SlideShare a Scribd company logo
INTERNATIONAL JOURNAL OF ELECTRICAL ENGINEERING & 
International Journal of Electrical Engineering and Technology (IJEET), ISSN 0976 – 6545(Print), 
ISSN 0976 – 6553(Online) Volume 5, Issue 7, July (2014), pp. 45-55 © IAEME 
TECHNOLOGY (IJEET) 
ISSN 0976 – 6545(Print) 
ISSN 0976 – 6553(Online) 
Volume 5, Issue 7, July (2014), pp. 45-55 
© IAEME: www.iaeme.com/IJEET.asp 
Journal Impact Factor (2014): 6.8310 (Calculated by GISI) 
www.jifactor.com 
45 
 
IJEET 
© I A E M E 
TRANSMISSION EXPANSION PLANNING AND COST ALLOCATION 
WITH AND WITHOUT SECURITY CONSTRAINTS IN A DEREGULATED 
POWER SYSTEM 
Srujana Raghupatruni Uddavolu 
Assistant Professor, Department of Electrical Engineering, Muffakham Jah College of Engineering 
and Technology, Hyderabad, India 
ABSTRACT 
This paper presents a novel approach for static transmission expansion planning and 
allocation of the associated expansion costs to individual market entities in a restructured power 
system. The approach seeks the optimal addition of transmission lines among the possible candidate 
transmission lines minimizing the overall system costs and at the same time satisfying the system 
operational and security constraints. Novelty of the approach lies in applying a widely known 
technique used for overload security analysis to an area such as Transmission expansion planning. 
Transmission expansion costs are allocated using distribution factors to the individual entities in a 
fair and transparent manner. The results for modified Garver Test system demonstrate that the 
approach with the advantage of its simplicity can be applied to transmission expansion planning and 
cost allocation in restructured power system. 
Keywords: Open Access, Deregulation, Restructured Power System, Transmission Expansion 
Planning (TEP), Security Constraints, Power Flow Tracing. 
1. INTRODUCTION 
Growing electricity demand driven by fast industrial growth and growing access to electricity 
in developing countries has necessitated the increase in generation and need for adequate 
transmission capacity. One of the many means of enhancing transmission capacity that involves 
significant capital expenditure is that of Transmission Expansion Planning (TEP). Vast number of 
influencing parameters including candidate circuits, electricity demand, generation forecast, 
operational network topology, etc. are required for an optimal solution of TEP problem. In general,
International Journal of Electrical Engineering and Technology (IJEET), ISSN 0976 – 6545(Print), 
ISSN 0976 – 6553(Online) Volume 5, Issue 7, July (2014), pp. 45-55 © IAEME 
TEP consists of choosing, from a predefined set of circuits, those that should be built in order to 
minimize the investment cost, and to supply the forecasted demand along the planning horizon. 
46 
 
The TEP problem is generally considered as non-linear, no-convex optimization problem. 
During past few decades, significant number of methods have been proposed to solve TEP problem. 
One of the earliest approaches for TEP was proposed by authors in [1], where TEP problem was 
formulated as a power flow problem and used a linear programming algorithm to find the most direct 
routes from generation to loads. The approach discourages power flow on the right of ways without 
existing transmission lines by penalizing them .The transmission line that alleviates maximum 
overload emerged as the one chosen for addition. A new interactive method of TEP optimization 
approach was proposed by author’s in [11]. A mixed integer linear programming approach to solve 
the static TEP problem has been proposed in [12]. The proposed approach considers the line losses in 
the optimization framework. However in this method it is generally hard to guaranty the model 
feasibility and global optimality of the problem solution. Authors in [13] proposed a new method 
known as branch and bound method to solve the TEP optimization problem. The authors have used a 
transportation model to represent the transmission network. Authors in [2], proposed a combined 
use of linear and dynamic programming. Linear programming was used to find the minimum cost 
capacity increments required to meet the changes on demand and generation. Afterwards, they used 
dynamic programming to search for a close to optimal sequence of investment (continuous) 
decisions. Reference [3] proposed a pure dynamic programming, but due to the computational 
effort, its applications were very restricted. 
Authors in [4] proposed the use of interactive tools for transmission planning. To rank the 
possible additions this approach used a sensitivity analysis with respect to circuit’s susceptances of a 
“least effort” index, which is the result of an optimization problem whose solution is identical to a 
DC power flow solution. In 1984, Villasana [6] proposed two approaches to be applied in 
transmission expansion planning. The first one is formulated combining a DC power flow model 
with a transportation model. While the DC model evaluated the power flow for the existing 
transmission facilities, the transportation model was used to compute the “overload” flow. This 
approach consists in an improvement of the approach proposed in [1]. The second approach used 
linear mixed integer formulation. 
The use of mathematical decomposition schemes for this problem started with the approach 
proposed in [5], where the author has applied a Benders decomposition technique to decompose the 
global problem into two sub problems: the Master investment sub problem, which chooses the trial 
expansion plan, and the operation sub problem that analyzes the trial investment decisions and 
expresses operational violated constraints in terms of investment variables through Benders cuts. 
However the hierarchical level II reliability calculations employed for composite system planning 
increases the complexity of overall problem. 
Many researchers [8],[9] have applied meta-heuristic techniques like GA and simulated 
annealing to tackle the TEP problem. However there are some limitations of these evolutionary 
optimization approaches. These limitations include large computational burden and constraint 
handling problem which becomes more complex for highly constrained problems especially in large 
power networks. 
Authors in [14] formulated the composite system expansion planning as a nonlinear model 
while considering different location based fuel supplying costs. Thought the method employs n-1 
contingency criterion, reliability measure has not been studied quantitatively. Authors in [7] have 
described an automatic way of finding the least cost method of securing a given power system. 
With the advent of electricity markets ,the inability of wheeling electricity through desired path 
either due to physical and operating limits of the transmission lines or the absence of transmission 
lines in the desired right of way may hamper the prospects of trading electricity as dictated by
International Journal of Electrical Engineering and Technology (IJEET), ISSN 0976 – 6545(Print), 
ISSN 0976 – 6553(Online) Volume 5, Issue 7, July (2014), pp. 45-55 © IAEME 
economics. In forward markets, it would be beneficial to plan for transmission expansion to ensure 
fair competition among the market participants. Transmission expansion planning must therefore, 
simulate market behaviour sufficiently to encourage and facilitate fair electricity market 
environment. 
47 
 
The present paper can be divide into three main sections- the first section (section II) 
discusses transmission expansion planning without security constraints ,where the transmission lines 
with the overall benefit of being comparatively inexpensive and being able to alleviate maximum 
overload are added one at a time till the overload on the network is alleviated. Reliability is of utmost 
importance in competitive markets and the second section (section III) deals with TEP to obtain N-1 
secure system. As expected, the number of lines that were added for N-1 secure system were higher. 
In the the third section (section IV) the transmission expansion costs were allocated to individual 
generators and loads using distribution factors [10]. Results are discussed in section V followed by 
concluding remarks in section VI. 
2. TEP WITHOUT SECURITY CONSTRAINTS 
2.1 Method Adopted 
The method adopted is similar to overload security analysis, where in instead of removing a 
line (as in overload security analysis), line addition is simulated. 
The brute force method involves adding one line at a time and performing DC load flow. A much 
more efficient approach is to simulate the line addition by using Thevenin’s /Norton’s equivalent. In 
this approach the base case network before line addition remains the same for all candidate circuits 
as shown in Fig.1. 
thkm X k 
m 
f 
km P 
f km X = X 
q 
km 
Fig. 1: Thevenin’s equivalent for single topological change 
For a line addition between buses k and m, thethakm ( 0 
q ) shown in the Thevenin’s 
km 
equivalent model is computed as defined in (1). 
0 0 0 
km k m 
q = q −q 
(1) 
(superscript 0 denotes that the values correspond to base case) 
Thevenin’s equivalent impedance is evaluated as defined in (2). 
thkm kk mm km mk X = X + X − X − X 
(2)
International Journal of Electrical Engineering and Technology (IJEET), ISSN 0976 – 6545(Print), 
ISSN 0976 – 6553(Online) Volume 5, Issue 7, July (2014), pp. 45-55 © IAEME 
f km 
km X X 
f DP = − P P 
  
