Solving security constrained optimal power flow problems: a hybrid evolutionary approach

Carolina G. Marcelino, Paulo E. M. Almeida, Elizabeth F. Wanner, Manuel Baumann, Marcel Weil, Leonel M. Carvalho, Vladimiro Miranda

Research output: Contribution to journalArticlepeer-review

Abstract

A hybrid population-based metaheuristic, Hybrid Canonical Differential Evolutionary Particle Swarm Optimization (hC-DEEPSO), is applied to solve Security Constrained Optimal Power Flow (SCOPF) problems. Despite the inherent difficulties of tackling these real-world problems, they must be solved several times a day taking into account operation and security conditions. A combination of the C-DEEPSO metaheuristic coupled with a multipoint search operator is proposed to better exploit the search space in the vicinity of the best solution found so far by the current population in the first stages of the search process. A simple diversity mechanism is also applied to avoid premature convergence and to escape from local optima. A experimental design is devised to fine-tune the parameters of the proposed algorithm for each instance of the SCOPF problem. The effectiveness of the proposed hC-DEEPSO is tested on the IEEE 57-bus, IEEE 118-bus and IEEE 300-bus standard systems. The numerical results obtained by hC-DEEPSO are compared with other evolutionary methods reported in the literature to prove the potential and capability of the proposed hC-DEEPSO for solving the SCOPF at acceptable economical and technical levels.
Original languageEnglish
Pages (from-to)3672–3690
JournalApplied Intelligence
Volume48
Issue number10
Early online date17 Apr 2018
DOIs
Publication statusPublished - 1 Oct 2018

Bibliographical note

© 2018 Springer Publishing. This is a post-peer-review, pre-copyedited version of an article published in Applied Intelligence. The final authenticated version is available online at: http://dx.doi.org/10.1007/s10489-018-1167-5.

Funding: BE MUNDUS Project, the Helmholtz-Project Energy System 2050.

Keywords

  • Evolutionary optimization methods
  • Optimal power flow
  • Hybrid algorithms
  • hC-DEEPSO algorithm
  • Fining tunining parameters
  • Statistical inference

Fingerprint

Dive into the research topics of 'Solving security constrained optimal power flow problems: a hybrid evolutionary approach'. Together they form a unique fingerprint.

Cite this