Professional Documents
Culture Documents
Multi-Objective GA For Security Enhancem PDF
Multi-Objective GA For Security Enhancem PDF
a r t i c l e i n f o a b s t r a c t
Article history: Power system security enhancement is a major concern in the operation of power system. In this paper,
Received 18 January 2011 the task of security enhancement is formulated as a multi-objective optimization problem with mini-
Received in revised form 10 August 2011 mization of fuel cost and minimization of FACTS device investment cost as objectives. Generator active
Accepted 7 March 2012
power, generator bus voltage magnitude and the reactance of Thyristor Controlled Series Capacitors
Available online 30 April 2012
(TCSC) are taken as the decision variables. The probable locations of TCSC are pre-selected based on the
values of Line Overload Sensitivity Index (LOSI) calculated for each branch in the system. Multi-objective
Keywords:
genetic algorithm (MOGA) is applied to solve this security optimization problem. In the proposed GA, the
Power system security
Flexible AC transmission system (FACTS)
decision variables are represented as floating point numbers in the GA population. The MOGA empha-
devices size non-dominated solutions and simultaneously maintains diversity in the non-dominated solutions. A
Thyristor Controlled Series Capacitors fuzzy set theory-based approach is employed to obtain the best compromise solution over the trade-off
(TCSC) curve. The proposed approach has been evaluated on the IEEE 30-bus and IEEE 118-bus test systems. Sim-
Genetic algorithm ulation results show the effectiveness of the proposed approach for solving the multi-objective security
Pareto optimal frontier enhancement problem.
© 2012 Elsevier B.V. All rights reserved.
1568-4946/$ – see front matter © 2012 Elsevier B.V. All rights reserved.
http://dx.doi.org/10.1016/j.asoc.2012.03.057
R.N. Banu, D. Devaraj / Applied Soft Computing 12 (2012) 2756–2764 2757
i -jxc rij+jxij j
Nomenclature
where SlC = MVA flow in line ‘l’ during contingency 3.1.3. Problem constraints
“C”. The constraints are:
The LOSI defined at branch “l” for the base case loading is defined
by LOSIlBL . In order to achieve optimal location of TCSC, valid under • load flow constraints
change in system loading, LOSI indices defined in (4) are also com-
NB
puted at an increased loading and decreased loading scenario. The Qi − Vi Vj (Gij sin ij − Bij cos ij ) = 0, i = 1, 2, . . . , NPQ
increased loading scenario pertains to all the loads increased by 5%
j=1
from their base values and the decreased loading scenario has been
(7)
simulated with the loads decreased by 5% from their base values.
The corresponding LOSI, calculated at each overloaded lines, are
termed as LOSIlIL and LOSIlDL respectively. The optimal location of
TCSC has been decided by an average line overload severity index,
NB
In general, the optimal power flow (OPF) problem is formu- • transmission line flow limit
lated as an optimization problem in which one or more objective
Sl < Slmax , l ∈ Nl (12)
functions are minimized while satisfying a number of equality
and inequality constraints. In the security enhancement problem • limit on reactance of TCSC
considered here the goal is to determine the optimal values of gen-
erator active power, generator bus voltage magnitudes and TCSC min max
XTCSC,i ≤ XTCSC,i ≤ XTCSC,i , i ∈ NTCSC (13)
that enhance the systems security level while minimizing the gen-
erator fuel cost and investment cost of TCSC. Minimization of fuel The security constrained optimal power flow (SCOPF) formula-
cost will necessitate higher values of TCSC to reach the same level tion considers both the pre and post contingency state power flows
of security. This will be lead to increased value of TCSC installation and all constraints in those states should always be satisfied. The
cost. The mathematical formulation of the security enhancement post-contingency constraints are of the same dimension as those
problem is given below. of the pre-contingency case. If there are m total constraints in a
given base case optimal power flow (OPF), there will be (k + 1)m
constraints in a SCOPF formulation with k contingencies.
