Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Abstract—In this paper, we propose a distributed algorithm to Vector of complex voltage on the
solve the yet explored distributed optimal power flow problem boundary buses of subsystem ,
with discrete control variables of large distributed power systems.
The proposed algorithm consists of two distinguished features: 1) which connects with subsystem .
a distributed algorithm for solving continuous distributed optimal
, .
power flow to serve as a core technique in the framework of ordinal
optimization (OO) strategy, and 2) implementing the OO strategy –dimensional vector of
in a distributed power system to select a good enough discrete discrete control variables, such
control variable solution. We have tested the proposed algorithm
for several cases on the IEEE 118-bus and Tai Power 244-bus as switching shunt capacitor
systems using a 4-PC network. The test results demonstrate the banks and transformer taps, etc.,
validity, robustness, and excellent computational efficiency of the corresponding to subsystem .
proposed distributed algorithm in getting a good enough feasible
solution. –dimensional discrete control
variables of the overall system
Index Terms—Discrete control variables, distributed computa-
tion, distributed optimal power flow, nonlinear programming, or- and .
dinal optimization. Solution space of for
subsystem .
NOMENCLATURE Solution space of .
Due to involved notations, in this section we illustrate those
frequently appear throughout the paper, and the rest will be il- Real and reactive power balance
lustrated in the context. equations of subsystem .
Total number of subsystems. Inequality constraints in
subsystem , such as security
Vector of continuous variables limits on voltage magnitude, real
consisting of real and reactive power line flows and real and
power generations and bus reactive power generation limits.
complex voltage corresponding to
subsystem . Vector of continuous variables in
the general CDOPF shown in (3)
Vector of continuous variables of corresponding to subsystem .
the overall system.
.
Objective function of subsystem .
Continuous variables on the
Objective function of the overall boundary buses of subsystem ,
system. which connects with subsystem .
Index set of subsystems
.
connecting with subsystem
. Equality constraints in the general
CDOPF (3).
represents
Manuscript received November 26, 2007; revised February 10, 2008. This the equality constraints on the
work was supported in part by the National Science Council, Taiwan, R.O.C.,
under Grant NSC95-2221-E-009-099-MY2. Paper no. TPWRS-00865-2007.
boundary buses of subsystem
C.-H. Lin is with the Department of Electronics Engineering, Kao Yuan Uni- but involving .
versity, Kaoshiung, Taiwan 821, R.O.C. (e-mail: chsinlin@cc.kyu.edu.tw).
S.-Y. Lin is with the Department of Electrical and Control Engineering, Na- .
tional Chiao Tung University, Hsinchu 300, Taiwan, R.O.C. (e-mail: sylin@cc.
nctu.edu.tw). Partition of .
Digital Object Identifier 10.1109/TPWRS.2008.926695
I. INTRODUCTION
Fig. 1. Example system formed by three interconnected subsystems.
where and denote the slack variables corresponding to The in (5) is the optimal
in subsystem . solution of the following QPP:
(7)
where the dual function is defined by (8) at the bottom of
subject to the page, in which we have put the inequality constraints in (6)
(3) as the domain of , denoted by and defined by
(9)
in which we can partition into
The DPQN method uses the following iterations to solve the
such that involves only, while involves . Thus, we
dual problem (7):
may use the following to replace the equality constants in (3):
(10)
(8)
1386 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 23, NO. 3, AUGUST 2008
(12)
where (13)
(14)
(15)
(16)
and the matrix in (13)–(16) is defined by the following: Fig. 2. Relationship between , , g , g , 1y , and 1y .
1) Complete Decomposition and Parallel Computation (Re- while varies for each iteration of the DPQN method as
solving the Difficulty Caused by Large Dimension): All the can be seen in Step 10.
computation formulae in the SQP and DPQN methods (5), (10),
Step 5) Once receiving all , , obtain from
(13)–(16), (18)–(20), and (22) are decoupled and can be carried
solving the th minimization subproblem in (22).
out independently and in parallel. This property resolves the dif-
ficulty caused by large dimensionality of CDOPF. Step 6) Send to subsystem for every .
