Risk-Limiting Scheduling of Optimal Non-Renewable Power Generation for Systems with Uncertain Power Generation and Load Demand

This study tackles a risk-limiting scheduling problem of non-renewable power generation for large power systems, and addresses potential violations of the security constraints owing to the volatility of renewable power generation and the uncertainty of load demand. To cope with the computational challenge that arises from the probabilistic constraints in the considered problem, a computationally efficient solution algorithm that involves a bisection method, an off-line constructed artificial neural network (ANN) and an on-line point estimation method is proposed and tested on the IEEE 118-bus system. The results of tests and comparisons reveal that the proposed solution algorithm is applicable to large power systems in real time, and the solution obtained herein is much better than the conventional optimal power flow (OPF) solution in obtaining a much higher probability of satisfying the security constraints.


Introduction
There is a growing interest in utilizing renewable energy such as wind and solar as the power generation sources to overcome the global climate change induced by carbon emission [1][2][3][4].Additionally, the economic incentives based demand response has prevailed recently to improve the efficiency of electricity utilization and reduce carbon emission [5].However, to integrate the distributed renewable energy sources and increase the participation of demand response, it is necessary to transform the traditional electricity grid into a smart grid [6].The smart grid itself is simply the application of modern communication infrastructure to various segments of the electricity grid.However, the intermittency of the electricity supplied by renewable energy sources and the uncertain load demand caused by demand response in a modern power system require some traditional power system operations to consider these uncertainties [7,8].For example, Dvorkin et al. [9] used a hybrid stochastic/interval approach to tackle the transmission-constrained unit commitment problem with uncertainties of wind power generation and load demand.Wu et al. [10] proposed a day-ahead stochastic scheduling model to cope with the hourly forecast errors of system loads and variable renewable sources.Ahmadi-Khatir et al. [11] proposed a decentralized method to optimally schedule generating units for systems under wind power uncertainties.Kusiak et al. discuss wind turbine capacity [12].In this paper, the schedule of non-renewable power generation in a large power system with uncertain power generation and load demand is under consideration.
The challenge posed by uncertain power generation and load demand in scheduling the non-renewable power generation is to maintain the power balance at all times and satisfy the security constraints on the security terms of interest, which are the bus voltage magnitude and the transmission line real power flow.In general, the scheduled value of optimal non-renewable power generation is the solution of optimal power flow (OPF), in which the renewable power generation and load demand are set to their predicted values, which differ from the actual values and cause a power mismatch in practice.Accordingly, the system operator should re-dispatch the scheduled optimal non-renewable power generation to maintain the power balance.This re-dispatch may cause the security constraints violated.Therefore, the purpose of this paper is to find a risk-limiting schedule of optimal non-renewable power generation to reduce the probability of violating security constraints after the re-dispatch in the presence of uncertain power generation and load demand.In past decades, numerous mathematical programming methods for solving deterministic OPF problems of the traditional electricity grid were proposed.For example, the successive linear programming method [13], the successive quadratic programming method [14], the Lagrange Newton method [15], the primal-dual interior point method [16], the dual-type method [17], the multi-objective programming method [18], the hybrid algorithm [19], the modified shuffle frog leaping (SFL) algorithm [20], the population based algorithm [21], etc.However, the aforementioned methods cannot be used to solve the problem considered in this paper.
Setting restrictive bounds for the security constraints in the OPF problem formulation can reduce the risk of violating the security constraints in practice; however, more restrictive bounds result in a larger scheduled optimal non-renewable power generation cost.Therefore, to minimize the scheduled optimal non-renewable power generation cost, the problem formulation of the proposed risk-limiting schedule of optimal non-renewable power-generation (RSONP) is to determine the least restrictive bounds that yield the required probability of satisfying the security constraints after the re-dispatch.Few articles have discussed this issue.Although Varaiya et al. [22] proposed a dispatch method with limiting risk, they ignored security constraints and considered only the need for power generation to satisfy load demand.Attaching a probability to the satisfaction of security constraints, Zhang and Li [23] developed a chance constrained programming (CCP) method for solving OPF with load uncertainty.Lin and Lin [24] proposed a risk-limiting OPF (RLOPF) method to solve the RLOPF problem for systems with a high penetration of wind power; however, they did not take into account the uncertainty of load demand.Therefore, the RSONP problem with uncertain power generation and load demand remains unsolved.Furthermore, both the CCP method and the RLOPF method were experimentally tested using small systems [23,24].Hence, the contribution of this paper is to propose a computationally efficient RSONP algorithm to solve the RSONP problem of a large power system.This paper is organized as follows.Section 2 presents the method for solving the RSONP problem.Section 3 presents the test results and discussions.Section 4 presents the conclusions and further research.

