• Tidak ada hasil yang ditemukan

Concluding Remarks

MANAGING AGGREGATORS IN THE SMART GRID

5.6 Concluding Remarks

extends in a straightforward way to this setting as well, as the dynamic programming structure remains preserved (the KKT conditions will simply be replaced by the corresponding conditions for the AC-based market clearing mechanism).

0 2 4 6 8 10 12 14 16

Time (s)

0 10 20 30 40 50 60 70 80 90 100

%age error in optimal value

Figure 5.8: The difference from the optimal solution as a function of the running time of the algorithm, in the 9-bus network with 1% curtailment allowance.

characterized the profit an aggregator can make by strategically curtailing generation in the ex-post market as the outcome of a bi-level optimization problem. This model captures the realistic price clearing mechanism in the electricity market.

We showed through simulations on realistic test cases that there is potentially large profit for aggregators by manipulating the LMPs in the electricity market.

When the aggregator is located in a single bus, we have shown that the locational marginal price is monotonically increasing with the curtailment, and we have an exact polynomial-time algorithm to solve the aggregators profit maximization problem.

The aggregator’s strategic curtailment problem in a general setting is a difficult bi-level optimization problem, which is intractable. However, we showed that for radial distribution networks (where aggregators are likely located), there is an efficient algorithm to approximate the solution up to arbitrary precision. We also demonstrated via simulation on a distribution test case that our algorithm can efficiently find the approximately optimal curtailment strategy.

We view this work as a first step in understanding market power of aggregators, and more generally, towards market design for integrating renewable energy and demand response from geographically distributed sources. With the result of this work, it is interesting to ask what the operator can do to address this problem, and in particular, how to design market rules for aggregators to maximize the contribution of renewable energy yet mitigate the exercise of market power. Also, extending the analysis to the case of multiple aggregators in the market is another interesting direction for future research.

5.A Connections between Curtailment Profit and Market Power

As mentioned earlier, there has been significant work on market power in electricity markets, but work is only beginning to emerge on the market power of renewable generation producers. One important work from this literature is [221], and the following is the proposed notion of market power from that work.

Definition 6. Forπ›Όβˆ—

𝑖 β‰₯ 0, themarket power(ability) of the aggregator is defined as πœ‚π‘– =

πœ†π‘–(π›Όβˆ—) βˆ’πœ†π‘–(0) πœ†π‘–(0)

/

π›Όβˆ—

𝑖

π‘π‘Ž

𝑖

(5.7)

In this definition, the value ofπœ‚π‘– captures the ability of the generator/aggregator to exercise market power. Intuitively, in a market with high value ofπœ‚π‘–, the aggregator can significantly increase the price by curtailing a small amount of generation.

Interestingly, the optimal curtailment profit is closely related to this notion of market power. We summarize the relationship in the following proposition.

Proposition 28. If the curtailment profit𝛾 is positive, then the market powerπœ‚π‘– > 1. Furthermore, the larger the curtailment profit is, the higher the market power.

Proof. From the definition of𝛾(π›Όβˆ—) =πœ†π‘–(π›Όβˆ—) (π‘π‘Ž

𝑖 βˆ’π›Όβˆ—

𝑖) βˆ’πœ†π‘–(0)π‘π‘Ž

𝑖, it follows that 𝛾(π›Όβˆ—)

πœ†π‘–(0) (π‘π‘Ž

𝑖 βˆ’π›Όβˆ—

𝑖) = πœ†π‘–(π›Όβˆ—) πœ†π‘–(0) βˆ’

π‘π‘Ž

𝑖

π‘π‘Ž

𝑖 βˆ’π›Όβˆ—

𝑖

=1+πœ†π‘–(π›Όβˆ—) βˆ’πœ†π‘–(0)

πœ†π‘–(0) βˆ’ (1βˆ’ π›Όβˆ—

𝑖

π‘π‘Ž

𝑖

)βˆ’1 ' 1+πœ†π‘–(π›Όβˆ—) βˆ’πœ†π‘–(0)

πœ†π‘–(0) βˆ’ (1+ π›Όβˆ—

𝑖

π‘π‘Ž

𝑖

)

