Professional Documents
Culture Documents
Centre of Excellence for Power System Automation and Operation, Iran University of Science and Technology, Tehran, Iran
Department of Electrical Engineering, Semnan University, Semnan, Iran
a r t i c l e
i n f o
Article history:
Received 5 November 2008
Accepted 8 June 2009
Available online 9 July 2009
Keywords:
Congestion management
Power market
Security cost
Contingency
a b s t r a c t
Congestion in a power network is turned up due to system operating limits. To relieve congestion in a
deregulated power market, the system operator pays to market participants, GENCOs and DISCOs, to alter
their active powers considering their bids. After performing congestion management, the network may
be operated with a low security level because of hitting some ows their upper limit and some voltages
their lower limit. In this paper, a novel congestion management method based on the voltage stability
margin sensitivities is introduced. Using the proposed method, the system operator so alleviates the congestion that the network can more retain its security. The proposed method not only makes the system
more secure after congestion management than other methods already presented for this purpose but
also its cost of providing security is lower than the earlier methods. Test results of the proposed method
along with the earlier ones on the New-England test system elaborate the efciency of the proposed
method from the viewpoint of providing a better voltage stability margin and voltage prole as well
as a lower security cost.
Crown Copyright 2009 Published by Elsevier Ltd. All rights reserved.
1. Introduction
Congestion in a competitive electricity market occurs when the
transmission network is unable to accommodate all of the desired
transactions due to a violation in system operating limits. Especially, in systems having weak connections among areas, the congestion problem frequently occurs due to overloading or voltage
security requirements.
In a deregulated power system, with the advent of the common
carrier role for transmission by open access, generation is primarily
dened in transactions that are agreed to in open markets and economics are embedded in satisfaction of the contractual deliveries.
The difculty under this scenario is how to ration the limited
capacity of the network in a secure, equitable but efcient manner.
The problem of congestion may arise during the day-ahead dispatch in a day-ahead market, the hour-ahead dispatch in an
hour-ahead market, or the real-time operations of the system in
a balancing market [1]. Therefore, the management of congestion
is somewhat complex in competitive power markets and leads to
several disputes. Several Optimal Power Flow (OPF)-based congestion management schemes have been proposed [2]. In [3], an approach for relieving congestion using a minimum total shift in
the transactions is presented. However, it disregards the economic
value of the transaction adjustment. To enhance the approach,
some dispatch methods are proposed in [4]. They are based on
* Corresponding author. Tel.: +98 21 88891886; fax: +98 21 88731293.
E-mail address: msdesmaili@gmail.com (M. Esmaili).
0196-8904/$ - see front matter Crown Copyright 2009 Published by Elsevier Ltd. All rights reserved.
doi:10.1016/j.enconman.2009.06.006
2563
sible all power transactions in the power system. Securityoriented congestion management methods exert an extra fee referred to as security cost. Different methods may provide different
costs to enhance the same security level. The system operator is
responsible for system security and it has authority to change generator or demand powers to maintain a satisfactory level of system
security [19]. In a deregulated power market, the system operator
pays to market participants according to their bids to alter the
powers for a better security level. A higher security level leads to
a higher security cost, which nally results in higher prices of energy in power market. Therefore, it is the responsibility of system
operator to establish a fair level of security with a reasonable security cost.
It is a common practice to use the DC model of the power system for congestion management purposes [16]. In the DC method
[7], sometimes called the classical congestion management model,
some assumptions are made to get a simple model. All voltage
magnitudes are considered one per unit. Also, all network impedances are assumed to be pure reactance without any resistive part.
Besides, reactive powers are ignored and only active powers are
considered. Since reactive powers and voltages are not considered
in the DC model, a low efciency from voltage stability viewpoint
is expected with this model.
The AC model of power system [13] is also used for congestion
management. The AC model, based on the AC power ow model, is
expected to give more efcient results than the DC model from
voltage stability viewpoint.