3.1. Objective functions
Aggregating the objectives and constraints, the problem can
be mathematically formulated as a non-linear constrained multi-
3.1.1. Economic objective function (FC )
objective optimization problem as follows:
The most commonly used objective in the OPF problem formu-
lation is the minimization of the total operation cost of the fuel minimize FT = [FC , FIC ] (14)
consumed for producing electric power within a scheduled time
interval. The individual costs of each generating unit are assumed subject to the constraints (7)–(13).
to be function only of real power generation and are represented
by quadratic curves. The objective function for the entire power 4. Multi-objective genetic algorithm
system can be expressed as the sum of the quadratic cost model at
each generator [18]. Genetic algorithms (GA) [22] are generalized search algorithms
based on the mechanics of natural genetics. GA maintains a popu-
Ng
lation of individuals that represent the candidate solutions to the
2
FC = (ai Pgi + bi Pgi + ci ) ($/h) (5) given problem. Each individual in the population is evaluated to
i=1 give some measure of its fitness to the problem from the objective
where ai , bi , and ci are the cost coefficients of generator at bus i. Pgi function. GAs combine solution evaluation with stochastic genetic
is the active power generation at bus i. operators namely, selection, crossover and mutation to obtain near
optimality. Being a population-based approach, GA is well suited
to solve multi-objective optimization problems. Multi-objective
3.1.2. TCSC cost function (FE )
genetic algorithm [7,23] is an extension of classical GA. The main
It is important to take the economical aspects of the TCSC devices
difference between a conventional GA and a MOGA lies in the
installed in the power system due to high investment and operating
assignment of fitness to an individual. The rest of the algorithm
costs. The total investment cost of the TCSC device is expressed as
is the same as that in a classical GA. The details of the MOGA are
[21]:
described below.
FIC = (fi + vi Xi ) (6) In the MOGA, first, each solution is checked for its domination
in the population. Two solutions (x(1) and x(2) ) are compared on the
i∈˝
basis of whether one dominates the other solution or not. A solu-
where fi and vi are the fixed cost and variable cost for candidate. tion x(1) is said to dominate the other solution x(2) , if the following
˝ is a set of all candidate sites, and Xi , is the rating of TCSC device i. conditions are satisfied:
R.N. Banu, D. Devaraj / Applied Soft Computing 12 (2012) 2756–2764 2759
(a) The solution x(1) is no worse than x(2) in all objectives, or where fjSC is the scaled fitness; fj is the shared fitness and it is cal-
fi (x(1) )f
¯ i (x(2) ) for all i = 1, 2, . . ., M where M be the objective culated using fj = fj /ncj ; (r) is the number of solutions in rank
functions. ri .
(b) The solutions x(1) is strictly better than x(2) in at least one objec- This procedure is continued until all ranks are processed. There-
tive, or fi (x(1) ) fi (x(2) ) for at least one j (j ∈ {1, 2, . . ., M}) after, selection, crossover and mutation operators are applied to
create a new population. With each individual represented as a
If any of the above condition is violated, the solution x(1) does string of integers and floating point numbers, selection process
not dominate the solution x(2) (or mathematically x(1) ≤ x(2) ). remains the same as in classical GA, but the cross over and mutation
To a solution ‘i’, a rank ri equal to one plus the number of solu- operators are applied variable by variable. In this paper, tourna-
tions i that dominate solution ‘i’ is assigned: ment selection and BLX-␣ crossover and non-uniform mutation
ri = 1 + i (15) operators [7] are used.
Table 1
Line outage ranking using severity index.
Outage line no. Over loaded lines Line flow (MVA) Line flow limit (MVA) Severity index (SI) Rank
22–24 19.062 16
28–27 2.1979 4
24–25 17.781 16
2–6 76.285 65
2–5 1.3777 5
5–7 101.08 70
⎧
• solution representation and ⎨ KV (ViK − Vimax )2 , if Vik > Vimax
• fitness evaluation.