= πœ†π‘–(π›Όβˆ—) βˆ’πœ†π‘–(0) πœ†π‘–(0) βˆ’

π›Όβˆ—

𝑖

π‘π‘Ž

𝑖

. (5.8)

Therefore we have π‘π‘Ž

𝑖

πœ†π‘–(0) (π‘π‘Ž

𝑖 βˆ’π›Όβˆ—

𝑖)π›Όβˆ—

𝑖

𝛾(π›Όβˆ—) =

πœ†π‘–(π›Όβˆ—) βˆ’πœ†π‘–(0) πœ†π‘–(0)

/

π›Όβˆ—

𝑖

π‘π‘Ž

𝑖

βˆ’1

=πœ‚π‘–βˆ’1.

Since the left-hand side parameters are all positive, if𝛾(π›Όβˆ—) >0, we can conclude that πœ‚π‘– > 1. Moreover, it is clear that the larger the value of𝛾(π›Όβˆ—) is, the higher the value ofπœ‚π‘–is. Note that we used the approximation (1βˆ’ 𝛼

βˆ— 𝑖

π‘π‘Ž

𝑖

)βˆ’1' 1+ 𝛼

βˆ— 𝑖

π‘π‘Ž

𝑖

, since

the curtailment is small with respect to the generation; however, the right-hand side expression (5.8) is an upper bound on the left-hand side anyway, and the result holds

exactly.

This proposition highlights that the notion of market power in [221] is consistent with an aggregator seeking to maximize its curtailment profit, and higher curtailment profit corresponds to more market power.

5.B Proof of Lemma 25 (Monotonicity of LMP)

Let us take a look at the ISO’s optimization problem (5.1), which is a linear program.

It is not hard to see that the dual of this problem is as follows.

maximize

π€βˆ’,𝝀+,πβˆ’,𝝁+,𝝂

(𝚫p+pβˆ’πœΆβˆ’d)π‘‡π€βˆ’+

(βˆ’p+𝜢+dβˆ’πš«p)𝑇𝝀++fπ‘‡πβˆ’βˆ’f𝑇𝝁+ (5.9a) subject to

B𝑇(𝒄+𝝀+βˆ’π€βˆ’) βˆ’πβˆ’+𝝁++H𝑇𝝂 =0 (5.9b)

π€βˆ’,𝝀+,πβˆ’,𝝁+ β‰₯ 0 (5.9c)

If one focuses on the terms involving𝛼𝑖 for a certain𝑖, the objective of the above optimization problem is in the form: (Δ𝑝

𝑖

+π‘π‘–βˆ’π›Όπ‘–βˆ’π‘‘π‘–)πœ†βˆ’

𝑖 + (βˆ’π‘π‘–+𝛼𝑖+π‘‘π‘–βˆ’Ξ”π‘

𝑖)πœ†+

𝑖

plus a linear function of the rest of the variables (i.e., the rest ofπ€βˆ’,𝝀+, as well as πβˆ’,𝝁+,𝝂). There is no𝜢in the constraints, and the first two terms of this objective are the only parts where𝛼𝑖 appears (and with opposite signs).

We need to show that if𝛼𝑖is changed to𝛼𝑖+𝛿for some𝛿 >0, then𝑐𝑖+πœ†+𝑛𝑒 𝑀

𝑖 βˆ’πœ†βˆ’π‘›π‘’ 𝑀

𝑖 β‰₯

𝑐𝑖+πœ†+

𝑖 βˆ’πœ†βˆ’

𝑖 , whereπœ†+𝑛𝑒 𝑀

𝑖 , πœ†βˆ’π‘›π‘’ 𝑀

𝑖 are the optimal solutions of the new problem.

We prove this in a general setting. Consider the following two optimization problems.

