of energy management systems have been generated. Interval solutions associated with different risk levels of constraint violation have been obtained. They can be used for generating decision alternatives and thus help decision makers identify desired policies under various economic and system-reliability constraints. The generated solutions can also provide desired energy resource/service allocation and capacity-expansion plans with a minimized system cost, a maximized system reliability and a maximized energy security. Tradeoffs between system costs and constraint-violation risks can also be tackled. Higher costs will increase system stability, while a desire for lower system costs will run into a risk of potential instability of the management system. They are helpful for supporting (a) adjustment or justification of allocation patterns of energy resources and services, (b) formulation of local policies regarding energy consumption, economic development and energy structure, and (c) analysis of interactions among economic cost, system reliability and energy-supply security.Government management and implementation of national real-time energy monitoring system for China large-scale public buildingThe supervision of energy efficiency in government office buildings and large-scale public buildings (GOBLPB) is the main embodiment for government implementation of Public Administration in the fields of resource saving and environmental protection. It is significant for China government to achieve the target: reducing building energy consumption by 11 million tonstandard coal before 2010. In the framework of a national demonstration project concerning the energy management system, Shenzhen Municipality has been selected for the implementation of the system. A data acquisition system and a methodology concerning the energy consumption of the GOBLPB have been developed. This paper summarizes the various features of the system incorporated into identifying the building consumes and energy saving potential. This paper also defines the methods to achieve the real-time monitoring and diagnosis: the meters installed at each building, the data transmitted through internet to a center server, the analysis and unification at the center server and the publication through web. Furthermore, this paper introduces the plans to implement the system and to extend countrywide. Finally, this paper presents some measurements to achieve a common benefit community in implementation of building energy efficiency supervisory system on GOBLPB in its construction, reconstruction or operation stages.A conceptual framework for the vehicle-to-grid (V2G) implementationThe paper focuses on presenting a proposed framework to effectively integrate the aggregated battery vehicles into the grid as distributed energy resources to act as controllable loads to levelize the demand on the system during off-peak conditions and as a generation/storage device during the day to provide capacity and energy services to the grid. The paper also presents practical approaches for two key implementation steps –computer/communication/control network and incentive program.Predictive optimal management method for the control of polygeneration systemsA predictive optimal control system for micro-cogeneration in domestic applications has been developed. This system aims at integrating stochastic inhabitant behavior and meteorological conditions as well as modelling imprecisions, while defining operation strategies that maximize the efficiency of the system taking into account the performances, the storage capacities and the electricity market opportunities.Numerical data of an average single family house has been taken as case study. The predictive optimal controller uses mixed-integer and linear programming where energy conversion and energy services models are defined as a set of linear constraints. Integer variables model the start-up and shut-down operations as well as the load dependent efficiency of the cogeneration unit. The proposed control system has been validated using more complex building and technology models to asses model inaccuracies. Typical demand profiles for stochastic factors have been used.The system is evaluated in the perspective of its usage in Virtual Power Plants applications. Power system DNP3 data object security using data setsPower system cyber security demand is escalating with the increased number of security incidents and the increased stakeholder participation in power system operations, specifically consumers. Rule-based cyber security is proposed for Distributed Network Protocol (DNP3) outstation devices, with a focus on smart distribution system devices. The security utilizes the DNP3 application layer function codes and data objects to determine data access authorization for outstations, augmenting other security solutions that include firewalls, encryption, and authentication. The cyber security proposed in this article protects outstation devices when masters are compromised or attempt unauthorized access that bypass the other security solutions. In this article, non-utility stakeholder data access is limited through DNP3 data sets rather than granting direct access to the data points within an outstation. The data set utilization greatly constrains possible attack methods against a device by reducing the interaction capabilities with an outstation. The data sets also decrease the security complexity through rule reduction, thereby increasing the security applicability for retrofitted or process constrained devices. Temporal security constraints are supported for the data sets, increasing security against denial of service attacks.The feasibility of renewable energies at an off-grid community in CanadaThree renewable energy technologies (RETs) were analyzed for their feasibility for a small off-grid research facility dependent on diesel for power and propane for heat. Presently, the electrical load for this facility is 115 kW but a demand side management (DSM) energy audit revealed that 15–20% reduction was possible. Downsizing RETs and diesel engines by 15 kW to 100 kW reduces capital costs by $27 000 for biomass, $49 500 for wind and $136 500 for solar. The RET Screen International 4.0? model compared the economical and environmental costs of generating 100 kW of electricity for three RETs compared to the current diesel engine (0 cost) and a replacement ($160/kW) diesel equipment. At all costs from $0.80 to $2.00/l, biomass combined heat and power (CHP) was the most competitive. At $0.80 per liter, biomass‘ payback period was 4.1 years with a capital cost of $1800/kW compared to wind's 6.1 years due to its higher initial cost of $3300/kW and solar's 13.5 years due to its high initial cost of $9100/kW. A biomass system would reduce annual energy costs by $63 729 per year, and mitigate GHG emissions by over 98% to 10 t CO2 from 507 t CO2. Diesel price increases to $1.20 or $2.00/l will decrease the payback period in years dramatically to 1.8 and 0.9 for CHP, 3.6 and 1.8 for wind, and 6.7 and 3.2 years for solar, respectively.HEMS部分:Scoping the potential of monitoring and control technologies to reduce energy use in homesThis scoping study takes a broad look at how information technology-enabled monitoring and control systems could assist in mitigating energy use in residences by more efficiently allocating the delivery of services by time and location. A great deal of energy is wasted in delivering services inefficiently to residents such as heating or cooling unoccupied spaces,overheating/undercooling for whole-house comfort, leakage current, and inefficient appliances. We construct a framework to estimate different categories of inefficient energy services and the result of our initial estimate is that over 39% of residential primary energy is wasted. We next discuss how monitoring and control technologies could manage home energy use to reduce waste. Technologies considered here include programmable thermostats, smart meters and outlets, zone heating, automated sensors, and wireless communications infrastructures. The level of energy services delivered is assumed to remain unchanged, with all energy savings being realized through better management. A final discussion on barriers to adoption of these systems speculates that a lack of consumer awareness of the technologies, high costs due to lack of economies of scale, and difficult user interfaces are currently the major hurdles toward adoption.Modelling of hybrid energy system—Part II: Combined dispatch strategies and solution algorithmComputer simulation is an increasingly popular tool for determining the most suitable hybrid energy system type, design and control for an isolated community or a cluster of villages. This paper presents the development of the optimum control algorithm based on combined dispatch strategies, to achieve the optimal cost of battery incorporated hybrid energy system for electricity generation, during a period of time by solving the mathematical model, which was developed in Part I of this tri-series paper.The main purpose of the control system proposed here is to reduce, as much as possible, the participation of the diesel generator in the electricity generation process, taking the maximum advantage of the renewable energy resources available.The overall load dispatch scenario is controlled by the availability of renewable power, total system load demand, diesel generator operational constraints and the proper management of the battery bank. The incorporation of a battery bank makes the control operation more practical and relatively easier.A dynamic inexact energy systems planning model for supporting greenhouse-gas emission management and sustainable renewable energy development under uncertainty—A case study for the City of Waterloo, Canada城市与地区的电厂建设规划In this study, a dynamic interval-parameter community-scale energy systems planning model (DIP-CEM) was developed for supporting greenhouse-gas emission (GHG) management and sustainable energy development under uncertainty. The developed model could reach insight into the interactive characteristics of community-scale energy management systems, and thus capable of addressing specific community environmental and socio-economic features. Through integrating interval-parameter and mixed-integer linear programming techniques within a general optimization framework, the DIP-CEM could address uncertainty (expressed as interval values) existing in related costs, impact factors and system objectives as well as facilitate dynamic analysis of capacity-expansion decisions under such a uncertainty. DIP-CEM was then applied tothe City of Waterloo, Canada to demonstrate its applicability in supporting dec isions of community energy systems planning and GHG-emission reduction management. One business-as-usual (BAU) case and two GHG-emission reduction cases were analyzed with desired plans of GHG-emission reduction. The results indicated that the developed DIP-CEM could help provide sound strategies for dealing with issues of sustainable energy development and GHG-emission reduction within an energy management system.Proposal of a modeling approach considering urban form for evaluation of city level energy