{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,3,31]],"date-time":"2023-03-31T10:41:21Z","timestamp":1680259281354},"reference-count":18,"publisher":"Walter de Gruyter GmbH","issue":"12","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,18]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Optimal power flow is a widely used tool in power system planning and management. Due to the complexity of the power system both in terms of number of variables, degrees of freedom and uncertainty, there is a continuous effort to find more efficient computational methods to solve optimal power flow problems. This article presents a novel method to speed-up the solution of a security constraint optimal power flow problem. An unconventional warm start based on the training of a neural network is investigated as an option to improve the computational efficiency of the optimization problem. The principle of the method and the validity of the approach is demonstrated by different analysis performed on the IEEE14 test grid and based on a linearized mathematical formulation of the problem. The results show the effectiveness of the method in reducing the number of iterations needed to converge to global optimum.<\/jats:p>","DOI":"10.1515\/auto-2020-0072","type":"journal-article","created":{"date-parts":[[2020,11,30]],"date-time":"2020-11-30T20:59:31Z","timestamp":1606769971000},"page":"1035-1043","source":"Crossref","is-referenced-by-count":0,"title":["Artificial intelligence and optimization: a way to speed up the security constraint optimal power flow"],"prefix":"10.1515","volume":"68","author":[{"given":"Marco","family":"Giuntoli","sequence":"first","affiliation":[{"name":"Hitachi ABB Power Grids , Mannheim , Germany"}]},{"given":"Veronica","family":"Biagini","sequence":"additional","affiliation":[{"name":"Hitachi ABB Power Grids , Mannheim , Germany"}]},{"given":"Moncef","family":"Chioua","sequence":"additional","affiliation":[{"name":"Poly-technique Montreal , Montreal , Canada"}]}],"member":"374","published-online":{"date-parts":[[2020,11,27]]},"reference":[{"key":"2023033109532069840_j_auto-2020-0072_ref_001_w2aab3b7d920b1b6b1ab2ab1Aa","doi-asserted-by":"crossref","unstructured":"Biagini, V., M. Subasic, A. Oudalov and J. Kreusel (2020): \u201cThe autonomous grid: Automation, intelligence and the future of power systems,\u201d Elsevier: Energy Research and Social Science, 65.","DOI":"10.1016\/j.erss.2020.101460"},{"key":"2023033109532069840_j_auto-2020-0072_ref_002_w2aab3b7d920b1b6b1ab2ab2Aa","doi-asserted-by":"crossref","unstructured":"Biskas, P.\u2009N. and A. Bakirtzis (2004): \u201cDecentralised security constrained dc-opf of interconnected power systems,\u201d IEE Proceedings \u2013 Generation, Transmission and Distribution, 151, 1350\u20132360.","DOI":"10.1049\/ip-gtd:20041063"},{"key":"2023033109532069840_j_auto-2020-0072_ref_003_w2aab3b7d920b1b6b1ab2ab3Aa","doi-asserted-by":"crossref","unstructured":"Capitanescu, F., J.\u2009L. Martinez Ramos, et al. (2011): \u201cState-of the art, challenges, and future trends in security constrained optimal power flow,\u201d Electric Power Systems Research, 81, 1731\u20131741.","DOI":"10.1016\/j.epsr.2011.04.003"},{"key":"2023033109532069840_j_auto-2020-0072_ref_004_w2aab3b7d920b1b6b1ab2ab4Aa","doi-asserted-by":"crossref","unstructured":"Fioretto, F., T.\u2009W. Mak and P.\u2009V. Hentenryck (2020): \u201cPredicting ac optimal power flows: Combining deep learning and lagrangian dual methods,\u201d Proceeding of AAAI 2020 conference.","DOI":"10.1609\/aaai.v34i01.5403"},{"key":"2023033109532069840_j_auto-2020-0072_ref_005_w2aab3b7d920b1b6b1ab2ab5Aa","doi-asserted-by":"crossref","unstructured":"Giuntoli, M., V. Biagini and K. Sch\u00f6nleber (2019): \u201cNovel formulation of ptdf and lodf matrices for security constrained optimal power flow for hybrid ac and dc grids,\u201d Innovative Smart Grid Technologies Conference Europe (ISGT Europe), IEEE PES.","DOI":"10.1109\/ISGTEurope.2019.8905672"},{"key":"2023033109532069840_j_auto-2020-0072_ref_006_w2aab3b7d920b1b6b1ab2ab6Aa","unstructured":"Glorot, X., A. Bordes and Y. Bengio (2011): \u201cDeep sparse rectifier neural networks,\u201d Proceedings of the 14th International Conference on Artificial Intelligence and Statistics (AISTATS)."},{"key":"2023033109532069840_j_auto-2020-0072_ref_007_w2aab3b7d920b1b6b1ab2ab7Aa","unstructured":"Goodfellow, I., Y. Bengio and A. Courville (2016): Deep Learning, The MIT Press."