π‘“βˆ— = sup

π‘₯1,π‘₯2∈R π‘₯3∈Rπ‘š

π‘Ž1π‘₯1+π‘Ž2π‘₯2+π‘Žπ‘‡

3π‘₯3 (5.10a)

s.t. (π‘₯1, π‘₯2, π‘₯3) ∈ 𝑆 (5.10b)

π‘“βˆ—π‘›π‘’ 𝑀 = sup

π‘₯1,π‘₯2∈R π‘₯3∈Rπ‘š

(π‘Ž1βˆ’π›Ώ)π‘₯1+ (π‘Ž2+𝛿)π‘₯2+π‘Žπ‘‡

3π‘₯3 (5.11a)

s.t. (π‘₯1, π‘₯2, π‘₯3) ∈ 𝑆 (5.11b)

Assume that the optimal values of the problems are attained at (π‘₯βˆ—

1, π‘₯βˆ—

2, π‘₯βˆ—

3) and (π‘₯βˆ—π‘›π‘’ 𝑀

1 , π‘₯βˆ—π‘›π‘’ 𝑀

2 , π‘₯βˆ—π‘›π‘’ 𝑀

3 ), respectively.

We claim thatπ‘₯βˆ—π‘›π‘’ 𝑀

2 βˆ’π‘₯βˆ—π‘›π‘’ 𝑀

1 β‰₯ π‘₯βˆ—

2βˆ’π‘₯βˆ—

1. (This precisely implies the LMP condition in our case, i.e.,πœ†+𝑛𝑒 𝑀

𝑖 βˆ’πœ†βˆ’π‘›π‘’ 𝑀

𝑖 β‰₯ πœ†+

𝑖 βˆ’πœ†βˆ’

𝑖).

Suppose by way of contradiction thatπ‘₯βˆ—π‘›π‘’ 𝑀

2 βˆ’π‘₯βˆ—π‘›π‘’ 𝑀

1 < π‘₯βˆ—

2βˆ’π‘₯βˆ—

1. We know thatπ‘Ž1π‘₯βˆ—

1+π‘Ž2π‘₯βˆ—

2+π‘Žπ‘‡

3π‘₯βˆ—

3 β‰₯ π‘Ž1π‘₯1+π‘Ž2π‘₯2+π‘Žπ‘‡

3π‘₯3, βˆ€(π‘₯1, π‘₯2, π‘₯3) βˆˆπ‘†.

Therefore we have

(π‘Ž1βˆ’π›Ώ)π‘₯βˆ—π‘›π‘’ 𝑀

1 + (π‘Ž2+𝛿)π‘₯βˆ—π‘›π‘’ 𝑀

2 +π‘Žπ‘‡

3π‘₯βˆ—π‘›π‘’ 𝑀

3

=π‘Ž1π‘₯βˆ—π‘›π‘’ 𝑀

1 +π‘Ž2π‘₯βˆ—π‘›π‘’ 𝑀

2 +π‘Žπ‘‡

3π‘₯βˆ—π‘›π‘’ 𝑀

3 βˆ’π›Ώπ‘₯βˆ—π‘›π‘’ 𝑀

1 +𝛿π‘₯βˆ—π‘›π‘’ 𝑀

2

≀ π‘Ž1π‘₯βˆ—

1+π‘Ž2π‘₯βˆ—

2+π‘Žπ‘‡

3π‘₯βˆ—

3+𝛿(π‘₯βˆ—π‘›π‘’ 𝑀

2 βˆ’π‘₯βˆ—π‘›π‘’ 𝑀

1 )

< π‘Ž1π‘₯βˆ—

1+π‘Ž2π‘₯βˆ—

2+π‘Žπ‘‡

3π‘₯βˆ—

3+𝛿(π‘₯βˆ—

2βˆ’π‘₯βˆ—

1)

=(π‘Ž1βˆ’π›Ώ)π‘₯βˆ—

1+ (π‘Ž2+𝛿)π‘₯βˆ—

2+π‘Žπ‘‡

3π‘₯βˆ—

3.

The first inequality above follows from the fact that (π‘₯βˆ—π‘›π‘’ 𝑀

1 , π‘₯βˆ—π‘›π‘’ 𝑀

2 , π‘₯βˆ—π‘›π‘’ 𝑀

3 ) ∈ 𝑆. Now the above implies that(π‘₯βˆ—π‘›π‘’ 𝑀

1 , π‘₯βˆ—π‘›π‘’ 𝑀

2 , π‘₯βˆ—π‘›π‘’ 𝑀

3 )is not the optimal solution of (5.11), and it is a contradiction.