management城市一级的电力、能源管理建模方法(考虑城市的发展预留空间)The importance of developing a method to bridge the gap between the current increasing trend of CO2 emission from the commercial sector and the reduced emission level for ensuring long-term sustainability has increased. V arious concepts exist for managing the energy use and CO2 emission. These concepts can be categorized into advancement in technologies, dissemination of energy saving measures in buildings, optimization of local energy generation and distribution systems, spatial building stock pattern management, and improvement in CO2 emission factor of the grid electricity. In this paper, we propose a modeling approach for energy use in the commercial sector in order to evaluate the options involved in the abovementioned energy management concepts in an integrated manner. In this modeling approach, a district is dealt with as a basic unit. Districts are first classified into several categories according to the spatial building stock pattern, or urban form. The end-use energy consumption per unit floor area is then calculated for each district category using a simulation of energy use in buildings in a representative district; this is used for quantifying the total end-use energy consumption at the municipal level. We carried out a case study in order to demonstrate the simulation capabilities and features of the suggested modeling approach in contrast with the conventional modeling approaches. In this case study, certain scenarios of CO2 abatement integrating the energy management concepts are applied in the commercial sector of Osaka city, Japan, in order to investigate alternative avenues toward which policy efforts must be directed.Community energy planning in Canada: The role of renewable energy加拿大的CEMS:新能源在其中的作用。
英语原文
![英语原文](https://img.taocdn.com/s3/m/1ad57100bb68a98271fefa36.png)
Page 1IEEE TRANSACTIONS ON SUSTAINABLE ENERGY, VOL. 4, NO. 1, JANUARY 2013 31 A Methodology for Transforming an Existing Distribution Network Into a Sustainable Autonomous Micro-Grid M. Venkata Kirthiga, S. Arul Daniel, Member, IEEE, and S. Gurunathan Abstract-A distribution network with renewable and fossil-based resources can be operated as a micro-grid, in au- tonomous or nonautonomous modes. Autonomous operation of a distribution network requires cautious planning. In this context, a detailed methodology to develop a sustainable autonomous micro-grid is presented in this paper. The proposed methodology suggests novel sizing and siting strategies for distributed gener- ators and structural modifications for autonomous micro-grids. The optimal sites and corresponding sizes of renewable resources for autonomous operation are obtained using particle swarm op- timization and genetic algorithm-based optimization techniques. Structural modifications based on ranking of buses have been at- tempted for improving the voltage profile of the system, resulting in reduction of real power distribution losses. The proposed methodology is adopted for a standard 33-bus distribution system to operate as an autonomous micro-grid. Results confirm the usefulness of the proposed approach in transforming an existing radial distribution network into an autonomous micro-grid. Index Terms-Distributed power generation, load flow, power generation planning. N OMENCLATURE Real power rating of the th generator. Maximum generation limit on the th generator. Minimum generation limit on the th generator. Reactive power rating of the th generator. Cost coefficient of the renewable energy source at the th bus. Current drawn from the substation feeder. Real power loss in line between buses and. Total real power generated in the system. Total reactive power generated in the system. Manuscript received October 20, 2011; revised February 06, 2012; accepted . April 16, 2012 Date of publication May 30, 2012; date of current version De- cember 12, 2012. MV Kirthiga and SA Daniel are with the Department of Electrical and Electronics Engineering, National Institute of Technology, Tiruchirappalli 620015, India (e-mail: mvkirthiga@; daniel@). S. Gurunathan was with Department of Electrical and Electronics En- gineering, National Institute of Technology, Tiruchirappalli, India, and is . now with WEG Industries of India (P) Ltd, Hosur 635109, India (e-mail: guru_gce2005@yahoo.co.in). Color versions of one or more of the figures in this paper are available online at. Digital Object Identifier 10.1109/TSTE.2012.2196771 Maximum limit on the bus voltage magnitude. Minimum limit on the bus voltage magnitude. Magnitude of the voltage at the th bus. Maximum bus voltage magnitude at th bus of the system. Minimum bus voltage magnitude at the th bus of the system. , Total real power demand in summer and winter, respectively. , Total reactive power demand in summer and winter, respectively. Number of buses in the distribution system. Number of distributed generator (DG) locations (Sites). I. I NTRODUCTION I N modern power distribution systems, integrating small nonconventional generation sources has become attractive. These technologies have less environmental impact, easy siting, high efficiency, enhanced system reliability and security, improved power quality, lower operating costs due to peak shaving, and relieved transmission and distribution congestion [1]. The distributed generator (DG) units used are highly modular in structure as well as helpful in providing continuous power supply to the consumers. However, depending on the rating and location of DG units, there is also a possibility for voltage swell and an increase in losses. In this scenario, to exploit the complete potential of distributed generation, proper siting and sizing of DGs become important. This paper, there- fore, attemptsto develop a sizing algorithm that transforms an existing distribution network to a sustainable autonomous system. In such an operation, the generation and corresponding loads of the distribution network can separate from the feedernetwork and form a micro-grid without affecting the transmis- sion grid's integrity. Most of the current micro-grid implementations combine loads with sources placed at favorable sites that allow inten- tional islanding and try to use utmost the available energy [2]. In such an operation, stable generation and voltage profile are necessary to independently supply power to customers [3]. 1949-3029 / $ 31.00 © 2012 IEEE Page 232 IEEE TRANSACTIONS ON SUSTAINABLE ENERGY, VOL. 4, NO. 1, JANUARY 2013 Hence obtaining the number of locations (sites) at which the DGs are placed becomes significant. In earlier works, algorithms were developed for optimal sizing of the DG units and they pertain to nonautonomous mode of operation of the micro-grids. Haesen et al. proposed a sizing algorithm based on minimizing the losses using genetic algorithm (GA) [4]. Mallikarjuna proposed another algorithm based on simulated annealing for optimizing the size of the DGs in a micro-grid [5]. Optimal sizing based on the detailed annualized cost calculations was also proposed [6]. Neverthe- less, none of the above algorithms had considered autonomous operation of the micro-grids. Katiraei et al. Has discussed about the autonomous opera- tion of micro-grids but it pertains to isolated operation of a few loads on emergency operating conditions [7]. Liu [8] and Nehrir [9] have also highlighted isolated operation of hybrid renewable systems. But all these earlier works do not investi- gate any autonomous micro-grid for a larger distribution net- work at medium voltage level, independent of the utility grid. So far, a methodology for optimal siting and sizing of the DGs in an autonomous micro-grid is not reported in the literature. In this context, this paper attempts to develop a sizing algo- rithm for an autonomous operation of an existing radial distribu- tion network, thus making it an isolated sustainable micro-grid. The constraints included in the proposed sizing algorithm are voltage limits, demand, and generator rating limits. In addition to sizing, this paper focuses on siting of the DGs and suggests a minimum-loss configuration for the network. There are many options available for reducing losses at the dis- tribution level: reconfiguration, capacitor installation, load bal- ancing, and introduction of higher voltage levels [10], [11]. Nevertheless, a heuristic approach in choosing the sites for the DG units has been attempted in this paper for autonomous micro-grids. Souza Ribeiro et al. proposed an architecture for isolated micro-grids [12]. They have proposed programmed switching of already existing switches to reconfigure the distribution network for stable operation as micro-grid. Two types of switches are used in primary distribution systems viz., sectionalizing switches (normally closed) and TIE switches (Normally open) [13], [14]. These switches are designed for both protection and configuration management resulting in cost minimization. Optimal reconfiguration of distribution systems with DGs have also been discussed in the literature [15] - [18] but complex optimization techniques have been used to iden- tify the optimal location of TIE switches to enable additional branches for reconfiguration. Moreover, none of these works on reconfiguration had an objective of autonomous operation of a distribution network as a micro-grid. In this context, reconfiguration of an existing distribution system has also been attempted for performance improvement of an autonomous micro-grid. Ranking of the buses based on maximum loadable limits (beyond which the voltage limits violation of buses was observed) has been employed to identify the nodes. Based on this ranking, additional TIE branches are to be connected. The standard 33-bus distribution system is used for valida- tion of the algorithms proposed and MATLABcoding has been developed for implementation of the proposed algorithm. The restof the paper is organized as follows: Methodology for planning an autonomous micro-grid is revealed in Section II. Optimal sizing of DGs and the optimization techniques used are explained in Section III. Section IV focuses on the signif- icance of reconfiguration in the operation of an autonomous micro-grid. Section V depicts discussions on the results in sup- port of the proposed methodology and its validation. Conclu- sions of the paper are presented in Section VI. II. P LANNING OF A UTONOMOUS M ICRO -G RIDS It is evident that transformation of an existing radial distribu- tion system into a sustainable autonomous micro-grid, requires DGsto be integrated into the network. The exact size of these generators and the optimal placement of the same in the net- work are necessary for its autonomous operation. Hence a hi- erarchical and partially heuristic methodology is attempted for determining the optimal sites and sizes of the generators and for reconfiguring the network. A. Optimal Number and Location of DG Units It is mandatory that the total demand and the system losses need to be satisfied by the DG units connected to the distribu- tion system. For obtaining the optimal number of DG units and the corresponding sites for the DG placements, the following methodology is proposed. 1) An optimization problem is formulated for minimizing the distribution losses, including the constraints viz., gener- ator rating constraint, voltage constraint, and power bal- ance constraint. 