Microsoft Word - 21-3511_s_ETASR_V10_N3_pp5700-5705 Engineering, Technology & Applied Science Research Vol. 10, No. 3, 2020, 5700-5705 5700 www.etasr.com Duong & Nguyen: Application of Sunflower Optimization Algorithm for Solving the Security … Application of Sunflower Optimization Algorithm for Solving the Security Constrained Optimal Power Flow Problem Thanh Long Duong Faculty of Electrical Engineering Technology Industrial University of Ho Chi Minh City Ho Chi Minh City, Vietnam duongthanhlong@iuh.edu.vn Thuan Thanh Nguyen Faculty of Electrical Engineering Technology Industrial University of Ho Chi Minh City Ho Chi Minh City, Vietnam nguyenthanhthuan@iuh.edu.vn Abstract—Finding the Optimal Power Flow (OPF) which minimizes total generator cost is the answer to one of the most important problems in the electricity market operation. Independent System Operators (ISO) face many challenges while operating the system in order to obtain economic benefits and security. The solution to this problem is known as Security Constrained Optimal Power Flow (SCOPF). SCOPF is a very large-scale and nonlinear optimization problem with many complex constraints. This paper proposes the Sunflower Optimization (SFO) algorithm for solving the SCOPF problem. The proposed method is tested on the IEEE 30-bus and the IEEE 118-bus systems for both normal and outage cases. The result comparison with other known methods showed that the proposed SFO algorithm is an effective method for solving the SCOPF problem in the electricity market. Keywords-OPF; SCOPF; SFO, electricity market I. INTRODUCTION The restructuring of the electricity industry made the electrical energy a commodity. However the Independent System Operators (ISO) are facing many challenges in terms of system operation to obtain economic benefits and security. Various factors such as the expansion of the generation and transmission systems have not been in accordance with the increase in demand. Besides, the number of unplanned power exchanges increases and direct contracts between producers and consumers sometimes cause insecure operation of the system. Hence, power system security [1] has become one of the most important aspects in the electricity market operation [2]. This problem is known as the Security Constrained Optimal Power Flow (SCOPF) [3-5] which is an extension of the OPF problem [6] which is used to obtain an economical operation of the system while considering not only normal operating limits, but also violations that would occur during contingencies. The SCOPF changes the system’s pre- contingency operating point so that the total operating cost is minimized, and at the same time no security limit is violated if contingencies occur. Although the SCOPF still faces challenges related to computations, it is expected that it eventually become a standard tool in the electricity market [7]. Various mathematical programming solutions have been proposed to solve the SCOPF problem such as iterative approach [8], Benders decomposition approach [9], linear programming [10], quadratic programming [11], and interior point method [12]. Recently, many Artificial Intelligence algorithms have been proposed for solving optimization problems in power system [13-18]. Among them several approaches were used to deal with the SCOPF problem such as Particle Swarm Optimization (PSO) [16], Genetic Algorithm (GA) [17], and Evolutionary Programming (EP) [18]. In [19], a PSO approach was presented to solve an Optimal Power Flow (OPF) problem with embedded security constraints represented by a mixture of continuous and discrete control variables, where the major aim is to minimize the total operating cost, taking into account both operating security constraints and system capacity requirements. A new robust differential evolution algorithm for SCOPF, considering detailed generator model is presented in [20], in which a hybrid constraint handling method has been proposed to enhance the diversity of the search process and increases the chance of finding the optimum solution. In [21], the authors presented a Self- Organizing Hierarchical PSO with Time-Varying Acceleration Coefficients (SOHPSO-TVAC) for dealing with the SCOPF