As a result,π‘₯βˆ—π‘›π‘’ 𝑀

2 βˆ’π‘₯βˆ—π‘›π‘’ 𝑀

1 β‰₯ π‘₯βˆ—

2βˆ’π‘₯βˆ—

1.

5.C Proof of Theorem 26 (Exact Single-Bus)

Since we are in the single-bus curtailment regime,𝛼has only one nonzero component.

For the sake of convenience, we denote that element itself by a scalar𝛼throughout this proof (no𝛼 is vector in this proof). The proof consists of the following two pieces: 1) From each jump point, the point where the next jump happens can be computed in polynomial time and 2) There are at most polynomially (in this case even linearly) many jumps.

Assuming that the solution to the program (5.1) is unique, for any fixed value of𝛼, exactly𝑑 of the constraints (5.1b), (5.1c), and (5.1d) are binding (active). We can express these binding constraints as

𝐴 𝑓 =𝑏(𝛼),

where 𝐴 ∈ R𝑑×𝑑 is an invertible matrix, and 𝑏(𝛼) ∈ R𝑑 is a vector that depends on 𝛼. As long as the binding constraints do not change, the matrix 𝐴is fixed, and the optimal solution is linear in 𝛼 (i.e., 𝑓 = π΄βˆ’1𝑏(𝛼)). Then, for simplicity, we can express the solution as 𝑓(𝛼) = 𝑓0+π›Όπ‘Ž, for some𝑑-vectors 𝑓0andπ‘Ž.

Now, if we look at the non-binding (inactive) constraints of (5.1), they can also be expressed as

˜ 𝐴 𝑓 < 𝑏,˜

for some matrix ˜𝐴and vector Λœπ‘of appropriate dimensions. Inserting 𝑓 into this set of inequalities yields ˜𝐴 𝑓0+π›Όπ΄π‘Ž <˜ π‘Λœ, or equivalently

𝛼(π΄π‘ŽΛœ )𝑖 < π‘Λœπ‘–βˆ’ (𝐴 π‘“Λœ 0)𝑖, for all𝑖=1,2, . . . ,(2𝑛+2π‘‘βˆ’π‘Ÿ π‘Žπ‘› π‘˜(𝐺)).

Now we need to figure out that, with increasing 𝛼, which of the non-binding constraints becomes binding first and with exactly how much of an increase in 𝛼. If for some𝑖 we have (π΄π‘ŽΛœ )𝑖 ≀ 0, then it is clear that increasing 𝛼 cannot make constraint𝑖binding. If(π΄π‘ŽΛœ )𝑖 > 0 then the constraint can be written as

𝛼 <

π‘Λœπ‘–βˆ’ (𝐴 π‘“Λœ 0)𝑖

(π΄π‘ŽΛœ )𝑖

.

Computing the right-hand side for all𝑖, and taking their minimum, tells us exactly which constraint will become binding next and how much change in the current value of𝛼results in that.

The complexity of this procedure is𝑂(𝑑2.373)for computing 𝑓0andπ‘Ž, plus𝑂(𝑑(2𝑛+ 2𝑑)) =𝑂(𝑛𝑑+𝑑2)for computing the lowest bound among all the constraints. Hence the complexity is𝑂(𝑑2.373).

The above procedure describes how the next jump point can be computed efficiently from the current point. The exact same procedure can be repeated for reaching the subsequent jump points. All that remains is to show the second piece of the proof, which is that the number of jump points are bounded polynomially. To show the last part, note that by increasing𝛼, if a binding constraint becomes non-binding, it will not become binding again. As a result, each constraint can change at most twice, and therefore, the number of jumps is at most twice the number of constraints.

Thus, the number of jumps is𝑂(𝑛+𝑑), and the overall complexity of the algorithm

is𝑂( (𝑛+𝑑)𝑑2.373) =𝑂(𝑑3.373).