Statement and Computational Challenges of Risk-Limiting Schedule of Optimal Non-Renewable Power-Generation Problem
For simplicity of presentation, the only renewable energy source considered herein is wind.However, solar power can be easily included in the formulated RSONP problem and the proposed RSONP algorithm.

Conventional Optimal Power Flow Problem
The OPF problem has various formulations.In this paper, the following conventional optimal power flow (COPF) problem is considered [8]. where the set of security constraints with normal bounds; and u G i ≤ u G i ≤ u G i represents the power generation constraint at bus i. Normally, For notational simplicity, the aforementioned security constraints are rewritten as , where m = N + |L|, and |L| is the total number of transmission lines, so m is the total number of security constraints.Notably, h o j = −h o j for the transmission line real power flow, and the renewable power generation is assumed to have no cost.

Statement of Risk-Limiting Schedule of Optimal Non-Renewable Power-Generation Problem
As indicated in Section 1, the RSONP problem is to determine the least restrictive bounds for security constraints in the OPF problem formulation that yield the required probability η that the security constraints will be satisfied in practice as follows: where x s represents the random state-vector after re-dispatching (RSAR), which is resulted from the scheduling and re-dispatching stages that will be presented later.
The solution of OPFPRB is denoted by u s * G i , ∀i ∈ G\WG, and is called the scheduled optimal non-renewable power-generation (SONP) for the given restrictive bounds (h s , h s ).

• Random Generation of Wind Speed and Load Demand
The wind speed v l is a random variable, so is the wind power generation u W l (v l ).Although the actual load demand for all buses, u D i , i = 1, • • • , N, are also random variables, the variations of small load demand can be neglected relative to those of large load demand.Therefore, large load demand can be regarded as random variables and the corresponding buses and load demand can be re-indexed as . The vector of small load demand is set to the predicted vector ûD S .Based on p(v l ) and p( P D L i ), v l and P D L i can be randomly generated.Subsequently, the wind power generation T can be calculated based on the randomly generated v l by: where a, A and C p represent the air density, cross-section swept by wind turbine blade and the power coefficient, respectively; φ l represents the phase angle in the power factor cosφ l of the wind power generation.The reactive load demand Q D L i can be obtained based on the randomly generated P D L i by: where φ D L i is the phase angle of the load power factor cosφ D L i .Then, we can have the large load , ∀i ∈ G\WG, using available economic dispatch (ED) method [25], such that: Then, in the re-dispatching stage, the SONP u s * G i , ∀i ∈ G\WG, is re-dispatched as the Non-renewable Power-generation After Re-dispatching (NPAR) u s G i , ∀i ∈ G\WG, for the given restrictive bounds (h s , h s ) by: The RSAR x s in Equation ( 2) can be obtained by solving the following power flow balance equation in terms of the re-dispatched NPAR u s G , the randomly generated u W , the randomly generated u D L and the predicted small load demand ûD S : Subsequently, the security term after re-dispatching (STAR), h j ( x s ), for the given restrictive bounds (h s , h s ) can be evaluated for j = 1, • • • , m; this re-dispatching stage associated with the randomly generated v l and u D L is repeated 10,000 times to carry out the Monte Carlo simulation (MCS), and 10,000 samples of h j ( x s ) can be obtained for each j = 1, • • • , m.
Based on the obtained 10,000 samples of h j ( x s ), the exact value of Prob{h Because MCS is too computational time consuming, the first computational challenge of the RSONP problem (Equation ( 2)) is to determine the feasibility of (h s , h s )that is defined as the satisfaction of the inequality constraints in Equation ( 2).Accordingly, the second computational challenge is to develop a computationally efficient algorithm to solve the RSONP problem (Equation ( 2)) for the optimal restrictive bounds (h s * , h s * ) and the associated optimal SONP (OSONP) which is the optimal solution to the OPFPRB (Equation ( 3)) when (h s , h s ) = (h s * , h s * ), in real time for a large system.The RSONP problem (Equation ( 2)) is separable, and it can be decomposed into the following m independent sub-problems.