problem, which was designed to avoid premature convergence. The SCOPF problem has been solved in [22] with the use of Adaptive Flower Pollination Algorithm (APFPA), where the control variables are optimized based on an adaptive and flexible structure which allows creating diversity and balance between exploration and exploitation during the search process. In this paper, the Sunflower Optimization (SFO) algorithm [23] is proposed for solving the SCOPF problem. SFO algorithm is inspired by nature and is classified as an iterative, population-based, meta-heuristic optimization technique for multidimensional problems. The sunflowers operate in a cycle. In the morning they stir and follow the sun throughout the day. At evening, they move in the opposite direction and wait until the next morning. A population of flowers is created in a direction and takes random steps towards the sun based on their position. The proposed SFO algorithm is able to find a global optimal solution, without stucking in local optimal solutions. The advantage of the SFO algorithm is that it does not need Corresponding author: Thanh Long Duong Engineering, Technology & Applied Science Research Vol. 10, No. 3, 2020, 5700-5705 5701 www.etasr.com Duong & Nguyen: Application of Sunflower Optimization Algorithm for Solving the Security … derivatives when evaluating the objective function [24]. The proposed method is tested on the IEEE 30-bus and the IEEE 118-bus systems, and the results are compared with the results of other known methods. II. OBJECTIVE FUNCTION The SCOPF problem is a very large-scale and nonlinear optimization problem with many complex constraints. The SCOPF problem consists of optimizing the total generator fuel- cost function, subject to power-balance and inequality constraints of the base-case state and the contingency-case states [3]. Mathematically, the SCOPF problem can be formulated as follows: Min f(x, u) (1) subject to the equality and inequality constraints of the normal case (2)-(3) and the outage case (4)-(5): g(x, u) = 0 (2) h(x, u) ≤ 0 (3) g(x c , u c ) = 0 (4) h(x c , u c ) ≤ 0 (5) where F is the fuel cost function of the generator, x is the vector of control variables, u is the vector of state variables, g(.) is the set of equality constraints, h(.) is the set of the inequality constraints, and c is the set of outage lines. The detailed model of the problem is formulated as follows: 1 Min ( ) gN i Gi i f f P = = ∑ (6) where fi(PGi) is the fuel cost function of generator i : 2 ( ) i Gi i i Gi i Gi f P a b P c P= + + (7) where PGi is the power output of generator i and ai, bi, ci, are cost coefficients. The equality and inequality constraints for the normal and outage cases are: • Power balance constraints: 1 | | | || | cos( ) bN Gi Di i ij j i j ij j P P V Y V δ δ θ = − = − −∑ (8) 1 | | | || | sin( ) bN Gi Di i ij j i j ij j Q Q V Y V δ δ θ = − = − −∑ (9) where QGi is the reactive power output of generator i, PDi and QDi are the active and reactive power demands at bus i respectively, i=1, 2,…, Nb, Nb is the number of buses in the system, |Vi|∠δi and |Vj|∠δj are the voltage at buses i and j, respectively, and |Yij|∠θij is an element in Ybus matrix related to buses i and j. • Power generation limits: max,GiGimin,Gi PPP ≤≤ (10) max,GiGimin,Gi QQQ ≤≤ (11) where PGi,max is the maximum active power output of generator i, QGi,min and QGi,max are the minimum and maximum reactive power outputs of generator i, i=1, 2, …, NG, and NG is the number of generators. • Bus voltage limits: max,GiGimin,Gi VVV ≤≤ , i = 1, 2, …, NG (12) max,lilimin,li VVV ≤≤ , i = 1, 2, …, Nd (13) • Transmission line limits: max,ll SS ≤ , l = 1, 2, …, Nl (14) VGi is the voltage at generation bus i, Vli is the voltage at load bus i, VGi,max and VGi,min are the maximum and minimum voltages at generation bus i respectively, Vli,max and Vli,min are the maximum and minimum voltages at load bus i respectively, and Nd is the number of load buses. III. APPLICATION OF THE SFO ALGORITHM The flowchart of the process of applying the SFO for solving the SCOPF problem is shown in Figure 1. Its steps are presented below. Step 1: Read the power system data and select control parameters such as