The proposed method in [16], referred to as the security level
method here, proposes a congestion management technique in
which another set of constraints for a specied increased load level
(named security loading level) is dened in addition to those of
base case as shown in Fig. 1. Such a mechanism ensures that the
power system constraints are satised at both the base case and
security loading level. Of course, congestion management cost consists of an additional security cost compared with the case where
only base case constraints are considered. That is, the system operator pays all loads, regardless of their effect on voltage stability, to
maintain the security constraints at the security loading level.
The proposed method in this paper relieves congestion by taking into account the effect of market participants on the voltage
stability using the concept of effective bids. Raw bids, received
from demands and generators for the congestion market, are combined with their Voltage Stability Margin (VSM) sensitivity factors
to make sure that risky bidders are less contributed. In other
words, the participants are treated with their security-effective
bids rather than their raw bids. After congestion management
Security
Loading
Level
Base Case
Vmax
Vmin
Voltage
Collapse
Point
VSM
PDi
PDiSL
2564
Using the concept of effective bids, the proposed method mitigates congestion minimizing the following objective function:
Minimize:
up
@VSM
DVSM VSMGj VSM BC
;
up
up
DPGj
DPup
@PGj
Gj
@VSM
DVSM
VSMdown
VSM BC
Gj
SGj
j2SG
DP down
Gj
down
SGj
!
7
Subject to:
max
Pmin
Gj P Gj P Gj
max
Q min
Gj Q Gj Q Gj
Pmin
Dk
Pmax
Dk
10
Q Dk PDk tan/Dk
X
X
PGj ; Q Gn
Q Gj
PGn
11
PDk
j2SGn
PDn
12
j2SGn
PDk ;
Q Dn
k2SGn
PGn PDn jV n j
Q Dk
13
k2SDn
14
ib2SN
Q Gn Q Dn jV n j
15
ib2SN
V n V max
V min
n
n
16
jSm j Smax
m
17
PGj
PMC
Gj
PDk
down
DPup
Dk DP Dk
down
up
DPGj ; DPDk ; DPdown
Dk
DPup
Gj ;
j 2 SG
Bdown
Gj
PMC
Dk
DPup
Gj
DPdown
Gj
18
19
0 j 2 SG; k 2 SD; n 2 SN; m 2 SB
20
In the above equations, SG, SD, SN, and SB are the set of online generators, demands, nodes, and branches, respectively. Also, SGn and
SDn indicate the set of online generators and demands connected
to bus n, respectively. Eqs. (8) and (9) set active and reactive power
limits for generators, respectively. These limits are ones that generators would like to declare to the system operator as the permissible range of power for congestion management market and they
may not be the operating limits of machines. Eq. (10) sets active
power limits offered by demands as the power range for demand
side bidding. After rescheduling the demand active power by system operator to relieve congestion, its reactive power is changed
according to a constant power factor [16]. Eq. (11) adjusts reactive
power of demands considering a constant power factor when their
active power is rescheduled. Eq. (12) gives the total active and reactive generation at buses as the sum of generation units when multiple units are installed at a bus. Similarly, Eq. (13) gives the total
active and reactive load powers at buses when multiple demands
are present at a bus. Eqs. (14) and (15) require that the net injection
of active and reactive powers from buses be equal to powers exported through branches connected to buses. Voltage security limits
for all buses are set by (16). The thermal rating of branches including lines and transformers is limited by (17) in terms of apparent
power (MVA). Accepted rescheduling of generator active power in
up and down directions in the congestion market, as optimized by
down
in (18). Also, P MC
(7), is given by DP up
Gj indicates powers
Gj ; DP Gj
determined by the market clearing procedure. PGj is the nal
rescheduled active power of generator j due to congestion management. Similarly, PDk in (19) gives demand k nal rescheduled power
after relieving congestion. Finally, (20) connes all up and down
power changes due to congestion management to positive values.