2) Required Data Communication: As indicated previously,
Step 7) Once all are received, calculate
all the computation formulae in the SQP and DPQN methods
by (19) and (20).
are decoupled, however there are data communications required
in performing (14)–(16), (20) and (22). Specifically, to prepare Step 8) Solve from (18).
in (18), we need to perform (13)–(16) in subsystem ; while
preparing in (14)–(16), we require the data of or , Step 9) If , send a signal to the root subsystem
to inform the convergence of the DPQN method in this
, from subsystems , because
subsystem and go to Step 11 if or go
involves . Similar situations occur to computing
to Step 12 if . If , go to
in (20), in which we need from subsystem the data
Step 10.
to prepare and , and the data to perform (20).
In addition, to obtain from solving (22), we need the data Step 10) Update by (10) with an experienced
, and , from subsystems . However, to step-size , set and return to Step 4.
prepare the just mentioned data in subsystem , we need Step 11 (for root subsystem only) Once receiving the signal
the data from subsystem . Fortunately, the data required indicating the convergence of the DPQN method from all
in subsystem from subsystems (subsystem ) are subsystems, send a convergence signal of the DPQN method to
only those on the boundary buses. Therefore, the burden of data subsystem for all .
communication is very light. This indicates that the proposed Step 12) Once receiving the convergence signal of the DPQN
distributed algorithm for solving CDOPF is very suitable for method from the root subsystem, set . If
implementation in a distributed computer network. , send a signal to the root subsystem to inform
3) Convergence Determination and Synchronization of Dis- the convergence of the SQP method in this subsystem and
tributed Computation: Regarding convergence determination, wait for further convergence signal from the root subsystem;
we assign a subsystem namely the root subsystem to monitor otherwise, update by (5) with an experienced
the convergence of the SQP and DPQN methods in the dis- step-size , set and return to Step 1.
tributed computer network. Following is the distributed algo-
rithmic steps for solving CDOPF in each subsystem , and the Step 13 (for root subsystem only) Once receiving the signal
steps for determining the convergence will be executed in the indicating the convergence of the SQP method from all
root subsystem only, which will be indicated specifically. Re- subsystems, send a signal to all subsystems to continue the
garding the synchronization in each algorithmic step, we employ algorithmic steps in Distributed Algorithm II, which will be
the concept of asynchronous synchronization, which implies the presented later.
computations of an algorithmic step will start only when all
the required data from the connecting subsystems are B. OO Theory-Based Distributed Algorithm to Solve DOPFD
received. for a Good Enough Solution
4) Distributed Algorithm I for Subsystem : Now we are
For real-time application purpose, we would rather obtain a
ready to state the distributed algorithmic steps for subsystem
good enough solution within reasonable computation time than
to solve the CDOPF (3).
get the optimal solution using incredibly long time. The OO
theory [22], [23] is a recently developed optimization technique
Step 0) Initially guess and ; set , .
to solve hard optimization problems, such as the combinato-
Step 1) Calculate the values of , , , ; send rial optimization problem, for a good enough solution with high
probability using limited computation time. Based on the obser-
to subsystem for every .
vation that the performance order of discrete solutions is likely
Step 2) Once receiving from all subsystems . preserved even evaluated by a surrogate model, the OO theory
calculate , , (i.e., , ), and concludes the following: Suppose we simultaneously evaluate
a large set of alternatives very approximately and order them
(by (13)–(16)); send to subsystem for every . according to the approximate evaluation. Then there is high
Step 3) Once receiving from all subsystems , probability that we can find the actual good alternatives if we
limit ourselves to the top of the observed good choices.
go to Step 4.
According to this conclusion, we can quickly evaluate the es-
Step 4) Send to subsystem for every . timated performances of all discrete solutions in the candidate
discrete solution set using a surrogate model and rank them to
Note: The reason why we send and to subsystem select a set of top ranked solutions. Suppose we employ a more
for every in separate steps is because is constant refined surrogate model, there will be more actual good discrete
for the whole DPQN method in iteration of the SQP method, solutions contained in the selected set of top ranked solutions,
1388 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 23, NO. 3, AUGUST 2008
however at the cost of more evaluation time for each discrete so- the optimal for (1) is only a feasible solution of (23). Since
lution. Therefore, if the size of the primitive discrete solution set most of the objective functions considered in the OPF, such as
is huge, the above evaluation, ranking and selection process can total generation cost and total system losses, are continuously
repeat for more than one stage, such that 1) the employed surro- differentiable and locally convex, the neighboring discrete
gate models will be refined stage by stage, and 2) the set of top control solutions of the continuous optimal solution, , of (23)
ranked solutions selected in one stage will serve as the candidate should consist of good enough discrete control solutions of (1).