mortality rate m, population size n, pollination rate p, and maximum iteration number maxi.tr Step 2: Initialize a population of n individuals: Each individual contains a vector of control variables represented by: 2 3 1 2 1 2 [ , ,..., , , ,..., , , ,..., ] 1,..., G Gi G G GN G G GN c c N X P P P V V V Q Q Q i n = = (15) Each individual in the population is initialized by: (0) min max min 1 *( ) i i i i X X rand X X= + − (16) where Xi max and Xi min are the upper and lower limits of each individual and rand1 is a random numbers in the range [0,1]. Step 3: Evaluation of the initialized population: The power flow problem is solved for the initialized population and the obtained result is used to evaluate the quality of the initialized population via calculating the fitness function including the outage case: lim 2 0 1 1 1 lim 2 lim 2 0 0 1 1 2 0 ,max 1 lim, lim, 2 1 1 1 lim, 2 2 ,max, 1 1 ( ) *( ) * ( ) * ( ) * ( ) *( ) * ( ) * ( ) * ( ) G g d l g d l N f i Gi p G G i N N q Gi Gi v li li i i N s l l l N c c p G G q Gi Gi i N N c v li li s l l c i l F f P K P P K Q Q K V V K S S K P P K Q Q K V V K S S = = = = = = = = + − + − + − + −  − + − + + − + −  ∑ ∑ ∑ ∑ ∑ ∑ ∑ 1 cN c=           ∑ (17) Engineering, Technology & Applied Science Research Vol. 10, No. 3, 2020, 5700-5705 5702 www.etasr.com Duong & Nguyen: Application of Sunflower Optimization Algorithm for Solving the Security … Step 4: Individuals adjustment: Each individual (sunflower) adjust its position towards the best solution (sun) as shown in (18): * * , 1,2....,i i i X X s i n X X − = = − � (18) where X* is the overall best solution with the corresponding best fitness function Ff in the population, and Xi is the current solution. The furthest individuals are eliminated. Step 5: Solve the power flow problem for each individual after adjusting its position and update the best fitness value. Step 6: Individuals movements and update: The step of each individual towards the best individual is calculated in (19) and the individuals update their positions as shown in (20). ( )1 1i i i i i id P X X X Xλ − −= × + × + (19) 1i i i i X X d s+ = + × � � (20) Step 7: Evaluate the new individuals: The power flow problem is solved for the new population Xi (n) and the obtained result is used to calculate the fitness function Ff (n) in (17). Step 8: Accept the new individuals if their fitness function value is better than the current values. Step 9: Check the stopping criteria. If n < Nmax, n = n + 1 then return to Step 4, otherwise, stop. Fig. 1. The flowchart of the proposed process IV. RESULTS The proposed SFO algorithm has been tested on the IEEE 30-bus and the IEEE 118-bus systems for both normal and outage cases. The IEEE 30-bus test system is composed of 6 generators at buses 1, 2, 5, 8, 11, and 13, four transformers and 41 transmission lines as shown in Figure 2. The total system demand was 283.4MW and 126.6Mvar. The bus and branch data with the fuel cost coefficients are given in [4, 31]. For the outage cases, the 5-outage lines 1, 2, 3, 5, and 7 are considered. The IEEE 118-bus system consists of 118 buses, 186 branches, 99 load sides, 54 thermal units, and 9 transformers. In the outage cases, outages of lines 21 and 50 were considered. The data of the system are derived from [25, 32]. For the implementation of the proposed method, the control parameters of the proposed SFO for the test system are selected experimentally as follows. The population number n is set to 15, the mortality rate m to 0.1, the pollination rate p to 0.05, and all penalty factors to 10 6 . The number of iterations is set to 300 for the normal case, and 400 for the case with 5 outage lines. The proposed SFO method was coded in Matlab 2014a and Matpower platform, and ran in a Microsoft Windows 7 PC with Intel(R) Core(TM)2 Duo CPU @ 2.0 GHz with 2 GB Random Access Memory (RAM). Fig. 2. The IEEE 30-bus system A. Simulation Results of the IEEE 30-Bus Test System 1) Normal Case The obtained results from the proposed SFO have been compared with the ones from other methods such as Tabu Search (TS) [26], Evolutionary Programming (EP) [27], DE [28], pSADE_ALM [29], PSO, PSO-TVIW and SOHPSO- TVAC [21, 30], hybrid DA-PSO [31]. The