Risk-Limiting
For Accordingly, the optimal solution (h s * , h s * ) to the RSONP problem (Equations ( 2) or ( 12)) is defined such that: for j = are located on the right-hand side and the left-hand side of h s * j , respectively.Similarly, h o j and feasible h s j are located on the left-hand side and the right-hand side of h s * j , respectively.The η-upper and η-lower bounds of h j ( x s ) are denoted by y jη and y jη , respectively.For the bus voltage magnitude, y jη and y jη are defined by: (y jη , y jη ) = arg[ min However, for the transmission-line real-power flow, an additional constraint y jη = −y jη must be imposed on the minimization problem that is specified on the right-hand side of Equation ( 14).Hence, (y jη , y jη ) is a function of (h s , h s ) and can also be written as (y jη (h s , h s ), y jη (h s , h s )).16) and LB(h s * j ) to be updated as: based on the sufficient conditions for the feasibility of (h s , h s ).Notably, the evaluation of both y jη (h s , h s ) and y jη (h s , h s ) for the given (h s , h s ) for j = To carry out the bisection method presented above, the y jη (h s , h s ) and y jη (h s , h s ) for the given (h s , h s ) need to be evaluated first for j = 1, • • • , m.For this purpose, a two-stage approach is presented in this section.The two-stage approach consists of an off-line stage and an on-line stage.In the off-line stage, the functional relationship between (y jη (h s , h s ), y jη (h s , h s )) and (µ h j , σ h j ) for a large range of (h s , h s ) is constructed using an artificial neural network (ANN) for each j = 1, • • • , m, where µ h j and σ h j represent the mean and standard deviation of h j ( x s ) for the given (h s , h s ).In the on-line stage, (µ h j , σ h j ) will be evaluated for the given (h s , h s ).In general, to obtain the exact (µ h j , σ h j ) of h j ( x s ) for the given (h s , h s ), MCS is required.However, MCS is too time consuming to be used on-line.Therefore, a 2K + 1 point estimation method is used to evaluate (µ h j , σ h j ) of h j ( x s ) for the given (h s , h s ) on-line.Thus, for the given (h s , h s ), once the corresponding (µ h j , σ h j ) of h j ( x s ) is obtained on-line, it will be input to the off-line constructed ANN, and whose output is the (y jη (h s , h s ), y jη (h s , h s )) needed in the bisection method.In the following, the ANN and the 2K + 1 point estimation method are presented.
• ANN Model for Input-Output Relationship between (µ h j , σ h j ) and (y jη (h s , h s ), y jη (h s , h s )) In the off-line stage, for each j = 1, • • • , m, an easily implementable feed-forward back propagation ANN [26,27], which comprises an input layer, a hidden layer and an output layer, is used to establish the input-output relationship between (µ h j , σ h j ) and (y jη (h s , h s ), y jη (h s , h s )) for a large range of (h s , h s ).
Figure 1 shows this three-layer ANN that consists of two input neurons, q hidden-layer neurons and two output neurons, where ω il , i = 1, 2, l = 1, • • • , q and γ lk , k = 1, 2 are the arc weights.The inputs to the two neurons in the input layer are µ h j and σ h j , and the outputs of the two output neurons are y jη (h s , h s ) and y jη (h s , h s ).
The neurons in the input layer directly distribute µ h j and σ h j to the neurons in the hidden layer.The hyperbolic tangent sigmoid function given in Equation ( 21) is utilized as the activation function of the neurons in the hidden layer [26]: The activation function in the output layer is a linear function, which sums all the weighted outputs of the hidden layer.
Each of the m ANNs is trained off-line in two steps, which are the collection of training data set and training the ANN.should be considered to cover a wide range of applications.For example, if () l pv is of a Weibull distribution, it can be described by Equation (22): where the parameters α and β are the scale and shape coefficients, respectively, then wide ranges of α and β will be considered.Similarly, if () is of a normal distribution, it can be described by Equation ( 23): where the parameters μ