=   
48 
 
thkm f 
P 
+ 
= 
q 0 
(3) 
To find out the effect of the line addition on the rest of the system, the angle changes are 
evaluated as defined in (4)-(6). 
f f Dq = XDP 
(4) 
where, 
[0 0...... 0 ...0] f 
km 
f 
km 
(5) 
(the two entries correspond to buses k and m affected) 
q f = q 0 + Dq f 
(6) 
DC load flow is run to get post addition flows using the new angles ( 
q f ). 
From flows obtained, the indices p PI and NI are calculated as defined in (7) and (8) 
respectively. 
2 
P 
flowl 
max 
p 
l l 
PI 
P 
  
 
(7) 
where, l belongs to the set of all the lines that are overloaded to avoid masking effect i.e., the line 
that is just below its limit contributes to performance index almost equal to the line just above the 
limit. 
 − 	 
base 
p p PI PI 
=
os 

 
NI 
C t 
(8) 
Using the procedure described below the optimal solution is arrived at. 
2.2 Algorithm 
1) DC load flow is run on the base case network (modified Garver Six bus system) to obtain the 
flows on all the lines and bus angles prior to the line addition 
and performance index, base 
p PI is calculated. 
2) A line is added amongst the 5 possible right of way using Thevenin’s Equivalent approach 
described above and flows are calculated. 
3) From the flows, performance index, p PI and a normalized index, NI are calculated. 
4) Go to step 2 until normalized index is found out for all possible right of way (ROW). 
Add the line with largest value of the normalized index and go to step 1 till all the overloads 
on the network are alleviated.
International Journal of Electrical Engineering and Technology (IJEET), ISSN 0976 – 6545(Print), 
ISSN 0976 – 6553(Online) Volume 5, Issue 7, July (2014), pp. 45-55 © IAEME 
49 
3. TEP WITH SECURITY CONSTRAINTS 
 
An important aspect that must be considered when planning a transmission network 
expansion is system-security. Contingency analysis looks at the state of the system after some lines 
of the network fail. The N-1 contingency analysis looks at the system state after a single line of the 
network fails and see if it is secure or not. N-1 contingency analysis requires that after each line fails 
independently, the network constraints be satisfied. 
When planning a transmission expansion, it is desirable to consider whether or not the 
topology modification plan will be secure after any single line outage. 
Seifu et. al. [13] have first considered a base case network (optimal expansion plan obtained 
from TEP without security constraints) in which there are no overloads. They have then considered a 
network expansion plan beyond that network so that it does not have overloads in a single line out 
case (N-1 secure). 
In the proposed method, the overall network planning for (N-1) security is solved in an 
integrated fashion i.e. there is no distinction as base case network planning (without security 
constraints) and planning against contingencies. The proposed method considers outage possibility of 
any line (excluding radial lines) one at a time and plans the network expansion such that there are no 
overloads in any (Nc+1) topology cases. 
3.1 Method Adopted 
A double line outage kind of approach is used for security constrained transmission 
expansion planning to simulate two network changes – a line addition and another line removal.For a 
line addition between buses, k and m and line removal between buses, i and j, the Thevenin’s 
equivalent model is computed as defined in (9)-(16). 
th X 
T 
f f 
km ij P P  
  
0 
=   
 0 
 
km 
f 
ij 
X 
X 
X 
 q 
0 
 
 km 
 
 q 
0 
ij 
 
Fig. 2: Thevenin’s equivalent for double topological change 
0 0 0 
km k m 
q = q −q 
(9) 
0 0 0 
ij i j 
q = q −q 
(10) 
(superscript 0 denotes that the values correspond to base case) 
Thevenin’s equivalent impedance is evaluated as, 
thij ij ii jj ij ji X = X + X − X − X 
, (11) 
thkm,km kk mm km mk X = X + X − X − X (12) 
thkm,ij thij ,km ik im jk jm X = X = X − X − X + X (13)
International Journal of Electrical Engineering and Technology (IJEET), ISSN 0976 – 6545(Print), 
ISSN 0976 – 6553(Online) Volume 5, Issue 7, July (2014), pp. 45-55 © IAEME 
f DP = −P P −P P 
50 
 
 
 
 
 
= 
X X 
, , 
thkm km thkm ij 
th X X 
thij km thij ij 
X 
, , 
(14) 
 
  
 
q 
  
f 
km = X + 
X 
P 
 
  
 
  
− 
0 
km 
0 
1 [ ] 
ij 
P 
f th f 
ij 
q 
(15) 
where, 
 
 
 
 
− 
+ 
= 
ij 
km 
x 
f x 
X 
0 
0 
(16) 
To find out the effect of the change in the network topology on the rest of the system, the 
angle changes are evaluated as defined in (17)-(19). 
f f Dq = XDP 
(17) 
where, 
[0 0...... 0 ... ...0.... ....0] f 
ij 
f 
ij 
f 
km 
f 
km 
(18) 
Therefore, 
q f = q 0 + Dq f 
(19) 
DC load flow is run to get post changes flows using the new angles ( 
q f ). 
From flows obtained, the indices p PI (which is a double summation over number of outage 
topologies and base case and number of overloaded lines) and NI are calculated 
 
 
Nc 
P 
   
 
= 
flowlj 
j P 
= l l 
PIp 
2 
max 
0 (20) 
Using the procedure described below the optimal N-1 secure solution is arrived at 
. 
 − 	 
base 
p p PI PI 
=
os 

 
NI 
C t 
(21) 
3.2 Algorithm 
1. DC load flow is run for the base case and base 
p PI is evaluated. 
2. A single line outage simulation is done for all the Nc outage topologies considering one line out 
at time and p PI calculated is added to the PIpbase obtained for the base case to get PIpbase for all the 
Nc+1 topologies. 
3. For all candidate circuit considered one at a time , using double line outage kind of approach 
(adding this line and considering Nc+1 outage topologies one at a time) indices p PI , NI are 
calculated. 
4. The line with highest NI is added and go to step 1 till a network which is N-1 secure is obtained.
International Journal of Electrical Engineering and Technology (IJEET), ISSN 0976 – 6545(Print), 
ISSN 0976 – 6553(Online) Volume 5, Issue 7, July (2014), pp. 45-55 © IAEME 
5. Redundant lines are removed by carrying out a double line outage simulation if it does not result 
in overloads for all the Nc+1 topologies to arrive at the optimal secure expansion plan. 
(Radial lines and the line added are not considered for outage) 
51 
5. RESULTS 
 
The validity of the method is investigated by applying it to the modified “Garver 6-bus test 
system for expansion”[1].Table 1 shows the lines added to meet forecasted load without security 
constraints. Additional lines are added in Right of Ways (ROW) 3—5,6—2,6—4. The total cost of 
the transmission expansion is 1X100 + 3X150 + 2X150 = 850 currency units. Transmission 
Expansion Planning without security constraints leaves the system unable to supply certain loads in 
case of transmission outages (planned and unplanned).The results for Transmission expansion 
planning with security constraints (Table II) shows that additional lines have to be added above those 
added in the previous case to make the system N-1 secure. The total cost of transmission expansion 
is 1340 currency units for the lines added as shown in Table II. An additional cost of 490 currency 
units needs to be incurred. 
Using the D and C factors, the transmission expansion costs can be attributed to generators 
and loads respectively. Negative costs indicate a certain entity is responsible for 
Table I: Results for TEP without security constraints 
Line no. 
Between buses (k-m) 
No. of lines added 
Total no. of lines in the 
ROW 
Flow in the ROW(p.u) 
Cost 
1 1-2 0 1 -0.5125 -- 
2 1-4 0 1 -0.3175 -- 
3 1-5 0 1 0.5300 -- 
4 2-3 0 1 0.6200 -- 
5 2-4 0 1 0.0363 -- 
6 3-5 1 2 1.8700 100 
7 6-2 3 4 3.5689 150 
8 6-4 2 2 1.8812 150 
9 6-5 0 0 0 305 
10 6-3 0 0 0 240
International Journal of Electrical Engineering and Technology (IJEET), ISSN 0976 – 6545(Print), 
ISSN 0976 – 6553(Online) Volume 5, Issue 7, July (2014), pp. 45-55 © IAEME 
52 
 
