Electricity market equilibrium analysis based on nonlinear interior point algorithm with complementarity constraints

SG Petoussis, Xiao-Ping Zhang, KR Godfrey

Research output: Contribution to journalArticle

18 Citations (Scopus)


This paper presents an interior point algorithm based on a.c. network model for determining the Nash supply function equilibrium (SFE) of bid-based electricity markets. The SFE problem is considered as a bi-level game. At the first level, the problem begins with the formulation of an optimal power flow (OPF) interior point-based algorithm to handle the independent system operator (ISO) problem for maximising social welfare. This algorithm is based on the OPF with a.c. network transmission model taking into account all the operating aspects such as the generation capacity limits, bus voltage limits, transmission line constraints, network losses and especially the effect of the reactive power. The resulting Karush-Kuhn-Tucker (KKT) conditions of the problem at the first level are then reformulated using nonlinear complementarity constraints and incorporated as equality constraints in the second-level formulation for maximising the individual profit for each strategic generating firm. By employing a special nonlinear complementarity function, the complementarity constraints are then transformed into nonlinear algebraic expressions, thus the KKT conditions of the resulting combined problem can be derived. The final problem is then solved iteratively based on the solution techniques of the interior point algorithm. Numerical examples of a three-bus system, the IEEE 14-bus system and the IEEE 30-bus system, show that the algorithm can successfully determine the electricity market equilibrium with the a.c. network model.
Original languageEnglish
Pages (from-to)603-612
Number of pages10
JournalIET Generation, Transmission and Distribution
Issue number4
Publication statusPublished - 1 Jan 2007


Dive into the research topics of 'Electricity market equilibrium analysis based on nonlinear interior point algorithm with complementarity constraints'. Together they form a unique fingerprint.

Cite this