• Collecting Training Data Set
In addition to a large range of (h s , h s ), a wide range of parameters of p(v l ) and p(P D L i ) should be considered to cover a wide range of applications.For example, if p(v l ) is of a Weibull distribution, it can be described by Equation ( 22): where the parameters α and β are the scale and shape coefficients, respectively, then wide ranges of α and β will be considered.Similarly, if p(P D L i ) is of a normal distribution, it can be described by Equation (23): where the parameters µ D L i and σ D L i are the mean and the standard deviation of P D L i , then wide ranges of µ D L i and σ D L i will be considered.Based on these premises, the procedure for collecting training data set can be described as follows.
Step Co1: Randomly select a sample of (h s , h s ), α, β, µ D L i and σ D L i .
Step Co2: For j = 1, • • • , m, use the MCS that is described in Section 2.1.3to obtain 10,000 samples of h j ( x s ) to compute µ h j and σ h j , and determine the y jη (h s , h s ) and y jη (h s , h s ) based on Equation ( 14); the obtained (µ h j , σ h j ) and (y jη (h s , h s ), y jη (h s , h s )) form a pair of input and output data of h j ( x s ).

• Training m ANNs
For a given input (µ i j , σ i h j ) to the jth ANN that is shown in Figure 1, let the corresponding output be )|ω, γ), given by the following Equations: where T are vectors the arc weights of the jth ANN.The training problem for the jth ANN is to find ω and γ that minimize the mean square error (MSE): based on the jth training data set ((µ i h j The Levenberg-Marquardt algorithm [28] is used herein as the iterative training algorithm for solving Equation ( 26).This training algorithm is terminated when either of the following two conditions is met: (i) MSE is less than 0.01; or (ii) the number of epochs exceeds 5000.
• 2K + 1 point estimation method for estimating mean and standard deviation of h j ( x s ) As indicated previously, it is too computational time consuming to evaluate µ h j and σ h j of h j ( x s ) using MCS.Therefore, the goal of 2K + 1 point estimation method is to evaluate µ h j and σ h j of h j ( x s ) for the given (h s , h s ) in real time.Suppose that |WG| + N L = K, where |WG| is the total number of wind power generation buses.h j ( x s ) is a random function of K input random variables, then the employed 2K + 1 point estimation method [7,24,29] can be described below.First, the considered random variables are re-named and re-indexed, such that the random wind speeds v l , ∀l ∈ WG, are re-named and re-indexed as z k , k = 1, • • • , |WG|, and the N L random large real load demands where the location z k,n and the weighting factor w k,n are the nth concentration of the random variable z k , and can be calculated as follows.Let , and the skewness λ k,3 and kurtosis λ k,4 are obtained based on λ k,j = 2 are obtained, then for a given (h s , h s ), the h j ( x s ) is evaluated twice for each random variable z k at the two points made up of the nth location z k,n of z k and the mean ẑk for the rest , rather than the 10,000 times in the MCS.The weighting factor w k,n specifies the relative importance of the evaluation of h j ( x s ) at the point ).These 2K evaluations of h j ( x s ) and an evaluation at the point ) that is associated with a weighting factor w 0,3 constitute the 2K + 1 evaluations of h j ( x s ), where w 0,3 ).Then, µ h j and σ 2 h j can be estimated from the above 2K + 1 evaluations of h j ( x s ) and the corresponding w k,n by: The advantage of 2K + 1 point estimation method is that it uses just 2K + 1 evaluations to evaluate the µ h j and σ 2 h j of h j ( x s ) for the given (h s , h s ) rather than using the 10,000 evaluations that are required in the MCS; therefore, it can be utilized in real-time applications.Clearly, estimating σ 2 h j yields an estimate of σ h j .Once µ h j and σ h j of h j ( x s ) for the given (h s , h s ) are estimated, they can be input to the jth ANN that is constructed off-line, and whose outputs are the estimated y jη (h s , h s ) and y jη (h s , h s ) of h j ( x s ).
, where d is a positive real number.