solution set of next stage. In the final stage, the exact model will Thus, we have reduced the size of candidate solution set, ,
be used to evaluate all discrete solutions of the largely trimmed to .
candidate solution set, and the resulted best discrete solution is However, , for example , is still a very large number.
the good enough solution that we seek. Thus, comparing with Thus, the second part of this stage is to further reduce the size
the exhaustive search method, in which the exact model is used of the candidate solution set from to based on sen-
to evaluate every discrete solution, the proposed OO strategy is a sitivity analysis, where , a faction of say , is prede-
process to select a good enough from the enormous using termined. To achieve this, we proceed as follows. Since some
limited computation time. However, some ranking and selection components of may already be very close to the closest dis-
are centralized behaviors. Thus, we need to assign the root sub- crete values or the discrete steps of some discrete control vari-
system, which is responsible for determining the convergence ables are very small such as the transformer tap ratio, we can
of SQP and DPQN methods in Distributed Algorithm I, to carry fix those components of to their closest discrete values if
out this task. Consequently, our idea to carry out some central- the corresponding deviations do not affect the optimal objec-
ized OO concept in a distributed power system is as follows. tive value of the CDOPF significantly. Thus, in the rest of this
Each subsystem will evaluate the estimated performances of stage, we will employ the sensitivity theory [25, Ch. 10, Sec.
and send the evaluation results to the root subsystem. The 10.7, p. 312] to find such components. The sensitivity theory
root subsystem will then rank and select a set of top ranked states that the sensitivity, or the gradient, of with respect to the
based on the gathering estimated performances of
value change of the equality constraint function
sent from all subsystems and send the subvector
of the selected to subsystem . Based on this idea, the equals the negative Lagrange multiplier, .
proposed distributed algorithm for solving DOPFD for a good We let and denote the th component of and
enough solution consists of three stages as described below. , respectively, and define and
1) Stage 1: There are two parts in this stage. The first part is
to reduce the size of the primitive candidate solution set, , to , where and denote
based on the optimal solution of the CDOPF. the closest discrete value on the right-hand side and left-hand
To achieve this, replacing the discrete in (1) by its con- side of , respectively. The deviation (or )
tinuous version and replacing the inequality constraints on
will cause the value change on and . Then
tie line real power flows by the transformed equality and simple
the deviation of the overall optimal objective value of (23), ,
inequality constraints, (2), we obtain a CDOPF shown in the
caused by the deviation (or ), denoted by
following:
(or ) can be calculated based on
the above mentioned sensitivity theory and chain rule by
subject to
(24)
2) Stage 2: In this stage, we will estimate the performance picking the best among as follows.
of the obtained in Stage 1 using sensitivity model When receiving the corresponding subvectors of the discrete
and select the top ranked , say 50, . control solutions resulted in Stage 2 from the root subsystem,
To do so, we will compute the estimated deviation of the op- all subsystems will cooperate to solve the CDOPFs. We let
timal objective value due to the deviation denote the
for each of the in subsystem by optimal solution of the CDOPF for the fixed . Once the
CDOPFs are solved, each subsystem will send the pairs of
to the root subsystem. The root sub-
system will calculate the objective value of the overall system
(25) for the given by taking the sum .
We denote as the corresponding to the smallest
The reason that supports (25) is exactly the same as , among . Then the
that supports (24) except for being a vector, while , associated with the will be the good
is a component. Then, subsystem will send the enough solution that we seek.
pairs of to the root subsystem. Remark 2: Solving CDOPFs seems to be computa-
Now in the root subsystem, we label these pos- tionally very intensive. In fact, it is not, because each is
neighboring to , and the initial operating point resulted from
sible as , and , the Stage 2 is already close to the solution. Therefore, in almost all
subvector of corresponding to subsystem , is one of the CDOPFs, it takes only one iteration of the Distributed Al-
the sent from subsystem . Due to the linear gorithm I excluding Step 0 to obtain the solution.