PViK = K min k 2min (24)
⎩ KV (Vi − Vi ) , if Vi < Vi
0, otherwise
6.1. Solution representation ⎧
⎨ Kq (QiK − Qimax )2 , if Qik > Qimax
Implementation of GA for a problem starts with the parameter PQiK = K min k 2min (25)
encoding (i.e., the representation of the problem). Each individ- ⎩ Kq (Qi − Qi ) , if Qi < Qi
0, otherwise
ual in the genetic population represents a candidate solution. The
elements of that solution consist of all the decision variables in 2
Kl (SlK − Slmax ) , if Slk > Slmax
the system. The decision variables of the SCOPF problem include PLlK = (26)
0, otherwise
active power generation Pgi , generator bus voltage magnitude Vgi
and transformer tap settings tk . The solution variables are repre- where Ks , Kv , Kq , and Kl are the penalty factors for slack bus power
sented as floating point numbers and integers. This representation output, bus voltage limit violation, generator reactive power limit
has a number of advantages over binary coding. The efficiency of violation and line flow violation respectively.
the GA is increased as there is no need to convert the solution vari- The penalty function is added to each of the objective function
ables to the binary type. Also, the computer memory required to to get the new objective functions.
store the population is reduced.
7. Simulation results
6.2. Evaluation function
The proposed multi-objective genetic algorithm approach has
GA searches for the optimal solution by maximizing a given fit- been applied to solve the security enhancement problem in IEEE-
ness function, and therefore an evaluation function which provides 30 bus and IEEE 118-bus test systems. The IEEE 30-bus system has 6
a measure of the quality of the problem solution must be provided. generator buses, 24 load buses and 41 transmission lines, of which
In the SCOPF problem under consideration, the objectives are to 4 branches (6–9), (6–10), (4–12) and (28–27) are with tap setting
minimize the fuel cost of generation and investment cost of TCSC transformers. The generator and transmission-line data relevant to
satisfying the constraints. The equality constraints given by Eqs. the system are taken from [1]. The upper and lower voltage limits at
(7) and (8) are satisfied by running the power flow program. The all the bus bars except slack bus are taken as 1.10 p.u. and 0.95 p.u.
active power generation (Pgi ) (except the generator at the slack respectively. The slack bus bar voltage is fixed to its specified value
bus), generator terminal bus voltages (Vgi ), transformer tap settings of 1.06 p.u. The generator cost coefficients and the transmission line
(tk ) and reactance of TCSC (XTCSC ) are the decision variables and parameters are taken from [1].
they are self-restricted by the optimization algorithm. The limit on The IEEE 118-bus test system has 54 generator buses and 186
active power generation at the slack bus (Pgs ), load bus voltages transmission lines. All other data are the same as the standard IEEE
(Vload ), reactive power generation (Qgi ) and line flow (Sl ) are satis- 118-bus data given in [20]. To demonstrate the effectiveness of the
fied by adding a penalty function with the objective function. With proposed approach, three different cases have been considered as
the inclusion of the penalty terms, the over all penalty function follows:
becomes:
Case 1: SCOPF with minimization of fuel cost as objective in
NC
NC NPQ
NC Ng
NC Nl
IEEE 30-bus system without considering post contingency
PF = PS K + PViK + PQiK + PLlK (22) rescheduling.
K=0 K=0 i=1 K=0 i=1 K=0 l=1 Case 2: Multi objective optimal power flow for security enhance-
ment in IEEE 30-bus system.
where PSK , PViK , PQiK and PLlK are the penalty terms for the slack
Case 3: Multi objective optimal power flow for security enhance-
bus generator active power limit violation, load bus voltage-limit
ment in IEEE 118-bus system.
violation, reactive power generation limit violation, and line flow
limit violation respectively. These quantities are defined by the
7.1. Case 1: SCOPF with minimization of fuel cost as objective in
equations:
IEEE 30-bus system
⎧
⎨ KS (PSK − PSmax )2 , if PSK > PSmax
In this case, contingency analysis was carried out on the system
PS K = K min K2 min (23)
⎩ KS (PS − PS ) , if PS < PS to identify the severe contingencies. The list of severe contingen-
0, otherwise cies along with their severity index value which were from Eq.
R.N. Banu, D. Devaraj / Applied Soft Computing 12 (2012) 2756–2764 2761
Table 4
Extreme solutions for the three severe contingencies.