Table II: Results for TEP with security constraints 
Line no. 
Between buses (k-m) 
No. of lines added 
Total no. of lines in the 
ROW 
Flow in the ROW(p.u) 
Cost 
1 1-2 0 1 -0.3348 -- 
2 1-4 0 1 -0.2682 -- 
3 1-5 0 1 0.3030 -- 
4 2-3 0 1 0.2735 -- 
5 2-4 0 1 -0.0675 -- 
6 3-5 2 3 2.0970 100 
7 6-2 3 4 2.9408 150 
8 6-4 3 3 1.9357 150 
9 6-5 0 0 0 305 
10 6-3 1 1 0.5735 240 
counter flows and therefore instead of being charged, the corresponding entity will be credited. It 
therefore encourages the entities that can reschedule their transactions to reduce/avoid the need for 
transmission expansion planning while charging the other entities for the additional transmission 
capacity to be added. Tables III and Table IV show the cost allocation without security constraints 
for generators and loads respectively. Tables V and Table VI show the cost allocation with security 
constraints for generators and loads respectively. 
6. CONCLUSION 
The optimal design of Transmission lines is an important part of the overall planning task of 
electric power systems. A single line outage simulation using Thevenin’s equivalent kind of 
approach was used to study the effect of line addition and to arrive at the optimal expansion without 
security constraints. Given the right of way where new transmission lines can be added, the solution 
gives the right of way in which the new line has to be added. 
A novel method for Transmission expansion planning incorporating security aspects so that 
the designed network is also secure due single outages has been presented .In the proposed method, 
the overall network is solved in an integrated fashion i.e., there is no
International Journal of Electrical Engineering and Technology (IJEET), ISSN 0976 – 6545(Print), 
ISSN 0976 – 6553(Online) Volume 5, Issue 7, July (2014), pp. 45-55 © IAEME 
53 
 
G6 5.45 = 
1 G = 0.5 
5 L = 2.4 
2 L = 2.4 
4 L = 1.6 
1 L = 0.8 
3 G = 1.65 
3 L = 0.4 
Fig. 3: Optimal transmission expansion plan without security constraints (newly added lines shown 
in red color) 
6 G = 5.45 
1 G = 0.5 
5 L = 2.4 
2 L = 2.4 
4 L = 1.6 
1 L = 0.8 
3 L = 0.4 
3 G = 1.65 
Fig. 4: Optimal transmission expansion plan with security constraints (newly added lines shown in 
red color)

More Related Content

What's hot

IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
A novel method for determining fixed running time in operating electric train...
A novel method for determining fixed running time in operating electric train...A novel method for determining fixed running time in operating electric train...
A novel method for determining fixed running time in operating electric train...
IJECEIAES
 
HSO: A Hybrid Swarm Optimization Algorithm for Reducing Energy Consumption in...
HSO: A Hybrid Swarm Optimization Algorithm for Reducing Energy Consumption in...HSO: A Hybrid Swarm Optimization Algorithm for Reducing Energy Consumption in...
HSO: A Hybrid Swarm Optimization Algorithm for Reducing Energy Consumption in...
TELKOMNIKA JOURNAL
 
Critical Review of Different Methods for Siting and Sizing Distributed-genera...
Critical Review of Different Methods for Siting and Sizing Distributed-genera...Critical Review of Different Methods for Siting and Sizing Distributed-genera...
Critical Review of Different Methods for Siting and Sizing Distributed-genera...
TELKOMNIKA JOURNAL
 
IRJET- An Optimal Algorithm for Data Centres to Minimize the Power Supply
IRJET-  	  An Optimal Algorithm for Data Centres to Minimize the Power SupplyIRJET-  	  An Optimal Algorithm for Data Centres to Minimize the Power Supply
IRJET- An Optimal Algorithm for Data Centres to Minimize the Power Supply
IRJET Journal
 
Resource aware wind farm and D-STATCOM optimal sizing and placement in a dist...
Resource aware wind farm and D-STATCOM optimal sizing and placement in a dist...Resource aware wind farm and D-STATCOM optimal sizing and placement in a dist...
Resource aware wind farm and D-STATCOM optimal sizing and placement in a dist...
IJECEIAES
 
IRJET- Optimal Placement and Size of DG and DER for Minimizing Power Loss and...
IRJET- Optimal Placement and Size of DG and DER for Minimizing Power Loss and...IRJET- Optimal Placement and Size of DG and DER for Minimizing Power Loss and...
IRJET- Optimal Placement and Size of DG and DER for Minimizing Power Loss and...
IRJET Journal
 
IRJET- Reducing electricity usage in Internet using transactional data
IRJET-  	  Reducing electricity usage in Internet using transactional dataIRJET-  	  Reducing electricity usage in Internet using transactional data
IRJET- Reducing electricity usage in Internet using transactional data
IRJET Journal
 
01 16286 32182-1-sm multiple (edit)
01 16286 32182-1-sm multiple (edit)01 16286 32182-1-sm multiple (edit)
01 16286 32182-1-sm multiple (edit)
IAESIJEECS
 
Optimization for-power-sy-8631549
Optimization for-power-sy-8631549Optimization for-power-sy-8631549
Optimization for-power-sy-8631549
Kannan Kathiravan
 
Multi objective economic load dispatch using hybrid fuzzy, bacterial
Multi objective economic load dispatch using hybrid fuzzy, bacterialMulti objective economic load dispatch using hybrid fuzzy, bacterial
Multi objective economic load dispatch using hybrid fuzzy, bacterialIAEME Publication
 
A LITERATURE SURVEY ON ENERGY SAVING SCHEME IN CELLULAR RADIO ACCESS NETWORKS...
A LITERATURE SURVEY ON ENERGY SAVING SCHEME IN CELLULAR RADIO ACCESS NETWORKS...A LITERATURE SURVEY ON ENERGY SAVING SCHEME IN CELLULAR RADIO ACCESS NETWORKS...
A LITERATURE SURVEY ON ENERGY SAVING SCHEME IN CELLULAR RADIO ACCESS NETWORKS...
International Journal of Technical Research & Application
 
Comparitive analysis of doa and beamforming algorithms for smart antenna systems
Comparitive analysis of doa and beamforming algorithms for smart antenna systemsComparitive analysis of doa and beamforming algorithms for smart antenna systems
Comparitive analysis of doa and beamforming algorithms for smart antenna systems
eSAT Journals
 
McCalley-Li-CIGRE2014Final (2)
McCalley-Li-CIGRE2014Final (2)McCalley-Li-CIGRE2014Final (2)
McCalley-Li-CIGRE2014Final (2)Yifan Li
 
IRJET- Optimal Placement and Size of DG and DER for Minimizing Power Loss and...
IRJET- Optimal Placement and Size of DG and DER for Minimizing Power Loss and...IRJET- Optimal Placement and Size of DG and DER for Minimizing Power Loss and...
IRJET- Optimal Placement and Size of DG and DER for Minimizing Power Loss and...
IRJET Journal
 
Framework Development to Analyze the Distribution System for Upper Karnali Hy...
Framework Development to Analyze the Distribution System for Upper Karnali Hy...Framework Development to Analyze the Distribution System for Upper Karnali Hy...
Framework Development to Analyze the Distribution System for Upper Karnali Hy...
IJMERJOURNAL
 
Forecasting electricity usage in industrial applications with gpu acceleratio...
Forecasting electricity usage in industrial applications with gpu acceleratio...Forecasting electricity usage in industrial applications with gpu acceleratio...
Forecasting electricity usage in industrial applications with gpu acceleratio...
Conference Papers
 
Optimal Siting of Distributed Generators in a Distribution Network using Arti...
Optimal Siting of Distributed Generators in a Distribution Network using Arti...Optimal Siting of Distributed Generators in a Distribution Network using Arti...
Optimal Siting of Distributed Generators in a Distribution Network using Arti...
IJECEIAES
 

What's hot (19)

IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
A novel method for determining fixed running time in operating electric train...
A novel method for determining fixed running time in operating electric train...A novel method for determining fixed running time in operating electric train...
A novel method for determining fixed running time in operating electric train...
 
HSO: A Hybrid Swarm Optimization Algorithm for Reducing Energy Consumption in...
HSO: A Hybrid Swarm Optimization Algorithm for Reducing Energy Consumption in...HSO: A Hybrid Swarm Optimization Algorithm for Reducing Energy Consumption in...
HSO: A Hybrid Swarm Optimization Algorithm for Reducing Energy Consumption in...
 
Critical Review of Different Methods for Siting and Sizing Distributed-genera...
Critical Review of Different Methods for Siting and Sizing Distributed-genera...Critical Review of Different Methods for Siting and Sizing Distributed-genera...
Critical Review of Different Methods for Siting and Sizing Distributed-genera...
 