• Algorithm
Based on the analysis presented in Sections 2.2.1 and 2.2.2, the algorithmic steps of the proposed RSONP algorithm for solving the RSONP problem (Equation ( 2)) can be presented in the following.Step 0: Calculate ûW l = [ PW l , QW l ] T using Equations ( 4) and ( 5 15) and ( 16).
Step 2: Use 2K + 1 point estimation method to estimate µ h j and σ h j of h j ( x s ) for j = 1, • • • , m.
Step 3: For j = 1, • • • , m, input µ h j and σ h j , obtained in Step 2, into the jth ANN, and whose outputs are the estimated η-upper bound y jη (h s , h s ) and η-lower bound y jη (h s , h s ) of h j ( x s ).
Step 4: , UB(h s * j ) and LB(h s * j ) using Equations ( 17)- (20), and update h s j and h s j using Equations ( 15) and ( 16).The structure of the proposed RSONP algorithm for solving the RSONP problem can be summarized by the flow chart presented in Figure 2, and the corresponding algorithmic steps are also indicated in the figure.The structure of the proposed RSONP algorithm for solving the RSONP problem can be summarized by the flow chart presented in Figure 2, and the corresponding algorithmic steps are also indicated in the figure.Eqs. ( 15)-( 16).( (17)-( 20), and update and using Eqs. ( 15)-( 16).(

Setup of Tests
The IEEE 118-bus system that is presented in [31] is used as the test system.In this system, there are 44 non-renewable power generation buses, 10 wind power generation buses and 25 buses of large load demand.Consequently, |WG| = 10, N L = 25 and K = 35.Bus 69 is designated as the swing bus; the number of transmission lines is 186, so m = 304.(V o j , V  3)) and COPF problem (Equation ( 1)), the values of the cost coefficients a i , b i and c i ∀i ∈ G\WG are randomly selected from the intervals (6.78, 74.33), (8.3391, 37.6968) and (0.002401, 0.069663), respectively.Notably, the units of a i , b i and c i are $/(MW) 2 (h) 3 , $/MW (h) 2  and $, respectively.The Weibull distribution given by Equation ( 22) and the normal distribution given by Equation ( 23 .The parameters used in the ANN are set as q = 5 and epochs = 5000.
To study the effect of re-dispatching the SONP u s * G i , ∀i ∈ G\WG, on the performance of the OSONP u ŝ * G i , ∀i ∈ G\WG, and the corresponding generation cost, two test cases, A and B, are designed with extremely different re-dispatching results.In Case A, r P i % = r Q i % = 0, ∀i ∈ G\WG and i = 69 are assumed, consistent with a situation in which no non-renewable power generation bus other than the swing bus has a power generation reserve to compensate for the power mismatch.In Case B, r P i % = r P j % and r Q i % = r Q j %, ∀i, j ∈ G\WG, are assumed, approximately consistent with a situation in which all non-renewable power generation buses including the swing bus can generate enough power to compensate for the power deviations of interest.
Notably, all simulations in this test are performed using a personal computer with 3.3 GHz Intel Core I5 and 4 GB RAMS, and all algorithms are implemented in MATLAB (2015b, MathWorks, Natick, MA, USA).