2) For "" generator units, the number of different possible combinations of sites is , Where is the total number of buses in the distribution system. 3) The particle swarm optimization (PSO) technique is then employed for minimizing the optimization problem, for each of the combinations, where initially "" is set to 1. 4) The optimal locations corresponding to the minimal distri- bution losses for each of the DG units are noted down for all the combinations.5) The above steps from 2 to 4 are repeated for locations (ie, one unit at one site to one unit each at sites). 6) The minimum distribution losses and hence the corre- sponding installation cost pertaining to "" DG locations are normalized on a ten point scale and the variation of the above functions have been plotted against a varying (say to). The normalized value of the function is (1) where actual value of the function; minimum and maximum value of the function;Page 3KIRTHIGA et al:. METHODOLOGY FOR TRANSFORMING AN EXISTING DISTRIBUTION NETWORK 33 normalized value of the function; minimum and maximum values of the normalizing range (1 and 10, respectively). 7) The number of DG sites for which both the curves intersect is decided as the optimal number of DG units (taking only one DG unit at any given site), that is required to convert an existing distribution system into an autonomous micro- grid. 8) The siting combination pertaining to minimum distribution losses and minimum installation cost for the DG units is decided as the optimal siting of the DG units. B. Optimal Sizing of the DG Units The determination of optimal number of DG units to be in- tegratedinto the network and its placement is followed by de- termining its optimal sizes. The detailed sizing algorithm is ex- plained in Section III. C. Choice of the Type of DG Units This paper assumes that the distribution network has potential for harnessing renewable resources viz., solar, wind, biomass, etc., and since the primary objective is optimization of sizes and reconfiguration, the issues relating to type of DGs has not been taken up in this work. In general, renewable sources driven synchronous generators and inverter-based sources are considered and are assumed to be controlled for constant power and constant power factor op- eration [19]. Hence, for simplification, the interfaced resources have been treated as - specified sources and the bus voltages are specified as 1.0 pu D. Load Flow Analysis Load flow analysis ofthe micro-grid is necessary for ascer- taining the adequacy of the supply from the DGs and also to determine if the required voltage profile is maintained. Avail- able literature confirms that the conventional Newton Raphson and the fast-decoupledpower flow algorithms and their mod- ifications are not suitable for solving the load flow problem of ill-conditioned systems such as radial distribution systems [20] -. [23] The backward and forward sweep algorithm exploits the radial nature of the distribution system and it is computa- tionally simpler and efficient [24], [25]. Hence, in this work, the basic backward and forward sweep technique has been modified to include DG units in the distribu- tion system and the autonomous micro-grid. The DG unit with largest generating capacity is chosen as the Slack generator in the load flow analysis adopted for this purpose. Assumptions Made in the Paper The following assumptions have been made in this paper for implementing the proposed methodology: 1) Small generating units either of synchronous generators or the inverter-based type, of generating capacity less than 2 MW are connected at any location in the distribution network. 2) Power factor controller has been assumed to be present at each bus and hence the generator buses are modeled as constant buses supplying lagging reactive power with a fixed power factor of 0.85. 3) The grid supply has been considered as a backup support during emergency situations (nonavailability of DGs). III. S IZING OF D ISTRIBUTED G ENERATORS A. Problem Formulation The minimization objective function has been formulated with two objectives as shown in (2). corresponds to cost function of the generators and is for loss minimization (1) where cost function to be minimized (I objective); loss function to be minimized (II objective). Subject to (I) Generator rating constraint: Based on cost per unit peak power generation, the minimum and maximum limits have been imposed on the generation capacity as (3) (Ii) Voltage constraint: The optimal sizing has to be obtained such that there are no bus voltages limits violations. Hence the following constraint is included: (4) (Iii) Power balance constraint: The variation in demand with seasons has been considered and the power mismatch con- straints are as follows: (5) (6) (7) (8) (Iv) Feeder current constraint: In addition to and , to ensure autonomous operation, the feeder current constraint (9)Page 434 IEEE TRANSACTIONS ON SUSTAINABLE ENERGY, VOL. 4, NO. 1, JANUARY 2013 shown in (9) is to be satisfied (ie, current drawn from the feeder should be close to zero). The multiobjective problem has been converted to a single objective function. The above constraints have been included in the main objective function without any scale factors and the resultant unconstrained formulation is given in (10). The problem under consideration is a multiobjective function and hence weighted sum method has been adopted to convert it to a single objective function, but with equal weights to both the objectives viz., to minimize the total installation cost and also to minimize the total distribution losses (10) B. Sizing Algorithms Two nontraditional optimization techniques have been adopted in this paper to minimize the objective function shown in (10), viz., GA [26] and PSO [27], [28]. The following steps are proposed for the optimal sizing of the DGs: 1) System data and the resource data are taken as input and load flow analysis is performed with and without DG units. 2) Population size, length, and number of the variables, ini- tial constants of the various optimization techniques, and minimum and maximum limits (3) pertaining to thevari- ables are decided. In this problem, the number of variables equals the number of DG sites . Each variable indicates the size of each generator at a particular site. 3) The function value (10) and the fitness value for each com- bination of variables (particle position in PSO and chromo- some in GA) are determined. 4) Set of best solutions are upgraded as per the type of the optimization technique viz., velocityand distance updation in PSO and crossover with mutation in GA. 5) If the values in any two consecutive iterations are the same, then the algorithm is deemed to have converged. 6) If convergence criterion is not satisfied, then steps 3 to 4 are repeated,else terminated. IV. R ECONFIGURATION S TRATEGY Having obtained the number of sites for DG placements and their optimal sizes, the next step is to decide the modifi- cations required in the structure of the network for sustainable autonomous operation of the micro-grid. Distribution systems are provided with two types of switches namely sectionalizing switches and TIE switches which are initially in closed and opened positions, respectively. On reconfiguration, these posi- tions are altered resulting in the redistribution of loads among the branches of the system [15], [16]. This alteration in the loading pattern also influences the operating reliability of the distribution systems. This modification in the structure of the system results in modification of the real and reactive power losses in the system [29] -. [31] Hence reconfiguration of an existing distribution system has been attempted for effective realization of the autonomous operation of a micro-grid formed with optimally sized DGs located at optimal sites to enhance voltage profile improvement and distribution losses reduction. A. Ranking of Buses Based on the Maximum Levels of Real and Reactive Power Demands In this paper, an algorithm has been proposed to identify the buses between which additional branches are to be added by operation of TIE switches thus reconfiguring the structure of the existing radial system. The candidate locations for placing the TIE switches has been identified by ranking the buses based on their capability to meet real power demands without violating the voltage limits. Real power demands on each bus are incremented consecutively in equal steps until voltage violations take place in any bus of the system. The maximum real power demand in each bus (taken one at a time), beyond which violations of voltage limits take place is noted and tabulated (as shown in Table III). The vio- lation of voltage limits (5%) decides the maximum level up to which the real power demands have been increased on a par- ticular bus for tabulation. The bus with the highest real power loadability is assigned as the strongest and the one with the least loadability as the weakest bus. This proposed ranking algorithm has been depicted in the flowchart shown in Fig. 1. In this work, each DG connected to the system is expected to have the capability to provide reactive power support and hence emphasis is given only to the effect of increase in real power de- mand upon the bus voltages. The reactive power loadable limits are not considered in this work. B. Reconfiguration of Autonomous Micro-Grids In the proposed reconfiguration algorithm, TIE switches are placed near the locations identified as the strong and weak buses. The operation of the sectionalizing switches in the event of faults may result in islanding of a section of the micro-grid. However, the proposed reconfiguration can minimize the for- mation of such larger islands and thereby improve the reliability of supply to major section of the micro-grid. A detailed studyof the switching of such sectionalizers in the operation of an autonomous micro-grid has not been taken up in this work. The TIE switches are normally open and are modified to close position for reconfiguration. Additional TIE branches are also introduced in the existing radial distribution system for linking strong and weak buses. All possible combinations of reconfig- uration are identified for deciding the best reconfigured option. For each of the possible configurations, load flow analysis is performed and the total real power distribution losses are determined. After reconfiguration, the micro-grid structure re- sembles a weakly meshed system. Hence in this paper, NewtonPage 5KIRTHIGA et al:. METHODOLOGY FOR TRANSFORMING AN EXISTING DISTRIBUTION NETWORK 35 Fig. 1. Flowchart for the ranking algorithm based on maximum loadable levels of real and reactive power demands. Raphson-based loadflow analysis for the reconfigured system is carried out to check for voltage limit violations and for cal- culation of line losses. The possible configurations are ranked based on distribution losses. Consequent to this ranking, voltage limit violations are checked for each configuration. Hence the best reconfigured Fig. 2. Flowchart depicting the optimal reconfiguration algorithm. architecture for transforming an existing radial distribution system into