IRJET- An Optimal Algorithm for Data Centres to Minimize the Power Supply
IRJET-  	  An Optimal Algorithm for Data Centres to Minimize the Power SupplyIRJET-  	  An Optimal Algorithm for Data Centres to Minimize the Power Supply
IRJET- An Optimal Algorithm for Data Centres to Minimize the Power Supply
 
Resource aware wind farm and D-STATCOM optimal sizing and placement in a dist...
Resource aware wind farm and D-STATCOM optimal sizing and placement in a dist...Resource aware wind farm and D-STATCOM optimal sizing and placement in a dist...
Resource aware wind farm and D-STATCOM optimal sizing and placement in a dist...
 
IRJET- Optimal Placement and Size of DG and DER for Minimizing Power Loss and...
IRJET- Optimal Placement and Size of DG and DER for Minimizing Power Loss and...IRJET- Optimal Placement and Size of DG and DER for Minimizing Power Loss and...
IRJET- Optimal Placement and Size of DG and DER for Minimizing Power Loss and...
 
IRJET- Reducing electricity usage in Internet using transactional data
IRJET-  	  Reducing electricity usage in Internet using transactional dataIRJET-  	  Reducing electricity usage in Internet using transactional data
IRJET- Reducing electricity usage in Internet using transactional data
 
01 16286 32182-1-sm multiple (edit)
01 16286 32182-1-sm multiple (edit)01 16286 32182-1-sm multiple (edit)
01 16286 32182-1-sm multiple (edit)
 
Optimization for-power-sy-8631549
Optimization for-power-sy-8631549Optimization for-power-sy-8631549
Optimization for-power-sy-8631549
 
Multi objective economic load dispatch using hybrid fuzzy, bacterial
Multi objective economic load dispatch using hybrid fuzzy, bacterialMulti objective economic load dispatch using hybrid fuzzy, bacterial
Multi objective economic load dispatch using hybrid fuzzy, bacterial
 
A LITERATURE SURVEY ON ENERGY SAVING SCHEME IN CELLULAR RADIO ACCESS NETWORKS...
A LITERATURE SURVEY ON ENERGY SAVING SCHEME IN CELLULAR RADIO ACCESS NETWORKS...A LITERATURE SURVEY ON ENERGY SAVING SCHEME IN CELLULAR RADIO ACCESS NETWORKS...
A LITERATURE SURVEY ON ENERGY SAVING SCHEME IN CELLULAR RADIO ACCESS NETWORKS...
 
Comparitive analysis of doa and beamforming algorithms for smart antenna systems
Comparitive analysis of doa and beamforming algorithms for smart antenna systemsComparitive analysis of doa and beamforming algorithms for smart antenna systems
Comparitive analysis of doa and beamforming algorithms for smart antenna systems
 
McCalley-Li-CIGRE2014Final (2)
McCalley-Li-CIGRE2014Final (2)McCalley-Li-CIGRE2014Final (2)
McCalley-Li-CIGRE2014Final (2)
 
IRJET- Optimal Placement and Size of DG and DER for Minimizing Power Loss and...
IRJET- Optimal Placement and Size of DG and DER for Minimizing Power Loss and...IRJET- Optimal Placement and Size of DG and DER for Minimizing Power Loss and...
IRJET- Optimal Placement and Size of DG and DER for Minimizing Power Loss and...
 
40220130405017
4022013040501740220130405017
40220130405017
 
Framework Development to Analyze the Distribution System for Upper Karnali Hy...
Framework Development to Analyze the Distribution System for Upper Karnali Hy...Framework Development to Analyze the Distribution System for Upper Karnali Hy...
Framework Development to Analyze the Distribution System for Upper Karnali Hy...
 
Forecasting electricity usage in industrial applications with gpu acceleratio...
Forecasting electricity usage in industrial applications with gpu acceleratio...Forecasting electricity usage in industrial applications with gpu acceleratio...
Forecasting electricity usage in industrial applications with gpu acceleratio...
 
Optimal Siting of Distributed Generators in a Distribution Network using Arti...
Optimal Siting of Distributed Generators in a Distribution Network using Arti...Optimal Siting of Distributed Generators in a Distribution Network using Arti...
Optimal Siting of Distributed Generators in a Distribution Network using Arti...
 

Viewers also liked

A refined solution to classical unit commitment
A refined solution to classical unit commitmentA refined solution to classical unit commitment
A refined solution to classical unit commitment
eSAT Publishing House
 
Dynamic economic load dispatch a review of solution methodologies48
Dynamic economic load dispatch a review of solution methodologies48Dynamic economic load dispatch a review of solution methodologies48
Dynamic economic load dispatch a review of solution methodologies48jiten2k13
 
ECONOMIC LOAD DISPATCH USING GENETIC ALGORITHM
ECONOMIC LOAD DISPATCH USING GENETIC ALGORITHMECONOMIC LOAD DISPATCH USING GENETIC ALGORITHM
ECONOMIC LOAD DISPATCH USING GENETIC ALGORITHM
IJARIIT
 
ECONOMIC LOAD DISPATCH USING PARTICLE SWARM OPTIMIZATION
ECONOMIC LOAD DISPATCH USING PARTICLE SWARM OPTIMIZATIONECONOMIC LOAD DISPATCH USING PARTICLE SWARM OPTIMIZATION
ECONOMIC LOAD DISPATCH USING PARTICLE SWARM OPTIMIZATION
Mln Phaneendra
 
A Case Study of Economic Load Dispatch for a Thermal Power Plant using Partic...
A Case Study of Economic Load Dispatch for a Thermal Power Plant using Partic...A Case Study of Economic Load Dispatch for a Thermal Power Plant using Partic...
A Case Study of Economic Load Dispatch for a Thermal Power Plant using Partic...
International Journal of Science and Research (IJSR)
 
Economic load dispatch
Economic load  dispatchEconomic load  dispatch
Economic load dispatch
Md. Hasan Al Roktim
 
Project on economic load dispatch
Project on economic load dispatchProject on economic load dispatch
Project on economic load dispatchayantudu
 
Economic operation of Power systems by Unit commitment
Economic operation of Power systems by Unit commitment Economic operation of Power systems by Unit commitment
Economic operation of Power systems by Unit commitment
Pritesh Priyadarshi
 
Economic load dispatch
Economic load  dispatchEconomic load  dispatch
Economic load dispatchDeepak John
 

Viewers also liked (9)

A refined solution to classical unit commitment
A refined solution to classical unit commitmentA refined solution to classical unit commitment
A refined solution to classical unit commitment
 
Dynamic economic load dispatch a review of solution methodologies48
Dynamic economic load dispatch a review of solution methodologies48Dynamic economic load dispatch a review of solution methodologies48
Dynamic economic load dispatch a review of solution methodologies48
 
ECONOMIC LOAD DISPATCH USING GENETIC ALGORITHM
ECONOMIC LOAD DISPATCH USING GENETIC ALGORITHMECONOMIC LOAD DISPATCH USING GENETIC ALGORITHM
ECONOMIC LOAD DISPATCH USING GENETIC ALGORITHM
 
ECONOMIC LOAD DISPATCH USING PARTICLE SWARM OPTIMIZATION
ECONOMIC LOAD DISPATCH USING PARTICLE SWARM OPTIMIZATIONECONOMIC LOAD DISPATCH USING PARTICLE SWARM OPTIMIZATION
ECONOMIC LOAD DISPATCH USING PARTICLE SWARM OPTIMIZATION
 
A Case Study of Economic Load Dispatch for a Thermal Power Plant using Partic...
A Case Study of Economic Load Dispatch for a Thermal Power Plant using Partic...A Case Study of Economic Load Dispatch for a Thermal Power Plant using Partic...
A Case Study of Economic Load Dispatch for a Thermal Power Plant using Partic...
 