DPdown
Gj
up
up DP Gj
@Pdown
Gj
j 2 SG
X Bup
Gj
DP down
Gj
VSMup
@VSM
Gj =VSM BC 1
;
up
DPup
@PGj
Gj =VSM BC
@VSM
@Pdown
Gj
VSMdown
=VSMBC 1
Gj
DPdown
=VSMBC
Gj
j 2 SG
;
j 2 SG
3
4
Since the purpose of using the VSM sensitivities is to rank units effects on the system VSM, it is possible to omit constant terms of
down
DP up
=VSMBC , and 1 in the Eqs. (3) and (4) and then
Gj =VSM BC ; DP Gj
consider only the variable terms of these equations. Finally, the desired VSM sensitivities for generators can be written as:
Sup
Gj
VSMup
Gj
VSM BC
Sdown
Gj
VSM down
Gj
;
VSMBC
j 2 SG
Similarly, the VSM sensitivity with respect to loads can be driven as:
Sup
Di
VSMup
Di
;
VSM BC
Sdown
Di
VSM down
Di
;
VSMBC
j 2 SD
down
where VSMup
show the system VSM after a little increDi and VSM Di
up
in the active power of load i,
ment DPDi and decrement DP down
Di
respectively. SD indicates the set of loads.
In (5) and (6), a sensitivity value greater than one implies that
the stability margin of the network is improved with the change.
2565
37
Demand
VSM up
Di (MW)
VSMdown
(MW)
Di
Sup
Di
Sdown
Di
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
1038
1035
711
748
674
1038
1038
1038
1040
1039
1040
1040
1039
1039
1039
1039
1039
1046
1037
1037
1040
1065
1042
822
1037
1037
1037
1035
1036
1035
1035
1036
1036
1036
1036
1036
1029
1037
1.00096
0.99807
0.68563
0.72131
0.64995
1.00096
1.00096
1.00096
1.00289
1.00193
1.00289
1.00289
1.00193
1.00193
1.00193
1.00193
1.00193
1.00868
1.00000
1.00000
1.00289
1.02700
1.00482
0.79267
1.00000
1.00000
1.00000
0.99807
0.99904
0.99807
0.99807
0.99904
0.99904
0.99904
0.99904
0.99904
0.99229
1.00000
Table 2
The sensitivity of the network VSM with respect to each generation.
GENCO
VSMup
(MW)
Gj
VSM down
(MW)
Gj
Sup
Gj
Sdown
Gj
1
2
3
4
5
6
7
8
9
10
1036
1025
1025
1035
1035
1035
1035
1036
1036
1037
1039
1050
1049
1040
1040
1040
1040
1039
1039
1037
0.99904
0.98843
0.98843
0.99807
0.99807
0.99807
0.99807
0.99904
0.99904
1.00000
1.00193
1.01254
1.01157
1.00289
1.00289
1.00289
1.00289
1.00193
1.00193
1.00000
using the CONOPT solver of GAMS 22.7 (General Algebraic Modeling System) software [23].
The base case scheduling when examined by power ow (within the PSS/E software package) does not make feasible all the
power transactions. Using the base case conguration, there are
some overloaded branches. Lines 78, 1314, 1619, 2324, and
2938 are overloaded to 351.0, 297.2, 477.5, 356.2, and 839.3
G
26
25
30
Table 1
The sensitivity of the network VSM with respect to each demand.
28
38
2
18
24
27
17
35
15
39
21
4
5
22
14
6
16
3
G
29
31
12
19
11
10
G
32
13
23
20
36
33
34
G
2566
MVA, while their ratings are 100, 200, 200, 200, and 500 MVA,
respectively. Thus, the operator has to employ one of the congestion management methods to mitigate the branch overloads.
Though all methods relieve the congestion and make feasible
power transactions, the network experiences a different postrescheduling status and a different security level using each
method.
The rst method implemented for congestion management is
the DC method minimizing the total payment to the market participants subject to security constraints of the power system DC model. Since reactive powers and voltages are not considered in the
network DC model, it may be expected to result in a lower reactive
support as well as a weak voltage prole after congestion
management.
The second implemented method is the AC congestion management minimizing the total payment to the market participants
subject to security constraints of the power system AC model. Despite the fact that the AC method relives the congestion, there is no
guarantee to securely operate the power system after rescheduling
generations and demands. In other words, the stability margin of
the network after congestion management may be low leading to
a vulnerable system.