P1 124.92 129.74
P2 58.64 44.121
P5 25.32 40.507
P8 34.89 27.471
P11 22.934 25.984
P13 20.67 17.508
V1 1.0489 1.0476
V2 1.0345 1.0322
V5 1.0096 1.002
V8 1.0147 1.0023
V11 1.0986 1.0597
V13 1.0580 1.0566
TCSC (line outage 1–2) −0.5000, −0.5000,
−0.0734 −0.4958
TCSC (line outage 1–3) −0.5000, −0.3468,
−0.2441 −0.4709
TCSC3 (line outage 3–4) −0.4173, −0.2895,
−0.4336 −0.2612
Fuel cost ($/h) 814.7269 827.5058
Fig. 2. Convergence of the GA-SCOPF algorithm for IEEE 30-bus test system. Installation cost ($) 3.56 × 104 0.47 × 104
Table 5
(A.1) is given in Table 1. From the contingency analysis, it is found Best compromise solution for the IEEE 30-bus system.
that five contingencies have resulted in overload on other lines.
The line flows corresponding to the severe contingencies were Control variables Optimal Control variable settings
included as additional constraints of the OPF problem and the P1 , P2 , P5 , P8 , P11 , P13 (base) 125.265,58.645, 25.317, 34.89, 22.93,
proposed GA was applied to solve this security constrained OPF 20.67
V1 , V2 , V5 , V8 , V11 , V13 0.9750, 1.0500, 1.1000, 0.9800, 0.9670,
problem with the minimization of base case fuel cost as the objec-
0.9520, 1.0140, 1.0750, 0.9840.
tive function. Generator active power outputs and the generator TCSC (line outage 1–2) −0.5000, −0.0404
bus terminal voltages were taken as the optimization variables. The TCSC (line outage 1–3) −0.4900, −0.321
optimization variables are represented as floating point numbers TCSC3 (line outage 3–4) −0.323, −0.4321
Fcost ($/h) 819.41
in the GA population. The initial population was randomly gener-
Installation cost ($) 1.52 × 104
ated between the variable’s lower and upper limits. Tournament
selection was applied to select the members of the new popula-
tion. Blend crossover and uniform mutation were applied on the No. of generations: 100, population size: 50, crossover probabil-
selected individuals. The performance of GA generally depends on ity: 0.9, mutation probability: 0.01.
the GA parameters used, in particular, the crossover and mutation After 100 generations it was found that all the individuals have
probabilities, Pc and Pm, respectively. The performance of GA for reached almost the same fitness value. This shows that GA has
various crossover and mutation probabilities in the range of 0.6–0.9 reached the optimal solution. Fig. 2 shows the variation of fitness
and 0.001–0.01 respectively was therefore evaluated. during the GA run for the best case. Ten trail runs of the GA was
The best result of the GA was obtained with the following algo- conducted for the SCOPF problem and the minimum, maximum
rithm parameters: and the average value of fuel cost are 824.8991 $/h, 824.991 $/h
and 824.9231 $/h respectively.
Table 2
Result of SCOPF Algorithm.
P1 142.38
P2 49.18
P5 29.51
P8 34.59
P11 16.70
P13 20.6
V1 1.0498
V2 1.0340
V5 1.0105
V8 1.0245
V11 0.9310
V13 1.0264
Table 3
LOSI values for IEEE 30 bus test system.
1 2–6 0.93942
2 2–4 0.3283
Fig. 3. Pareto-optimal front for the three severe contingencies.
2762 R.N. Banu, D. Devaraj / Applied Soft Computing 12 (2012) 2756–2764
Table 6
Line outage ranking using severity index for IEEE 118-bus system.
Outage line no. Over loaded lines Line flow (MVA) Line flow limit (MVA) Severity index (SI) Rank
Table 8
Pareto optimal solutions for the most severe contingencies.