a weakly meshed autonomous micro-grid is chosen as that structure which has minimal losses as well as the one which does not violate the voltage limits. In addition, the length of the TIE lines is also considered (for bringing down the cost of the TIE lines) for deciding the final configuration of the micro-grid. The algorithm followed for reconfiguration of autonomous micro-grids has been depicted in the flowchart shown in Fig. 2. V. C ASE S TUDY The standard 33 bus distribution system, with a demand of 3.715 and 4.456 MW [15], [32], [33] in summer and winter, respectively, has been adopted for the validation of the proposed methodology. The base voltage and base MVA chosen for the entire analysis are 12.66 kV and 100 MVA, respectively.Page 636 IEEE TRANSACTIONS ON SUSTAINABLE ENERGY, VOL. 4, NO. 1, JANUARY 2013 TABLE I O PTIMAL N UMBER AND L OCATIONS OF THE DG U NITS A. Optimal Number and Location of DG Units for Autonomous Micro-Grids A detailed analysis has been carried out iteratively by varying the number of DG sites (ie, number of DG units varying from to taking one unit / site) in the given system. The net real power loss for each of the conditions (ie, to ) Is tabulated in Table I. The real power losses in kW and the cost of installation of the DGs in 0.1 million dollars have been normalized on a ten point scale using (1) and the variation of the losses and cost of installation has been plotted against the number of DG units (ie, for to). It has been noticed that, for the standard 33 bus distribution system adopted for validation, the curves depicting the variation in the distribution system losses and the installation cost are contradictory in nature and hence cut each other at three DG sites. Hence, for transforming the system under consideration into an autonomous micro-grid, DGs are to be placed in three locations for 100% penetration. Fig. 3 shows this variation and validates the choice of three DGs as the optimal number of DG sites / units (considering one DG unit / site). In this work, different types of DGs are assumed to be em- ployed and hence different cost coefficients [ in (2)] are uti- lized. All the DG units are expected to provide reactive power support to maintain a constant power factor of 0.85 lagging at each of their respective locations. Consequent to deciding the number of DGs sites (units) re- quired, the optimal placement for the three DG units is taken up. For all possible combinations of three locations, the op- timal sizing algorithm is run and the corresponding losses have been recorded. It has been seen from Table I that for three DGs the optimal location pertaining to minimum distribution losses Fig. 3. Variation in the real power losses and the installation cost against the number of DG locations in an autonomous micro-grid. TABLE II O PTIMAL S IZING OF THE DG U NITS B ASED ON O PTIMIZATION T ECHNIQUES without violation of voltage limits is viz., 3rd bus, 9th bus, and 31st bus (as explained in Section II of the paper). B. Optimal Sizing of DG Units For Autonomous Micro-Grids The load flow analysis based on the forward and backward sweep method has been adapted for determining the losses. These computed losses are utilized in (10) and optimal sizes have been obtained by applying the nontraditional optimization techniques viz., GA and PSO and the values are tabulated in Table II. The details ofthe parameters used in the optimization techniques are given in the Appendix. In both the nontraditional optimization techniques viz., GA and PSO, initial population has been randomly chosen and hence they are not the same. Though the number ofunits (sites) is the same, the optimal sizes obtained for the DG units are found to be different. This difference is reflected in the compu- tation of distribution losses and reconfiguration patterns. Since emphasis is given to the algorithm and the methodology, it is left to the discretion of the decision maker to choose the size among the two options. However, to demonstrate the adaptation of GA and PSO for sizing, this paper utilizes the sizes obtained from both the techniques for subsequent reconfiguration strate- gies. The structure of the transformed autonomous micro-grid with the DG units located at optimal locations has been shown in the Fig. 4. C. Ranking of the Buses Based on Real Power Loadabilities After deciding the optimal placement (siting) of the DG units, all buses of the system under investigation are tested for their maximum withstanding capability of variations in real power demand (following the flowchart shown in Fig. 1). RankingPage 7KIRTHIGA et al:. METHODOLOGY FOR TRANSFORMING AN EXISTING DISTRIBUTION NETWORK 37 Fig. 4. One line diagram of the autonomous micro-grid with optimally placed DG units. TABLE III R ANKING OF B USES B ASED ON M AXIMUM L EVELS OF R EAL P OWER D EMANDS based on the maximum real power loadabilities of each of the buses is performed and tabulated in Table III. The strongest and the weakest buses are determined from the ranking. Table III depicts that the 31st bus has the maximum load- able real power demand which is expected due to the presence of a generator. But all the top three strong buses are found to be closely present on a sublateral. However, due to geograph- ical distances between the buses, adding a TIE-line connecting the strongest and weakest buses does not guarantee reduction in losses. Hence, based on the geographic considerations, the 33rd bus is ranked the strongest bus. The other consecutive strong buses are chosen similarly as 30th and 27th, respectively. Similarly, the weak buses are also chosen as 12th, 25th, and 17th buses, respectively (considering the proximity towards the strong buses). Thus a heuristic alter- ation of the ranking in the top and bottom three ranks of Table III is carried out for reducing the length of the TIE branches. As a result, six locations have been chosen (three for strong and three for weak buses, respectively) for placing the TIE switches to enable additional distribution lines between these locations for different possible reconfigurations. The choice of the optimal locations for the TIE switches by including geographical prox- imity helps to compensate the additional cost incurred on in- cluding the TIE lines. The optimal locations chosen for placing TIE switches are shown in Fig. 5. D. Optimal Reconfiguration of Autonomous Micro-Grids The TIE-switches employed in the system based on ranking of buses are used in reconfiguring the radial distribution network Fig. 5. One line diagram of the autonomous micro-grid with optimal locations for placing TIE switches for reconfiguration. TABLE IV C HOICE OF ALL P OSSIBLE C OMBINATIONS OF TIE S WITCHES into an autonomous micro-grid. It is evident that such a recon- figuration transforms a radial network into a weakly meshed net- work, thereby improving the reliability of service to customers. A radial network operated as an autonomous micro-grid has the possibility of formation of accidental islands due to the oc- currence of any electrical disturbances viz., line contingency or line outage. In such an eventuality, a reconfigured weakly meshed network will prevent blackout of a major section of the network. In addition, such a reconfiguration also improves the voltage profile and hence will bring down the distribution losses. The proposed algorithm for optimal reconfiguration of au-。
基于风险约束的风电场穿透极限功率优化计算
![基于风险约束的风电场穿透极限功率优化计算](https://img.taocdn.com/s3/m/c71b8341e45c3b3567ec8b7a.png)
基于风险约束的风电场穿透极限功率优化计算Optimal Calculation of Wind Power Penetration Limit Based on Risk Constrained Programming曾利华1贾宁2侯元柏3Zeng Lihau 1Nin Jia g 2Hou Yuanbai 3(1、河北省电力勘测设计研究院,河北石家庄0500312、中电国际新能源控股有限公司,上海2000863、河北建投燕山(沽源)风能有限公司,河北沽源076550)(1.Hebei electric power design and research institute,Shijiazhuang,050031 2.China Power International New Energy Holding Ltd.,Shanghai,2000863Hebei construction investment YANSHAN Wind power Co.,LTD,Guyuan,076550)引言当今能源危机的阴影正日益困扰着人类的生产和生活,为了解决这个问题,人们开始把目光投向风能这种取之不尽、用之不竭的清洁能源。
但是,自然界风的变化是很难预测的,风速和风向的变化,影响着风力发电机发出的功率,出力变动大是风力发电的特点。
由于这种功率的不稳定性,对于系统的影响是显而易见的。
随着国内风力发电项目的增加和百兆瓦级风电场的出现[1][2],因风电场注入电网功率的变动,而造成的对电网的影响将会越来越引人注目。
根据美国的风场经验,即使由数十台风力发电机组成的风场,通常1分钟最大出力变动达40%左右[3]。
较大容量的风电在并网后,会给电网带来机网协调问题[4],包括以下几方面:(1)电能质量;(2)稳定性;(3)发电计划与调度;(4)容量可信度等[5][6]。
因此,利用含风电场的混合系统的随机模拟运算,在不同的风况下,计算出某置信条件下的风电穿透极限对于系统的影响就有十分重要的意义。
计及主动电网结构优化的机组组合
![计及主动电网结构优化的机组组合](https://img.taocdn.com/s3/m/b2e7aada7375a417876f8fcd.png)
求下使得综合费用最低,是电力系统运行中的一 个重要优化问题[12]。目前在机组组合方面已有 学者做了大量的研究。文献[3]采用狄利克雷模 型模拟风电的非精确出力,研究了含风电机组的
任燕峰(1983—),男,工程师,主要从事配网自动化研究。 胡永新(1970—),男,工程师,主要从事配网自动化研究。 基金项目:国家重点研发计划项目(2016YFB0900101);国家自然科学基金重点项目(513370005)
电器与能效管理技术(2020No组组合
杜孟珂1, 任燕峰1, 胡永新1, 程浩忠2 [1.国网北京市电力公司 朝阳供电公司,北京 100124; 2.电力传输与功率变换控制教育部重点实验室(上海交通大学),上海 200240]
摘 要:传统机组组合问题不考虑输电线路的开断问题,忽略了电网拓扑结构改 变引起的潮流阻塞。在传统机组组合模型中计及电网拓扑结构的改变,建立了计及主 动输电网结构优化的机组组合模型,模型考虑了安全网络约束。通过引入大 M法,将 主动输电网结构优化模型转化为混合整数规划形式。为了加快模型的求解,采用遗传 算法结合混合整数线性规划,研究成果在传统给出各时段机组开停方案的基础上,给 出对应时段的最优网络拓扑结构。对修改的 IEEERTS24节点的算例表明,计及网络 拓扑结构的机组组合能够更有效地降低系统的综合费用。
MinistryofEducation,Shanghai200240,China]
Abstract:Thegridtopologyisfixedinthetraditionalunitcommitment,regardlessofthetransmissionline activebreaking.Inordertosolvetheproblemoftransmissionlinecongestioncausedbyunitcommitment,thispaper takesintoaccountthechangeofpowergridtopologyinthetraditionalunitcommitmentmodel,andestablishesunit commitmentmodelwhichtakesactiveoptimaltransmissionswitchingintoconsideration.Themodelincludesnetwork securityconstraint.ByintroducingBigM method,theactiveoptimaltransmissionswitchingmodelistransformedinto themixedintegerlinearprogrammingformulation.Inordertospeedupthesolutionofthemodel,thispaperuses geneticalgorithm combined with mixed integerlinearprogramming.Thispapernotonlycan givetheunit commitmentschemesateachtime,butalsogettheoptimalnetworktopologyofeachperiod.Anexampleofa modifiedIEEERTS24nodesindicatesthatthecombinationofunitscommitmenttakingintoaccountactiveoptimal transmissionswitchingcanbemoreeffectiveinreducingtheoverallcostofthesystem.
凸优化分析 -导论 斯坦福大学电子工程系必修课程
![凸优化分析 -导论 斯坦福大学电子工程系必修课程](https://img.taocdn.com/s3/m/dd18ebee551810a6f524861e.png)
exceptions: certain problem classes can be solved efficiently and reliably • least-squares problems • linear programming problems • convex optimization problems
using convex optimization • often difficult to recognize • many tricks for transforming problems into convex form • surprisingly many problems can be solved via convex optimization
Introduction 1–6
i = 1, . . . , m
Convex optimization problem
minimize f0(x) subject to fi(x) ≤ bi,
i = 1, . . . , m
• objective and constraint functions are convex: fi(αx + βy) ≤ αfi(x) + βfi(y) if α + β = 1, α ≥ 0, β ≥ 0 • includes least-squares problems and linear programs as special cases
Introduction
1–12
Course goals and topics
goals 1. recognize/formulate problems (such as the illumination problem) as convex optimization problems 2. develop code for problems of moderate size (1000 lamps, 5000 patches) 3. characterize optimal solution (optimal power distribution), give limits of performance, etc. topics 1. convex sets, functions, optimization problems 2. examples and applications 3. algorithms
针对特高压直流接入受端电网的TCSC装置定容选址规划
![针对特高压直流接入受端电网的TCSC装置定容选址规划](https://img.taocdn.com/s3/m/f5a96781b8f3f90f76c66137ee06eff9aef849ac.png)
