International Journal of Soft Computing and Engineering

نویسنده

  • V. N. Ananth
چکیده

There are many methods for overload relieving which have been reported for determining a secure operating point. Most of these methods use conventional optimization techniques, which are generally time–consuming from a computation point of view, especially for large systems. Further the conventional optimization technique updates all the controllers for most of the operating conditions. Under emergency conditions the operator, has to make quick decisions, with little concern for the theoretical optimality of the operating point and also the operator cannot move all the controllers to different settings within less time. In this context a simplified approach has been proposed in this paper for security oriented power system operation. The contribution of each generator for a particular overloaded line is first identified, then based on Relative Electrical Distance (RED) concept the desired proportions of generation for the desired overload relieving is obtained. Then based on the Generation Shift Sensitivity Factor (GSSF) concept the desired proportions of generation for the desired overload relieving is obtained. An attempt is also made to curtail the number of generators to be rescheduled based on GSSF for overload relieving Results obtained for network overload alleviation of 5 bus meshed system, IEEE 30-bus New England system are presented for illustration purposes. The change in load sharing and generation scheduling was examined when the slack bus was changed, generator node changed and placed in the midpoint of the system, increase in generator number, load modeling was calculated. For all the above cases the voltage stability indices (Ve, Lindex and MSV) were calculated, recorded and then compared for best performance to the previous cases. The generation scheduling was determined with line outage and subsequent load shedding. KeywordsRelative Electrical Distance, Generation Shift Sensitivity Factor, Congestion, Load modeling, slack bus, load sharing, power flow analysis, optimal power flow.

منابع مشابه

Utilization of Soft Computing for Evaluating the Performance of Stone Sawing Machines, Iranian Quarries

The escalating construction industry has led to a drastic increase in the dimension stone demand in the construction, mining and industry sectors. Assessment and investigation of mining projects and stone processing plants such as sawing machines is necessary to manage and respond to the sawing performance; hence, the soft computing techniques were considered as a challenging task due to stocha...

متن کامل

A Fuzzy Rule-based Expert System for the Prognosis of the Risk of Development of the Breast Cancer

Soft Computing techniques play an important role for decision in applications with imprecise and uncertain knowledge. The application of soft computing disciplines is rapidly emerging for the diagnosis and prognosis in medical applications. Between various soft computing techniques, fuzzy expert system takes advantage of fuzzy set theory to provide computing with uncertain words. In a fuzzy exp...

متن کامل

A COMPARATIVE STUDY OF TRADITIONAL AND INTELLIGENCE SOFT COMPUTING METHODS FOR PREDICTING COMPRESSIVE STRENGTH OF SELF – COMPACTING CONCRETES

This study investigates the prediction model of compressive strength of self–compacting concrete (SCC) by utilizing soft computing techniques. The techniques consist of adaptive neuro–based fuzzy inference system (ANFIS), artificial neural network (ANN) and the hybrid of particle swarm optimization with passive congregation (PSOPC) and ANFIS called PSOPC–ANFIS. Their perf...

متن کامل

Investigating electrochemical drilling (ECD) using statistical and soft computing techniques

In the present study, five modeling approaches of RA, MLP, MNN, GFF, and CANFIS were applied so as to estimate the radial overcut values in electrochemical drilling process. For these models, four input variables, namely electrolyte concentration, voltage, initial machining gap, and tool feed rate, were selected. The developed models were evaluated in terms of their prediction capability with m...

متن کامل

Workspace Boundary Avoidance in Robot Teaching by Demonstration Using Fuzzy Impedance Control

The present paper investigates an intuitive way of robot path planning, called robot teaching by demonstration. In this method, an operator holds the robot end-effector and moves it through a number of positions and orientations in order to teach it a desired task. The presented control architecture applies impedance control in such a way that the end-effector follows the operator’s hand with d...

متن کامل

COMBINING FUZZY QUANTIFIERS AND NEAT OPERATORS FOR SOFT COMPUTING

This paper will introduce a new method to obtain the order weightsof the Ordered Weighted Averaging (OWA) operator. We will first show therelation between fuzzy quantifiers and neat OWA operators and then offer anew combination of them. Fuzzy quantifiers are applied for soft computingin modeling the optimism degree of the decision maker. In using neat operators,the ordering of the inputs is not...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

متن کامل
عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012