Test Results, Comparison and Discussions of Case A
Based on the above test setup and the m off-line constructed ANNs, the RSONP algorithm is used to solve the RSONP problems on the IEEE 118-bus system in test Case A to obtain the OSONP u ŝ * G i , ∀i ∈ G\WG, and the optimal restrictive bounds (h s * , h s * ).The five Terms (a)-(e) listed in Table 1 are reported or evaluated in this test.Corresponding CPU time of (a) The Terms (a) and (b) correspond to the run time of the RSONP algorithm.Term (c) is the optimal objective value of the RSONP problem (Equation ( 2)).Term (d) represents the scheduled optimal total non-renewable power generation cost in unit $/h, which is the optimal objective value of the OPFPRB (Equation (3)) when (h s , h s ) = (h s * , h s * )., ∀i ∈ G\WG, respectively.Table 2 presents the test results concerning the aforementioned five terms that were obtained using the proposed RSONP algorithm in Case A. Although RSONP algorithm takes ten iterations to reach the termination criterion, the results that were obtained in 6-9 th iterations are also reported.Columns 1 and 3 of Table 2 reveal the iteration-wise improvement of the objective value of the RSONP problem (Equation ( 2)), indicating that the distance between the obtained restrictive bounds and the normal bounds becomes smaller each iteration.As the restrictive bounds become less restrictive, the scheduled optimal total non-renewable power generation cost shown in Column 4 of Table 2 becomes smaller as predicted.Moreover, as the restrictive bounds becomes more restrictive, the performance of the OSONP u ŝ * G i , ∀i ∈ G\WG, improves but at the cost of an increase in the scheduled optimal total non-renewable power generation cost as is observed from Columns 3-5 in Table 2.This is reasonable, because a higher cost is required for a better performance.The performance of the OSONP u ŝ * G i , ∀i ∈ G\WG, in iterations six to ten of the RSONP algorithm exceeds 0.95 and the consumed CPU time are all less than 83.4 s, as revealed by Columns 5 and 2 in Table 2.In fact, the RSONP algorithm can be terminated after iteration 7, because the corresponding CPU time is less than one minute, but the performance is 0.55% better than that achieved in ten iterations, at the cost of only a 0.03% increase in the scheduled optimal total non-renewable power generation cost.The above results imply the following.The solution obtained at the end of iteration ten being the best is simply because the objective function of the RSONP problem (Equation ( 2)) considers only Term (c) that is proportional to Term (d), the non-renewable power generation cost, but do not consider Term (e), the performance regarding the probability of satisfying the security constraints in the presence of uncertain power generation and load demand.Since some system operators may care more about the security than the cost, a multi-objective OPF that considers both non-renewable power generation cost and the probability of satisfying the security constraints would be an issue that is worthy of investigation.To demonstrate the advantage of the RSONP algorithm, the performance of the obtained OSONP u ŝ * G i , ∀i ∈ G\WG, is compared with the conventional schedule of optimal non-renewable power-generation (CSONP) u o * G i , ∀i ∈ G\WG, which is obtained by solving the COPF problem (Equation (1)) using the OPF solution method [30] that was used in Step 1 of the RSONP algorithm.The performance of , ∀i ∈ G\WG, at the cost of a 0.024% increase in the total non-renewable power generation cost.The above results reveal that the proposed RSONP algorithm can be applied in real time to a large power system and effectively reduce the risk of violating security constraints in the presence of uncertain power generation and load demand at the very small cost of an increase in the total non-renewable power generation cost.