㊀㊀㊀㊀收稿日期:2020-10-19;修回日期:2020-11-23基金项目:国网湖南省电力有限公司科技项目(5216A 218000B )通信作者:李㊀勇(1982-),男,博士,教授,主要从事电力系统优化运行与控制㊁电能质量分析与控制研究;E -m a i l :l i y o n g1881@163.c o m 第37卷第1期电力科学与技术学报V o l .37N o .12022年1月J O U R N A LO FE I E C T R I CP O W E RS C I E N C EA N DT E C H N O L O G YJ a n .2022㊀针对特高压直流接入受端电网的T C S C 装置定容选址规划李湘旗1,章㊀德1,廖长风2,李㊀勇2,马俊杰2(1.国网湖南省电力有限公司经济技术研究院,湖南长沙410007;2.湖南大学电气与信息工程学院,湖南长沙410082)摘㊀要:目前中国特高压直流接入的受端电网大多呈现 强直弱交 的情况㊂特高压受端换流站发生直流闭锁故障时,系统将发生大规模潮流转移,并可能引发部分线路过载㊂在此背景下,提出在受端电网中加入晶闸管控制串联电容器(T C S C )装置改善含特高压直流接入受端电网安全稳定问题,并建立了计及N -1安全约束的T C S C 装置定容选址双层规划模型㊂上层规划模型以加装T C S C 装置投资成本最小为目标,下层规划模型以N -1约束下最优潮流为目标,下层通过最优潮流求解结果选取给系统造成严重影响的N -1故障返回上层,增加新的约束,上下层通过互相迭代求得最终解㊂提出规划模型在修改I E E E39节点系统中得到验证㊂关㊀键㊀词:特高压直流;T C S C ;双层规划D O I :10.19781/j .i s s n .1673-9140.2022.01.010㊀㊀中图分类号:TM 715㊀㊀文章编号:1673-9140(2022)01-0082-08C a p a c i t y a n d l o c a t i o n p l a n n i n g o f T C S Cf o rU H V D Cr e c e i v i n g en d p o w e r g r i d L IX i a n g q i 1,Z H A N G D e 1,L I A O C h a n g f e n g 2,L IY o n g 2,MAJ u n ji e 2(1.S t a t eG r i dH u n a nE l e c t r i cP o w e rC o m p a n y L i m i t e dE c o n o m i c&T e c h n i c a lR e s e a r c h I n s t i t u t e ,C h a n gs h a 410007,C h i n a ;2.C o l l e g e o fE l e c t r i c a l a n d I n f o r m a t i o nE n g i n e e r i n g ,H u n a nU n i v e r s i t y ,C h a n gs h a 410082,C h i n a )A b s t r a c t :I nC h i n a ,m o s t o f t h e r e c e i v i n g s y s t e m sw i t h t h eUHV D Ca c c e s s a r e i n t h e s i t u a t i o n o f "s t r o n g DCa n dw e a k A C "i n p r e s e n t .A f t e r t h eD Cb l o c k i n g f a u l to c c u r s ,t h es y s t e m w i l lu n d e r g ot h e l a r ge -s c a l e p o w e rf l o wt r a n s f e r ,w h i c hm a y c a u s e o v e r l o a d s i n s o m e l i n e s .U n d e r t h e c i r c u m s t a n c e ,a t h y r i s t o r -c o n t r o l l e d s e r i e s c a pa c i t o r (T C S C )d e -v i c e i s a d d e d t o t h e r e c e i v i n g s y s t e m ,a n d ab i l e v e l p l a n n i n g m o d e l i s e s t a b l i s h e d f o r f i x e d -c a p a c i t y a nd s i te s e l e c t i o n of T C S Cd e v i c e sw h i c h t a k e s N -1s e c u r i t y c o n s t r a i n t s i n t oa c c o u n t .T h eu p p e r -l e v e l p l a n n i ng mo d e l a i m s t o m i n i m i z e t h e i n v e s t m e n t c o s t o f i n s t a l l i n g aT C S Cd e v i c e .T h e l o w e r -l e v e l p l a n n i n g m o d e l a i m s t o o p t i m i z e t h e p o w e r f l o wu n -d e r t h e c o n s t r a i n t o f N -1.A f t e r w a r d s ,t h e l o w e r l a y e r s e l e c t s t h e N -1f a u l t t h a t h a s a s e r i o u s i m p a c t o n t h e s y s t e m o p e r a t i o n t h r o u g h t h e o p t i m a l p o w e r f l o ws o l u t i o n .T h e l o w e r l a y e r r e s u l t s a r e r e t u r n e dt o t h eu p p e r l a y e r t oa d da n e wc o n s t r a i n t a n d t h e f i n a l s o l u t i o n i s g i v e nb y i t e r a t i n g .T h e p l a n n i n g m o d e l p r o p o s e d i n t h i s p a p e r a r ev e r i f i e d i n t h em o d i f i e d I E E E39-n o d e s ys t e m.K e y wo r d s :UHV D C ;T C S C ;b i l e v e l p l a n n i n g m o d e l Copyright ©博看网. All Rights Reserved.第37卷第1期李湘旗,等:针对特高压直流接入受端电网的T C S C装置定容选址规划㊀㊀中国的新能源与负荷的分布在地域上存在着严重不匹配的情况,为满足西电东送的需求,中国正在大力发展大容量㊁远距离特高压直流输电技术[1]㊂受益于高输送容量和较低的建造成本,基于电网换相换流器(l i n e-c o mm u t a t e dc o n v e r t e r,L C C)的高压直流输电(h i g hv o l t a g ed i r e c t c u r r e n t,H V D C)技术目前在中国应用最为广泛[2]㊂然而,L C C-H V D C存在换相失败的问题,在发生连续换相失败情况下,将会导致直流保护动作出口闭锁[3],给受端电网造成严重不利影响㊂目前,中国绝大多数大规模交直流混联系统都呈现着 强直弱交 特征,交流系统网架结构较为薄弱㊂以2025年湖南电网目标网架为例,在规划方案中,有一回ʃ800k V特高压直流落点湘南地区㊂当系统发生直流闭锁故障后,将通过与外部电网联络通道紧急调度来填补有功缺额,而大规模的潮流转移可能会导致部分线路过载,造成系统输电阻塞问题,从而大面积切负荷,给系统带来严重经济损失㊂针对输电阻塞问题,已有许多研究者提出了相应改善方案㊂文献[4-5]分别针对自由电力市场下和大规模风电接入下系统潮流变化造成的线路过载问题,提出了传输线路切换优化模型,通过切除部分传输线路来满足线路潮流安全约束㊂这种方式虽然可以在一定程度上改善潮流分布,但无法最大化利用系统线路传输容量,当系统发生大规模潮流转移时,仍可能导致部分线路过载,给电力系统稳定运行带来严重影响㊂新建变电站及输电线路虽可以有效地解决输电阻塞问题,然而新建变电站存在经济性差且选址困难的问题[6]㊂文献[7-8]基于晶闸管控制的串联电容器(t h y r i s t o r c o n t r o l l e ds e r i e s c a p a c i-t o r,T C S C)提出了一种电力系统阻塞疏导方法, T C S C可以通过连续地调节所补偿线路的电抗来控制线路潮流[9],进而可以高效地缓解系统输电阻塞问题;文献[10]基于T C S C改善了风电并网对网络功率分布的影响㊂除此之外,还可以通过T C S C的快速响应能力提升系统的暂态稳定性[11]以及降低系统的短路电流水平[12]㊂因此,为满足含特高压接入受端系统发生直流闭锁故障后的大规模潮流转移需求,亟需要一种针对该系统的T C S C装置定容选址规划方法㊂本文将L C C-H V D C直流闭锁故障作为安全约束加入到规划模型中㊂目前针对安全约束下规划问题,已有大量文献做了相关研究㊂文献[13]采用模糊聚类法将风电场和负荷出力的数据聚类成多个确定性的运行场景,提出了计及N-1安全约束的含风电场输电网扩展规划模型;文献[14]基于安全距离模型,配电网N-1安全评估方法和指标,提出一种考虑N-1安全的多目标D G选址定容规划模型;文献[15]为了在改变系统网架结构的同时保证系统安全性,建立考虑N-1安全网络约束的输电网结构优化模型;文献[16]分析了考虑节点电压限制和N-1潮流约束的D G出力上限求解方法,提出了一种考虑N-1安全约束的D G出力控制可视化方法;文献[17]建立了考虑风电和负荷波动及系统N-1故障多场景的备用容量优化模型㊂文献[13-17]中提出的N-1规划方案,虽能有效地保证系统安全性,但也导致了N-1安全约束下最优潮流问题规模大,计算耗时长的问题[18]㊂文献[19]提出了将机组组合与电网线路N-1安全校核直接闭环的发电计划优化模型㊂然而其N-1故障校核中,没有设置切负荷等紧急控制方案㊂文献[20]提出在含可再生能源接入的电力系统输电网络结构优化模型,将该优化问题分为经济调度问题和N-1校验问题,2个问题交替求解㊂对输电网结构和机组出力进行优化,文献[21]利用多场景技术对风电㊁负荷的不确定性进行建模,在此基础上建立了计及N-1安全网络约束的发输电双层随机规划模型㊂文献[19-21]中下层N-1校验均选取造成系统切负荷的N-1故障返回上层,然而造成系统切负荷的故障不均是对系统整体造成影响最大的故障,且当针对特高压直流接入的受端系统发生直流闭锁故障时,可能无法避免采取切负荷紧急控制㊂故本文选取新的指标判断下层N-1故障是否通过校验,返回上层规划㊂针对上述文献分析,本文建立了针对特高压直38Copyright©博看网. All Rights Reserved.电㊀㊀力㊀㊀科㊀㊀学㊀㊀与㊀㊀技㊀㊀术㊀㊀学㊀㊀报2022年1月流接入受端电网的T C S C装置定容选址规划模型㊂所提模型主要创新点包括:1)针对特高压直流接入受端系统发生直流闭锁故障后所造成大规模潮流转移问题,通过加装T C-S C装置进行改善;2)综合考虑T C S C投资建设成本及系统运行成本,构建双层规划模型,降低了N-1约束下优化规划的求解难度;3)下层N-1故障校验中,通过各机组有功出力与最优出力的偏移量选取对系统造成严重影响的故障返回上层,进行规划优化㊂1㊀规划模型1.1㊀T C S C工作原理T C S C工作原理如图1所示,X i j为原线路电抗;X T C S C为晶闸管控制串联电容器,为可运行在容性状态或感性状态㊂运行在容性状态下时,线路电抗减小,有功潮流增加;运行在感性状态下时,线路电抗增加,有功潮流减小㊂X ijX TCSC图1㊀T C S C等效电路模型F i g u r e1㊀E q u i v a l e n t c i r c u i t o fT C S C通过加装T C S C,节点i与节点j之间线路电抗将被调节为X L=X i j+X T C S C(1)㊀㊀将T C S C的控制作用等效为系统线路传输功率,不需要对系统原导纳矩阵做任何修改[22]㊂支路有功潮流可计算为P i j=B i jθi j+P T C S Ci j(X i j,X T C S C,θi j)(2)式中㊀B i j为系统导纳矩阵中对应元素;θi j为相角差;P T C S Ci j为T C S C控制作用下等效线路传输功率,可通过X i j㊁X T C S C㊁θi j非线性表达,本文仅对其定容选址进行规划,不考虑其控制过程㊂1.2㊀上层规划模型1)目标函数㊂考虑T C S C装置建设的经济性,T C S C定容选址规划模型中,上层模型以加装T C-S C装置投资成本最小为目标,上层目标函数设定为o b j=m i nðΩl n T C S C i j(3)式中㊀o b j为目标函数值;n T C S C i j为线路上安装T C-S C装置数量;Ωl为线路集合㊂若n T C S C i j为0,则表示线路i-j上没有加装T C S C装置㊂2)等式约束㊂节点潮流方程为P i,s=ðΩi P i j,sP i s=P G i,s+P T i,s+P D C i,s-P L i,sìîí(4)式中㊀s为状态维度,包括正常运行状态和故障状态,s={b c,f k};P i,s为节点注入功率;Ωi为节点集合;P G i,s为发电机有功出力;P L i,s为节点负荷; P T i,s为联络通道有功传输功率㊂支路潮流方程为P i j,s=l i j,s B i jθi j,s+l i j,s P T C S Ci j,s(5)式中㊀l i j,s为线路状态㊂若线路正常运行,则值为1,若线路因故障而断开,则值为0㊂3)不等式约束㊂支路潮流约束为P i j,m i nɤP i j,sɤP i j,m a x(6)式中㊀P i j,m i n㊁P i j,m a x分别为支路传输功率上㊁下限㊂发电机出力及调节约束为P G i,m i nɤP G i,sɤP G i,m a xP G i,l oɤP G i,sɤP G i,u pΔP G i,m i nɤP G i,f k-P G i,b cɤΔP G i,m a xìîí(7)式中㊀P G i,m a x㊁P G i,m i n分别为发电机有功出力上下限;P G i,u p㊁P G i,l o分别为下层给出发电机有功出力约束区间的上下限;ΔP G i,m a x㊁ΔP G i,m i n分别为故障后发电机有功出力调节上下限㊂联络通道功率传输约束为P T i,m i nɤP T i,sɤP T i,m a x(8)式中㊀P T i,m a x㊁P T i,m i n分别为联络通道有功传输上㊁下限值㊂切负荷约束为P L i,b c-P L i,fɤΔP L i,m a x(9)式中㊀ΔP L i,m a x为节点i在故障后最大切负荷量㊂48Copyright©博看网. All Rights Reserved.第37卷第1期李湘旗,等:针对特高压直流接入受端电网的T C S C 装置定容选址规划T C S C 调节约束为-n T C S C i j P T C S C r ɤP T C S C i j ,s ɤn T C S C i j P T C S Cr(10)式中㊀P T C S C r 为T C S C 装置额定容量㊂最低运行成本约束为ði ɪΩi(a i (P G i ,bc )2+b i P G i ,b c +c i +d i P Ti ,b c )+ði ɪΩiðf ɪΩf p fe i ΔP Li ,f ɤC m i n (11)式中㊀a i ㊁b i ㊁c i 为节点i 上发电机发电成本系数;d i 为节点i 上联络通道有功功率调度成本系数;e i 为切负荷补偿成本系数;p f 为故障影响因子,定义为故障发生几率与影响权重的乘积;ΔP Li ,f为节点i 上故障后切负荷量;C m i n 为最低运行成本㊂1.3㊀下层优化模型下层优化模型以运行成本最小为目标,考虑了节点潮流方程等等式约束和发电机出力及调节等不等式约束㊂在上层规划给出T C S C 配置方案基础上进行最优潮流计算㊂通过计算结果分析给出对系统造成影响较大的N -1故障及其最低运行成本,各发电机及联络通道有功出力区间,并返回上层㊂s .t .P i ,s =ðΩiPi j ,s P i ,s =P G i ,s +P T i ,s +P D C i ,s -P Li ,s ìîíP i j ,s =l i j ,s B i j θi j ,s +l i j ,s P T C S C i j ,s p i j ,m i n ɤP i j ,s ɤP i j ,m a x P G i ,m i n ɤP G i ,s ɤP Gi ,m a xΔP G i ,m i n ɤP G i ,f k -P G i ,b c ɤΔP G i ,m a x {PTi ,m i nɤPTi ,sɤPTi ,m a xP L i ,b c -P L i ,f ɤΔP Li ,m a x -n T C S C i j P T C S C r ɤP T C S C i j ,s ɤn T C S C i j P T C S C rìîí(12)2㊀模型求解为改善由于加入多个N -1安全约束所造成的优化模型规模增加的问题,并同时考虑T C S C 装置加装成本及系统运行成本,本文将规划模型分为上层T C S C 定容选址规划和下层最优潮流㊂通过下层最优潮流优化结果分析选取对系统造成严重影响的N -1故障作为约束返回上层,上层针对这些故障进行T C S C 定容选址规划,并将规划结果再次传递给下层,通过上下层相互迭代得到最终规划结果㊂其中,下层最优潮流主要包含以下3个部分㊂1)不考虑N -1安全约束下的最优潮流模型㊂通过不含N -1故障安全约束的最优潮流结果,分别设置各发电力及联络通道有功出力区间㊁发电机及联络通道有功出力区间边界值与最优值之差绝对值为P G Δ和P TΔ㊂2)考虑各单独N -1安全约束下最优潮流模型㊂判断各故障下发电机及联络通道在最优潮流下,有功出力是否在有功出力区间内,如若不在,则说明系统需要对此N -1故障进行较强的预防控制,将对系统造成影响较大的N -1故障返回上层㊂3)考虑全部N -1安全约束下最优潮流模型㊂本文在上层规划中还加入了最低运行成本约束,通过求解含全部N -1故障下的最优潮流得出每个故障下的最低运行成本㊂具体求解过程如图2所示㊂开始上层:TCSC 装置定容选址/投资成本最小否,适当放松有功出力约束区间是否有解?含TCSC 装置接入的系统规划方案是下层:最优潮流/运行成本最小考虑全部N -1故障下最优潮流不考虑N -1故障下最优潮流考虑各单独N -1故障下最优潮流通过不考虑N -1故障下的最优潮流计算结果及上层规划运行结果给出系统中各发电机及联络通道的有功出力约束区间;通过考虑全部N -1故障下的最优潮流计算结果给出考虑各单独N -1故障下系统最低运行成本;通过将考虑各单独N -1故障下与不考虑N -1故障下的最优潮流计算结果对比,得出各单独N -1故障造成系统最优潮流偏差是是否各单独N -1故障下最优潮流结果中各发电机及联络通道有功出力均在有功出力约束区间内?求得最终解是结束增加该N -1安全约束;加入有功出力约束区间;最低运行成本约束选取造成最优潮流中不在有功出力约束区间中的N -1故障否图2㊀算法流程F i gu r e 2㊀A l g o r i t h mf l o w c h a r t 58Copyright ©博看网. All Rights Reserved.电㊀㊀力㊀㊀科㊀㊀学㊀㊀与㊀㊀技㊀㊀术㊀㊀学㊀㊀报2022年1月3㊀算例分析3.1㊀仿真算例在修改后的I E E E39节点中,对本文提出优化模型进行验证㊂系统拓扑结构如图3所示,原I E E E39节点系统中,31节点与39节点上发电机替换为外部大电网联络通道,17节点上接入一条特高压直流输电线路,输送有功功率为1000MW,各故障设置如表1所示㊂可中断负荷节点设置为3㊁4㊁7㊁8㊁18,可中断负荷量设置为节点负荷总量50%㊂故障后运行状态下,发电机有功可调节量设置为系统最大有功出力的10%,p f均设置为0.05㊂系统中各成本参数如表2所示㊂系统连接发电机,联络通道及特高压直流线路潮流约束设置为600MV㊃A,其余线路潮流约束P i j,m a x如表3所示,系统基准容量图3㊀算例拓扑F i g u r e3㊀T o p o l o g y o f t e s t s y s t e m表1㊀故障设置T a b l e1㊀F a u l t s e t t i n g s故障类型故障支路或节点线路f1/支路f2/支路f3/支路f4/支路f5/支路2-254-145-89-3910-13 f6/支路f7/支路f8/支路f9/支路f10/支路11-1216-2417-2722-2326-29发电机/联络通道/直流闭锁f11/节点f12/节点f13/节点f14/节点f15/节点3035383117表2㊀系统成本系数T a b l e2㊀S y s t e mc o s t c o e f f i c i e n t$/MW㊃h成本系数节点a i b i c i d i e i各发电机发电 0.010.30.2联络通道输电31 8.539 9切负荷补偿 100表3㊀线路潮流约束参数T a b l e3㊀B r a n c h p o w e r f l o wc o n s t r a i n t s p a r a m e t e r参数线路载流量600/(MV㊃A)(1-2),(1-39),(2-30),(6-31),(8-9),(9-39)(10-32),(12-11),(16-17),(16,19),(17-18)(17-27),(19-20),(19-33),(20-34),(22-35),(23-36),(25-37),(29-38)p i j,m a x(2-3),(2-25),(3-4),(3-18),(4-5),(4-14)(5-6),(5-8),(6-7),(6,11),(7-8),(10-11)(10-13),(12-13),(13-14),(14-15),(15-16)(16-21),(16-24),(21-22),(22-23),(23-24)(25-26),(26-27),(26-28),(26-29),(28-29)设置为100MV㊃A㊂每条线路上安装T C S C装置单位上限为5组,每组额定容量为20MV㊃A[12]㊂本文所提出的上下层规划优化模型在G AM S中采用S B B求解器进行求解,算法流程通过MA T L A B实现㊂3.2㊀算例结果分析本文提出模型在不同支路潮流约束设置下的迭代求解结果如图4所示㊂系统在加装T C S C装置后,能有效地降低系统的运行成本㊂对比不同支路潮流约束下系统T C S C装置优化规划结果可知,随着系统支路潮流约束的增强,即系统网架结构越薄弱,通过加装T C S C降低的系统运行成本越大㊂当支路传输功率上限P i j,m a x=4.5时,通过加装T C S C装置可降低运行成本1811.5$/h;而当P i j,m a x=5.5时,降低运行成本则仅为5.3$/h㊂同时,在加装相同数量T C S C装置时,网架较为薄弱的系统能够取得更好的效果,当P i j,m a x=4.5,n T C S C i j=7时,系统减少运行成本为354.2$/h,;而当P i j,m a x=5,n T C S Ci j=5时,系统减少运行成本则为247.4$/h㊂因此,受端交流系统网架越薄弱,其故障下潮流转移时,输电阻塞问题越为严重,T C S C对此问题的改善68Copyright©博看网. All Rights Reserved.