SECURITY CONSTRAINED OPTIMAL POWER FLOW BASED ON AN ARTIFICIAL INTELLIGENCE TECHNIQUE

Authors

  • Ayman Almansory Electrical Engineering Department, Collage of Engineering, Mustansiriayh University, Baghdad, Iraq Author https://orcid.org/0000-0003-1002-8544
  • Kassim Al-Anbarri Electrical Engineering Department, Collage of Engineering, Mustansiriayah University, Baghdad, Iraq Author https://orcid.org/0000-0001-8002-7913

DOI:

https://doi.org/10.31272/jeasd.27.6.5

Keywords:

power system security, differential evolution, economic dispatch, multi-objective optimization

Abstract

In the past, artificial intelligence techniques were successfully adopted for obtaining optimal power flow in a power system. However, this optimality is limited to the economic aspects of the system's operating conditions. The other aspects of the operation, like security conditions, have been given limited attention. Hence, this paper presents an attempt to dispatch the power generation in electrical power systems optimally by taking into consideration both economic and secure operations, so that modern power systems can operate reliably and effectively. Security-constrained optimal power flow is addressed in this paper as a multi-objective optimization problem, consisting of four objective functions: minimizing power generation costs; minimizing voltage deviation; minimizing power losses; and alleviating the overloading on transmission lines. A detailed steady-state generator model is adopted in the present formulation. A metaheuristic optimization technique, namely, differential evolution, is used to obtain the security constraint optimal power dispatch. Additionally, the operating states of a power system have been addressed in this paper. The identification of the operating states is vital to the assessment of the security of the EPS. Improvements and appropriate security assessments have been made in some cases. The proposed algorithm is applied to a typical power system with different operating strategies. The obtained results are compared to those obtained from previous studies in the literature to demonstrate the suggested method's validity and effectiveness.

References

Olofsson, M., Andersson, G., and Soder, L. (1995). Linear programming based optimal power flow using second order sensitivities. IEEE Transactions on Power Systems. Vol. 10, Issue 3, pp. 1691–1697.

https://doi.org/10.1109/59.466472.

Sivasubramani, S., and Swarup, K. S. (2011). Sequential quadratic programming based differential evolution algorithm for optimal power flow problem. IET Generation, Transmission & Distribution. Vol. 5, Issue. 11, pp. 1149.

https://doi.org/10.1049/iet-gtd.2011.0046.

Aoki, K., & Kanezashi, M. (1985). A Modified Newton Method For Optimal Power Flow Using Quadratic Approximated Power Flow. IEEE Transactions on Power Apparatus and Systems, PAS. Vol. 104, Issue 8, pp. 2119–2125.

https://doi.org/10.1109/tpas.1985.318790

Momoh, J. A., Adapa, R., and El-Hawary, M. E. (1999). A review of selected optimal power flow literature to 1993, Part I: non-linear and quadratic programming approaches. IEEE Trans. on Power Systems. Vol. 14, Issue. 1, pp. 105-111.

https://doi.org/10.1109/59.744492.

Tang, W. J., Li, M. S., Wu, Q. H., and Saunders, J. R. (2008). Bacterial Foraging Algorithm for Optimal Power Flow in Dynamic Environments. IEEE Transactions on Circuits and Systems I: Regular Papers, Vol.55, Issue. 8, pp. 2433–2442.

https://doi.org/10.1109/tcsi.2008.918131.

Abido, M. A. (2002). Optimal power flow using particle swarm optimization. International Journal of Electrical Power & Energy Systems. Vol. 24, Issue. 7, pp. 563–571.

https://doi.org/10.1016/s0142-0615(01)000679.

Mithun, B. M., Muthyala, S., and Maheswarapu, S. (2010). Security Constraint Optimal Power Flow (SCOPF) A Comprehensive Survey. International Journal of Computer Applications. Vol.11, Issue. 6, pp. 42–52.

https://doi.org/10.5120/1583-2122.

Monticelli, A., Pereira, M. V. F., and Granville, S. (1987). Security-Constrained Optimal Power Flow with Post-Contingency Corrective Rescheduling. IEEE Power Engineering Review. Vol. PER-7, Issue. 2, pp. 43–44.

https://doi.org/10.1109/mper.1987.5527553.

Capitanescu, F., Martinez Ramos, J. L., Panciatici, P., Kirschen, D., Marano Marcolini, A., Platbrood, L., and Wehenkel, L. (2011). State-of-the-art, challenges, and future trends in security constrained optimal power flow. Electric Power Systems Research. Vol. PER-81, Issue. 8, pp. 1731–1741.

https://doi.org/10.1016/j.epsr.2011.04.003.

Galvani, S., Talavat, V., and Rezaeian Marjani, S. (2018). Preventive/corrective security constrained optimal power flow using a multiobjective genetic algorithm. Electric Power Components and Systems. Vol. 46, Issue, 13, pp. 1462-1477.

https://doi.org/10.1080/15325008.2018.1489432

Kucuktezcan, C. F., and Genc, V. I. (2015). Preventive and corrective control applications in power systems via big bang–big crunch optimization. Int. J. Electr. Power Energy Syst. Vol. 67, pp. 114–124.

https://doi.org/10.1016/j.ijepes.2014.11.022.

Ayan, K., Kılıç, U., and Baraklı, B. (2015). Chaotic artificial bee colony algorithm based solution of security and transient stability constrained optimal power flow. International Journal of Electrical Power & Energy Systems. Vol. 64, pp. 136-147.‏

https://doi.org/10.1016/j.ijepes.2014.07.018.