Test Results, Comparisons and Discussions of Case B
The procedure of using the RSONP algorithm to solve the RSONP problem on the IEEE 118-bus system in Case B is the same as that in Case A, but with a different re-dispatching percentage share.Table 3 presents the test results of Case B regarding the five Terms, (a)-(e), defined in Table 1, and they are qualitatively the same as those in Case A. , ∀i ∈ G\WG, obtained by the proposed RSONP algorithm using 6 to 10 iterations as presented in Table 3. Notably, the total non-renewable power generation cost of CSONP u o * G i , ∀i ∈ G\WG, in Case B is exactly the same as that presented in Case A. Therefore, comparing with the CSONP u o * G i , ∀i ∈ G\WG, the performance of the OSONP u ŝ * G i , ∀i ∈ G\WG, obtained from executing the RSONP algorithm for 10 iterations in Case B is 23.35% better at the small cost of a 0.022% increase in the total non-renewable power generation cost.Since the re-dispatching percentage share for all the non-renewable power generation busses in these two cases are extremely different, the test results presented in Tables 2 and 3 demonstrate the robustness of the proposed RSONP algorithm.

Conclusions and Further Research
Intermittent renewable power generation and uncertain load demand may cause security constraints to be violated.To limit this risk, an RSONP problem is formulated and a computationally efficient RSONP algorithm is presented and tested on the IEEE 118-bus power system.The computing speed of the RSONP algorithm and its comparison with the CSONP show that it can be applied in real time to reduce the risk of violating security constraints at the very small cost of an increase in the total non-renewable power generation cost.As for further research, due to the conflicting nature between the non-renewable power generation cost and the probability of satisfying security constraints indicated in Section 3.2, it would be worthwhile to formulate a multi-objective OPF problem by taking into account the aforementioned two conflicting terms and propose a computationally efficient algorithm to solve it.The jth NSTAR x s The RSAR resulted from the scheduling and re-dispatching stages h j ( x s ) The jth STAR for the given restrictive bounds (h s , h s ) y jη /y jη η-upper bound/η-lower bound of h j ( x s ) µ h j /σ 2 h j mean/variance of h j ( x s ) ) and u D L i differ from their predicted values ûW l and ûD L i , respectively.The total power generation deviation ∑ l∈WG u W l (v l ) − ûW l , the total large load-demand deviation the system's total real and reactive line losses, which are denoted by ∆P loss and ∆Q loss , respectively, can be compensated by re-dispatching the SONP u s * G i Energies 2016, 9, 868 8 of 18 Each of the m ANNs is trained off-line in two steps, which are the collection of training data set and training the ANN.
considered.Based on these premises, the procedure for collecting training data set can be described as follows.
Given data: The pdf p(v l ), parameters C p , a, A and |cosφ l | of bus l ∈ WG.The pdf p(P D L i ) and |cosφ D i |, ∀i = 1, • • • , N L .The m ANNs constructed off-line.The values of η, d and ε.

Figure 2 .
Figure 2. Flow chart of the risk-limiting schedule of optimal non-renewable power-generation algorithm.

Figure 2 .
Figure 2. Flow chart of the risk-limiting schedule of optimal non-renewable power-generation algorithm.

T
for any heading (&), subscript (∆) or superscript ($), where the procedures to evaluate the exact value of Prob{h o j ≤ h j ( x s ) ≤ h Prob{h o j ≤ h j ( x s ) ≤ h o j |h s , h s } represents the conditional probability of satisfying the jth security constraint after the re-dispatch for the given restrictive bounds (h s , h s ), and the objective function is the distance between the restrictive bounds (h s , h s ) and the normal bounds (h o , h o ).Therefore, the RSONP problem is to find the (h s , h s ) that is closest to (h o , h o ) while satisfying the conditional probability constraints in Equation (2).2.1.3.Monte Carlo Simulation Procedures for Evaluating Exact Conditional Probability of Satisfying Security Constraints For the given (h s , h s ), number of samples of h j ( x s ) satisfying the It can be easily proved that if y jη (h s , h s ) ≤ h o j and y jη (h s , h s ) ≥ h o j , then Prob{h o j ≤ h j ( x s ) ≤ h o j |h s , h s } ≥ η, meaning that the inequality constraints in Equation (2) hold.Therefore, y jη (h s , h s ) ≤ h o j and y jη (h s , h s ) ≥ h o j for j = 1, • • • , m represent sufficient conditions for the feasibility of (h s , h s ).j based on y jη (h s , h s ) and y jη (h s , h s ) as follows.Let UB(h Co3: Repeat Steps Co1-Co2 M times, where M = 16,512.Then, for j = 1, • • • , m, M pairs of input output data that are (µ i )) represent the (µ h j , σ h j ) and (y jη (h s , h s ), y jη (h s , h s )) of h j ( x s ), respectively, obtained based on the ith randomly selected sample s of (h s , h s ), (α, β) and (µ D L i , σ D L i , respectively, for j = 1, • • • , m; otherwise, return to Step 1.If the algorithm stops, output the optimal restrictive bounds (h s * , h

