Power System Security Constrained Economic Dispatch Using Real Coded Quantum Inspired Evolution Algorithm

This paper presents a new optimization technique based on quantum computing principles to solve a security constrained power system economic dispatch problem (SCED). The proposed technique is a population-based algorithm, which uses some quantum computing elements in coding and evolving groups of potential solutions to reach the optimum following a partially directed random approach. The SCED problem is formulated as a constrained optimization problem in a way that insures a secure-economic system operation. Real Coded Quantum-Inspired Evolution Algorithm (RQIEA) is then applied to solve the constrained optimization formulation. Simulation results of the proposed approach are compared with those reported in literature. The outcome is very encouraging and proves that RQIEA is very applicable for solving security constrained power system economic dispatch problem (SCED).




References:
[1] J. Gruska, Quantum Computing. London: Mcgraw-Hill, 1999.
[2] L. K. Grover, "Framework for Fast Quantum Mechanical Algorithms,"
Presented at Conf. Proc. of the 30th Annual ACM Symposium on
Theory of Computing, New York, PP. 53-62, 1998.
[3] F. Alfares, M. S. Alfares, and I. I. Esat, "Quantum-Inspired Evolution
Algorithm: Experimental Analysis," Presented at Sixth International
Conference on Adaptive Computing in Design and Manufacture, Bristol,
UK, PP. 377-389, 2004.
[4] H. K. Youssef, M.El-Shibini, and G.A.Hazaa, "Some New Aspects in
Power System Dynamic Security Using Pattern Recognition," Presented
at Second Middle East Power Conference. MEPCON-92, PP. 308-313,
1992.
[5] H. K. Youssef, M. El-Shibini, and G. A. W. Hazza, "Power System
Security with the Consideration of Economic Dispatch," Presented at the
Mediterranean Electrotechnical Conference - MELECON, Antalya,
Turkey, PP. 889-892, 1994.
[6] H. Mashhadi, "Pattern Recognition Technique for Fast On-Line Security
Assessment of Large Interconnected Power Systems," IEEE Trans. on
Power System, PP. 3816-3824, 1983.
[7] R. B. Alder, "Security Consideration Economic Dispatch with
Participation Factors," IEEE Transactions on Power Apparatus and
Systems, Vol. Pas-96, 1977.
[8] R. T. Bui and S. Ghaderpanah, "Real Power Rescheduling and Security
Assessment," IEEE Transactions on Power Apparatus and Systems, Vol.
Pas-101, pp. 2906-15, 1982.
[9] M. El-Sharkawy and D. Nieebur, "Artificial Neural Networks with
Application to Power Systems," IEEE Power Engineering Society, A
Tutorial Course, 1996.
[10] T. Yalcinoz and M. J. Short, "Neural Networks Approach For Solving
Economic Dispatch Problem with Transmission Capacity Constraints,"
IEEE Transactions on Power Systems, Vol. 13, pp. 307-13, 1998.
[11] R. K. Pancholi and K. S. Swarup, "Particle Swarm Optimization for
Security Constrained Economic Dispatch," Presented at International
Conference on Intelligent Sensing and Information Processing. (IEEE
Cat. No.04ex783), Chennai, India, pp. 7-12, 2004.
[12] H. K. Youssef and K. M. El-Naggar, "Genetic Based Algorithm for
Security Constrained Power System Economic Dispatch," Electric Power
Systems Research, Vol. 53, pp. 47-51, 2000.
[13] C. L. Chen And N. Chen, "Direct Search Method for Solving Economic
Dispatch Problem Considering Transmission Capacity Constraints,"
IEEE Transactions on Power Systems, Vol. 16, pp. 764-769, 2001.
[14] C. K. Pang, F. S. Prabhakara, A.H.Abid, And A. J. Koivo, "Security
Evaluation in Power Systems Using Pattern Recognition," IEEE Trans.
on Power Apparatus and Systems, pp. 969-976, 1974.
[15] R. Barr, B. L. Golden, J. P. Kelly, M. G. Resende, and W. R. Stewart,
"Designing and Reporting on Computational Experiments with Heuristic
Methods," Journal of Heuristics, vol. 1, pp. 9-32, 1995.