第37卷第1期李湘旗,等:针对特高压直流接入受端电网的T C S C 装置定容选址规划效果越加显著㊂本文所提模型在面对受端系统 强直弱交 问题时,能够取得良好的改善效果㊂此外,对加装T C S C 装置前后系统,在直流闭锁故障后,对各元器件状态进行分析比较,研究T C -S C 装置在系统发生直流闭锁故障后所起到的具体作用㊂选取支路传输功率上限P i j ,m a x =5,系统发生直流闭锁故障后最优潮流分布如图5所示,各元器件状态如表4㊁5所示㊂当系统发生直流闭锁故障后,主要通过联络通道紧急调度来填补系统出现的大量有功缺额,进而系统无法避免的出现大规模潮流转移㊂然而线路3(2-3)已经达到支路潮流约束上线,无法继续增加有功传输量,从而导致节点3切除负荷0.709p .u .,当系统加装T C S C 装置后,可通过线路40(25-26)上T C S C 装置增加向节点26上功率传输,进而通过线路42(26-27)㊁31(17-27)㊁30(17-18)㊁7(3-18)增加对节点3的有功功率传输㊂从而有效地改善了系统由于大规模潮流转移所导致输电阻塞而造成的切负荷㊂因此,本文提出T C S C 装置规划模型能够有效地改善含特高压直流接入受端系统直流闭锁故障下的切负荷问题㊂3.53.43.33.2运行成本/(104S /h )5040302010TCSC 安装数量/组P ij ,max =5.5P ij ,max =5.0P ij ,max =4.5图4㊀安装不同数目T C S C 装置下的最优解F i gu r e 4㊀O p t i m a l s o l u t i o nw i t hd i f f e r e n tT C S Cn u m b e r s 不含TCSC 已安装TCSC TCSC 控制潮流64-2支路潮流/p .u .46312661线路20-4-611162136417图5㊀直流闭锁故障后系统最优潮流(P i j ,m a x =5)F i gu r e 5㊀O p t i m a l p o w e r f l o wa f t e rD Cb l o c k i n g f a u l t 表4㊀直流闭锁故障后发电机出力结果对比T a b l e 4㊀G e n e r a t o r o u t p u t a f t e rD Cb l o c k i n g fa u l t 发送电方案不同调度方案优化结果不含T C S C加装T C S CP G 30,b c/P G 30,f 154.69/5.734.96/6.00P G 32,b c /P G 32,f 155.28/6.005.00/5.72P G 33,b c /P G 33,f 155.35/6.005.24/5.89P G 34,b c /P G 34,f 154.57/5.084.57/5.08P G 35,b c /P G 35,f 154.36/5.054.92/5.60P G 36,b c /P G 36,f 154.74/5.324.98/5.56P G 37,b c /P G 37,f 155.00/5.565.03/6.00P G 38,b c /P G 38,f 155.14/6.005.14/6.00P T 31,b c /P T 31,f 156.09/6.096.09/6.09P T 39,b c /P T 39,f 157.33/11.006.62/11.00发送电成本/($/h)32167.96032189.858表5㊀直流闭锁故障后切负荷结果对比T a b l e 5㊀L o a d s h e d d i n g a f t e rD Cb l o c k i n g fa u l t 切负荷方案不同调度方案优化结果不含T C S C加装T C S CP L 3,b c/P L 3,f 153.22/2.513.22/3.22P L 4,b c /P L 4,f 155.00/5.005.00/5.00P L 7,b c /P L 7,f 152.34/2.342.34/2.34P L 8,b c /P L 8,f 155.20/5.225.22/5.22P L 18,b c /P L 18,f 151.58/1.581.58/1.58切负荷成本/($/h)354.5004㊀结语本文提出了一种针对含特高压直流接入的受端系统T C S C 装置定容选址双层规划模型,同时考虑了T C S C 装置加装成本与系统运行成本㊂下层规划选取对系统最优潮流造成影响较大的故障返回上层,通过迭代得到数组有效优化解㊂通过不同支路潮流约束下的优化结果对比可知,受端交流系统网架越薄弱,故障下潮流转移时输电阻塞问题越为严重,T C S C 对此问题的改善效果越加显著㊂因此,针对中国特高压直流接入下受端系统网架大多存在 强直弱交 问题,本文所提方法模型能够取得良好改善效果㊂直流闭锁故障后各元器件的状态对比结果表明,通过T C S C 装置控制潮流可以有效地解决系统发生直流闭锁故障后发生大规模潮流转移导致的线路过载所造成切负荷问题㊂78Copyright ©博看网. All Rights Reserved.电㊀㊀力㊀㊀科㊀㊀学㊀㊀与㊀㊀技㊀㊀术㊀㊀学㊀㊀报2022年1月综上,本文所提出T C S C装置定容选址双层规划模型可同时提高含特高压接入受端系统的经济性和稳定性㊂参考文献:[1]李智琦,罗日成,李稳,等.ʃ800k V特高压直流输电线路带电作业电位转移特性分析[J].高压电器,2020,56 (3):164-168+175.L I Z h i q i,L U O R i c h e n g,L I W e n,e ta l.A n a l y s i so f p o-t e n t i a l s h i f t c h a r a c t e r i s t i c s o f l i v ew o r k i n g o nʃ800k V UHV D Ct r a n s m i s s i o nl i n e[J].H i g h V o l t a g e A p p a r a-t u s,2020,56(3):164-168+175.[2]陈龙龙,徐飞,魏晓光,等.大容量可控关断的直流输电用电流源型换流器研究综述[J].中国电力,2021,54(1):25-36.C H E N L o n g l o n g,X U F e i,W E IX i a o g u a n g,e ta l.A r e v i e wo nl a r g ec a p a c i t y c o n t r o l l a b l es w i t c h i n g c u r r e n t s o u r c e c o n v e r t e r r e s e a r c h[J].E l e c t r i cP o w e r,2021,54 (1):25-36.[3]朱金涛,辛业春.柔性高压直流输电仿真技术研究方法综述[J].智慧电力,2021,49(3):1-11.Z HUJ i n t a o,X I N Y e c h u n.R e v i e wo f r e s e a r c ho ns i m u-l a t i o nm e t h o d s o fV S C-HV D Ct r a n s m i s s i o n s y s t e m[J]. S m a r tP o w e r,2021,49(3):1-11.[4]沈政委,汤涌,易俊,等.用于电网拓扑优化的输电线开断控制研究综述[J].电网技术,2020,44(2):475-483. S H E NZ h e n g w e i,T A N G Y o n g,Y I J u n,e t a l.R e v i e wo f r e s e a r c ho nt r a n s m i s s i o ns w i t c h i n g c o n t r o l f o rn e t w o r k t o p o l o g y o p t i m i z a t i o n[J].P o w e r S y s t e m T e c h n o l o g y, 2020,44(2):475-483.[5]王智冬,娄素华,范臻,等.基于机会约束规划的含大规模风电电力系统阻塞调度优化[J].电力系统自动化, 2019,43(23):147-154.WA N GZ h i d o n g,L O US u h u a,F A NZ h e n,e t a l.C h a n c e-c o n s t r a i n e d p r o g r a mm i n g b a s e dc o n g e s t i o nd i s p a t c h i n g o p t i m i z a t i o n o f p o w e r s y s t e m w i t h l a r g e-s c a l e w i n d p o w e r i n t e g r a t i o n[J].A u t o m a t i o n o f E l e c t r i c p o w e r s y s-t e m s,2019,43(23):147-154.[6]王泽宇,张仰飞,陈光宇,等.基于最优传输切换阻塞管理方法研究[J].电工技术,2019(16):71-74.WA N GZ e y u,Z HA N G Y a n g f e i,C H E N G u a n g y u,e t a l. R e s e a r c ho nc o n g e s t i o n m a n a g e m e n tb a s e do no p t i m a l t r a n s m i s s i o n s w i t c h[J].E l e c t r i cE n g i n e e r i n g,2019(16):71-74.[7]周前,方万良.基于T C S C技术和粒子群优化算法的电力系统阻塞疏导方法[J].电网技术,2008,32(8):47-52.Z HO U Q i a n,F A N G W a n g l i a n g.S t u d i e so nc o n g e s t i o n m a n a g e m e n t o f p o w e r s y s t e m s b a s e d o nT C S Ca n dP S O [J].P o w e r S y s t e m T e c h n o l o g y,2008,32(8):47-52.[8]R A S H E D GI,S U N Y,S HA H E E N HI.O p t i m a l l o c a-t i o no ft h y r i s t o rc o n t r o l l e d s e r i e sc o m p e n s a t i o ni n a p o w e r s y s t e m b a s e do nd i f f e r e n t i a l e v o l u t i o na l g o r i t h m c o n s i d e r i n g t r a n s m i s s i o n l o s sr e d u c t i o n[C]//20119t h W o r l dC o n g r e s s o n I n t e l l i g e n t C o n t r o l a n dA u t o m a t i o n, T a i p e i,C h i n a,2011.[9]和萍,陈婕,耿斯涵,等.F A C T S装置对含风电互联系统低频振荡特性分析[J].电力系统保护与控制,2020,48(8):86-95.H E P i n g,C H E N J i e,G E N G S i h a n,e ta l.A n a l y s i so f F A C T Sd e v i c eo n l o w-f r e q u e n c y o s c i l l a t i o nc h a r a c t e r i s-t i c s o f a p o w e r s y s t e m w i t hw i n df a r mi n t e g r a t i o n[J]. P o w e r S y s t e m P r o t e c t i o na n dC o n t r o l,2020,48(8):86-95.[10]李娟,孙欣.计及风电不确定性和T C S C功率调节作用的最优潮流研究[J].电气自动化,2019,41(6):21-24.L I J u a n,S U N X i n.R e s e a r c ho no p t i m a l p o w e r f l o wc o n-s i d e r i n g w i n d p o w e r u n c e r t a i n t y a n dT C S C p o w e r r e g u l a-t i o n[J].E l e c t r i c a lA u t o m a t i o n,2019,41(6):21-24. [11]眭仁杰,薛峰,周野,等.提高电力系统暂态稳定性的T C S C控制策略[J].电力系统及其自动化学报,2018, 30(9):64-69.S U IR e n j i e,X U EF e n g,Z HO U Y e,e t a l.T C S Cc o n t r o l s t r a t e g y f o r e n h a n c i n g t h e t r a n s i e n t s t a b i l i t y o f p o w e r s y s t e m s[J].P r o c e e d i n g so ft h eC S U-E P S A,2018,30(9):64-69.[12]HA S H E M I S M,HA G H M T,S e y e d iH.H i g h-s p e e dr e l a y i n g s c h e m e f o r p r o t e c t i o no f t r a n s m i s s i o n l i n e s i n t h e p r e s e n c e o ft h y r i s t o r-c o n t r o l l e d s e r i e s c a p a c i t o r[J].I E T G e n e r a t i o n,T r a n s m i s s i o n&D i s t r i b u t i o n, 2014,12(8):2083-2091.[13]杨芸槿.计及N-1安全约束的含风电场电力系统扩展规划[J].电工技术,2018(22):100-103.Y A N G Y u n j i n.E x p a n s i o n p l a n n i n g o f p o w e rs y s t e mc o n t a i n i n g w i n df a r m w i t hc o n s ide r i n g N-1s e c u r i t yc r i t e r i o n[J].E l e c t r i cE n g i n e e r i n g,2018(22):100-103.88Copyright©博看网. All Rights Reserved.第37卷第1期李湘旗,等:针对特高压直流接入受端电网的T C S C装置定容选址规划[14]钟浩,郝亚群,刘海涛,等.考虑风电消纳的风-蓄联合系统N-1安全校正方法[J].电网与清洁能源,2019,35(2):78-86.Z HO N G H a o,HA O Y a q u n,L I U H a i t a o,e t a l.N-1s e-c u r i t y r e s c h ed u l i n g me t h o df o rw i n d-s t o r ag e c o m b i n e ds y s t e mc o n s i d e r i n g w i n d p o w e r c o n s u m p t i o n[J].P o w-e r S y s t e ma n dC l e a nE n e r g y,2019,35(2):78-86.[15]杨德州,任彦辉,葛磊蛟,等.基于N-l安全约束的主动配电网拓扑优化控制方案[J].电测与仪表,2020, 57(1):49-54.Y A N GD e z h o,R E N Y a n h u i,G EL e i j i a o,e t a l.At o-p o l o g y o p t i m i z a t i o nc o n t r o l s c h e m eo fa c t i v ed i s t r i b u-t i o nn e t w o r kb a s e do n N-1s e c u r i t y c o n s t r a i n t s[J].E-l e c t r i c a l M e a s u r e m e n t&I n s t r u m e n t a t i o n,2020,57(1):49-54.[16]刘佳,程浩忠,李思韬,等.考虑N-1安全约束的分布式电源出力控制可视化方法[J].电力系统自动化, 2016,40(11):24-30.L I UJ i a,C H E N G H a o z h o n g,L IS i t a oe ta l.V i s u a l i z a-t i o n m e t h o d o fo u t p u t p o w e rc o n t r o lo fd i s t r i b u t e dg e n e r a t o r sc o n s i d e r i n g N-1s e c u r i t y c o n s t r a i n t s[J].A u t o m a t i o no fE l e c t r i c p o w e rs y s t e m s,2016,40(11):24-30.[17]张粒子,李丰,叶红豆,等.考虑风电和负荷波动及N-1故障的发电备用优化方法研究[J].太阳能学报,2014, 35(1):64-73.Z HA N GL i z i,L I F e n g,Y E H o n g d o u,e t a l.O p t i m a l r e-s e r v ed i s p a t c ha p p r o a c hc o n s i d e r i n g w i n d p o w e ra n d l o a d f l u c t u a t i o n sa n d N-1f a u l t[J].A c t aE n e r g i a eS o-l a r i sS i n i c a,2014,35(1):64-73.[18]阳育德,陶琢,刘辉,等.电力系统静态安全最优潮流并行计算方法[J].电力自动化设备,2019,39(1):99-105.Y A N GY u d e,T A OZ h u o,L I U H u i,e t a l.P a r a l l e l c o m-p u t a t i o n m e t h o d sf o rs t a t i cs e c u r i t y-c o n s t r a i n e do p t i-m a l p o w e rf l o w o f p o w e rs y s t e m[J].E l e c t r i cP o w e rA u t o m a t i o nE q u i p m e n t,2019,39(1):99-105.[19]汪洋,夏清,康重庆.考虑电网N-1闭环安全校核的最优安全发电计划[J].中国电机工程学报,2011,31(10):39-45.WA N G Y a n g,X I A Q i n g,K A N G C h o n g q i n g.O p t i m a l s e c u r i t y c o n s t r a i n e d g e n e r a t i o ns c h e d u l i n g c o n s i d e r i n gc l o s e d-l o o p N-1s e c u r i t y c o r r e c t i o n[J].P r o c e ed i n g so ft h eC S E E,2011,31(10):39-45.[20]赵博石,胡泽春,宋永华.考虑N-1安全约束的含可再生能源输电网结构鲁棒优化[J].电力系统自动化, 2019,43(4):16-26.Z HA O B o s h i,HU Z e c h u n,S O N G Y o n g h u a.R o b u s t o p t i m i z a t i o no f t r a n s m i s s i o nt o p o l o g y w i t hr e n e w a b l ee n e r g y s o u r c e sc o n s i d e r i n g N-1s e c u r i t y c o n s t r a i n t s[J].A u t o m a t i o no fE l e c t r i c p o w e rs y s t e m s,2019,43(4):16-26.[21]张衡,程浩忠,张建平,等.高比例风电背景下计及N-1安全网络约束的发输电优化规划[J].中国电机工程学报,2018,38(20):5929-5936.Z HA N G H e n g,C H E N G H a o z h o n g,Z HA N G J i a n-p i n g,e t a l.G e n e r a t i o n a n d t r a n s m i s s i o n e x p a n s i o n p l a n n i n g c o n s i d e r i n g N-1s e c u r i t y c o n s t r a i n t s w i t hh i g h p e n e t r a t i o no fw i n d p o w e r[J].P r o c e e d i n g so f t h eC S E E,2018,38(20):5929-5936.[22]李娟,许欣,李壮,等.S V C与T C S C优化配置在电力系统静态电压稳定中的应用[J].广东电力,2016,29(4):67-72+78.L I J u a n,X U X i n,L IZ h u a n g,e t a l.a p p l i c a t i o no fS V Ca n dT C S Co p t i m a l c o n f i g u r a t i o ni ns t a t i cv o l t a g es t a-b i l i t y o f p o w e r s y s t e m[J].G u a n g d o n g E l ec t r i c p o w e r,2016,29(4):67-72+78.98Copyright©博看网. All Rights Reserved.。
复杂预想场景下电力系统备用优化模型_舒隽
![复杂预想场景下电力系统备用优化模型_舒隽](https://img.taocdn.com/s3/m/c18a1034af45b307e87197fd.png)
105
复杂预想场景下电力系统备用优化模型
舒隽 1,李春晓 2,苏济归 3,董伟 2
(1. 华北电力大学电气与电子工程学院, 北京市 昌平区 102206; 2. 廊坊供电公司, 河北省 廊ห้องสมุดไป่ตู้市 065000; 3.宜昌供电公司,湖北省 宜昌市 443000)
Optimal Reserve Dispatch Model Considering Complicated Contingency Scenarios
S13
rate. The scenario sets composed of single scenarios are introduced to express multiple scenarios. A scenario set consists of three subsets: generator malfunction subset, transmission equipment malfunction subset and load fluctuation subset. Based on the scenario set, an optimal reserve dispatch model considering complicated contingency scenarios is proposed. The objective is to minimize the sum cost of the electricity and reserve, and is subject to general SCUC constraints and some new introduced constraints related to different response rate reserves dispatch, such as capacity limits of generators, branches, and different response rate reserves under different contingency scenarios. The formulation of the optimal reserve dispatch model considering complicated contingency scenarios with nonlinear constraints is transferred to the mixed integer linear programming (MILP) problem, which is able to be solved by commercial MILP solvers. The case studies utilize the CPLEX 11 under the general algebraic modeling system (GAMS) 23 on a Pentium-4 2.53 GHz personal computer. The IEEE 30-bus system is applied to verify the proposed optimal reserve dispatch model. Six cases under contingency scenarios with different degrees of complexity are discussed in detail. The results given in Tab. 1 show that: 1) the optimal solution of reserve capacity and dispatch is determined by given scenario sets; 2) given complicated contingency scenarios, the proposed reserve dispatch model can derive more reliability solutions than the ordinary reserve capacity allocation model considering constant reserve capacity constraint.