},{"key":"2023033109532069840_j_auto-2020-0072_ref_008_w2aab3b7d920b1b6b1ab2ab8Aa","unstructured":"Kingma, D. and J. Ba (2014): \u201cAdam: A method for stochastic optimization,\u201d International Conference on Learning Representations."},{"key":"2023033109532069840_j_auto-2020-0072_ref_009_w2aab3b7d920b1b6b1ab2ab9Aa","doi-asserted-by":"crossref","unstructured":"Molzahn, D.\u2009K., F. D\u00f6rfler, et al. (2017): \u201cA survey of distributed optimization and control algorithms for electric power systems,\u201d IEEE Transactions on Smart Grid, 8, 2941\u20132962.","DOI":"10.1109\/TSG.2017.2720471"},{"key":"2023033109532069840_j_auto-2020-0072_ref_010_w2aab3b7d920b1b6b1ab2ac10Aa","doi-asserted-by":"crossref","unstructured":"Muter, I., S.\u2009I. Birbil and K. B\u00fclb\u00fcl (2012): \u201cSimultaneous column-and-row generation for large-scale linear programs with column-dependent-rows.\u201d","DOI":"10.1007\/s10107-012-0561-8"},{"key":"2023033109532069840_j_auto-2020-0072_ref_011_w2aab3b7d920b1b6b1ab2ac11Aa","doi-asserted-by":"crossref","unstructured":"Overbye, T., X. Cheng and Y. Sun (2004): \u201cA comparison of the ac and dc power flow models for lmp calculations,\u201d Proceedings of the 37th Annual Hawaii International Conference on System Sciences.","DOI":"10.1109\/HICSS.2004.1265164"},{"key":"2023033109532069840_j_auto-2020-0072_ref_012_w2aab3b7d920b1b6b1ab2ac12Aa","unstructured":"Pan, X., T. Zhao and M. Chen (2019): \u201cDeepopf: A deep neural network approach for security-constrained dc optimal power flow,\u201d arXiv preprint arXiv:1910.14448."},{"key":"2023033109532069840_j_auto-2020-0072_ref_013_w2aab3b7d920b1b6b1ab2ac13Aa","doi-asserted-by":"crossref","unstructured":"Paucar, V.\u2009L. and M.\u2009J. Rider (2002): \u201cArtificial neural networks for solving the power flow problem in electric power systems,\u201d Elsevier: Electric Power System Research, 62, 139\u2013144.","DOI":"10.1016\/S0378-7796(02)00030-5"},{"key":"2023033109532069840_j_auto-2020-0072_ref_014_w2aab3b7d920b1b6b1ab2ac14Aa","unstructured":"Wood, A.\u2009J., B.\u2009F. Wollenberg and G.\u2009B. Shebl\u00e9 (2013): Power Generation, Operation, and Control, Wiley."},{"key":"2023033109532069840_j_auto-2020-0072_ref_015_w2aab3b7d920b1b6b1ab2ac15Aa","doi-asserted-by":"crossref","unstructured":"Xavier, A.\u2009S., F. Qiu and S. Ahmed (2019): \u201cLearning to solve large-scale security-constrained unit commitment problems.\u201d","DOI":"10.1287\/ijoc.2020.0976"},{"key":"2023033109532069840_j_auto-2020-0072_ref_016_w2aab3b7d920b1b6b1ab2ac16Aa","doi-asserted-by":"crossref","unstructured":"Xavier, A.\u2009S., F. Qui, F. Wang and P.\u2009R. Thimmapuram (2020): \u201cTransmission constraint filtering in large-scale security-constrained unit commitment,\u201d IEEE Transactions on Power Systems.","DOI":"10.1109\/TPWRS.2019.2892620"},{"key":"2023033109532069840_j_auto-2020-0072_ref_017_w2aab3b7d920b1b6b1ab2ac17Aa","doi-asserted-by":"crossref","unstructured":"Yalcinoz, T. and M.\u2009J. Shor (1998): \u201cNeural networks approach for solving economic dispatch problem with transmission capacity constraints,\u201d IEEE Transactions on Power Systems, 13, 307\u2013313.","DOI":"10.1109\/59.667341"},{"key":"2023033109532069840_j_auto-2020-0072_ref_018_w2aab3b7d920b1b6b1ab2ac18Aa","unstructured":"Yindong, S. and N. Yudong (2008): \u201cColumn generation approaches to large driver scheduling problems,\u201d IEEE Chinese Control Conference."}],"container-title":["at - Automatisierungstechnik"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.degruyter.com\/view\/journals\/auto\/68\/12\/article-p1035.xml","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/auto-2020-0072\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/auto-2020-0072\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,31]],"date-time":"2023-03-31T10:21:18Z","timestamp":1680258078000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/auto-2020-0072\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,18]]},"references-count":18,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2020,11,27]]},"published-print":{"date-parts":[[2020,11,18]]}},"alternative-id":["10.1515\/auto-2020-0072"],"URL":"https:\/\/doi.org\/10.1515\/auto-2020-0072","relation":{},"ISSN":["2196-677X","0178-2312"],"issn-type":[{"value":"2196-677X","type":"electronic"},{"value":"0178-2312","type":"print"}],"subject":[],"published":{"date-parts":[[2020,11,18]]}}}