property of the sensitivity theory [25, Ch. 10, Sec. 10.7, p. Remark 3: We say that a is feasible if the CDOPF re-
312], we have , where sulted by setting the in (1) to be the given has optimal
, is the subvector of solution. Now, one of the conventional approaches to central-
corresponding to subsystem , and is one of ized OPF with discrete control variables is using an approxi-
the sent from subsystem . As indicated mating technique to obtain an approximate discrete control so-
previously, the optimal objective value of (1) is larger than lution then rounding off to the closest discrete values. However,
that of (23), because the optimal for (1) is only a feasible arbitrarily rounding off may cause infeasibility problem as in-
solution for (23). Therefore, smaller implies dicated in [16]. Our approach can circumvent such undesirable
a smaller deviation of the optimal objective value of (23) situation, because if there is at least one feasible among the
caused by the deviation . Thus, the root subsystem resulted in Stage 2, the good enough solution obtained in
will then rank these based on the corre- Stage 3 must be a feasible one. In other words, we significantly
sponding values of such that the with increase the probability of obtaining a good enough feasible so-
smaller has higher rank. Subsequently, we lution. For example, suppose half of the resulted in the
can pick the top ranked and relabel them as , first part of Stage 1 are feasible. The probability of getting fea-
. Then the root subsystem will send to subsystem sible by arbitrarily rounding off is then 0.5. However, the
the corresponding subvectors , , for probability that the good enough obtained by our approach
every . Thus, we have further reduced the size of is feasible is
the candidate solution set from to . In the meantime,
the probability that none of the is feasible
the root subsystem will inform each subsystem to proceed with
next stage.
3) Stage 3: In this stage, we will use the exact model to Now we are ready to state the algorithmic steps of the dis-
evaluate the resulted in Stage 2, and the best one is tributed algorithm for each subsystem to solve DOPFD for a
the good enough that we seek. good enough solution, and the steps executed only in the root
The exact model for evaluating the discrete control solutions subsystem will be specifically indicated.
, obtained in Stage 2 is (1), but in which
the is replaced by the fixed and becomes a CDOPF. C. Distributed Algorithm II for Subsystem
Replacing the inequality constraints on tie line real power flows
by the transformed equality and simple inequality constraints Step 0 (for root subsystem only) Command all subsystems
(2), the exact model will be the same as (23) except for substi- to start.
tuting the continuous variables by the fixed . Using
the similar treatment as to (23), we can set , Step 1) When receiving the command from the root subsystem,
perform the first part of Stage 1 using Distributed Algorithm I.
, and , where ,
and have been defined in the paragraph followed by (23). Step 2) When receiving the convergence signal of CDOPF
Thus, we can use Steps 1–13 of the Distributed Algorithm I from the root subsystem, perform the second part of Stage
to solve the resulted CDOPF. Note that we do not need Step 1, such that will be fixed at one side of the
0 of Distributed Algorithm I, because the resulted operating closest discrete value. For the rest yet fixed components
point from Stage 2 (that is the optimal solution of the CDOPF of , we have possible , which are relabeled as
(23), but in which is replaced by ) will be the ini- , . Compute by (25), where
tial operating point of this Stage. Thus we can proceed with as indicated in Stage 2. Send the
1390 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 23, NO. 3, AUGUST 2008
model: Pentium IV, 2.66-GHz processor and 1.25 GB of RAM. CPU time is less than one third but more than one fourth of the
We assign subsystems and as the root subsystems of the CPU time consumed by the centralized version. The reason that
IEEE 118-bus and TP 244-bus systems, respectively. The pro- the Distributed Algorithm II is not four times faster than the
gram is written in . We employ the TCPIP as the communica- centralized version when using the 4-PC network is because the
tion protocol in the 4-PC network. We set in Steps 9 sizes of the four subsystems are different, and there exists some
and 12 in Distributed Algorithm I and in Step 3 of Dis- but very slight communication overhead. It is worth noting that
tributed Algorithm II. The final objective value of the overall the good enough solutions we obtained in all the eight cases
system in each case obtained by the Distributed Algorithm II are feasible. This reflects the significantly improved probability
and corresponding CPU time consumed in the 4-PC network is of our approach in getting feasible discrete control solutions as
shown in the second and the eighth columns in Table III. The commented in Remark 3. Although we cannot find any com-
consumed CPU time including the communication overhead in peting methods in dealing with the DOPFD considered in this
the 4-PC network is counted until the root subsystem determines paper so far, we can treat (1) as a centralized OPF with discrete
the good enough discrete control solution and sends the corre- control variables for all the eight cases and solve them using
sponding subvector to each subsystem. the global searching techniques GA and TS methods associated