Economic load dispatch
Economic load  dispatchEconomic load  dispatch
Economic load dispatch
 
Project on economic load dispatch
Project on economic load dispatchProject on economic load dispatch
Project on economic load dispatch
 
Economic operation of Power systems by Unit commitment
Economic operation of Power systems by Unit commitment Economic operation of Power systems by Unit commitment
Economic operation of Power systems by Unit commitment
 
Economic load dispatch
Economic load  dispatchEconomic load  dispatch
Economic load dispatch
 

Similar to 40220140507005

Transmisison & generation_expansion_planning_ijepes-d-13-00427_r1_accepted
Transmisison & generation_expansion_planning_ijepes-d-13-00427_r1_acceptedTransmisison & generation_expansion_planning_ijepes-d-13-00427_r1_accepted
Transmisison & generation_expansion_planning_ijepes-d-13-00427_r1_accepted
Neeraj Gupta
 
Reliability Constrained Unit Commitment Considering the Effect of DG and DR P...
Reliability Constrained Unit Commitment Considering the Effect of DG and DR P...Reliability Constrained Unit Commitment Considering the Effect of DG and DR P...
Reliability Constrained Unit Commitment Considering the Effect of DG and DR P...
IJECEIAES
 
Economic Dispatch using Quantum Evolutionary Algorithm in Electrical Power S...
Economic Dispatch  using Quantum Evolutionary Algorithm in Electrical Power S...Economic Dispatch  using Quantum Evolutionary Algorithm in Electrical Power S...
Economic Dispatch using Quantum Evolutionary Algorithm in Electrical Power S...
IJECEIAES
 
Cost Aware Expansion Planning with Renewable DGs using Particle Swarm Optimiz...
Cost Aware Expansion Planning with Renewable DGs using Particle Swarm Optimiz...Cost Aware Expansion Planning with Renewable DGs using Particle Swarm Optimiz...
Cost Aware Expansion Planning with Renewable DGs using Particle Swarm Optimiz...
IJERA Editor
 
A Generalized Multistage Economic Planning Model for Distribution System Cont...
A Generalized Multistage Economic Planning Model for Distribution System Cont...A Generalized Multistage Economic Planning Model for Distribution System Cont...
A Generalized Multistage Economic Planning Model for Distribution System Cont...
IJERD Editor
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Wide Area Monitoring, Protection and Control (WAMPAC) Application in Transmis...
Wide Area Monitoring, Protection and Control (WAMPAC) Application in Transmis...Wide Area Monitoring, Protection and Control (WAMPAC) Application in Transmis...
Wide Area Monitoring, Protection and Control (WAMPAC) Application in Transmis...
IRJET Journal
 
Two-way Load Flow Analysis using Newton-Raphson and Neural Network Methods
Two-way Load Flow Analysis using Newton-Raphson and Neural Network MethodsTwo-way Load Flow Analysis using Newton-Raphson and Neural Network Methods
Two-way Load Flow Analysis using Newton-Raphson and Neural Network Methods
IRJET Journal
 
ACTIVE POWER AND COST ALLOCATION IN OPEN ACCESS ENVIRONMENT UTILIZING POWER F...
ACTIVE POWER AND COST ALLOCATION IN OPEN ACCESS ENVIRONMENT UTILIZING POWER F...ACTIVE POWER AND COST ALLOCATION IN OPEN ACCESS ENVIRONMENT UTILIZING POWER F...
ACTIVE POWER AND COST ALLOCATION IN OPEN ACCESS ENVIRONMENT UTILIZING POWER F...
ecij
 
Active power and cost allocation in open access environment utilizing power f...
Active power and cost allocation in open access environment utilizing power f...Active power and cost allocation in open access environment utilizing power f...
Active power and cost allocation in open access environment utilizing power f...
ecij
 
A New Methodology for Active Power Transmission Loss Allocation in Deregulate...
A New Methodology for Active Power Transmission Loss Allocation in Deregulate...A New Methodology for Active Power Transmission Loss Allocation in Deregulate...
A New Methodology for Active Power Transmission Loss Allocation in Deregulate...
IJECEIAES
 
Optimal Unit Commitment Based on Economic Dispatch Using Improved Particle Sw...
Optimal Unit Commitment Based on Economic Dispatch Using Improved Particle Sw...Optimal Unit Commitment Based on Economic Dispatch Using Improved Particle Sw...
Optimal Unit Commitment Based on Economic Dispatch Using Improved Particle Sw...
paperpublications3
 
Inclusion of environmental constraints into siting and sizing
Inclusion of environmental constraints into siting and sizingInclusion of environmental constraints into siting and sizing
Inclusion of environmental constraints into siting and sizingIAEME Publication
 
An analytical approach for optimal placement of combined dg and capacitor in ...
An analytical approach for optimal placement of combined dg and capacitor in ...An analytical approach for optimal placement of combined dg and capacitor in ...
An analytical approach for optimal placement of combined dg and capacitor in ...
IAEME Publication
 
Allocation of Transmission Cost Using Power Flow Tracing Methods
Allocation of Transmission Cost Using Power Flow Tracing MethodsAllocation of Transmission Cost Using Power Flow Tracing Methods
Allocation of Transmission Cost Using Power Flow Tracing Methods
IJERA Editor
 
Hybrid method for achieving Pareto front on economic emission dispatch
Hybrid method for achieving Pareto front on economic  emission dispatch Hybrid method for achieving Pareto front on economic  emission dispatch
Hybrid method for achieving Pareto front on economic emission dispatch
IJECEIAES
 
Distribution network reconfiguration for loss reduction using PSO method
Distribution network reconfiguration for loss reduction  using PSO method Distribution network reconfiguration for loss reduction  using PSO method
Distribution network reconfiguration for loss reduction using PSO method
IJECEIAES
 
28 16107 paper 088 ijeecs(edit)
28 16107 paper 088 ijeecs(edit)28 16107 paper 088 ijeecs(edit)
28 16107 paper 088 ijeecs(edit)
IAESIJEECS
 

Similar to 40220140507005 (20)

Transmisison & generation_expansion_planning_ijepes-d-13-00427_r1_accepted
Transmisison & generation_expansion_planning_ijepes-d-13-00427_r1_acceptedTransmisison & generation_expansion_planning_ijepes-d-13-00427_r1_accepted
Transmisison & generation_expansion_planning_ijepes-d-13-00427_r1_accepted
 
Reliability Constrained Unit Commitment Considering the Effect of DG and DR P...
Reliability Constrained Unit Commitment Considering the Effect of DG and DR P...Reliability Constrained Unit Commitment Considering the Effect of DG and DR P...
Reliability Constrained Unit Commitment Considering the Effect of DG and DR P...
 
Economic Dispatch using Quantum Evolutionary Algorithm in Electrical Power S...
Economic Dispatch  using Quantum Evolutionary Algorithm in Electrical Power S...Economic Dispatch  using Quantum Evolutionary Algorithm in Electrical Power S...
Economic Dispatch using Quantum Evolutionary Algorithm in Electrical Power S...
 
Cost Aware Expansion Planning with Renewable DGs using Particle Swarm Optimiz...
Cost Aware Expansion Planning with Renewable DGs using Particle Swarm Optimiz...Cost Aware Expansion Planning with Renewable DGs using Particle Swarm Optimiz...
Cost Aware Expansion Planning with Renewable DGs using Particle Swarm Optimiz...
 
A Generalized Multistage Economic Planning Model for Distribution System Cont...
A Generalized Multistage Economic Planning Model for Distribution System Cont...A Generalized Multistage Economic Planning Model for Distribution System Cont...
A Generalized Multistage Economic Planning Model for Distribution System Cont...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Wide Area Monitoring, Protection and Control (WAMPAC) Application in Transmis...
Wide Area Monitoring, Protection and Control (WAMPAC) Application in Transmis...Wide Area Monitoring, Protection and Control (WAMPAC) Application in Transmis...
Wide Area Monitoring, Protection and Control (WAMPAC) Application in Transmis...
 
Two-way Load Flow Analysis using Newton-Raphson and Neural Network Methods
Two-way Load Flow Analysis using Newton-Raphson and Neural Network MethodsTwo-way Load Flow Analysis using Newton-Raphson and Neural Network Methods
Two-way Load Flow Analysis using Newton-Raphson and Neural Network Methods
 
ACTIVE POWER AND COST ALLOCATION IN OPEN ACCESS ENVIRONMENT UTILIZING POWER F...
ACTIVE POWER AND COST ALLOCATION IN OPEN ACCESS ENVIRONMENT UTILIZING POWER F...ACTIVE POWER AND COST ALLOCATION IN OPEN ACCESS ENVIRONMENT UTILIZING POWER F...
ACTIVE POWER AND COST ALLOCATION IN OPEN ACCESS ENVIRONMENT UTILIZING POWER F...
 
Active power and cost allocation in open access environment utilizing power f...
Active power and cost allocation in open access environment utilizing power f...Active power and cost allocation in open access environment utilizing power f...
Active power and cost allocation in open access environment utilizing power f...
 
