Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33087
Power System Security Constrained Economic Dispatch Using Real Coded Quantum Inspired Evolution Algorithm
Authors: A. K. Al-Othman, F. S. Al-Fares, K. M. EL-Nagger
Abstract:
This paper presents a new optimization technique based on quantum computing principles to solve a security constrained power system economic dispatch problem (SCED). The proposed technique is a population-based algorithm, which uses some quantum computing elements in coding and evolving groups of potential solutions to reach the optimum following a partially directed random approach. The SCED problem is formulated as a constrained optimization problem in a way that insures a secure-economic system operation. Real Coded Quantum-Inspired Evolution Algorithm (RQIEA) is then applied to solve the constrained optimization formulation. Simulation results of the proposed approach are compared with those reported in literature. The outcome is very encouraging and proves that RQIEA is very applicable for solving security constrained power system economic dispatch problem (SCED).Keywords: State Estimation, Fuzzy Linear Regression, FuzzyLinear State Estimator (FLSE) and Measurements Uncertainty.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1333696
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1714References:
[1] J. Gruska, Quantum Computing. London: Mcgraw-Hill, 1999.
[2] L. K. Grover, "Framework for Fast Quantum Mechanical Algorithms," Presented at Conf. Proc. of the 30th Annual ACM Symposium on Theory of Computing, New York, PP. 53-62, 1998.
[3] F. Alfares, M. S. Alfares, and I. I. Esat, "Quantum-Inspired Evolution Algorithm: Experimental Analysis," Presented at Sixth International Conference on Adaptive Computing in Design and Manufacture, Bristol, UK, PP. 377-389, 2004.
[4] H. K. Youssef, M.El-Shibini, and G.A.Hazaa, "Some New Aspects in Power System Dynamic Security Using Pattern Recognition," Presented at Second Middle East Power Conference. MEPCON-92, PP. 308-313, 1992.
[5] H. K. Youssef, M. El-Shibini, and G. A. W. Hazza, "Power System Security with the Consideration of Economic Dispatch," Presented at the Mediterranean Electrotechnical Conference - MELECON, Antalya, Turkey, PP. 889-892, 1994.
[6] H. Mashhadi, "Pattern Recognition Technique for Fast On-Line Security Assessment of Large Interconnected Power Systems," IEEE Trans. on Power System, PP. 3816-3824, 1983.
[7] R. B. Alder, "Security Consideration Economic Dispatch with Participation Factors," IEEE Transactions on Power Apparatus and Systems, Vol. Pas-96, 1977.
[8] R. T. Bui and S. Ghaderpanah, "Real Power Rescheduling and Security Assessment," IEEE Transactions on Power Apparatus and Systems, Vol. Pas-101, pp. 2906-15, 1982.
[9] M. El-Sharkawy and D. Nieebur, "Artificial Neural Networks with Application to Power Systems," IEEE Power Engineering Society, A Tutorial Course, 1996.
[10] T. Yalcinoz and M. J. Short, "Neural Networks Approach For Solving Economic Dispatch Problem with Transmission Capacity Constraints," IEEE Transactions on Power Systems, Vol. 13, pp. 307-13, 1998.
[11] R. K. Pancholi and K. S. Swarup, "Particle Swarm Optimization for Security Constrained Economic Dispatch," Presented at International Conference on Intelligent Sensing and Information Processing. (IEEE Cat. No.04ex783), Chennai, India, pp. 7-12, 2004.
[12] H. K. Youssef and K. M. El-Naggar, "Genetic Based Algorithm for Security Constrained Power System Economic Dispatch," Electric Power Systems Research, Vol. 53, pp. 47-51, 2000.
[13] C. L. Chen And N. Chen, "Direct Search Method for Solving Economic Dispatch Problem Considering Transmission Capacity Constraints," IEEE Transactions on Power Systems, Vol. 16, pp. 764-769, 2001.
[14] C. K. Pang, F. S. Prabhakara, A.H.Abid, And A. J. Koivo, "Security Evaluation in Power Systems Using Pattern Recognition," IEEE Trans. on Power Apparatus and Systems, pp. 969-976, 1974.
[15] R. Barr, B. L. Golden, J. P. Kelly, M. G. Resende, and W. R. Stewart, "Designing and Reporting on Computational Experiments with Heuristic Methods," Journal of Heuristics, vol. 1, pp. 9-32, 1995.