Saberi, H., Amraee, T., Zhang, C., and Dong, Z. Y. (2020). A heuristic benders-decomposition-based algorithm for transient stability constrained optimal power flow. Electric Power Systems Research. 185, 106380.‏

https://doi.org/10.1016/j.epsr.2020.106380.

Xu, Y., Yang, H., Zhang, R., Dong, Z. Y., Lai, M., and Wong, K. P. (2016). A contingency partitioning approach for preventive- corrective security-constrained optimal power flow computation. Electr. Power Syst. Res. Vol. 132, pp. 132–140.

https://doi.org/10.1016/j.epsr.2015.11.012.

Velloso, A., Van Hentenryck, P., and Johnson, E. S. (2021). An exact and scalable problem decomposition for security-constrained optimal power flow. Electric Power Systems Research. 195, 106677.‏

https://doi.org/10.1016/j.epsr.2020.106677.

Baskar, G., and Mohan, M. R. (2009). Contingency constrained economic load dispatch using improved particle swarm optimization for security enhancement. Electric Power Systems Research, Vol. 79, Issue. 4, pp. 615–621.

https://doi.org/10.1016/j.epsr.2008.08.013.

R. Storn, K. Price. (1997). Differential evolution, a simple and efficient heuristic strategy for global optimization over continuous spaces. Journal of Global Optimization. Vol.11 pp. 341–359.

https://doi.org/10.1023/a:1008202821328.

Storn, R., and Price, K. (1996). Minimizing the real functions of the ICEC’96 contest by differential evolution. Proceedings of IEEE International Conference on Evolutionary Computation. pp. 842–844.

https://doi.org/10.1109/icec.1996.542711.

Das, S., Abraham, A., and Konar, A. (2008). Particle Swarm Optimization and Differential Evolution Algorithms: Technical Analysis, Applications and Hybridization Perspectives. Studies in Computational Intelligence. Vol. 1, pp.38.

https://doi.org/10.1007/978-3-540-78297-1_1.

Abou El Ela, A. A., Abido, M. A., and Spea, S. R. (2009). Optimal power flow using differential evolution algorithm. Electrical Engineering. Vol. 91, Issue. 2, pp. 69–78.

https://doi.org/10.1007/s00202-009-0116-z.

Trivedi, I. N., Jangir, P., Parmar, S. A., and Jangir, N. (2016). Optimal power flow with voltage stability improvement and loss reduction in power system using Moth-Flame Optimizer. Neural Computing and Applications.

https://doi.org/10.1007/s00521-016-2794-6.

A.Qasim, L. Al-Bahrani. (2020). constraint optimal power flow based on ant colony optimization. Journal of Engineering and Sustainable Development. Vol.24, PP. 274-283.

https://doi.org/10.31272/jeasd.conf.1.30.

M. Al-Kaabi and L. Al-Bahrani. (2020). Modified artificial bee colony optimization technique with different objective function of constraints optimal power flow. Int Journal of Intelligent Engineering and Systems, Vol. 13, Issue. 4, pp. 378–388.

https://doi.org/10.22266/ijies2020.0831.33.

Sekhar, P., and Mohanty, S. (2016). An enhanced cuckoo search algorithm based contingency constrained economic load dispatch for security enhancement. International Journal of Electrical Power & Energy Systems, Vol. 75, pp. 303–310.

https://doi.org/10.1016/j.ijepes.2015.09.018.

Islam, M. Z., Wahab, N. I. A., Veerasamy, V., Hizam, H., Mailah, N. F., Guerrero, J. M., and Mohd Nasir, M. N. (2020). A Harris Hawks Optimization Based Single- and Multi-Objective Optimal Power Flow Considering Environmental Emission. Sustainability, Vol. 12, Issue. 13, pp. 5248.

https://doi.org/10.3390/su12135248.

Song, S.-H., Jeong, J.-W., Yoon, Y. T., & Moon, S.-I. (2007). Classification method of operating states in Cost Based Pool (CBP) market in Korea. Electric Power Systems Research, Vol. 77, Issue. 10, pp. 1390–1401.

https://doi.org/10.1016/j.epsr.2006.10.009.

Bansal, R. C. (2005). Optimization Methods for Electric Power Systems: An Overview. International Journal of Emerging Electric Power Systems. Vol. 2, Issue. 1.

https://doi.org/ 10.2202/1553-779x.1021.

Alsac, O., and Stott, B. (1974). Optimal Load Flow with Steady-State Security. IEEE Transactions on Power Apparatus and Systems. Vol. 93, Issue. 3, pp. 745–751. https://doi.org/10.1109/tpas.1974.293972

Lee, K., Park, Y., and Ortiz, J. (1985). A United Approach to Optimal Real and Reactive Power Dispatch. IEEE Transactions on Power Apparatus and Systems. Vol. PAS-104, Issue. 5, pp 1147–1153.

https://doi.org/10.1109/tpas.1985.32346

Downloads

Key Dates

Published

2023-11-01

How to Cite

SECURITY CONSTRAINED OPTIMAL POWER FLOW BASED ON AN ARTIFICIAL INTELLIGENCE TECHNIQUE. (2023). Journal of Engineering and Sustainable Development, 27(6), 725-741. https://doi.org/10.31272/jeasd.27.6.5

Similar Articles

1-10 of 610

You may also start an advanced similarity search for this article.