A New Methodology for Active Power Transmission Loss Allocation in Deregulate...
A New Methodology for Active Power Transmission Loss Allocation in Deregulate...A New Methodology for Active Power Transmission Loss Allocation in Deregulate...
A New Methodology for Active Power Transmission Loss Allocation in Deregulate...
 
Optimal Unit Commitment Based on Economic Dispatch Using Improved Particle Sw...
Optimal Unit Commitment Based on Economic Dispatch Using Improved Particle Sw...Optimal Unit Commitment Based on Economic Dispatch Using Improved Particle Sw...
Optimal Unit Commitment Based on Economic Dispatch Using Improved Particle Sw...
 
Inclusion of environmental constraints into siting and sizing
Inclusion of environmental constraints into siting and sizingInclusion of environmental constraints into siting and sizing
Inclusion of environmental constraints into siting and sizing
 
An analytical approach for optimal placement of combined dg and capacitor in ...
An analytical approach for optimal placement of combined dg and capacitor in ...An analytical approach for optimal placement of combined dg and capacitor in ...
An analytical approach for optimal placement of combined dg and capacitor in ...
 
40220140502002
4022014050200240220140502002
40220140502002
 
Allocation of Transmission Cost Using Power Flow Tracing Methods
Allocation of Transmission Cost Using Power Flow Tracing MethodsAllocation of Transmission Cost Using Power Flow Tracing Methods
Allocation of Transmission Cost Using Power Flow Tracing Methods
 
40220130405014 (1)
40220130405014 (1)40220130405014 (1)
40220130405014 (1)
 
Hybrid method for achieving Pareto front on economic emission dispatch
Hybrid method for achieving Pareto front on economic  emission dispatch Hybrid method for achieving Pareto front on economic  emission dispatch
Hybrid method for achieving Pareto front on economic emission dispatch
 
Distribution network reconfiguration for loss reduction using PSO method
Distribution network reconfiguration for loss reduction  using PSO method Distribution network reconfiguration for loss reduction  using PSO method
Distribution network reconfiguration for loss reduction using PSO method
 
28 16107 paper 088 ijeecs(edit)
28 16107 paper 088 ijeecs(edit)28 16107 paper 088 ijeecs(edit)
28 16107 paper 088 ijeecs(edit)
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
IAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
IAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
IAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
IAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
IAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 

Recently uploaded (20)

