dc.contributorUniversidade Estadual Paulista (UNESP)
dc.date.accessioned2022-04-29T16:11:49Z
dc.date.accessioned2022-12-20T03:28:08Z
dc.date.available2022-04-29T16:11:49Z
dc.date.available2022-12-20T03:28:08Z
dc.date.created2022-04-29T16:11:49Z
dc.date.issued2015-04-01
dc.identifierInternational Review on Modelling and Simulations, v. 8, n. 2, p. 154-164, 2015.
dc.identifier2533-1701
dc.identifier1974-9821
dc.identifierhttp://hdl.handle.net/11449/232428
dc.identifier10.15866/iremos.v8i2.4047
dc.identifier2-s2.0-84938088807
dc.identifier.urihttps://repositorioslatinoamericanos.uchile.cl/handle/2250/5412565
dc.description.abstractThe transmission expansion planning (TEP) problem in modern power systems is a large-scale, mixed-integer, non-linear, and non-convex problem. The problem becomes even more complicated when the security constraints are taken into account as in some large-scale systems, finding the optimal solution is inaccessible. This paper presents a novel mathematical model to solve the security constraints of transmission system expansion planning problem via a constructive heuristic algorithm (CHA). The proposed CHA is extended to multi-stage planning. The basic idea comes from Garver’s work applied to the transportation model. Nevertheless, the proposed algorithm works with a hybrid linear model. The proposed CHA finds an acceptable solution in an iterative process, where in each step, a circuit is chosen by using a sensitivity index and is subsequently added to the system. Moreover, several simulation studies and tests were carried out on Garver, the South Brazilian system, and the North Brazilian system, to demonstrate the effectiveness of the proposed methodology.
dc.languageeng
dc.relationInternational Review on Modelling and Simulations
dc.sourceScopus
dc.subjectConstructive Heuristic Algorithm
dc.subjectMixed-Integer Non-Linear Programming
dc.subjectMultistage Transmission Expansion Planning
dc.subjectN-1 Security
dc.titleA constructive heuristic algorithm for multi-stage transmission expansion planning under N-1 security constraints
dc.typeArtículos de revistas


Este ítem pertenece a la siguiente institución