Table 1 .
The five terms evaluated in the test.RSONP: risk-limiting schedule of optimal non-renewable power-generation.
G\WG, and is evaluated based on the MCS presented in Section 2.1.3but replacing (h s , h s ) and u s * G i , ∀i ∈ G\WG by (h s * , h s * ) and u ŝ *

Table 2 .
Results of using the RSONP algorithm to solve the RSONP problem on the IEEE 118-bus system in Case A.

Table 2 .
(10), is the Normal-bound-based Non-renewable Power-generation After Re-dispatching (NNPAR) that was obtained by re-dispatching the CSONP u o * G i , ∀i ∈ G\WG, using Equations (9) and(10)based on the re-dispatching percentage share in Case A. The procedure for evaluating Prob{h o j ≤ h j ( x o ) ≤ h G\WG, respectively.The test results show that the performance of the CSONP u o * G i, ∀i ∈ G\WG, in Case A is 0.7723 which is far from performance of greater than 0.95 that results from all the OSONP u ŝ * G i , ∀i ∈ G\WG, obtained in iterations six to ten of the proposed RSONP algorithm as shown in However, the total non-renewable power generation cost of u o * , ∀i ∈ o j , ∀j = 1, • • • , m|h o , h o } inCase A is also based on the MCS presented in Section 2.1.3but replacing (h s , h s ) and u s * G i , ∀i ∈ G\WG by (h o , h o ) and u o * G i , ∀i ∈

Table 3 .
Results of using the RSONP algorithm to solve the RSONP problem on the IEEE 118-bus system in Case B.
* Terms regarding (a)-(e) are specified in

Table 1 .
To demonstrate the advantage of the RSONP algorithm in Case B, the performance of the previously obtained CSONP u o * G i , ∀i ∈ G\WG, is also investigated in Case B. The test procedures are the same as that for Case A described in Section 3.2 except for the re-dispatching percentage share.The test result shows that the performance of the CSONPu o * G i , ∀i ∈ G\WG,, i.e., Prob{h o j ≤ h j ( x o ) ≤ h o j , ∀j = 1, • • • , m|h o , ho } in Case B is 0.7715 (<0.95) in contrast to the larger than 0.95 performances resulted from all the OSONP u ŝ * Normal upper/lower bound of p ij g(x, u G , u W , u D ) = 0 Real and reactive power flow balance equation∑ i∈G\WG a i P 2 G i + b i P G i + c iTotal non-renewable power generation cost, where a i , b i and c i are cost coefficients h j Function of the jth security term such as voltage magnitude V i at bus i or real power flow p ij over transmission line (i, j) h for any superscript ($), where m denotes the total number of security constraints ηRequired probability level of satisfying the security constraints in Equation (2), and 0 < η < 1r P i %/r Q i %Non-renewable power generation bus i's re-dispatching percentage share of real/reactive power generationr i % = [r P i %, r Q i %] T u o * G i , ∀i ∈ G\WG CSONP,which is the solution of COPF Problem (1) u s * G i , ∀i ∈ G\WG SONP for the given restrictive bounds (h s , h s ), which is the solution of OPFPRB (3) u ŝ * G i , ∀i ∈ G\WG OSONP, which is the solution of OPFPRB (3) when (h s , h m ] T s ) = (h s * , h s * ) i , ∀i ∈ G\WG NPAR for the given restrictive bounds (h s , h s ) (&)