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 

40220140507005

  • 1. INTERNATIONAL JOURNAL OF ELECTRICAL ENGINEERING & International Journal of Electrical Engineering and Technology (IJEET), ISSN 0976 – 6545(Print), ISSN 0976 – 6553(Online) Volume 5, Issue 7, July (2014), pp. 45-55 © IAEME TECHNOLOGY (IJEET) ISSN 0976 – 6545(Print) ISSN 0976 – 6553(Online) Volume 5, Issue 7, July (2014), pp. 45-55 © IAEME: www.iaeme.com/IJEET.asp Journal Impact Factor (2014): 6.8310 (Calculated by GISI) www.jifactor.com 45 IJEET © I A E M E TRANSMISSION EXPANSION PLANNING AND COST ALLOCATION WITH AND WITHOUT SECURITY CONSTRAINTS IN A DEREGULATED POWER SYSTEM Srujana Raghupatruni Uddavolu Assistant Professor, Department of Electrical Engineering, Muffakham Jah College of Engineering and Technology, Hyderabad, India ABSTRACT This paper presents a novel approach for static transmission expansion planning and allocation of the associated expansion costs to individual market entities in a restructured power system. The approach seeks the optimal addition of transmission lines among the possible candidate transmission lines minimizing the overall system costs and at the same time satisfying the system operational and security constraints. Novelty of the approach lies in applying a widely known technique used for overload security analysis to an area such as Transmission expansion planning. Transmission expansion costs are allocated using distribution factors to the individual entities in a fair and transparent manner. The results for modified Garver Test system demonstrate that the approach with the advantage of its simplicity can be applied to transmission expansion planning and cost allocation in restructured power system. Keywords: Open Access, Deregulation, Restructured Power System, Transmission Expansion Planning (TEP), Security Constraints, Power Flow Tracing. 1. INTRODUCTION Growing electricity demand driven by fast industrial growth and growing access to electricity in developing countries has necessitated the increase in generation and need for adequate transmission capacity. One of the many means of enhancing transmission capacity that involves significant capital expenditure is that of Transmission Expansion Planning (TEP). Vast number of influencing parameters including candidate circuits, electricity demand, generation forecast, operational network topology, etc. are required for an optimal solution of TEP problem. In general,
  • 2. International Journal of Electrical Engineering and Technology (IJEET), ISSN 0976 – 6545(Print), ISSN 0976 – 6553(Online) Volume 5, Issue 7, July (2014), pp. 45-55 © IAEME TEP consists of choosing, from a predefined set of circuits, those that should be built in order to minimize the investment cost, and to supply the forecasted demand along the planning horizon. 46 The TEP problem is generally considered as non-linear, no-convex optimization problem. During past few decades, significant number of methods have been proposed to solve TEP problem. One of the earliest approaches for TEP was proposed by authors in [1], where TEP problem was formulated as a power flow problem and used a linear programming algorithm to find the most direct routes from generation to loads. The approach discourages power flow on the right of ways without existing transmission lines by penalizing them .The transmission line that alleviates maximum overload emerged as the one chosen for addition. A new interactive method of TEP optimization approach was proposed by author’s in [11]. A mixed integer linear programming approach to solve the static TEP problem has been proposed in [12]. The proposed approach considers the line losses in the optimization framework. However in this method it is generally hard to guaranty the model feasibility and global optimality of the problem solution. Authors in [13] proposed a new method known as branch and bound method to solve the TEP optimization problem. The authors have used a transportation model to represent the transmission network. Authors in [2], proposed a combined use of linear and dynamic programming. Linear programming was used to find the minimum cost capacity increments required to meet the changes on demand and generation. Afterwards, they used dynamic programming to search for a close to optimal sequence of investment (continuous) decisions. Reference [3] proposed a pure dynamic programming, but due to the computational effort, its applications were very restricted. Authors in [4] proposed the use of interactive tools for transmission planning. To rank the possible additions this approach used a sensitivity analysis with respect to circuit’s susceptances of a “least effort” index, which is the result of an optimization problem whose solution is identical to a DC power flow solution. In 1984, Villasana [6] proposed two approaches to be applied in transmission expansion planning. The first one is formulated combining a DC power flow model with a transportation model. While the DC model evaluated the power flow for the existing transmission facilities, the transportation model was used to compute the “overload” flow. This approach consists in an improvement of the approach proposed in [1]. The second approach used linear mixed integer formulation. The use of mathematical decomposition schemes for this problem started with the approach proposed in [5], where the author has applied a Benders decomposition technique to decompose the global problem into two sub problems: the Master investment sub problem, which chooses the trial expansion plan, and the operation sub problem that analyzes the trial investment decisions and expresses operational violated constraints in terms of investment variables through Benders cuts. However the hierarchical level II reliability calculations employed for composite system planning increases the complexity of overall problem. Many researchers [8],[9] have applied meta-heuristic techniques like GA and simulated annealing to tackle the TEP problem. However there are some limitations of these evolutionary optimization approaches. These limitations include large computational burden and constraint handling problem which becomes more complex for highly constrained problems especially in large power networks. Authors in [14] formulated the composite system expansion planning as a nonlinear model while considering different location based fuel supplying costs. Thought the method employs n-1 contingency criterion, reliability measure has not been studied quantitatively. Authors in [7] have described an automatic way of finding the least cost method of securing a given power system. With the advent of electricity markets ,the inability of wheeling electricity through desired path either due to physical and operating limits of the transmission lines or the absence of transmission lines in the desired right of way may hamper the prospects of trading electricity as dictated by
  • 3. International Journal of Electrical Engineering and Technology (IJEET), ISSN 0976 – 6545(Print), ISSN 0976 – 6553(Online) Volume 5, Issue 7, July (2014), pp. 45-55 © IAEME economics. In forward markets, it would be beneficial to plan for transmission expansion to ensure fair competition among the market participants. Transmission expansion planning must therefore, simulate market behaviour sufficiently to encourage and facilitate fair electricity market environment. 47 The present paper can be divide into three main sections- the first section (section II) discusses transmission expansion planning without security constraints ,where the transmission lines with the overall benefit of being comparatively inexpensive and being able to alleviate maximum overload are added one at a time till the overload on the network is alleviated. Reliability is of utmost importance in competitive markets and the second section (section III) deals with TEP to obtain N-1 secure system. As expected, the number of lines that were added for N-1 secure system were higher. In the the third section (section IV) the transmission expansion costs were allocated to individual generators and loads using distribution factors [10]. Results are discussed in section V followed by concluding remarks in section VI. 2. TEP WITHOUT SECURITY CONSTRAINTS 2.1 Method Adopted The method adopted is similar to overload security analysis, where in instead of removing a line (as in overload security analysis), line addition is simulated. The brute force method involves adding one line at a time and performing DC load flow. A much more efficient approach is to simulate the line addition by using Thevenin’s /Norton’s equivalent. In this approach the base case network before line addition remains the same for all candidate circuits as shown in Fig.1. thkm X k m f km P f km X = X q km Fig. 1: Thevenin’s equivalent for single topological change For a line addition between buses k and m, thethakm ( 0 q ) shown in the Thevenin’s km equivalent model is computed as defined in (1). 0 0 0 km k m q = q −q (1) (superscript 0 denotes that the values correspond to base case) Thevenin’s equivalent impedance is evaluated as defined in (2). thkm kk mm km mk X = X + X − X − X (2)
  • 4. International Journal of Electrical Engineering and Technology (IJEET), ISSN 0976 – 6545(Print), ISSN 0976 – 6553(Online) Volume 5, Issue 7, July (2014), pp. 45-55 © IAEME f km km X X f DP = − P P = 48 thkm f P + = q 0 (3) To find out the effect of the line addition on the rest of the system, the angle changes are evaluated as defined in (4)-(6). f f Dq = XDP (4) where, [0 0...... 0 ...0] f km f km (5) (the two entries correspond to buses k and m affected) q f = q 0 + Dq f (6) DC load flow is run to get post addition flows using the new angles ( q f ). From flows obtained, the indices p PI and NI are calculated as defined in (7) and (8) respectively. 2 P flowl max p l l PI P (7) where, l belongs to the set of all the lines that are overloaded to avoid masking effect i.e., the line that is just below its limit contributes to performance index almost equal to the line just above the limit. − base p p PI PI =
  • 5. os NI C t (8) Using the procedure described below the optimal solution is arrived at. 2.2 Algorithm 1) DC load flow is run on the base case network (modified Garver Six bus system) to obtain the flows on all the lines and bus angles prior to the line addition and performance index, base p PI is calculated. 2) A line is added amongst the 5 possible right of way using Thevenin’s Equivalent approach described above and flows are calculated. 3) From the flows, performance index, p PI and a normalized index, NI are calculated. 4) Go to step 2 until normalized index is found out for all possible right of way (ROW). Add the line with largest value of the normalized index and go to step 1 till all the overloads on the network are alleviated.