To illustrate the reduction of the search space of discrete con- with the combination of SQP with the DPQN methods to solve
trol variables in our approach, we take the case (1,1,1) as an the centralized CDOPF. In the employed GA [26], we use a
illustrative example. The size of the original search space simple coding scheme of 0 and 1 strings to represent all pos-
is , because each sible in , and each represents a population in GA. We
transformer tap has 32 discrete steps and each switching capac- randomly select 20 from as our initial populations. The
itor has four capacitor banks. After executing Step 1 of Dis- fitness of a population is set to be the reciprocal of the objec-
tributed Algorithm II (i.e., part 1 of Stage 1), the size of search tive value of (1), in which is set to be the population , and
space is reduced from 2.237 to is solved by the combination of the SQP and DPQN methods in
. At this point, each discrete control variable single PC. The members in the mating pool are selected from
has two choices of discrete values, or . After ex- the pool of populations using roulette wheel selection scheme
based on the fitness values. We set the probability of selecting
ecuting Step 2 (i.e., part 2 of Stage 1), we found that the op-
members in the mating pool to serve as parents for crossover
timal objective value of the CDOPF (23) is very insensitive to
to be . We use a single point crossover scheme and
the transform tap ratio due to two reasons: 1) the values of assume the mutation probability to be . For each
and are insensitive to the deviation of transformer of the eight cases, we stop GA when it consumes around 150
tap ratio and 2) the discrete step of the transform tap ratio is very times of the CPU time consumed by the centralized version of
small. On the other hand, optimal objective value is more sen- Distributed Algorithm II and record the best so far objective
sitive to capacitor due to larger discrete step unless the optimal values and the consumed CPU time in the fourth and the tenth
continuous capacitor value is already close to one of the neigh- columns of Table III. The iterative mechanism of the employed
boring discrete values. Thus, all the transformer taps and half of TS method is stated in the following. Starting from a randomly
the switching capacitors of each subsystem are fixed at the side selected from , in each iteration of the TS method, we ran-
of closest discrete value that achieves as defined domly evaluate one third of the neighboring of the current
in part 2 of Stage 1. At this point, we have further reduced the and accept the best one to be the new based on the tabu
size of the search space from 1.1 to . list and a criterion of global aspiration by objective [26]. Noting
After executing Step 3 (i.e., Stage 2), the best 50 out of the 1024 that evaluating the objective value of (1) for a given in the
possible resulted from Step 2 are selected based on the sen- TS method is the same as in GA, we apply TS method to all
sitivity model. At this point, we have further reduced the size of eight cases. For each of the eight cases, we also stop the method
the search space from 1024 to 50. Applying the exact model to when it consumes around 150 times of the CPU time consumed
evaluate the 50 possible resulted from Step 3, that is ex- by the centralized Distributed Algorithm II and record the best
ecuting Steps 4 and 5 (i.e., Stage 3), the best is the good so far objective value and the consumed CPU times in the sixth
enough discrete control variable solution. From this case, we and the eleventh columns in Table III. From the fourth and sixth
see that if we apply the exhaustive search method to find the op- columns of Table III, we see that in most of the cases, GA out-
timal for (1), we need to solve 2.237 CDOPFs. How- performs TS method, because of its capability of decentraliza-
ever, we only need to solve 51 CDOPFs to obtain a good enough tion. From the fifth and seventh columns, we can observe that
. Moreover, the 50 CDOPFs solved in Steps 4 and 5 take one when the number of discrete control variables increases in the
iteration only. This manifests the dramatic computation time re- same system for the same objective function, the performance
duction in our approach. of both GA and TS methods degrade, because the improvement
To verify our results, we also implement the Distributed Al- of the best so far objective values becomes more sluggish. Fur-
gorithm II in single PC and apply to the eight cases. The final thermore from the third, fifth, seventh, ninth, tenth and eleventh
objective values shown in the third column of Table III are ex- columns, we find that when both GA and TS methods consumed
actly the same as that obtained in the 4-PC network, and the around 150 times of the CPU time consumed by the central-
consumed CPU times are shown in the ninth column. ized version of Distributed Algorithm II, their best so far objec-
This demonstrates that Distributed Algorithm II is success- tive values are still 23.25% and 24.63%, on the average, more
fully implemented in a computer network, and the consumed than the objective values obtained by the centralized version of
1392 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 23, NO. 3, AUGUST 2008
Distributed Algorithm II, respectively. On the other hand, using [12] H. Chang and S.-S. Lin, “A MPBSG technique based parallel dual-type
less than one third of the CPU time, the Distributed Algorithm method for solving distributed optimal power flow problems,” IEICE
Trans. Fundam. Electron., Commun., Comp. Sci., pp. 260–269, Jan.