基于保密度的OFDMA中继网络资源分配研究
![基于保密度的OFDMA中继网络资源分配研究](https://img.taocdn.com/s3/m/f36e04fdac51f01dc281e53a580216fc700a537d.png)
基于保密度的OFDMA中继网络资源分配研究赵君;郑伟;温向明;张海君;路兆铭;景文鹏【期刊名称】《电子与信息学报》【年(卷),期】2014(000)012【摘要】考虑到异构双向中继网络中存在窃听者的安全资源分配问题,为了提高中继安全性,该文研究了受限于子信道分配和功率约束的用户安全保密度问题模型,与传统的保密容量模型相比,安全保密度模型更侧重于反映用户本身的安全程度。
基于此保密度模型,该文进一步考虑了不同用户的安全服务质量(Quality of Service, QoS)需求和网络公平性,联合优化功率分配、子信道分配、子载波配对,并分别通过约束型粒子群、二进制约束型粒子群优化算法和经典的匈牙利算法找到最优解,实现资源的最优分配,提高网络中合法用户的保密度。
仿真结果验证了所提算法的有效性。
%Considering the security resource allocation problem in the two-way relay networks exiting an eavesdropper, to improve the security of the relay, a security secrecy ratio scheme under the constraintof subchannel allocation and power is studied in this paper. Compared to the traditional secrecy capacity scheme, the security secrecy ratio scheme pays more attention to reflecting the user’s own s ecurity extent. Based on the proposed scheme, security Quality of Service (QoS) requirement for different users and the network fairness are further considered. Besides, power allocation, subchannel allocation and subchannel pairing are joint considered. Then, the optimal solution is obtained through Constraint Particle Swarm Optimization (CPSO) algorithm, Binary CPSO (B_CPSO)algorithm and Classic Hungarian Algorithm (CHA), respectively. Finally, the network resources are allocated in an optimal manner and the secrecy ratio for legitimate users is improved. Simulations results show the effectiveness of the proposed algorithm.【总页数】6页(P2816-2821)【作者】赵君;郑伟;温向明;张海君;路兆铭;景文鹏【作者单位】北京邮电大学信息与通信工程学院北京 100876;北京邮电大学信息与通信工程学院北京 100876;北京邮电大学信息与通信工程学院北京 100876;北京化工大学信息科学与技术学院北京 100029;北京邮电大学信息与通信工程学院北京 100876;北京邮电大学信息与通信工程学院北京 100876【正文语种】中文【中图分类】TN929.53【相关文献】1.解码转发中继网络基于OFDMA的低复杂度资源分配 [J], 唐伦;蒋广健;陈前斌2.基于负载均衡的OFDMA双跳中继网络资源分配策略 [J], 赵越;方旭明;黄博;陈煜3.基于两跳匹配的OFDMA中继网络联合资源分配算法 [J], 文凯;喻昉炜;周斌;张赛龙4.基于无线中继网络的OFDMA-MIMO资源分配算法研究 [J], 熊军洲;熊文祥5.基于非合作博弈的OFDMA无线多跳中继网络上行链路资源分配算法 [J], 向征;方旭明;徐鹏因版权原因,仅展示原文概要,查看原文内容请购买。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Transaction on Power system, protection, and distribution ISSN: 2229-8711 Online Publication, June 2011/gjto.htmPF-P20 /GJTOCopyright @ 2011/gjtoSECURITY CONSTRAINT OPTIMAL POWER FLOW (SCOPF) – A COMPREHENSIVE SURVEYMithun M. Bhaskar, MuthyalaSrinivas, SyduluMaheswarapuNational Institute of Technology, Warangal, IndiaEmail: mmbaskr@Received July 2010, Revised October 2010, Accepted February 2011AbstractThis paper reviews the existing developments in Security Constrained Optimal Power Flow (SCOPF) from 1960’s to till date. Diverse schemes and approaches on Single Area/Multi-area, algorithms, Contingency Selection, Steady and Dynamic SCOPF, Artificial Intelligence based SCOPF, Real time and SCOPF using Parallel/Distributed Processing, Economic Dispatch with Security Constraints, Decentralized SCOPF, Voltage Constrained SCOPF (VSCOPF), Incorporation of FACTS on SCOPF studies and Literatures on Applications of SCOPFetc are appraised in structured manner chronologically with detailed reviews on the strategies and the test systems used for the analysis are reported. A brief summary of the existing stratagems and test system data which can be retrieved are given in the conclusion for easy access of researchers.Keywords: Security Constrained Optimal Power Flow (SCOPF), Security analysis, Flexible AC Transmission System (SCOPF), Literature review, Optimization Techniques.I.I NTRODUCTIONPower system throughout the world is undergoing tremendous changes and developments due torapid Restructuring, Deregulation and Open-access policies. Greater liberalization, larger market and increasing dependency on the electricity lead to the system operators to work on limited spinning reserve and to operate on vicinities to maximize the economy compromising on the reliability and security of the system for greater profits, which lead to establishment of a monitoring authority and accurate electronic system to prevent any untoward incidents like Blackouts.Optimal Power Flow (OPF) study plays an important role in the Energy Management System (EMS), where the wholeoperation of the system issupervised in eachconceivablereal time intervals. Optimal Power flow is the assessment of the finest settings of the control variables viz. the Active Power and Voltages of Generators, Discrete variables like Transformer taps, Continuous variables like the Shunt reactors and Capacitors and other continuous and discrete variables so as to attain a common objective such as minimization of operating cost or Social Welfare while respecting all the system limits for safe operation. This greater dependency on Electric Power has brought in the stage where the consumer depends not only on the availability of the electricity, but also looks for Reliable, Secure, Quality and Uninterrupted supply. Optimal Power flow, considered on, when system meets witha contingency viz. Generator/Transformer/Line/ Load / Static or Synchronous compensator failure / Apparatus failure is termed as Security Constrained Optimal Power flow (SCOPF). The recent Blackouts lead to the importance of the system which is capable to withstand any contingencies, or to have system which can work on the specified limits when a contingency occurs, without effecting the overall operation of the system. SCOPF problem is the perfect incorporation of the contradictory doctrines of maximum economy, safer operation and augmented security.This paper is organized into 14 Sections; First section gives an outline of OPF and SCOPF, Section II and III reviews the exhaustive segments like Steady State Security and Dynamic Security respectively, Section IV assesses the Contingency Selection strategies, Section V evaluates the Contingency Constrained OPF, Section VI deals with Security Constrained Economic Dispatch (SCED), Section VIItransacts with the Security Constrained OPF (SCOPF), Section VIII analyses the Artificial Intelligence Techniques applied to SCOPF, Section IX evaluates other Algorithms and Techniques applied for Optimization in SCOPF studies, Section X censures the Voltage Security Constrained OPF (VSCOPF) approach, Section XI relatethe Decentralized SCOPF approach, XII dissects the Parallel and Distributed algorithms applied to SCOPF, Section XIIIreviews the methodologies of SCOPF with Flexible AC transmission System (FACTS) incorporated and Section XIV reviews the literatures on the possible application of SCOPF.Security Constraint Optimal Power Flow (Scopf) – A Comprehensive SurveyCopyright @ 2011/gjto12II. STEADY STATE SECURITYAt any given case, the security engineer monitors the power flow with induced contingencies to empowerand withstand any case of overload and voltage violations. H. W. Dommel et al. [1] has sketched a detailed survey on Load flow algorithms, the first credits for Load flows unquestionably goes for J Carpentair (1962). All the considerable developments in Power Flow algorithms are listed in [2] – [3].SCOPF studies help to overcome when any real contingency happens by rescheduling / controlling to make sure that system is within the allowed limits of operation and termed assteady state security. Earlier methods were basically of Linearized DC load flow models with many approximations [4] and used only a linearized model of only the outage system. Early 1960s has the proposal of Wells [5], and 1970s works by El-Hawary [6], Kaltenbach et al. [7] and Shen et al. [8] were the earlier works on Power system security constrained optimization, Alsac et al. [9] in early as 1973 proposed a more accurate (earlier methods were DC approximate methods) method to incorporate the steady state security constraints into OPF, which allowed to consider the reactive power and voltage constraints in outage cases. There, the OPF is solved using the ‘Dommel-Tinney ’ approach and later security constraints are added to the AC-Power Flow via their penalty functions (first to introduce) and Lagrange multipliers, to obtain the optimum operating conditionswhich was tested on IEEE 30 bus system. But it was Monticelli et al. [10] (1987) has put forward a new blenders decomposition based method for Economic dispatch with security constraints with post-outagecorrection and separate the base case with contingency analysis together with generation rescheduling using Benders feasibilitycuts. The method was tested on IEEE 118 bus system. Last mentioned was that of non-decomposing methods and Carpentier [11] (1973), Elacqua et al. [12] (1982), Schnyder et al. [13] (1987) and Stott et al. [14] (1978) exposed various decomposed methods involving security constraints. Dias et al.[15](1991) claimed that by implementing the SCOPF for higher fuel cost systems, the total operating system tends to come down as the power demand on contingencies tend to come down due to lowering of voltage and natural reasons, the expensive generators are lightly loaded. He has also highlighted the effect of Under Load Tap Changing (ULTC) transformers in the normal OPF and SCOPF studies with load models implemented and modeled SCOPF solution which was tested on various 30, 57, 118 and the Nova Scotia 131 bus reduced power system; with specified power demand at loads fed by tap-transformers, when specified power demand occurs at voltages obtained from the standard OPF solution and by using voltages from a standard security constrained OPF solution with and without line flow constraints in OPF and SCOPF condition. In 1996, Saavedra [16] exploited distributedprocessing environment with dual relaxation method and was tested on two Brazilian systems consisting of 725 buses, 1212 branches and 76 adjustable power generators; Second system of 1663 buses, 2349 branches and 99 adjustable power generators. Saavedra together with Rodrigues et al. [17] (1994) proposed asynchronous method with dual-simplex relaxation solution for the linearized SCOPF with parallel architecture processing for the preventive mode of SCOPF. Security Constraint Optimal Power Flow becomes a bi-objective problem and the optimization occurs at the best trade-off between generation cost and the security cost. The 'Opportune SecurityIndex ', first mentioned in the Ph.D thesis of D. D Menniti (1989) and later widely used in his research on Steady State security using pattern recognition [18] and Neural Network [19] in 1991 and 1995 respectively. The very next year, Minniti together with Confroti and Sorrentino proposed Parallel Gradient Distribution (PGD) and Non-Linear Programming based OPF algorithm with (N-1) contingencies [20] with continuous security metrics and was tested on a 5 bus system. III. DYNAMIC SECURITY CONSTRAINED OPFEbrahimVaahedi et al. [21] (2001) was the pioneer to include the dynamic constraints; voltage stability with the static security constraints viz., the flow and voltage profile during normal and post contingency operations. The problem has been formulated as a three level hierarchical decomposition scheme where the Interior programming/ Benders Decomposition techniques are used and tested on a North American electric utility system with 1449 buses, 2511 circuits, 778 transformers and 240 generators and on a reduced Brazilian System of 11 buses and 15 circuits and the authors has validated using Continuation Power Flow and Point of Collapse Program (PFLOW). Don Huret al. [22] (2001) proposed aNovel algorithm in decentralized framework, using a price-based mechanism that models each region as an economic unit. Here, Linear Programming based approach is used by the authors for maximum secure simultaneous transfer capability of tie-lines. IV. CONTINGENCY SELECTION Lizhi Wang [23] (2006) projected a new contingency selection technique for the SCOPF problem which proved to provide a better solution than the conventional (N-K) selection principles. A DC lossless load flow model is used and the trade-off between economy and security is achieved using a parametric utility function. A best trade-off between the Economy benefit, Infeasibility cost and Infeasibility risk are considered and Integer Programming method is used which was tested on 5 bus, 6 line system and on IEEE 30 bus system using Matlab™ and CPLEX 9.0 platform. Y Yuan et al. [24] proposed solutions for transient stability constrained OPF with multi-contingency rather with the conventional single contingency analysis till then used. A Primal Dual Newton Interior Point method was used by authors to solve the TSOPF problem on 3 machines, 9 bus systems; IEEJ WEST 10 and IEEJ WEST 30 systems and implemented using FORTRAN language. Francois Bouffard et al. [25] (2005) proposed a model to Identify, Analyze and Validate a set of contingencies from the complete set of contingencies by norms of the Lagrange multiplier vectors of Post-contingency analysis. Two cases, viz. the Deterministic case and the Stochastic SCOPF problem have been analyzed here. In the former, the umbrella contingencies are identified as the contingency which yield the same market-clearing solution and in the latter case, the identification is done such that the sensitivity of the optimum solution to the neglected contingencies is smaller to a pre-specified threshold. In addition, authors have attempted to validate "super umbrella " contingency, which are nothing but, umbrella contingencies which remain asumbrella contingencies irrespective of the system parameters. ASecurity Constraint Optimal Power Flow (Scopf) – A Comprehensive Survey Copyright @ 2011/gjto 13DC-OPF analysis was used for Numerical analysis of deterministic SCOPF problem as the load varies and the effect of ranking and other cut-off rules of stochastic SCOPF is demonstrated and is tested on a Three-bus, three-line, three-generator system.Florin Capitanescu [26] (2007) introduced two novel contingency filtering techniques based on comparison of intermediate solutions of Preventive Security Constrained OPF (PSC-OPF) in post contingency analysis. Authors have compared the proposed method with classical methods like severity index-based (SI) filtering schemes and with direct PSCOPF method. Two techniques viz., Individually Non-dominated Contingency (INDC) Technique and Non-dominated Contingency Group (NDCG) Technique; both based on the concept of 'constraint violation domination'. Both had the advantage that it is free from any parameter tuning (weight matrices and thresholds). The former technique is found to keep only the non-dominated contingencies, which can obtain a solution to PSOPF, as of all contingencies are present and discarding all other ones; the later technique selects the contingency for each constraint, which creates maximum violation. The Interior-Point Method (IPM) is used in the base algorithm. The algorithms were tested on a modified Nordic32 system (60 bus system) and on standard IEEE 118 test bus system. Authors demonstrate that the proposed methods are more robust and accelerate the sequential solution of PSOPF than any other classical methods.V.CONTINGENCY CONSTRAINED OPFRamesh et al.[27] (1997)put forward a decomposed form of Contingency Constrained Optimal Power Flow (CCOPF) using Fuzzy Logic where, the minimization of both the base case (pre-contingency) operating cost and of the post-contingency correction times which are conflicting, were accepted as fuzzy goals. Devaraj et al.