The third implemented method, the security level, mitigates the
congestion guaranteeing the power system to be secure in both the
base case and security loading level (Fig. 1). This approach makes
the system more secure compared with the conventional methods.
However, it is expected to increase the payment of ISO because of
adding a new set of constraints corresponding to the security loading level. In addition, it includes the growth of all loads and does
not make any distinction between loads in the security loading level. Indeed, the growth of each load has its own effect on the stability of a power system.
The last implemented method, as the proposed method, alleviates the congestion considering the sensitivity of networks stability margin with respect to each load and generation. The
rescheduling of powers is so done that the stability margin of the
network is more retained. In other words, the implemented mech-
Generation, MW
1500
Pre-Rescheduling
DC
AC
Security Level
Proposed
1000
500
4
5
6
7
8
9
10
Generating Bus Number
Demands Rescheduled by Different Congestion Management Methods
Demand, MW
1500
Pre-Rescheduling
DC
AC
Security Level
Proposed
1000
500
8
10
12
Load Bus Number
14
16
18
Fig. 3. The rescheduled powers by the four implemented methods along with powers from the market clearing process.
2567
DC
AC
Security level
Proposed
45239.46
44551.53
50769.80
44910.46
0
6218.27 (14.0%)
358.93 (0.8%)
301
425
591
833
0.43
7.7
8.7
8.4
Voltage, p.u.
0.95
0.9
Proposed
Security Level
AC
DC
0.85
5
10
15
20
Bus Number
25
30
35
To more investigate the performance of the congestion management methods, the behavior of the test system after alleviating
congestion using the methods is evaluated under a few severe contingencies. To thoroughly examine the efciency of methods, a various range of contingencies including the outage of branches and
the trip of generators is chosen in the both single and double forms.
The results are shown in Table 4.
In Table 4, four critical contingencies, all making the system
unstable using the DC congestion management, are applied. The
rst single contingency, the outage of line 89, makes the network
rescheduled by the DC method unstable; however, the next methods result in a stable network after the contingency of course with
different VSM values. The next single contingency, the trip of generator 31, makes the system unstable if either the DC or the AC
method is used. However, the system retains stability in the
post-contingency if the two other methods are employed. Of
course, the 406 MW stability margin provided by the proposed
method in the post-contingency state is much greater than
94 MW margin provided by the security level method. Thus, the
post-contingency system is more robust using the proposed method compared with the security level method.
In Table 4, the two next contingencies are double contingencies,
which exert more stresses to the power system. The rst one is the
outage of branches 89 and 58. This phenomenon can occur if relays at bus 8 disconnect the two branches due to a fault at bus 8. In
such a case, the system is unstable if the DC, AC and security level
methods are employed. However, the proposed method can retain
the system stability in this difcult situation with the post-contingency VSM of 97 MW. The next double contingency is the trip of
generator at bus 32 and the outage of branch 78. The other methods fail to stabilize the system in the post-contingency state. In
contrast, the proposed method retains the stability with a good
margin of 198 MW.
2568
Table 4
Post-contingency VSMs with four reschedulings obtained from the implemented congestion management methods.
Contingency
DC method
AC method
Proposed method
Unstable
Unstable
Unstable
Unstable
Stable VSM = 39 MW
Unstable
Unstable
Unstable
Stable
Stable
Stable
Stable
Table A1
GENCO data for the New-England test system.
No.
P MC
Gj (MW)
P min
(MW)
Gj
P max
(MW)
Gj
Bup
($/MW h)
Gj
Bdown
($/MW h)
Gj
1
2
3
4
5
6
7
8
9
10
250.0
572.9
650.0
632.0
508.0
650.0
560.0
540.0
830.0
1000.5
100.0
100.0
100.0
100.0
100.0
100.0
100.0
100.0
100.0
100.0
1000.0
1000.0
1000.0
1000.0
1000.0
1000.0
1000.0
1000.0
1000.0
1200.0
17.00
20.00
17.00
20.00
20.00
20.00
18.00
16.00
20.00
17.00
24.00
24.00
19.00
24.00
24.00
24.00
24.00
20.00
24.00
21.00
VSM = 374 MW
VSM = 406 MW
VSM = 97 MW
VSM = 198 MW
Table A2
DISCO data for the New-England test system.