Control variables Minimum fuel cost solution Minimum installation cost solution
P10 , P12 , P25 , P26 , P31 , P46 , P49 , P54 , P59 , P61 , P65 , P66 , 201.8711, 108.6736, 219.7154, 264.0657, 19.7902, 220.8711, 118.76, 148.7154, 283.0657, 53.87,
P69 , P80 , P87 , P89 , P100 , P103 , P111 28.5594, 213.0799, 63.3050, 199.4073, 156.4032, 48.5594, 240.19, 75.3050, 219.43, 178.32, 361.8,
331.5864, 231.4445, 201.6571, 405.5204, 12.7802, 245.4445, 257.3, 451.04, 64.82, 417.03, 201.2229,
215.6403, 223.2229, 35.7076, 52.6144 73.7, 70.6144
V1 , V4 , V6 , V8 , V10 , V12 , V15 , V18 , V19 , V24 , V25 , V26 , 0.9726, 1.0394, 0.9917, 1.0375, 1.0130, 0.9885, 1.0147, 1.0354, 1.0196, 0.9611, 0.9503, 1.0138,
V27 , V31 , V32 , V34 , V36 , V40 , V42 , V46 , V49 , V54 , V55 , 1.0116, 1.0203, 1.0143, 1.0113, 1.0300, 1.0524, 0.9922, 1.0095, 0.9943, 1.0355, 1.0558, 1.0279,
V56 , V59 , V61 , V62 , V65 , V66 , V69 , V70 , V72 , V73 , V74 , 1.0165, 0.9868, 1.0045, 1.0221, 1.0192, 0.9945, 0.9904, 1.0105, 0.9960, 1.0072, 1.0141, 0.9698,
V76 , V77 , V80 , V85 , V87 , V89 , V90 , V91 , V92 , V99 , V100 , 0.9821, 1.0025, 1.0364, 1.0183, 1.0046, 1.0100, 0.9788, 1.0030, 1.0244, 0.9938, 1.0155, 1.0017,
V103 , V104 , V105 , V107 , V110 , V111 , V112 , V113 , V116 1.0052, 0.9957, 1.0280, 1.0044, 1.0255, 1.0447, 1.0401, 1.0487, 1.0324, 1.0381, 1.0169, 1.0543,
1.0222, 1.0136, 1.0309, 0.9894, 0.9789, 1.0158, 1.0396, 1.0285, 1.0136, 1.0088, 0.9888, 0.9887,
1.0357, 0.9940, 1.0149, 0.9870, 0.9874, 0.9646, 0.9868, 1.0127, 1.0301, 1.0408, 0.9724, 0.9825,
0.9798, 1.0290, 1.0258, 1.0143, 0.9949, 0.9902, 1.0116, 0.9884, 1.0239, 1.0335, 1.0118, 1.0091,
0.9614, 0.9973, 1.0222, 0.9608, 1.0302, 1.0136 1.0157, 1.0248, 1.0231, 1.0369, 1.0208, 0.9868
TCSC (line outage 8–5) −0.5000, −0.4464, −0.3850 −0.4495, −0.1831, −0.2335
Fuel cost ($/h) 2.202 × 105 3.61 × 105
Installation cost ($) 5.37 × 105 4.02 × 105
R.N. Banu, D. Devaraj / Applied Soft Computing 12 (2012) 2756–2764 2763
Table 9
Best compromise solution for the IEEE 118-bus system.
P10 , P12 , P25 , P26 , P31 , P46 , P49 , P54 , P59 , P61 , P65 , P66 , P69 , P80 , P87 , P89 , P100 , P103 , 204.8711, 108.6736, 229.7154, 284.0657, 9.79, 28.55, 213.07, 63.30, 199.40,
P111 156.40, 331.58, 319.44, 201.65, 405.52, 12.78, 215.64, 223.22, 35.70, 52.61
V1 , V4 , V6 , V8 , V10 , V12 , V15 , V18 , V19 , V24 , V25 , V26 , V27 , V31 , V32 , V34 , V36 , V40 , V42 , 1.0170, 0.9648, 0.9495, 1.0005, 0.9864, 1.0507, 0.9824, 1.0291, 1.0121, 0.9777,
V46 , V49 , V54 , V55 , V56 , V59 , V61 , V62 , V65 , V66 , V69 , V70 , V72 , V73 , V74 , V76 , V77 , V80 , 1.0203, 1.0141, 1.0107, 0.9481, 0.9748, 1.0364, 0.9709, 0.9687, 1.0399, 1.0031,
V85 , V87 , V89 , V90 , V91 , V92 , V99 , V100 , V103 , V104 , V105 , V107 , V110 , V111 , V112 , V113 , 0.9729, 1.0442, 1.0132, 1.0404, 0.9712, 0.9801, 0.9739, 0.9489, 0.9581, 0.9952,
V116 1.0188, 0.9857, 1.0040, 1.0032, 0.9750, 0.9960, 0.9874, 0.9535, 0.9646, 0.9762,
1.0311, 1.0184, 1.0209, 0.9675, 0.9945, 0.9959, 1.0132, 1.0086, 0.9639, 0.9524,
0.9541, 0.9744, 1.0217, 1.0083
7.3. Case 3: multi-objective SCOPF in IEEE 118-bus system where Sl = MVA flow in line ‘l’; Slmax = MVA rating of the line ‘l’.
