A Multi-Objective Contingency Constrained Optimal Power Flow Based on Composite Security Index Using Genetic Algorithm and Newton Method

(*) Corresponding author

Authors' affiliations

DOI's assignment:
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)


Market economic constraints in the deregulated environment may force the power system to operate closer to its security limits there by decreasing the overall security margins. Efforts are needed to check the security before a set of transactions is accepted and to take preventive or corrective control actions as soon as these are deemed insufficient.  This paper proposes a multi-objective contingency constrained optimal power flow to enhance the system security as well as to ensure the economic operation of the system.  In order to reduce the high dimensionality of contingency constrained optimal power flow, only the critical contingencies are identified with the help of the developed composite security index and the corresponding constraints are used for the problem formulation. The composite security index which is a function of both power flow and bus voltage limit violations gives an accurate differentiation between the secure and non-secure states of the power system. Weight based Genetic algorithm is used as the optimization tool and the results obtained are validated using the conventional Newton method of optimization. The effectiveness of the method is tested on a practical Indian utility 62 bus system.
Copyright © 2013 Praise Worthy Prize - All rights reserved.


Power System Security Assessment; Composite Security Index; Contingency Constrained Optimal Power Flow; Genetic Algorithm; Newton Method of Optimization

Full Text:



I.N. Kassabalidis, M.A. El-Sharkawi, R.J. Marks, L.S. Moulin, A.P. Alves da Silva. Dynamic security border identification using enhanced particle swarm optimization, IEEE Transactions on Power Systems, vol. 17, n.3, August 2002, pp. 723 – 729.

B. Stott, O. Alsac, A. J. Monticelli. Security analysis and optimization, Proceedings of the IEEE, Vo. 75, n.12, December 1987, pp. 1623-1644.

P. Ristanovic, O. Obadina, M. Aganagic. Security constrained Optimal Power flow method. [Online] Available: http://www.uspto.gov/

Florin Capitanescu, Mevludin Glavic, Damien Ernst, Louis Wehenkel. Contingency Filtering Techniques for Preventive Security-Constrained Optimal Power Flow, IEEE Transactions on Power Systems, vol. 22, n.4, November 2007, pp 1690-1697.

O. Alsac, J. Bright, M. Prais, B. Stott. Further developments in LP-based optimal power flow, IEEE Transactions on Power Systems, Vol. 5, n.3, August 1990, pp 697-711.

T. J. Bertram, K. D. Demaree, L. C. Dangelmaier. An integrated package for real-time security enhancement, IEEE Transactions on Power Systems, Vol. 5, n.2, May 1990, pp 592-600.

F. Bouffard, F. D. Galiana, J. M. Arroyo. Umbrella contingencies in security-constrained optimal power flow 15th Power Systems Computation Conf. (PSCC), Liège, Belgium 2005.

Nara, K., Tanaka, K., Shoults, R.R., Chen, M.S., and Peter van Olinda. On-line Contingency Selection for Voltage Security Analysis, IEEE Transactions on Power Apparatus and Systems, Vol. 104, no.4, April 1985, pp 847-856.

Sunitha R, Sreeramakumar R., Abraham T. Mathew. A Composite Security Index for On-line Static Security Evaluation, Electric Power Components and Systems, Vol. 39, n.1, January 2011, pp 1-14.

Fonseca, C.M., Fleming, P.J. Genetic algorithms for multi-objective optimization: formulation, discussion and generalization, 5th International Conference on Genetic Algorithms, ICGA-93, Urbana- Champaign, IL, USA 1993.

Prakash G Burade, Dr jagdish, B Helonde. A Novel Approach for Optimal Dispatch Using Artificial Intelligence (AI) Methods, International Conference on Control, Automation, Communication and Energy Conservation, 2009.

D Devaraj, B Yegnanarayana, Genetic Algorithm based Optimal Power Flow for Security Enhancement, IEE Proceedings on Generation, Transmission, Distribution, Vo. 152, n.6, November 2005, pp 899-905.

Anastasios G Bakirtzis, Pandel N Biskas, Christoforos E Zoumas, Vasilios Petridis, Optimal power Flow by Enhanced Genetic Algorithm, IEEE Transactions on Power Systems 2002, Vol. 17, n.2, May 2002, pp 229-236.

Kalantari, M., Kazemi, A., Zahedi Anaraki, A.H., Optimal sizing and placement of distributed generation units with different load models in distribution network by genetic algorithm and particle swarm optimization, (2012) International Review on Modelling and Simulations (IREMOS), 5 (1), pp. 15-23.

Zitzler E, Thiele L, Multi-objective evolutionary algorithms: a comparative case study and the strength Pareto approach, IEEE Transactions on Evolutionary Computation, Vol. 3, n. 4, November 1999, pp 257-271.

Hajela, P. Lin, C.-Y. Genetic search strategies in multi-criterion optimal design. Journal of Structural Optimization, Vol.4, n.2, 1992 pp 99-107.

D P Kothari, J S Dillon, Power System Optimization (Prentice Hall of India Private Limited, 2004).

R. Gnanadass, N. P. Padhy. A New Approach for Transmission Embedded Cost Allocation in Restructured Power Market, Journal of Energy & Environment, Vol. 4, 2005, pp 37-47.

Syai'in, M., Lian, K.L., Soeprijanto, A., Digital generator capability curve for improving optimal power flow based on IPSO, (2013) International Review of Electrical Engineering (IREE), 8 (2), pp. 912-918.

Panyakaew, P., Damrongkulkamjorn, P., Hybrid computational method for step-bidding price optimal power flow, (2013) International Review of Electrical Engineering (IREE), 8 (1), pp. 369-378.

Bastin Solai Nazaran, J., Selvi, K., Security enhanced optimal power flow with transmission cost solution, (2012) International Review of Electrical Engineering (IREE), 7 (4), pp. 4963-4970.

Rahiminejad, A., Alimardani, A., Hosseinian, S.H., Rahmatian, M., Investigation of optimal power flow enhancement after installing HVDC links through traditional and evolutionary optimization algorithms, (2012) International Review of Electrical Engineering (IREE), 7 (5), pp. 5623-5632.

Zamani, H.A., Ezzati, S.M., Vahedi, H., Gandomkar, M., Security constrained optimal power flow using artificial bee colony, (2012) International Review of Electrical Engineering (IREE), 7 (2), pp. 3991-3999.


  • There are currently no refbacks.

Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize