Abstract

In this paper, different optimization algorithms are introduced to solve the security-constrained optimal power flow between two connected regions, applying two control modes, namely the centralized and decentralized modes. Traditionally, the decentralized control, i.e., each power system controls its variables regardless of the boundary buses, is the most commonly used approach. However, the centralized control has been recently utilized to enhance the system security, because the active power of the generation units and/or the voltage buses on the boundaries are the two variables, which can mitigate the changes, when compared to the decentralized control solution. The optimization techniques applied propose using the Genetic Algorithm (GA) as a tool to validate the solution reached through the Whale Optimization Algorithm. The proposed methodology is investigated on the IEEE 48-bus electric power system, which consists of two regions connected to each other through three transmission lines. The problem can be solved by applying both the AC and DC Optimal Power Flow respectively, using three approaches, namely: 1- Changing the active power of generation unit; 2- Controlling the voltage magnitude and 3- Combining the changes in the real power of generation units and the voltage variations. All the proposed approaches are implemented taking into consideration the technical constraints. All of these different techniques are constructed and modeled by utilizing the Matlab code. The results of each case study are presented; and a final comparison between all the methods utilized is drawn to demonstrate the advantages of each method. The novelty of this paper is represented in investigating the effectiveness of applying the AC Optimal Power Flow and the DC Power Flow, utilizing meta-heuristic techniques.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.