L0 = set of overloaded lines. m = integer exponent.
In this case, the proposed algorithm was applied to alleviate Larger the severity index value a contingency has, the more
the line overload under contingency condition in the IEEE 118-bus severe it will be. The line flows in (A.1) are obtained from
system. Contingency analysis was conducted on this system and Newton–Raphson load flow calculations. While using the above
the top three contingencies are produced in Table 6 along with the severity index for security assessment, only the overloaded lines
overloaded lines and the severity index value. LOSI values for the are considered to avoid masking effect.
optimal location of TCSC are given in Table 7. Based on LOSI value,
three locations were identified for the installation of TCSC to alle-
viate the line overload. In this case, the proposed algorithm was
References
applied to enhance the security of the system for the first severe
contingency. [1] O. Alsac, B. Scott, Optimal load flow with steady state security, IEEE Transactions
The best results of the MOGA were obtained with the following on Power Systems PAS-93 (3) (1974) 745–751.
[2] A. Monticelli, M.V.F. Pereira, S. Granville, Security constrained optimal power
algorithm parameters:
flow with post contingency corrective rescheduling, IEEE Transactions on
Number of generation: 120, population size: 50, cross over prob- Power Systems PWRS-2 (1) (1987) 175–182.
ability: 0.9 and mutation probability: 0.01. [3] X. Duan, J. Chen, F. Peng, Y. Luo, Y. Huang, Power flow control with FACTS
The pareto optimal front obtained for the first severe contin- devices, IEEE Transactions on Power Systems 3 (2000) 1585–1589.
[4] T.T. Lie, W. Deng, Optimal flexible AC transmission system (FACTS) devices
gency case is plotted in Fig. 4. From the pareto front, two optimal allocation, Electrical Power & Energy Systems 19 (2) (1997) 125–134.
solutions which are the extreme points of Fig. 4 that represents the [5] J. Mutale, Transmission network reinforcement versus FACTS: an economic
best installation cost and best fuel cost are given in Table 8. The best assessment, IEEE Transactions on Power Systems 15 (3) (2000) 961–967.
[6] G.D. Galiana, Assessment and control of the impact of FACTS devices on
compromise solutions are given in Table 9. Corresponding to this power system performance, IEEE Transactions on Power Systems 11 (4) (2000)
control variable it is found that there is no limit violation in any of 1931–1936.
the state variables in the base case and also in contingency cases. [7] K. Deb, Multi-objective Optimization Using Evolutionary Algorithms, John
Wiley & Sons, Ltd., New York, 2005, pp. 209–213.
[8] C.A.C. Coello, A.D. Christiansen, Moses, A multi-objective optimization tool for
8. Conclusion engineering design, Engineering Optimization 31 (3) (1999) 337–368.
[9] C.S. Chang, K.P. Wong, B. Fan, Security-constrained multi-objective generation
dispatch using bi-criterion global optimization, Proceedings of the Institute of
In this paper, the security enhancement task has been Electrical and Electronics Engineers – Generation, Transmission & Distribution
formulated as a multi-objective optimization problem and multi- 142 (4) (1995) 406–414.
[10] R. Yokoyama, S.H. Bae, T. Morita, H. Sasaki, Multi-objective generation dispatch
objective genetic algorithm was applied to solve the same. The based on probability security criteria, IEEE Transactions on Power Systems 3
location of TCSC was identified based on Line Overload Sensitivity (1) (1988) 317–324.
