Security Constrained Optimal Power Flow Using Modern Optimization Techniques

. Reham Hosny Salem Mansour;

Abstract


The event of numerous failures in the power framework can prompt power stability and influences its parameters to go past its working points of confinement. It might prompt hindering the safe activities and dependability of power frameworks. Guaranteeing system security needs appropriate moves to be made for the unwanted possibility. In this way, security examination is vital assignments in present day vitality administration frameworks.

Security and execution of the power framework are the prime worry of power frameworks arranging and activity. It is fundamental to devise legitimate measures for the maintenance and enhancement of security in the power framework.

The essential goal of the exploration work is to upgrade the security of the power framework and limit the generator fuel cost. Possibility positioning is utilized to choose line blackouts. The line flow confine violation in different single line blackouts are alleviated successfully by the advancement techniques, which keep control flows inside their security limits.

The thesis receives unraveling the security constrained optimal power flow issue by Four strategies which are genetic, bat, flower pollination and grey wolf enhancement strategies.

To recognize the adequacy of the proposed techniques, simulation cases are applied to the standard IEEE 14 and 30 transport frameworks and the acquired outcomes are contrasted and the before strategies.

The thesis additionally adjusts three unique sorts of FlexibleAC Transmission Systems (FACTs) which are Thyristor Controlled Series Compensation (TCSC), Static Var Compensator (SVC) and Unified Power Flow Control (UPFC) for enhancing the framework execution


Other data

Title Security Constrained Optimal Power Flow Using Modern Optimization Techniques
Other Titles سريان القدرة الأمثل المشروط بالأمان باستخدام طرق أمثلة حديثة
Authors . Reham Hosny Salem Mansour
Issue Date 2019

Attached Files

File SizeFormat
BB32.pdf1.31 MBAdobe PDFView/Open
Recommend this item

Similar Items from Core Recommender Database

Google ScholarTM

Check

views 6 in Shams Scholar


Items in Ain Shams Scholar are protected by copyright, with all rights reserved, unless otherwise indicated.