No.
P MC
Di (MW)
P min
Di (MW)
P max
(MW)
Di
Bup
($/MW h)
Di
Bdown
($/MW h)
Di
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
322.0
500.0
233.8
522.0
8.5
320.0
329.4
158.0
680.0
274.0
247.5
308.6
224.0
139.0
281.0
206.0
283.5
9.2
1104.0
225.4
350.0
163.7
365.4
6.0
224.0
230.6
110.6
476.0
191.8
173.3
216.0
156.8
97.3
196.7
144.2
198.5
6.4
772.8
418.6
650.0
333.9
678.6
11.05
416.0
428.2
205.4
884.0
356.2
321.8
401.2
291.2
180.7
365.3
267.8
368.6
12.0
1435.2
16.00
16.00
16.00
16.00
16.00
16.00
16.00
16.00
16.00
16.00
16.00
16.00
16.00
16.00
16.00
16.00
16.00
16.00
16.00
20.00
20.00
20.00
20.00
20.00
20.00
20.00
20.00
20.00
20.00
20.00
22.00
20.00
20.00
20.00
20.00
20.00
20.00
20.00
References
[1] Bompard Ettore et al. Congestion-management schemes: a comparative
analysis under a unied framework. IEEE Trans Power Syst
2003;18(1):34652.
[2] Kumar Ashwani, Srivastava SC, Singh SN. Congestion management in
competitive power market: a bibliographical survey. Electr Power Syst Res
2005;76(13):15364.
[3] Galiana FD, Ilic M. A mathematical framework for the analysis and
management of power transactions under open access. IEEE Trans Power
Syst 1998;13(2):6817.
[4] David AK. Dispatch methodologies for open access transmission systems. IEEE
Trans Power Syst 1998;13(1):4653.
[5] Fang RS, David AK. Transmission congestion management in an electricity
market. IEEE Trans Power Syst 1999;14(3):87783.
[6] Singh H, Hao S, Papalexopoulos A. Transmission congestion management in
competitive electricity markets. IEEE Trans Power Syst 1998;13(2):67280.
[7] Gribik PR, Angelidis GA, Kovacs RR. Transmission access and pricing with
multiple separate energy forward markets. IEEE Trans Power Syst
1999;14(3):86576.
[8] Glavitsch H, Alvarado F. Management of multiple congested conditions in
unbundled operation of a power system. IEEE Trans Power Syst
1998;13(3):10139.
[9] Shahidehpour M, Almoush M. Restructured electrical power systems:
operation, trading, and volatility. New York: Marcel Dekker; 2001.
[10] Philpott Andy B, Pettersen Erling. Optimizing demand-side bids in day-ahead
electricity markets. IEEE Trans Power Syst 2006;21(2):48898.
[11] Shahidehpour M, Tinney W, Fu Y. Impact of security on power systems
operation. Proc IEEE 2005;93(11):201325.
[12] IEEE/CIGRE joint task force on stability terms and denitions. Denition and
classication of power system stability. IEEE Trans Power Syst
2004;9(2):13871401.
2569
[18] Amjady Nima, Esmaili Masoud. Improving voltage security assessment and
ranking vulnerable buses of power systems with consideration of power
system limits. Int J Electr Power Energy Syst 2003;25(9):70515.
[19] Shahidehpour M, Yamin H, Li Z. Market operations in electric power systems,
forecasting, scheduling and risk management. NY: John Wiley and Sons Inc.;
2002.
[20] Hongjie J, Xiaodan Y, Yixin Y. An improved voltage stability index and its
application. Int J Electr Power Energy Syst 2005;27(8):56774.
[21] <http://psdyn.ece.wisc.edu/IEEE_benchmarks> [accessed June 2009].
[22] PSS/E 30 user manuals. USA: Shaw Power Technologies, Inc.; 2004.
[23] GAMS, General Algebraic Modeling System. <http://www.gams.com>
[accessed June 2009].