Efficient secure AC OPF for distributed generation uptake maximisation

C. J. Dent, L. F. Ochoa, G. P. Harrison, J. W. Bialek

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract / Description of output

A method is presented for maximising the total capacity of distributed generation which a network can support, using a Security Constrained AC Optimal Power Flow (SCOPF). The motivation behind this model is to assess the network's capacity for new generation. Differently from the classical OPF, where generation cost is minimised, the objective function maximises the total capacity of the proposed DG sites that can be accommodated without breaching transmission constraints. Unlike previous work, a secure OPF including line outage contingencies is used, in order to ensure that the resulting DG capacities maintain the relevant network security standard. The resulting mathematical program is solved by iteratively adding the most severe contingencies and using warm starts to speed up the solution of the resulting OPFs. The results presented are based on a modified IEEE 73-bus Reliability Test System with N-1 security - however the method is generic and can be used at other voltage levels and with reconfiguration-based security models. Issues arising from the non-convexity of the AC OPF are also discussed.

Original languageEnglish
Title of host publication16th Power Systems Computation Conference, PSCC 2008
PublisherPower Systems Computation Conference ( PSCC )
ISBN (Electronic)9780947649289
Publication statusPublished - 1 Jan 2008
Event16th Power Systems Computation Conference, PSCC 2008 - Glasgow, United Kingdom
Duration: 14 Jul 200818 Jul 2008


Conference16th Power Systems Computation Conference, PSCC 2008
Country/TerritoryUnited Kingdom

Keywords / Materials (for Non-textual outputs)

  • Generation planning
  • Modelling language
  • Optimal Power Flow
  • Security Constrained


Dive into the research topics of 'Efficient secure AC OPF for distributed generation uptake maximisation'. Together they form a unique fingerprint.

Cite this