Index. It has considered as optimization criteria, the minimiza- [11] D. Radu, Y. Besanger, A multi-objective genetic algorithm approach to optimal
allocation of multi-type FACTS devices for power systems security, in: Pro-
tion of fuel cost and installation cost of TCSC. The algorithm has ceedings of the IEEE Power Engineering Society General Meeting, 2006, pp.
been tested on the standard IEEE 30-bus and IEEE 118-bus test sys- 8–16.
tems. The proposed multi-objective GA has performed well when [12] K. Deb, A. Pratap, S. Agrawal, T. Meyarivan, A fast and elitist multi-objective
genetic algorithm: NSGA-II, IEEE Transactions on Evolutionary Computation 6
it was used to characterize pareto optimal front of the multi- (2) (2002) 182–197.
objective optimal power flow problem. The MOGA emphasizes [13] E. Zitzler, M. Laumanns, L. Thiele, SPEA2: improving the strength pareto
non-dominated solutions and simultaneously maintains diversity evolutionary algorithm, in: Proceedings of Evolutionary Methods for Design,
Optimization and Control with Applications to Industrial Problems – EUROGEN,
in the non-dominated solutions. In future, the proposed approach
2001, pp. 95–100.
can be applied to solve security-constrained optimal power flow [14] E. Zitzler, S. Kunzli, Indicator-based selection in multi-objective search, in: Pro-
problems with multi-type FACTS devices. ceedings of the Eighth International Conference on Parallel Problem Solving
from Nature – PPSN VIII, 2004, pp. 832–842.
[15] F. Xue, A.C. Sanderson, R.J. Graves, Pareto-based multi-objective differential
Appendix A. Severity index evolution, in: Proceedings of the 2003 Congress on Evolutionary Computation
– CEC’2003, vol. 2, Canberra, Australia, IEEE Press, 2003, pp. 862–869.
[16] P.D. Justesen, R.K. Ursem, Many-objective distinct candidates optimization
The severity of a contingency to line overload may be expressed using differential evolution on centrifugal pump design problems, in: Proceed-
in terms of the following severity index, which express the stress ings of Evolutionary Computation (CEC), IEEE Congress, 2010, pp. 1–8.
[17] L.J. Eshelman, J.D. Schaffer, in: D. Whitley (Ed.), Real-Coded Genetic Algorithms
on the power system in the post contingency period:
and Interval Schematam, 1993, pp. 187–202.
[18] J.A. Wood, F.B. Woolenberg, Power Generation, Operation and Control, 2nd
L0 2m
Sl
edition, Wiley India Pvt Ltd., New Delhi, 2006.
severity index (SIC ) = (A.1) [19] D.P. Kothari, J.S. Dhillon, Power System Optimization, 2nd edition, Prentice Hall
Slmax of India Private Ltd, New Delhi, 2011, pp. 422–423.
l=1 [20] IEEE 118-Bus System, Available at: www.ee.washintgton.edu, 1996.
2764 R.N. Banu, D. Devaraj / Applied Soft Computing 12 (2012) 2756–2764
[21] E.-S. E.-S. El-Araby, N. Yorino, H. Sasaki, A two level hybrid GA/SLP for FACTS
allocation problem considering voltage security, Electric Power and Energy Dr. D. Devaraj is a graduate from Thiagarajar College
Systems 25 (2003) 327–335. of Engineering in Electrical and Electronics Engineering
[22] D.E. Goldberg, Genetic Algorithms for Search, Optimization, and Machine (1992). He did his Masters in Power System Engineer-
Learning, Addison–Wesley, Reading, MA, 1989. ing from Madurai Kamaraj University, Madurai (1994). He
[23] C.M. Fonseca, P.J. Fleming, An overview of evolutionary algorithms in multi- obtained his Ph.D. from the Indian Institute of Technol-
objective optimization, Evolutionary Computation 3 (1) (1995) 1–16. ogy, Chennai (2000) with specialization in power systems
[24] D. Devaraj, Improved genetic algorithm for multi-objective reactive power engineering. His research interests include power system
dispatch problem, European Transactions on Electrical power 17 (6) (2007) engineering, power system automation, power system
569–581. simulation, computational intelligent techniques, intel-
[25] P. Somasundaram, K. Kuppusamy, K. Devi, Evolutionary programming based ligent control techniques. He is currently working as a
security constrained optimal power flow, Electric Power System Research 72 senior professor and Dean (research and development) in
(2004) 137–145. the Kalasalingam University, Krishnankoil, Tamil Nadu.
[26] C. Thitithamrongchai, B. EuaArpon, Security control optimal power flow: a par-
allel self-adaptive differential evolution approach, Electric Power Components
and Systems 23 (10) (2005) 280–298.