[28] (2005) demonstrated a new Real Coded Genetic Algorithm (RCGA)centered approach for OPF for improving the security goals of line overload by generation re-dispatching and by adjustment of phase-shifting transformers, which are installed based on the Severity Index (SI). This algorithm has overcome the traditional GA snagsof solution being depended on the number of bits of the variables and the cumbersome procedure of converting the real time variables into binary strings. The variables are modeled in natural form and operating the cross-over and mutation operators directly with integer and floating-point genetic algorithm. The authors has adopted the IEEE 30 and IEEE 118 bus systems for implementation and three cases viz, for obtaining the optimal-control variables in the IEEE 30-bus system; to alleviate overloads under line outage by generator rescheduling and phase-shifting transformers; the third case, proposed algorithm was used to alleviate line overload in the IEEE 118-bus system. Lopez-Lezama [29] (2006) offered a new coupled post contingency OPF with reliability criteria added as an additional linear constraint. The algorithm was tested on a Colombian market. The actual nodal prices and marginal price of a blackout-risk are also calculated. The mathematical modeling of that paper for SCOPF was adopted from Thorp et al. (2001) by using of coupled post contingency Optimal Power Flows and a unique system of islands arebuild, which are nothing but the base case system and the system after contingency. Load of various types like Dispatchable, Curtailable and Sheddable are found to be included. Objective function modeling consisting of additional variable; the difference of expected relative load shedding and average of all the expected relative load shedding, together with probabilities of contingencies are included and MATPOWER has been used for optimization part by authors.VI.ECONOMIC DISPATCH WITH SECURITY CONSTRAINTS Mohamed Aganagic et al. [30] (1997) demonstrated a two level decomposition algorithm using nonlinear version of the ‘Dantzig-Wolfe’ decomposition based Security constrained Economic dispatch (SCED) using nonlinear unit cost functions. A detailed representation of the reserve curves were given and were tested on three custom test cases with a total load of 3595MW. The proposed algorithm consists two phases; first phase obtains a primal feasible solution by minimizing the sum of infeasibilities, whereas in second phase the generation cost is minimized and is solved using a revised simplex method. Yan et al. [31] (1997) unraveled the Security Constrained Economic Dispatch (SCED) using successive linear Programming/Predictor-Corrector Interior Point method. Efforts have been made for the adjustment of Barrier Parameter and for determination of initial points. The proposed algorithm is compared with the results obtained using primal-dual interior point method. The algorithm is not applied directly; instead, the successive linear programming is applied to exploit the computational gain achieved on not having to calculate the second-order derivatives of Hessian matrix at each iteration. The proposed algorithm was tested on 236, 354, 708, 1062, 2124 bus systems, which are obtained by interconnecting standard IEEE 118 bus systems in many ways. Authors concluded by using feasibility condition on fast reducing duality gap, by customizing initial points by adopting relatively small threshold and by balancing its primal and dual values, the number of iterations can be reduced even up to 50% and the time savings are found to increase with larger size systems. Luis Vargas et al. [32] (1993) published an in-depth tutorial on Interior point method and demonstrated the application of IP (Dual Affine version) on SCED problem. Luis deliberatedon the superiority of the IP over the simplex method and a demonstrated a practical method to avoid the oscillatory behavior in the iteration process of IP. Fast Decoupled Load Flow, Generalized Generation Distribution Factors (GGDF) and generation power Incremental Transmission Losses Factor (ITLF) concepts are used in sub problems of the proposed algorithm and to increase the computational speed, ‘Pre-conditioned Conjugate Gradient’ (PCG) technique is used instead of the direct method based on Cholesky factorization, to prevent ill-conditioning and added time consumption. The algorithm was implemented and tested on IEEE 30 and 118 bus systems and is compared with simplex code (MINOS). RabihJabr et al. [33] (2000) put forward a new simplified homogeneous and self-dual (SHSD) linear programming (LP) interior point algorithm for SCED and did the analysis not only for the conventional (N-1) criteria but also for the (N-2) contingencies. The analysis has been compared with predictor-corrector interior point algorithm as proposed by Yan [31]. The cost curves in this paper are considered as convex and piecewise-linear and expressed in a separate programming which is tested on an IEEE 24 bus test system and on a practical 175 bus network. Yong Fu et al.[34] (2006) made an attempt on modeling a Security constrained Unit Commitment (SCUC) model with preventive/corrective approach contingencies (controllable andSecurity Constraint Optimal Power Flow (Scopf) – A Comprehensive SurveyCopyright @ 2011/gjto14uncontrollable) over an 24hr time schedule, AC-SCOPF, Load shedding and Unit commitment is considered, wherever the security constraints are not met in the recalculation of Unit commitment. The Authors have exploited Augmented Lagrangian relaxation, Dynamic programming and Benders Decomposition for solving the SCOPF/SCUC/UC. Load Shedding is resorted for unfeasible problem arising out of contingencies to act as Virtual generators based on decremental bids. Authors have adopted 6 bus, IEEE 118 bus and 1168 bus (169 generators, 1168 buses, 1474 branches, and 568 load sides) test systems for implementation andthe AC results are depicted. It’s concluded that the implementationtime increases linearly with size of the problem. Kyoung Shin Kim[35] et al.(2006) approached the SCED with Interior Point methodby including the power flow constraints. An novel algorithm is presented to linearize the SCED problem based relations among generator outputs, active power flows, loads, losses etc. and is solved using Linear programming. The concepts of Incremental Transmission Loss Factor (ITLF) and Generalized Generation Distribution Factor (GGDF) concepts are used in the algorithm which is later optimized using Primal Interior Point Method (PIPM). Authors has compared the results obtained by applying this algorithm to IEEE 6-bus and 30-bus systems and comparing it with Simplex Programming and its found that this algorithm offers more computational speed and takes lesser iterations. Florin Capitanescu et al.[36] (2008) proposed new techniques to solve the Corrective Security Constrained Optimal Power Flow (CSCOPF) consisting of CSOPF, Steady State Security Analysis (SSSA), a contingency filtering and an OPF variant to check post contingency corrective analysis. Severity-Index-Based Contingency Ranking Approach, Non-dominated Contingency (NDC) Approaches are used by authors in the CF category. Other variant of new IterativeCSCOPF approach like Infeasible post-contingency optimal powerflow, without filtering and Severity based approaches are alsodemonstrated in the paper. Authors have analyzed the proposed method with classical direct approach and Benders decompositiontechniques and are tested on modified 60 bus (Nordic32), IEEE 118 and 1203 bus (French-RTE) systems and the algorithm is found to be more robust and faster than direct approach, Benders decomposition technique and severity index (SI) based approaches. VII. SECURITY CONSTRAINED OPTIMAL POWER FLOW Harshan et al. [37] exposed notable works in speeding up the SCOPF analysis to make them competent for the online analysis using with a new fast Cyclic Contingency Screening model (CCS) of security analysis by accepting the results of a security analysis carried out at time 't k ' for drawing the data to be used in a security analysis at a time 't k +At' to reduce the computational burden which in turn increases the speed of the entire analysis. Authors used local perturbation effect and Concentric Relaxation Method and double stage pre-filters to separate non-critical cases on updating the database. This method was tested on National French 225-400 kV grid containing 462 nodes and 855 branches with 96 real states for a 24hr period on 15 minute steps. FabriceZaoui et al.[38] (2006) proposed a new direct method for the simultaneous optimization of AC-OPF base case and with (N-K) contingencies rather having sub problem approach which has been commonly found, using Primal Dual Interior Point method (IPM). The contingency analysis is run before the optimization process to select only the critical contingencies as size of the optimization problem increases linearly with the number of considered contingencies. In this approach, IPM converts the inequality constraints to the equality ones with addition of two positive slack variables and the equality constrained problem is converted to an unconstrained problem by using Lagrangian function together with a ‘Fiacco-McCormick ’ approach for barrier update (also called monotone strategy ). The algorithm is tested on a small 3-bus network, medium system of 95 buses, 105 branches with 19 load tap changing transformers, 22 generating units and 21 shunt compensation devices (CorsicaIsland) &on a large system consisting of 1207 buses, 1821branches, 185 generating units and 2 shunt compensation devices(French Continental Network). OñateYumbla et al.[39] (2008) proposed a Particle Swarm Optimization with Reconstruction Operators (PSO-RO) based solution for SCOPF problem, where the constraints are handled using reconstruction operators, instead of penalizing the objective function. Authors have formulated the OPF with (N-1) criterion, where the Pre/Post optimal contingency points are obtained, together while considering the constraints in generating units’ limits, minimum and maximum up and down-time, slope-down and slope-up, and coupling constraints in the pre- and the post-contingency states. Authors claim that by PSO-Reconstruction Operator approach, there is an increase in the search area/particles in the space. Performance Index based Contingency ranking system is used together with NRLF and is tested on two systems; viz. 39 buses, 46 branches, ten generators (New England System) with a total load of 1000MW and another one consisting of 26 buses, 46 branches, six generators, seven transformers, and nine shunt capacitors (adopted from Hadi Sadat ) with Six active power generations, Seven transformers-tap setting,and Nine var-injection values with a total load is 1263 MW and 22control variables.VIII. ARTIFICIAL INTELLIGENCE TECHNIQUESLiteratures speak that the main constriction was that the problem tend to settle in a global optimum as security constraints are difficult to be included in the line security constraints into fitnessfunction. L L Lai et al.[40] (1997) proposed an Binary CodedImproved Genetic Algorithm approach for the Normal andcontingent condition of the system and two cases has been compared on IEEE 30 bus system with a simulated circuit outage. Somasundaram et al . [41] put forward a Evolutionary programming based solution for the SCOPF problem and claimed to be a better and robust technique as EP uses only the objective function information and not the first and second derivatives of it or constraints and is independent of the nature of the search space such as smoothness, convexity or uni-modality and is tested on a IEEE30 bus system. Zwe-Lee Gaing et al. [42] (2006) suggested a Real coded Mixed Integer Genetic Algorithm based approach to the SCOPF problem. There, real coding is exploited instead of the conventional binary coding with a two arithmetic crossover and mutation schemes are proposed. Authors used uniform crossover, FDLF method and only one critical contingency is selected among all for the contingency analysis and the results provide a comparison with that of evolutionary programming on same system. The proposed SCOPF not only considers the generation cost, but also transmission security, transmission loss, bus voltageSecurity Constraint Optimal Power Flow (Scopf) – A Comprehensive Survey Copyright @ 2011/gjto 15profile, value-point loading and is tested on custom 26 bus (46 transmission lines, load demand of 1263 MW system) & IEEE 57 bus system.IX.APPLICATION OF OTHER TECHNIQUES TO SCOPFIt was in 1997, Scott et al. [43] reviewed some exceptional works on their 'Invited paper' on Power System Security Optimization Techniques, which revealed the future scope of online contingency analysis and pointed out areas of difficulty that constitute them and challenges for successful practical on-line implementations which are applied for the security analysis of Power System in the future. An in-depth review of security concepts and terminology, Security Assessment, Optimization techniques; Linear and Non-linear, a thorough ideas on modeling of Contingency Analysis, Direct & Indirect Contingency Selection methods, Active and Reactive power Contingency Screening, Security Constrained Optimal Scheduling; Contingency constrained OPF with security level 1 and level 2; online security analysis and its found to be must read literature for any researchers on Power System Security. Momoh et al.[44] offered a Quadratic Programming and New Non-Linear Convex Network Flow Programming (NLCNFP) model, which considers the tie-line security and transfer constraints together with buying and selling contracts has been implemented on a four area IEEE 30 bus system. KarimKaroui [45] (2008) highlighted the use of Interior Point programing (Interior-point Direct, Interior-point CG, Active set algorithms) for SCOPF using KNITRO (Integrated Power System Optimizer) software, which offers preventive and corrective strategy, the discrete variables modeling, the modeling of units capability curves, the modeling of the primary active power-frequency control, modeling of discrete variables, Transformertaps discretization with shunt variables discretization and authors has demonstrated the use of the same in evaluating the Total Transfer Capability. It’s found that KNITRO models the problem into barrier method where, nonlinear objective function is replaced to a set of barrier sub-problems controlled by a barrier parameter. The algorithm is demonstrated on a 2351 bus, 4587 lines European system. Anibal et al. [46] proposed a Predictor-Corrector Interior Point algorithm for SCOPF problem with Branch Outages, Generator Outages and Multiple equipment congestion together with the objective of minimization of transmission loss. A scalar weight method is used for integrating the objectives together. Line Outage Distribution Factors (LODFs) and GeneralizedGeneration Distribution Factors (GGDFs) are used in the contingency analysis consisting of 157 security constraints. Authors have validated the algorithm on a Brazilian power system consisting of 3535 bus and 4238 branches for a tolerance of 0.01. X.VOLTAGE SECURITY CONSTRAINED OPFClaudio Canizares et al. [47] (2001) projected and compared two OPF techniques incorporating Voltage Security, both multi-objective optimizations, minimizing the generation cost, transmission losses and improving the voltage security. The minimum voltage collapse point constraint is added together with the singular value and its derivatives at each iteration using the Hessian of the power flow equations which is solved using the Han-Powell procedure; Nonlinear Primal-Dual Predictor-Corrector Interior Point method and is tested on a modified IEEE 118 bus system. Devaraj et al. [48] (2007) proposed a new Improved Genetic Algorithm for the voltage security constrained OPF which used the natural form of the variables (Real coded GA) with floating point integers based crossover and mutation probability. Generator power output, Generator voltage magnitude, Transformer Taps and Reactive power of the capacitor banks are selected as control variables and the voltage stability is analyzed using the Maximum L-index value of load buses. In the proposed genetic algorithm the continuous variables are modeled as floating point numbers and discrete variables as integers. The method has been tested on a standard IEEE 30 bus system. WorawatNakawiro et al. [49] (2009) proposed a novel GA-ANN method for network loss minimization and for the reactive power dispatch where the ANN are trained offline to substitute for OPF online. The k-mean clustering method is used to select the input for the ANN, Line Indicator (L) is used to analyze the security margin and GA is used for optimizing the complete problem. For the offline learning, a database encompassing realistic operatingconditions, in terms of random load, generation mix and outages is simulated on 6000 operating points which were selected for ANN training using Back propagation method (Lavenberg-Marquart optimization adopted). The proposed algorithm was tested on a Standard IEEE 30 bus system and it’s found to be 5 times faster than other conventional methods.XI.DECENTRALIZED OPFBiskas et al.[50] (2005) presented a decentralized solution for large interconnected system by decomposing multi-area system SCOPF problem into smaller individual SCOPF problem. Later, the sub problems are combined using a pricing mechanism, which are the electricity exchange prices of the neighboring areas, until they converge all smaller sub problems. The advantage of this method is found to be reduced effect of line outages. Unit outages outside the sub problem area are ignored. Authors have implemented this algorithm for an IEEE 3 area RTS-96 and Balkan Power system consisting of 310 buses, 77 units, 485 internal lines and 5 tie-lines. Don Hur et al. [51] presented a new parallel decentralized solution for SCOPF problem using Linear Programming using Line Outage Distribution Factor and was implemented on the Korean Power System consisting of four regions and each region connected directly by the major eight 345 kV transmission lines and seventeen 154 kV transmission lines, which are considered as tie lines. The intraregional SCOPF is solved using conventional Linear Programming (LP) approach by the authors.XII.PARALLEL PROCESSING BASED SCOPFWei Qiu [52] (2005) proposed a new parallel processed (16 Pentium 1GHz Processors used in paper) solution for SCOPF using Nonlinear Interior Point Method (Primal-dual interior point). Authors have used multiple set of distributed processors for independent and parallel computing of contingency states. The ‘Blocked Diagonal Bordered’ (BDB) structure of the linear equations is exploited for assigning each processor an independent block for parallel processing. Authors have used ‘Generalized Minimal Residual’ (GMRES) method solutions have been used for faster convergence. Its claimed that the proposed algorithm gives 12 times faster solution for decomposed SCOPF problem, based on。