II implemented in 4-PC network can obtain the same objective 2006.
value as that obtained by the centralized version. These indi- [13] A. Bakirtzis and A. Meliopoulos, “Incorporation of switching opera-
tion in power system corrective control computations,” IEEE Trans.
rect comparisons demonstrate the computational efficiency of Power Syst., vol. 2, no. 3, pp. 669–676, Aug. 1987.
Distributed Algorithm II and the goodness of the obtained good [14] A. Monticelli and W. Liu, “Adaptive movement penalty method for the
enough solutions. The feasibility and the goodness of the ob- Newton optimal power flow,” IEEE Trans. Power Syst., vol. 7, no. 1,
pp. 334–340, Feb. 1992.
tained good enough solutions in all eight cases confirm the ro- [15] W. Liu, A. Papalexopoulos, and W. Tinney, “Discrete shunt controls
bustness of our algorithm. in a Newton optimal power flow,” IEEE Trans. Power Syst., vol. 7, no.
4, pp. 1509–1520, Nov. 1992.
[16] W. Tinney, J. Bright, K. Demaree, and B. Hughes, “Some deficien-
cies in optimal power flow,” in Proc. IEEE PICA Conf., May 1987, pp.
V. CONCLUSION 164–169.
[17] S.-Y. Lin, Y.-C. Ho, and C.-H. Lin, “An ordinal optimization theory
In this paper, we have proposed a distributed algorithm to based algorithm for solving the optimal power flow problem with dis-
deal with DOPFD of large distributed power systems. We use a crete control variables,” IEEE Trans. Power Syst., vol. 19, no. 1, pp.
4-PC network to implement the proposed distributed algorithm 276–286, Feb. 2004.
[18] L. Chen, H. Suzuki, and K. Katou, “Mean field theory for optimal
and apply to the DOPFD on the IEEE 118-bus and TP 244-bus power flow,” IEEE Trans. Power Syst., vol. 12, no. 4, pp. 1481–1486,
systems. We have ascertained the robustness of our distributed Nov. 1997.
algorithm in the aspects of feasibility and goodness of the ob- [19] A. Bakirtzis, P. Biskas, C. Zoumas, and V. Petridis, “Optimal power
flow by enhanced genetic algorithm,” IEEE Trans. Power Syst., vol.
tained solution; moreover, the computational speed of our dis- 17, no. 2, pp. 229–236, May 2002.
tributed algorithm is at least three times faster than the central- [20] T. Kulworawanichpong and S. Sujitjorn, “Optimal power flow using
ized version in all the test cases when using a 4-PC network. tabu search,” IEEE Power Eng. Rev., vol. 22, no. 6, pp. 37–40, Jun.
2002.
[21] J. T. Ma and L. L. Lai, “Evolutionary programming approach to reac-
tive power planning,” Proc. Inst. Elect. Eng., Gen., Transm., Distrib.,
ACKNOWLEDGMENT vol. 143, no. 4, pp. 365–370, Jul. 1996.
[22] Y. C. Ho, Soft Optimization for Hard Problem. Cambridge, MA: Har-
The authors would like to thank the anonymous reviewers vard Univ. Press, 1996, Lecture Notes.
who gave them constructive comments and helpful suggestions [23] T. W. E. Lau and Y.-C. Ho, “Universal alignment probability, and
subset selection for ordinal optimization,” J. Optim. Theory Appl., vol.
to improve the readability of their paper. The authors also would 93, no. 3, pp. 455–489, Jun. 1997.
like to thank Mr. C.-Z. Lin for his efforts in setting up the PC net- [24] C.-H. Lin and S.-Y. Lin, “A new dual-type method used in solving
work, establishing the communication between PCs and typing optimal power flow problems,” IEEE Trans. Power Syst., vol. 12, no.
4, pp. 1667–1675, Nov. 1997.
this paper. [25] D. Luenberger, Linear and Nonlinear Programming, 2nd ed.
Reading, MA: Addison-Wesley, 1984.