solutions of all methods for the normal case are given in Table I. It can be seen that the total cost obtained by the proposed method is Engineering, Technology & Applied Science Research Vol. 10, No. 3, 2020, 5700-5705 5703 www.etasr.com Duong & Nguyen: Application of Sunflower Optimization Algorithm for Solving the Security … 802.01$/h which is close to the other methods’. As observed from Figure 3, the SFO method has the ability to converge quickly and can reach an optimum solution. From the results comparison it was shown that the proposed SFO is able to find the optimal solution for the OPF problem in the normal case. TABLE I. RESULT COMPARISON FOR THE NORMAL CASE Algorithm Cost ($/h) Time (s) TS [26] 802.29 NA EP [27] 802.62 51.4 DE [28] 802.28 5.02 SADE_ALM [29] 802.40 15.934 pSADE_ALM [29] 802.40 17.295 PSO [30] 802.58 28.208 PSO-TVAC [30] 802.67 11.255 PG-PSO [30] 802.25 11.416 BPSO [21] 803.13 35.15 PSO-TVIW [21] 802.11 33.756 PSO-TVAC [21] 803.56 35.82 SOHPSO-TVAC [21] 802.03 29.43 DA-PSO [31] 802.12 287.13 Proposed SFO 802.01 77.64 Fig. 3. Convergence characteristics of the SFO algorithm for the IEEE 30- bus system in the normal case 2) Outage Case Fig. 4. Convergence characteristics of the SFO algorithm for the IEEE 30- bus system in the outage case In a power system, if a line is corrupted, its power flow will be shared among the other lines of the system. This will lead to possible overloading of some of the lines. Among the 41 lines in the IEEE 30 bus system, the scenario considers five outage lines that have larger effect on the remaining lines. The optimal solution obtained by the SFO method for the outage cases is given in Table II. The best cost from the SFO method has been compared to those of other known methods in Table II. It can be seen that the total cost obtained by the proposed method was 826.245 which is approximate to the costs obtained from SADE_ALM, pSADE_ALM [29] methods and slightly better than the costs obtained from PSO and PSO-TVAC [30] methods. From Figure 3, it can be seen that the SFO method has the ability to converge quickly and can find the best solution. The result comparison has proved that the proposed SFO is also effective in solving the problem in the outage case. TABLE II. RESULT COMPARISON FOR THE CASE OF 5 OUTAGE LINES Algorithm Cost ($) Time (s) SADE_ALM [29] 826.979 46.896 pSADE_ALM [29] 826.242 119.812 PSO [30] 827.186 175.245 PSO-TVAC [30] 828.012 130.59 Proposed SFO 826.245 95.332 B. Simulation Results of the IEEE 118-Bus Test System Table III gives the fuel costs obtained by SFO and the other optimization techniques in the normal and outage cases under the same conditions. It can be seen that the obtained total fuel cost using SFO in the normal case is 133232.24$/h and for the outage case it is increased by 1238.33$/h. From Table III, it can also be observed that the results using SFO can reach a better solution when compared with many of the other known methods. TABLE III. RESULT COMPARISON FOR THE IEEE-118 BUS SYSTEM Algorithm Cost ($/h) Normal case Outage case ICBO [32] 135121.57 136353.31 CBO [32] 135072.99 135297.22 ECBO [32] 135172.26 135582.15 DE [32] 142751.11 158920.80 ABC [32] 135145.18 135759.01 BBO [32] 135272.19 135640.64 Proposed SFO 133232.24 134470.57 Figures 5 and 6 show the convergence characteristics of the minimum fuel cost of the SFO. It can be observed that the SFO has the ability to converge quickly and can find an optimum solution. Fig. 5. Convergence characteristics of the SFO algorithm for the IEEE 118-bus system in the normal case 50 100 150 200 250 300 800 805 810 815 820 825 830 835 840 845 850 Number of Iterations F it n e ss F u n c ti o n ( $ /h ) 0 50 100 150 200 250 300 350 400 0 0.5 1 1.5 2 2.5 3 3.5 x 10 8 Number of Iterations F it n e s s F u n c ti o n ( $ /h ) 10 20 30 40 50 0 1 2 3 4 x 10 7 10 0 10 1 10 2 1.32 1.34 1.36 1.38 1.4 1.42 1.44 1.46 x 10 5 Number of iterations = 500 F it n e s s f u n c ti o n ( $ /h ) Engineering, Technology & Applied Science Research Vol. 10, No. 3, 2020, 5700-5705 5704 www.etasr.com Duong & Nguyen: Application of Sunflower Optimization Algorithm for Solving the Security … Fig. 6. Convergence characteristics of the SFO