5.D Proof of Theorem 27 (Approximate Multi-Bus)

Lemma 29(𝛿-discretization). Given a set𝐢 βŠ‚ [𝐿1, 𝐿1] Γ— Β· Β· Β· Γ— [πΏπ‘˜, πΏπ‘˜], there exists a finite setXsuch that

βˆ€π‘§βˆˆπΆ βˆƒπ‘§0 ∈ X, max

1β‰€π‘–β‰€π‘˜

|π‘§π‘–βˆ’π‘§0

𝑖| ≀ 𝛿 and X contains at most𝑉/π›Ώπ‘˜ points, where𝑉 = ΓŽπ‘˜

𝑖=1(πΏπ‘–βˆ’ 𝐿𝑖) is a constant (the volume of the box). Xis said to be an𝛿-discretization of𝐢and written asX (𝛿). Lemma 30 (Reduction to Binary Tree). Any tree with arbitrary degrees can be reduced to a binary tree by introducing additional dummy nodes to the network.

Proof. Take any node𝑏in the tree with some parentπ‘Žandπ‘˜ > 2 children𝑐1, . . . , π‘π‘˜. There existsπ‘š > 0 such that 2π‘š < π‘˜ ≀ 2π‘š+1for some π‘š. We will show that this subgraph can be made a binary tree by introducing𝑂(π‘˜)dummy nodes (inπ‘šlevels) between𝑏and its children. The additional nodes and edges are defined as follows:

𝑏 β†’ 𝑏0, 𝑏 β†’ 𝑏1,

𝑏0β†’ 𝑏00, 𝑏0β†’ 𝑏01, 𝑏1β†’ 𝑏10, 𝑏1β†’ 𝑏11, 𝑏00 β†’ 𝑏000, 𝑏00 β†’ 𝑏001, . . . , 𝑏11 β†’ 𝑏111, up toπ‘šlevels:

𝑏0...00β†’ 𝑐1, 𝑏0...00 →𝑐2, 𝑏0...01 β†’ 𝑐3 . . .

This is transparently a binary tree with 𝑂(π‘˜) nodes. Each of the new nodes has zero injection, and effectively the incoming flow from its parent is just split in some way between its children. This in fact enforces the flow conservation constraint at 𝑏. Similar construction can be applied to any node of the tree with more than two children, until no such node exists. It can be seen that the number of nodes in the

new graph is still linear in𝑛.

So any tree can be transformed to a binary one by the above procedure. For the rest of the analysis, we focus on theπœ–-approximation of the dynamic program on the resulting binary tree. The optimization problem (5.5) on a binary tree, can be written after some algebra as the following.

max𝝀,f,𝛼

𝑛

Γ•

𝑖=1

πœ†π‘–(π‘π‘Ž

𝑖 βˆ’π›Όπ‘–) (5.12a)

subject to

0 ≀ 𝛼𝑖 ≀ π‘π‘Ž

𝑖, 𝑖=1, . . . , 𝑛 (5.12b)

Δ𝑝

𝑖

≀ 𝑓𝑐

1(𝑖) + 𝑓𝑐

2(𝑖)βˆ’ π‘“π‘–βˆ’π‘π‘–+𝛼𝑖+𝑑𝑖 ≀ Δ𝑝

𝑖,

𝑖=1, . . . , 𝑛 (5.12c) 𝑓

𝑖

≀ 𝑓𝑖 ≀ 𝑓

𝑖, 𝑖 =2, . . . , 𝑛 (5.12d)





ο£²



ο£³

(πœ†π‘–βˆ’π‘π‘–) (𝑓𝑐

1(𝑖) + 𝑓𝑐

2(𝑖) βˆ’ π‘“π‘–βˆ’ 𝑝𝑖+𝛼𝑖+π‘‘π‘–βˆ’Ξ”π‘

𝑖

) β‰₯ 0 (πœ†π‘–βˆ’π‘π‘–) (𝑓𝑐

1(𝑖) + 𝑓𝑐

2(𝑖) βˆ’ π‘“π‘–βˆ’ 𝑝𝑖+𝛼𝑖+π‘‘π‘–βˆ’Ξ”π‘

𝑖) β‰₯ 0 ,

𝑖=1, . . . , 𝑛 (5.12e)





