Security-constrained optimal power flow: A parallel self-adaptive differential evolution approach

被引:11
|
作者
Thitithamrongchai, C. [1 ]
Eua-Arporn, B. [1 ]
机构
[1] Chulalongkorn Univ, Power Syst Res Lab, Dept Elect Engn, Bangkok 10330, Thailand
关键词
differential evolution; optimal power flow; parallel processing; PC cluster; security constraints;
D O I
10.1080/15325000701603942
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This article proposes a parallel self-adaptive differential evolution with augmented Lagrange multiplier method (pSADE_ALM) to solve security-constrained optimal power flow (SCOPF) problems. The proposed pSADE_ALM is a modified version of sequential self-adaptive differential evolution (SADE_ALM) by exploiting parallel processing techniques to increase the search capability of the algorithm via PC cluster 3 x 2.8 GHz Pentium IV processors. An IEEE 30-bus system is investigated based on two cases, i.e., (1) the base-case optimal power flow (OPF) problems and (2) the SCOPF problems. The proposed pSADE_ALM shows very impressive results compared with others, e.g., gradient-based methods, tabu search-based methods, evolutionary programming (EP), improved evolutionary programming (IEP), and SADE_ALM.
引用
收藏
页码:280 / 298
页数:19
相关论文
共 50 条
  • [1] Self-adaptive differential approach for transient stability constrained optimal power flow
    Chen, Yingying
    Luo, Fengji
    Xu, Yan
    Qiu, Jing
    [J]. IET GENERATION TRANSMISSION & DISTRIBUTION, 2016, 10 (15) : 3717 - 3726
  • [2] A new approach to security-constrained optimal power flow analysis
    Yan, P
    Sekar, A
    [J]. 2001 POWER ENGINEERING SOCIETY SUMMER MEETING, VOLS 1-3, CONFERENCE PROCEEDINGS, 2001, : 1462 - 1467
  • [3] Flexible Security-Constrained Optimal Power Flow
    Thomas, James Jamal
    Grijalva, Santiago
    [J]. IEEE TRANSACTIONS ON POWER SYSTEMS, 2015, 30 (03) : 1195 - 1202
  • [5] Parallel computation methods for static security-constrained optimal power flow of power system
    Yang Y.
    Tao Z.
    Liu H.
    Qin Z.
    [J]. Dianli Zidonghua Shebei/Electric Power Automation Equipment, 2019, 39 (01): : 99 - 105
  • [6] Probabilistic security-constrained AC optimal power flow
    Vrakopoulou, Maria
    Katsampani, Marina
    Margellos, Kostas
    Lygeros, John
    Andersson, Goran
    [J]. 2013 IEEE GRENOBLE POWERTECH (POWERTECH), 2013,
  • [7] A New Iterative Approach to the Corrective Security-Constrained Optimal Power Flow Problem
    Capitanescu, Florin
    Wehenkel, Louis
    [J]. IEEE TRANSACTIONS ON POWER SYSTEMS, 2008, 23 (04) : 1533 - 1541
  • [8] Security-Constrained Optimal Power and Natural-Gas Flow
    Correa-Posada, Carlos M.
    Sanchez-Martin, Pedro
    [J]. IEEE TRANSACTIONS ON POWER SYSTEMS, 2014, 29 (04) : 1780 - 1787
  • [9] Preventive Security-Constrained Optimal Power Flow with Probabilistic Guarantees
    Li, Hang
    Zhang, Zhe
    Yin, Xianggen
    Zhang, Buhan
    [J]. ENERGIES, 2020, 13 (09)
  • [10] Adversarially Robust Learning for Security-Constrained Optimal Power Flow
    Donti, Priya L.
    Agarwal, Aayushya
    Bedmutha, Neeraj Vijay
    Pileggi, Larry
    Kolter, J. Zico
    [J]. ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 34 (NEURIPS 2021), 2021, 34