algorithm for the IEEE 118-bus system in the outages case V. CONCLUSION The competitiveness of the electricity market leads to an increased volume of traded electrical energy between generator and distribution companies which may cause unpredicted power flow through some transmission lines. This may lead to situations in which the transmission network is not able to accommodate all the desired transactions due to violations of some system security constraints. Thus, the Independent System Operators are facing many challenges in terms of normal system operation while trying to obtain economic benefits and security. SCOPF is a nonlinear optimization problem with many complex constraints. This paper proposes the Sunflower Optimization (SFO) algorithm for solving the SCOPF problem. The proposed method has been tested on the IEEE 30-bus and IEEE 118-bus systems for normal and outage cases. The result comparison revealed that the proposed SFO is capable of providing better solution quality than many other optimization approaches. Therefore, the proposed SFO can be an extremely effective alternative approach for solving the SCOPF problem. REFERENCES [1] P. Kundur, J. Paserba, V. Ajjarapu, G. Andersson, A. Bose, C. Canizares, N. Hatziargyriou, D. Hill, A. Stankovic, C. Taylor, T. V. Cutsem, V. Vittal, “Definition and classification of power system stability IEEE/CIGRE Joint Task Force on Stability Terms and Definitions”, IEEE Transactions on Power Systems, Vol. 19, No. 3, pp. 1387–1401, 2004 [2] V. J. G. Martinez, C. A. Canizares, C. R. F. Esquivel, A. P. Martinez, X. Gu, “Neural-network security-boundary constrained optimal power flow”, IEEE Transactions on Power Systems, Vol. 26, No. 1, pp. 63-72, 2010 [3] T. L. Duong, Y. J. Gang, V. A. Truong, “A new method for secured optimal power flow under normal and network contingencies via optimal location of TCSC”, International Journal of Electrical Power & Energy Systems, Vol. 52, pp. 68–80, 2013 [4] O. Alsac, B. Stott, “Optimal load flow with steady-state security”, IEEE Transactions on Power Apparatus and Systems, Vol. 93, No. 3, pp. 745– 751, 1974 [5] T. L. Duong, Y. J. Gang, V. A. Truong, “Improving the transient stability-constrained optimal power flow with Thyristor Controlled Series Compensators”, Russian Electrical Engineering, Vol. 85, No. 12, pp. 777–784, 2014 [6] H. W. Dommel, W. F. Tinney, “Optimal power flow solutions”, IEEE Transactions on Power Apparatus and Systems, Vol. 87, No. 10, pp. 1866–1876, 1968 [7] F. Capitanescu, J. L. M. Ramos, P. Panciatici, D. Kirschen, A. M. Marcolini, L. Platbrood, L. Wehenkel, “State-of-the-art, challenges, and future trends in security constrained optimal power flow”, Electric Power Systems Research, Vol. 81, No. 8, pp. 1731–1741, 2011 [8] F. Capitanescu, L. Wehenkel, “A new iterative approach to the corrective security-constrained optimal power flow problem”, IEEE Transactions on Power Systems, Vol. 23, No. 4, pp. 1533-1541, 2008 [9] Y. Li, J. D. McCalley, “Decomposed SCOPF for improving efficiency”, IEEE Transactions on Power Systems, Vol. 24, No. 1, pp. 494–495, 2009 [10] M. R. Babu, D. Harini, “LP based solution for security constrained optimal power flow”, Second International Conference on Science Technology Engineering and Management, Chennai, India, March 30- 31, 2016 [11] R. S. Wibowo, R. Maulana, A. Taradini, F. A. Pamuji, A. Soeprijanto, O. Penangsang, “Quadratic programming approach for security constrained optimal power flow”, 7th International Conference on Information Technology and Electrical Engineering, Chiang Mai, Thailand, October 29-30, 2015 [12] A. T. D. Azevedo, C. A. Castro, A. R. L. Oliveira, S. Soares, “Security constrained optimal active power flow via network model and interior point method”, Revista Controle and Automacao, Vol. 20, No. 2, pp 206-216, 2009 [13] T. L. Duong, T. T. Nguyen, N. A. Nguyen, L. A. T. Nguyen, “An effective method for maximizing social welfare in electricity market via optimal TCSC installation”, Engineering, Technology & Applied Science Research, Vol. 9, No. 6, pp. 4946-4955, 2019 [14] T. L. Duong, T. T. Nguyen, N. A. Nguyen, T. Kang, “Available transfer capability determination for the electricity market