Optimized security constrained unit commitment dispatch using linear programming for electricity markets
First Claim
1. A computer implemented system for optimal market dispatch for clearance and pricing of energy and ancillary services in an electricity market of at least one market participant, said system comprising:
- means for inputting transmission security constraints of said at least one market participant;
means for clearing energy and ancillary service bids;
means for optimizing the dispatch of energy and ancillary services considering said transmission security constraints of said at least one market participant using mixed integer linear programming techniques; and
means for pricing the dispatch of energy considering said transmission security constraints.
5 Assignments
0 Petitions
Accused Products
Abstract
The present invention is a method for optimizing security constrained unit commitment in the day ahead wholesale electricity market using mixed integer linear programming techniques. The wholesale electricity market uniquely requires the submission of offers to supply energy and ancillary services at stated prices, as well as bids to purchase energy, and known operating and security constraints. The present invention address the above noted needs by providing a SCUC engine to support and implement the requirements via a computer system implementation.
-
Citations
10 Claims
-
1. A computer implemented system for optimal market dispatch for clearance and pricing of energy and ancillary services in an electricity market of at least one market participant, said system comprising:
-
means for inputting transmission security constraints of said at least one market participant;
means for clearing energy and ancillary service bids;
means for optimizing the dispatch of energy and ancillary services considering said transmission security constraints of said at least one market participant using mixed integer linear programming techniques; and
means for pricing the dispatch of energy considering said transmission security constraints. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
Specification