Abstract: This paper presents a decomposition methodology using constraint handling rules to improve the computation time of a security-constrained optimal power flow (SCOPF) problem. In order to ...