[26] S. Sait and H. Youssef, Iterative Computer Algorithms With Applica-
REFERENCES tion in Engineering: Solving Combinatorial Optimization Problems.
Los Alamitos, CA: IEEE Computer Society, 1999.
[1] B. Stott, J. L. Marinho, and O. Alsac, “Review of linear programming
applied to power system rescheduling,” in Proc. IEEE PICA Conf., Ch’i-Hsin Lin was born in Taiwan, R.O.C. He
1979, pp. 142–154. received the B.S. degree in electrical engineering
[2] T. C. Giras and S. N. Talukdar, “Quasi-Newton method for optimal from Feng Chia University, Taichung, Taiwan, the
power flows,” Int. J. Elect. Power Energy Syst., vol. 3, no. 2, pp. 59–64, M.S. degree in electrical engineering from National
Apr. 1981. Tsing Hua University, Hsinchu, Taiwan, and Ph.D.
[3] R. C. Burchett, H. H. Happ, and D. R. Vierath, “Quadratically conver- degree in electrical and control engineering from
gent optimal power flow,” IEEE Trans. Power App. Syst., vol. PAS-103,
Chiao Tung University, Hsinchu, in 1989, 1991, and
no. 10, pp. 2864–2880, Oct. 1984.
1996, respectively.
[4] D. I. Sun, I. Hu, G. Lin, C. J. Lin, and C. M. Chen, “Experiences with
implementing optimal power flow for reactive scheduling in the Taiwan He joined the Department of Electronic Engi-
power system,” IEEE Trans. Power Syst., vol. 3, no. 3, pp. 1193–1200, neering at the Kao Yuan University, Kaoshiung,
Aug. 1988. Taiwan, R.O.C., in 1998 and has been a Associate
[5] Y. C. Wu, A. S. Debs, and R. E. Marsten, “A direct nonlinear predictor- Professor since 2003. His major research interests include large-scale power
corrector primal-dual interior point algorithm for optimal power flows,” systems and ordinal optimization theory and applications.
IEEE Trans. Power Syst., vol. 9, no. 2, pp. 876–883, May 1994.
[6] B. H. Kim and R. Baldick, “Coarse-grained distributed optimal power
flow,” IEEE Trans. Power Syst., vol. 12, no. 2, pp. 932–939, May 1997.
[7] B. H. Kim and R. Baldick, “A comparison of distributed optimal power Shin-Yeu Lin was born in Taiwan, R.O.C. He
flow algorithms,” IEEE Trans. Power Syst., vol. 15, no. 2, pp. 599–604, received the B.S. degree in electronics engineering
May 2000. from National Chiao Tung University, Hsinchu.
[8] D. Hur, J.-K. Park, and B. H. Kim, “Evaluation of convergence rate in Taiwan, R.O.C., the M.S. degree in electrical engi-
the auxiliary problem principle distributed optimal power flow,” Proc.
neering from University of Texas at El Paso, and the
Inst. Elect. Eng., Gen., Transm., Distrib., vol. 149, no. 5, pp. 525–532,
D.Sc. degree in systems science and mathematics
Sep. 2002.
[9] D. Hur, J.-K. Park, B. H. Kim, and K.-M. son, “Security constrained from Washington University, St. Louis, MO, in 1975,
optimal power flow for the evaluation of transmission capability on 1979, and 1983, respectively.
korea electric power system,” in Proc. IEEE Power Eng. Soc. Summer From 1984 to 1985, he was with Washington Uni-
Meeting, 2001, vol. 2, pp. 1133–1138. versity working first as a Research Associate and then
[10] F. J. Nogales, F. J. Prieto, and A. J. Conejo, “A decomposition method- a Visiting Assistant Professor. From 1985 to 1986, he
ology applied to the multi-area optimal power flow problem,” Ann. was with GTE Laboratory working as a Senior MTS. He joined the Department
Oper. Res., vol. 120, no. 1-4, pp. 99–116, Apr. 2003. of Electrical and Control Engineering at National Chiao Tung University in 1987
[11] S.-S. Lin and H. Chang, “An efficient algorithm for solving BCOP and and has been a Professor since 1992. His major research interests include op-
implementation,” IEEE Trans. Power Syst., vol. 22, no. 1, pp. 275–284, timal power flow, ordinal optimization theory and applications, and distributed
Feb. 2007. computations.