N-1-1 contingency-constrained optimal power flow by interdiction methods

Neng Fan, Richard Chen, Jean Paul Watson

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Scopus citations


N-1-1 contingency analysis considers the consecutive loss of two elements in a power system, with intervening time for operator adjustments; the associated reliability criterion was recently included in the NERC Standard TPL-001-1. In this paper, we introduce optimization models for N-1-1 contingency analysis, based on DC optimal power flow considerations. We use mixed-integer programming approaches to optimally model the system adjustments required to avoid potential cascading outages during the primary and secondary contingencies. Contingencies are determined via worst-case interdiction analysis. To facilitate operation during the secondary contingency, line overloads and load shedding are allowed. We test our models and algorithms on several IEEE test systems. Our computational experiments indicate potential for the models to augment comprehensive system operations models, such as unit commitment.

Original languageEnglish (US)
Title of host publication2012 IEEE Power and Energy Society General Meeting, PES 2012
StatePublished - Dec 11 2012
Externally publishedYes
Event2012 IEEE Power and Energy Society General Meeting, PES 2012 - San Diego, CA, United States
Duration: Jul 22 2012Jul 26 2012

Publication series

NameIEEE Power and Energy Society General Meeting
ISSN (Print)1944-9925
ISSN (Electronic)1944-9933


Other2012 IEEE Power and Energy Society General Meeting, PES 2012
Country/TerritoryUnited States
CitySan Diego, CA


  • N-1-1 contingency analysis
  • mixed integer programming
  • optimal power flow
  • power flow interdiction

ASJC Scopus subject areas

  • Energy Engineering and Power Technology
  • Nuclear Energy and Engineering
  • Renewable Energy, Sustainability and the Environment
  • Electrical and Electronic Engineering


Dive into the research topics of 'N-1-1 contingency-constrained optimal power flow by interdiction methods'. Together they form a unique fingerprint.

Cite this