  • 6. International Journal of Electrical Engineering and Technology (IJEET), ISSN 0976 – 6545(Print), ISSN 0976 – 6553(Online) Volume 5, Issue 7, July (2014), pp. 45-55 © IAEME 49 3. TEP WITH SECURITY CONSTRAINTS An important aspect that must be considered when planning a transmission network expansion is system-security. Contingency analysis looks at the state of the system after some lines of the network fail. The N-1 contingency analysis looks at the system state after a single line of the network fails and see if it is secure or not. N-1 contingency analysis requires that after each line fails independently, the network constraints be satisfied. When planning a transmission expansion, it is desirable to consider whether or not the topology modification plan will be secure after any single line outage. Seifu et. al. [13] have first considered a base case network (optimal expansion plan obtained from TEP without security constraints) in which there are no overloads. They have then considered a network expansion plan beyond that network so that it does not have overloads in a single line out case (N-1 secure). In the proposed method, the overall network planning for (N-1) security is solved in an integrated fashion i.e. there is no distinction as base case network planning (without security constraints) and planning against contingencies. The proposed method considers outage possibility of any line (excluding radial lines) one at a time and plans the network expansion such that there are no overloads in any (Nc+1) topology cases. 3.1 Method Adopted A double line outage kind of approach is used for security constrained transmission expansion planning to simulate two network changes – a line addition and another line removal.For a line addition between buses, k and m and line removal between buses, i and j, the Thevenin’s equivalent model is computed as defined in (9)-(16). th X T f f km ij P P 0 = 0 km f ij X X X q 0 km q 0 ij Fig. 2: Thevenin’s equivalent for double topological change 0 0 0 km k m q = q −q (9) 0 0 0 ij i j q = q −q (10) (superscript 0 denotes that the values correspond to base case) Thevenin’s equivalent impedance is evaluated as, thij ij ii jj ij ji X = X + X − X − X , (11) thkm,km kk mm km mk X = X + X − X − X (12) thkm,ij thij ,km ik im jk jm X = X = X − X − X + X (13)
  • 7. International Journal of Electrical Engineering and Technology (IJEET), ISSN 0976 – 6545(Print), ISSN 0976 – 6553(Online) Volume 5, Issue 7, July (2014), pp. 45-55 © IAEME f DP = −P P −P P 50 = X X , , thkm km thkm ij th X X thij km thij ij X , , (14) q f km = X + X P − 0 km 0 1 [ ] ij P f th f ij q (15) where, − + = ij km x f x X 0 0 (16) To find out the effect of the change in the network topology on the rest of the system, the angle changes are evaluated as defined in (17)-(19). f f Dq = XDP (17) where, [0 0...... 0 ... ...0.... ....0] f ij f ij f km f km (18) Therefore, q f = q 0 + Dq f (19) DC load flow is run to get post changes flows using the new angles ( q f ). From flows obtained, the indices p PI (which is a double summation over number of outage topologies and base case and number of overloaded lines) and NI are calculated Nc P = flowlj j P = l l PIp 2 max 0 (20) Using the procedure described below the optimal N-1 secure solution is arrived at . − base p p PI PI =
  • 8. os NI C t (21) 3.2 Algorithm 1. DC load flow is run for the base case and base p PI is evaluated. 2. A single line outage simulation is done for all the Nc outage topologies considering one line out at time and p PI calculated is added to the PIpbase obtained for the base case to get PIpbase for all the Nc+1 topologies. 3. For all candidate circuit considered one at a time , using double line outage kind of approach (adding this line and considering Nc+1 outage topologies one at a time) indices p PI , NI are calculated. 4. The line with highest NI is added and go to step 1 till a network which is N-1 secure is obtained.
  • 9. International Journal of Electrical Engineering and Technology (IJEET), ISSN 0976 – 6545(Print), ISSN 0976 – 6553(Online) Volume 5, Issue 7, July (2014), pp. 45-55 © IAEME 5. Redundant lines are removed by carrying out a double line outage simulation if it does not result in overloads for all the Nc+1 topologies to arrive at the optimal secure expansion plan. (Radial lines and the line added are not considered for outage) 51 5. RESULTS The validity of the method is investigated by applying it to the modified “Garver 6-bus test system for expansion”[1].Table 1 shows the lines added to meet forecasted load without security constraints. Additional lines are added in Right of Ways (ROW) 3—5,6—2,6—4. The total cost of the transmission expansion is 1X100 + 3X150 + 2X150 = 850 currency units. Transmission Expansion Planning without security constraints leaves the system unable to supply certain loads in case of transmission outages (planned and unplanned).The results for Transmission expansion planning with security constraints (Table II) shows that additional lines have to be added above those added in the previous case to make the system N-1 secure. The total cost of transmission expansion is 1340 currency units for the lines added as shown in Table II. An additional cost of 490 currency units needs to be incurred. Using the D and C factors, the transmission expansion costs can be attributed to generators and loads respectively. Negative costs indicate a certain entity is responsible for Table I: Results for TEP without security constraints Line no. Between buses (k-m) No. of lines added Total no. of lines in the ROW Flow in the ROW(p.u) Cost 1 1-2 0 1 -0.5125 -- 2 1-4 0 1 -0.3175 -- 3 1-5 0 1 0.5300 -- 4 2-3 0 1 0.6200 -- 5 2-4 0 1 0.0363 -- 6 3-5 1 2 1.8700 100 7 6-2 3 4 3.5689 150 8 6-4 2 2 1.8812 150 9 6-5 0 0 0 305 10 6-3 0 0 0 240
  • 10. International Journal of Electrical Engineering and Technology (IJEET), ISSN 0976 – 6545(Print), ISSN 0976 – 6553(Online) Volume 5, Issue 7, July (2014), pp. 45-55 © IAEME 52 Table II: Results for TEP with security constraints Line no. Between buses (k-m) No. of lines added Total no. of lines in the ROW Flow in the ROW(p.u) Cost 1 1-2 0 1 -0.3348 -- 2 1-4 0 1 -0.2682 -- 3 1-5 0 1 0.3030 -- 4 2-3 0 1 0.2735 -- 5 2-4 0 1 -0.0675 -- 6 3-5 2 3 2.0970 100 7 6-2 3 4 2.9408 150 8 6-4 3 3 1.9357 150 9 6-5 0 0 0 305 10 6-3 1 1 0.5735 240 counter flows and therefore instead of being charged, the corresponding entity will be credited. It therefore encourages the entities that can reschedule their transactions to reduce/avoid the need for transmission expansion planning while charging the other entities for the additional transmission capacity to be added. Tables III and Table IV show the cost allocation without security constraints for generators and loads respectively. Tables V and Table VI show the cost allocation with security constraints for generators and loads respectively. 6. CONCLUSION The optimal design of Transmission lines is an important part of the overall planning task of electric power systems. A single line outage simulation using Thevenin’s equivalent kind of approach was used to study the effect of line addition and to arrive at the optimal expansion without security constraints. Given the right of way where new transmission lines can be added, the solution gives the right of way in which the new line has to be added. A novel method for Transmission expansion planning incorporating security aspects so that the designed network is also secure due single outages has been presented .In the proposed method, the overall network is solved in an integrated fashion i.e., there is no
  • 11. International Journal of Electrical Engineering and Technology (IJEET), ISSN 0976 – 6545(Print), ISSN 0976 – 6553(Online) Volume 5, Issue 7, July (2014), pp. 45-55 © IAEME 53 G6 5.45 = 1 G = 0.5 5 L = 2.4 2 L = 2.4 4 L = 1.6 1 L = 0.8 3 G = 1.65 3 L = 0.4 Fig. 3: Optimal transmission expansion plan without security constraints (newly added lines shown in red color) 6 G = 5.45 1 G = 0.5 5 L = 2.4 2 L = 2.4 4 L = 1.6 1 L = 0.8 3 L = 0.4 3 G = 1.65 Fig. 4: Optimal transmission expansion plan with security constraints (newly added lines shown in red color)
  • 12. International Journal of Electrical Engineering and Technology (IJEET), ISSN 0976 – 6545(Print), ISSN 0976 – 6553(Online) Volume 5, Issue 7, July (2014), pp. 45-55 © IAEME 54 Table III: TEP without Security Constraints Cost Allocation to Generators line G1 G3 G6 3--5 -3.07 43.27 59.80 6--2 -0.88 -21.28 472.15 6--4 1.11 26.91 271.98 Total cost -2.84 48.90 803.94 Table IV: TEP without Security Constraints Cost Allocation to Consumers/loads L1 L2 L3 L4 L5 15.44 2.41 -5.23 7.27 80.10 48.78 190.87 28.84 17.37 164.14 29.80 33.06 9.27 161.01 66.87 94.02 226.34 32.88 185.65 311.11 Table V: TEP with Security Constraints Cost Allocation to Generators line G1 G3 G6 3--5 -6.06 73.75 132.31 6--2 -0.01 -0.20 450.21 6--4 2.56 54.35 393.09 6--3 -4.59 -97.28 341.87 Total cost -8.09 30.62 1317.48 Table VI: TEP with Security Constraints Cost allocation to Consumers/loads line L1 L2 L3 L4 L5 3--5 30.75 4.85 -7.35 10.11 161.64 6--2 47.38 225.31 23.73 11.23 142.34 6--4 43.27 52.18 10.51 264.29 79.74 6--3 32.60 10.09 36.21 -26.32 187.42 Total cost 154.00 292.44 63.10 259.31 571.14 distinction as base case expansion planning and planning against contingencies. The solutions (for both with and without constraints) were obtained for Modified Garver six bus system (Fig. 7) using MATLAB matched with that reported in [7]. Cost of transmission expansion planning under market environment is also discussed in this paper. Using distribution factors the cost of TEP and the cost of security enhancement has also been computed. The simplicity of the transmission expansion planning and the incentive based cost allocation are the advantages of the approach in the present paper.
  • 13. International Journal of Electrical Engineering and Technology (IJEET), ISSN 0976 – 6545(Print), ISSN 0976 – 6553(Online) Volume 5, Issue 7, July (2014), pp. 45-55 © IAEME 55 ACKNOWLEDGEMENT The author would like to express her heartfelt gratitude to Prof. K.R.M. Rao, Retd. Dean, Osmania University for his constant support and motivation. REFERENCES [1] L. L. Garver, “Transmission network estimation using linear programming,” IEEE Trans. on PAS, vol. PAS-89, no. 7, pp. 1688–1687, 1970. [2] J. C. Kaltenbatch, J. Peshon, and E. H. Gehrig, “A mathematical optimization technique for the expansion of electrical power transmission systems,” IEEE Trans. on PAS, vol. PAS-89, no. 1, pp. 113–119, 1970. [3] Y. P. Dusonchet and A. H. El-Abiad, “Transmission planning using discrete dynamic optimization,” IEEE Trans. on PAS, vol. PAS-92, pp. 1358–1371, 1973. [4] A. Monticelli, A. Santos Jr., M. V. F. Pereira, S. H. F. Cunha, J. G. Praga, and B. Park, “Interactive transmission network planning using a least-effort criterion,” IEEE Trans. on PAS, vol. PAS-l01, no. 10, pp.3919–3925, 1982. [5] M. V. F. Pereira, L. M. V. G. Pinto, S. H. F. Cunha, and G. C. Oliveira, “A decomposition approach to automated generation-transmission expansion planning,” IEEE Trans. on PAS, vol. PAS-104, no. 11, 1985. [6] R. Villasana, L. L. Garver, and S. J. Salon, “Transmission network planning using linear programming,” IEEE Trans. on PAS, vol. PAS-104, 1985. [7] A. Seifu, S. Salon, and G. List, “Optimization of transmission line planning including security constraints,” IEEE Trans. Power Syst., vol. 4, pp. 1507–1513, Oct. 1989. [8] E. L. da Silva, H. A. Gil, and J. M. Areiza, “Transmission network expansion planning under an improved genetic algorithm,” IEEE Trans. Power Syst., vol. 15, pp. 1168–1175, Aug. 2000. [9] R. A. Gallego, A. B. Alves, A. Monticelli, and R. Romero, “Parallel simulated annealing applied to long term transmission network expansion planning,” IEEE Trans. Power Syst., vol. 12, pp. 181–188, Feb. 1997. [10] Mohammad Shahidehpour, Hatim Yamin and Zuyi Li, “Market Operations in Electric Power Systems,” Wiley; 2002. [11] R. Romero, C. Rocha, M. Mantovani and J. R. S. Mantovani, “Analysis of heuristic algorithms for the transportation model in static and multistage planning in network expansion systems,” IEE Proc. Gener.Transm. Distrib., vol. 150, no. 5, pp. 521-526, Sep.2003 [12] L. Bahiense, G. C. Oliveira, M. Pereira, and S. Granville, “A mixed integer disjunctive model for transmission network expansion,” IEEE Trans. Power Syst., vol. 16, pp. 560–565, Aug. 2001. [13] S. Haffner, A. Monticelli, A. Garcia, J. Mantovani and R. Romero, “Branch and bound algorithm for transmission system expansion planning using transportation model,” IEE Proc. Gener. Transm. Distrib., vol. 147, no.3, pp. 149-156, May 2000. [14] Sepasian, M.S., Seifi, H., Foroud, A.A., Hatami, A.R.: ‘A multiyear security constrained hybrid generation-transmission expansion planning algorithm including fuel supply costs’, IEEE Trans. Power Syst., 2009, 24, (3), pp. 1609–1618. [15] Guguloth Ramesh and T. K. Sunil Kumar, “Power Flow Solution with Flexible AC Transmission System Devices”, International Journal of Electrical Engineering Technology (IJEET), Volume 4, Issue 4, 2013, pp. 232 - 244, ISSN Print : 0976-6545, ISSN Online: 0976-6553.