ο£²



ο£³

(πœ†π‘–βˆ’πœ†π‘

𝑗(𝑖)) (𝑓

𝑐𝑗(𝑖) βˆ’ 𝑓𝑐

𝑗(𝑖)) β‰₯0 (πœ†π‘–βˆ’πœ†π‘

𝑗(𝑖)) (𝑓

𝑐𝑗(𝑖) βˆ’ 𝑓𝑐

𝑗(𝑖)) β‰₯0 ,

𝑖 =1, . . . , 𝑛, 𝑗 =1,2 (5.12f) The constraints 0 ≀ 𝛼𝑖 ≀ π‘π‘Ž

𝑖 and 𝑓

𝑖

≀ 𝑓𝑖 ≀ 𝑓

𝑖, along with a prior bound on lambda πœ† ≀ πœ† ≀ πœ†can be used to define the box where π‘₯𝑖 = (πœ†π‘–, 𝑓𝑖, 𝛼𝑖) lives. Then, an πœ–-accurate solution is a solution to the following problem.

max𝝀,f,𝛼

𝑛

Γ•

𝑖=1

πœ†π‘–(π‘π‘–βˆ’π›Όπ‘–) (5.13a)

subject to Δ𝑝

𝑖

βˆ’πœ– ≀ 𝑓𝑐

1(𝑖) + 𝑓𝑐

2(𝑖)βˆ’ π‘“π‘–βˆ’π‘π‘–+𝛼𝑖+𝑑𝑖 ≀ Δ𝑝

𝑖+πœ– ,

𝑖=1, . . . , 𝑛 (5.13b)





ο£²



ο£³

(πœ†π‘–βˆ’π‘π‘–) (𝑓𝑐

1(𝑖) + 𝑓𝑐

2(𝑖) βˆ’ π‘“π‘–βˆ’ 𝑝𝑖+𝛼𝑖+π‘‘π‘–βˆ’Ξ”π‘

𝑖

) β‰₯ βˆ’πœ– (πœ†π‘–βˆ’π‘π‘–) (𝑓𝑐

1(𝑖) + 𝑓𝑐

2(𝑖) βˆ’ π‘“π‘–βˆ’ 𝑝𝑖+𝛼𝑖+π‘‘π‘–βˆ’Ξ”π‘

𝑖) β‰₯ βˆ’πœ– ,

𝑖=1, . . . , 𝑛 (5.13c)





ο£²



ο£³

(πœ†π‘–βˆ’πœ†π‘

𝑗(𝑖)) (𝑓

𝑐𝑗(𝑖) βˆ’ 𝑓𝑐

𝑗(𝑖)) β‰₯ βˆ’πœ– (πœ†π‘–βˆ’πœ†π‘

𝑗(𝑖)) (𝑓

𝑐𝑗(𝑖) βˆ’ 𝑓𝑐

𝑗(𝑖)) β‰₯ βˆ’πœ– ,

𝑖 =1, . . . , 𝑛, 𝑗 =1,2 (5.13d)

Assuming a 𝛿-discretization of the constraint set, each of the constraints (as well as πœ–-accuracy of the objective) imposes a bound on the value of 𝛿. For example, constraint (5.13c) requires 4𝛿 ≀ πœ–. (Note that we could have defined different deltas π›Ώπœ†, 𝛿𝑓, 𝛿𝛼for different variables, and in that case, we would have had 3𝛿𝑓 +𝛿𝛼 ≀ πœ–, but for simplicity, we took all the deltas to be the same.) Similar bounds on𝛿can be obtained from the other constraints, and taking the lowest upper bound implies the existence of a constant𝑐0(that depends on the parameters) such that𝛿 ≀ πœ–/𝑐0. As a result, we have a𝛿-discretization with|X |=𝑉/𝛿3 =𝑐03𝑉/πœ–3number of points, for any node. Therefore, the computational complexity over any node will be|X |3, because we have|X |many values for the node itself and|X |many values for any of its two children. Since there are𝑛nodes, the overall complexity of the algorithm will simply be𝑛|X |3 =𝑛𝑐09𝑉3/πœ–9=𝑐𝑛/πœ–9.

Part III