کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
494687 862802 2016 22 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Security constrained optimal power flow solution using new adaptive partitioning flower pollination algorithm
ترجمه فارسی عنوان
امنیت محدوده راه حل جریان قدرت مطلوب با استفاده از الگوریتم گرده افشانی گلدان پارتیشن بندی جدید سازگار است
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر نرم افزارهای علوم کامپیوتر
چکیده انگلیسی


• A new formulation of critical optimal power flow problem based on partitioning structure is proposed.
• A dynamic adjustment of switching parameter is proposed to enhance the performance of the standard FPA.
• Three objective functions: fuel cost, power loss, voltage deviation are optimized considering faults.
• The standard FPA is improved in term of solution quality and number of generation required.
• Robustness of the proposed strategy adaptive partitioning FPA is tested and validated on IEEE 30-Bus and IEEE 57-Bus.

In this paper, a flexible power system planning strategy using a novel population-based metaheuristic algorithm inspired by the pollination process of flowers named adaptive flower pollination algorithm (APFPA) has been proposed. The proposed power system planning strategy implemented and successfully applied for solving the security optimal power flow (OPF) considering faults at critical generating unit. The main particularity of the proposed variant is that the control variables are optimized based on an adaptive and flexible structure. Also the performances of the standard FPA is improved by dynamically adjusting their control parameters, this allows creating diversity and balance between exploration and exploitation during search process. The robustness of the proposed planning strategy, is demonstrated on the IEEE 30-Bus, and IEEE 57-Bus tests power system for different objectives such as fuel cost, power losses, and voltage deviation. Considering the quality of the obtained results compared with various recent methods reported in the literature, the proposed strategy seems to be a competitive tool for solving with accuracy the security OPF considering critical situations.

Figure optionsDownload as PowerPoint slide

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Applied Soft Computing - Volume 46, September 2016, Pages 501–522
نویسندگان
, ,