using cuckoo search algorithm”, Engineering, Technology & Applied Science Research, Vol. 10, No. 1, pp. 5340-5345, 2020 [15] T. L. Duong, T. T. Nguyen, “Network reconfiguration for an electric distribution system with distributed generators based on symbiotic organisms search”, Engineering, Technology & Applied Science Research, Vol. 9, No. 6, pp. 4925-4932, 2019 [16] P. E. O. Yumbla, J. M. Ramirez, C. A. C. Coello, “Optimal power flow subject to security constraints solved with a particle swarm optimizer”, IEEE Transactions on Power Systems, Vol. 23, No. 1, pp. 33-40, 2008 [17] L. L. Lai, J. T. Ma, R. Yokoyama, M. Zhao, “Improved genetic algorithms for optimal power flow under both normal and contingent operation states”, International Journal of Electrical Power & Energy Systems, Vol. 19, No. 5, pp. 287-292, 1997 [18] P. Somasundaram, K. Kuppusamy, R. P. K. Devi, “Evolutionary programming based security constrained optimal power flow”, Electric Power Systems Research, Vol. 72, No. 2, pp. 137–145, 2004 [19] P. E. O. Yumbla, J. M. Ramirez, C. A. C. Coello, “Optimal power flow subject to security constraints solved with a particle swarm optimizer”, IEEE Transactions on Power Systems, Vol. 23, No. l, pp. 33-40, 2008 [20] N. Amjady, H. Sharifzadeh, “Security constrained optimal power flow considering detailed generator model by a new robust differential evolution algorithm”, Electric Power Systems Research, Vol. 81, No. 2, pp. 740–749, 2011 [21] J. Polprasert, W. Ongsakul, D. V. Ngoc, “Security constrained optimal power flow using self-organizing hierarchical PSO with time-varying acceleration coefficients”, Global Journal of Technology and Optimization, Vol. 5, No. 1, Article ID 1000163, 2014 [22] B. Mahdad, K. Srairi, “Security constrained optimal power flow solution using new adaptive partitioning flower pollination algorithm”, Applied Soft Computing, Vol. 46, No. 9, pp. 501-522, 2016 [23] G. F. Gomes, S. S. D. Cunha, A. C. Ancelotti, “A Sunflower Optimization (SFO) algorithm applied to damage identification on laminated composite plates”, Engineering with Computers, Vol. 35, No, 5, pp. 619-626, 2018 [24] M. A. M. Shaheen, H. M. Hasanien, S. F. Mekhamer, H. E. A. Talaat, “Optimal power flow of power systems including distributed generation units using sunflower optimization algorithm”, IEEE Access, Vol. 7, pp. 109289-109300, 2019 10 0 10 1 10 2 1.34 1.36 1.38 1.4 1.42 1.44 1.46 1.48 1.5 x 10 5 Number of iterations = 500 F it n e s s f u n c ti o n ( $ /h ) Engineering, Technology & Applied Science Research Vol. 10, No. 3, 2020, 5700-5705 5705 www.etasr.com Duong & Nguyen: Application of Sunflower Optimization Algorithm for Solving the Security … [25] R. D. Zimmerman, C. E. Murillo-Sanchez, Matpower 4.0: User’s manual, Power Systems Engineering Research Center, 2011 [26] M. A. Abido, “Optimal power flow using Tabu search algorithm”, Electric Power Components and Systems, Vol. 30, No. 5, pp. 469-483, 2002 [27] W. Ongsakul, T. Antimaporn, “Optimal power flow by improved evolutionary programming”, Electric Power Components and Systems, Vol. 34, No. 1, pp. 79–95, 2006 [28] S. Sayah, K. Zehar, “Modified differential evolution algorithm for optimal power flow with non-smooth cost functions”, Energy Conversion and Management, Vol. 49, No. 11, pp. 3036–3042, 2008 [29] C. Thitithamrongchai, B. E. Arporn, “Security-constrained optimal power flow: A parallel self-adaptive differential evolution approach”, Electric Power Components and Systems, Vol. 36, No. 3, pp. 280-298, 2008 [30] V. N. Dieu, K. P. Nguyen, G. Fujita, M. N. Muhtazaruddin, D. A. Le, “Pseudo-gradient based particle swarm optimization for security constrained optimal power flow”, International Symposium on Antennas & Propagation, Nanjing, China, October 23-25, 2013 [31] S. Khunkitti, A. Siritaratiwat, S. Premrudeepreechacharn, R. Chatthaworn, N. R. Watson, “A hybrid DA-PSO optimization algorithm for multiobjective optimal power flow problems”, Enegies, Vol. 11, No. 9, Article ID 2270, 2018 [32] H. R. E. H. Bouchekara, A. E. Chaib, M. A. Abido, R. A. E. Sehiemy, “Optimal power flow using an improved colliding bodies optimization algorithm”, Applied Soft Computing, Vol. 42, pp. 119–131, 2016