Security-constrained optimal power flow with wind and thermal power generators using fuzzy adaptive artificial physics optimization algorithm

被引:0
|
作者
Kiran Teeparthi
D. M. Vinod Kumar
机构
[1] National Institute of Technology Warangal,Department of Electrical Engineering
来源
Neural Computing and Applications | 2018年 / 29卷
关键词
Security-constrained optimal power flow; Wind power; Reserve cost; Penalty cost; Fuzzy-based artificial physics optimization;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, a new fuzzy adaptive artificial physics optimization (FAAPO) algorithm is used to solve security-constrained optimal power flow (SCOPF) problem with wind and thermal power generators. The stochastic nature of wind speed is modeled as a Weibull probability density function. The production cost is modeled with the overestimation and underestimation of available wind energy and included in the conventional SCOPF. Wind generation cost model comprises two components, viz. reserve capacity cost for wind power surplus and penalty cost for wind power shortage. The selection of optimal gravitational constant (G) is a tedious process in conventional artificial physics optimization (APO) method. To overcome this limitation, the gravitational constant (G) is fuzzified in this work. Therefore, based upon the requirement, the gravitational constant changes adaptively. Hence, production cost is reduced, settles at optimum point and takes less number of iterations. The proposed algorithm is tested on IEEE 30-bus system and Indian 75-bus practical system, including wind power in both the test systems. It is observed that FAAPO can outperform BAT algorithm and APO algorithm. Hence, the proposed algorithm can be used for integration of wind power with thermal power generators.
引用
收藏
页码:855 / 871
页数:16
相关论文
共 50 条
  • [41] Security-Constrained Optimal Power Flow via Cross-Entropy Method
    Carvalho, Leonel de Magalhaes
    Leite da Silva, Armando Martins
    Miranda, Vladimiro
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2018, 33 (06) : 6621 - 6629
  • [42] Security constrained optimal power flow solution of wind-thermal generation system using modified bacteria foraging algorithm
    Panda, Ambarish
    Tripathy, M.
    ENERGY, 2015, 93 : 816 - 827
  • [43] Probabilistic security-constrained optimal power flow including the controllability of HVDC lines
    Vrakopoulou, Maria
    Chatzivasileiadis, Spyros
    Andersson, Goeran
    2013 4TH IEEE/PES INNOVATIVE SMART GRID TECHNOLOGIES EUROPE (ISGT EUROPE), 2013,
  • [44] A Scalable Formulation for Look-Ahead Security-Constrained Optimal Power Flow
    Varawala, Lamia
    Hesamzadeh, Mohammad Reza
    Dan, Gyorgy
    Baldick, Ross
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2022, 9 (01): : 138 - 150
  • [45] Improving the statement of the corrective security-constrained optimal power-flow problem
    Capitanescu, Florin
    Wehenkel, Louis
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2007, 22 (02) : 887 - 889
  • [46] Transferability-Oriented Adversarial Robust Security-Constrained Optimal Power Flow
    Zuo, Ke
    Sun, Mingyang
    Zhang, Zhenyong
    Cheng, Peng
    Strbac, Goran
    Kang, Chongqing
    IEEE TRANSACTIONS ON SMART GRID, 2024, 15 (05) : 5169 - 5181
  • [47] A New Iterative Approach to the Corrective Security-Constrained Optimal Power Flow Problem
    Capitanescu, Florin
    Wehenkel, Louis
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2008, 23 (04) : 1533 - 1541
  • [48] SECURITY-CONSTRAINED OPTIMAL POWER FLOW WITH POST-CONTINGENCY CORRECTIVE RESCHEDULING
    MONTICELLI, A
    PEREIRA, MVF
    GRANVILLE, S
    IEEE TRANSACTIONS ON POWER SYSTEMS, 1987, 2 (01) : 175 - 182
  • [49] Security constrained optimal power flow solution using new adaptive partitioning flower pollination algorithm
    Mahdad, Belkacem
    Srairi, K.
    APPLIED SOFT COMPUTING, 2016, 46 : 501 - 522
  • [50] Security-constrained unit commitment with volatile wind power generation
    Wang, Jianhui
    Shahidehpour, Mohammad
    Li, Zuyi
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2008, 23 (03) : 1319 - 1327