Soft Computing Applications for Advancements in Power Systems

Soft Computing Applications for Advancements in Power Systems

River Publishers Series in Power

Soft Computing Applications for Advancements in Power Systems Forthcoming

Editors:
Vijay Kumar Sood, Ontario Tech University, Canada
Krishna Murari, The University of Toledo, Ohio, USA
Om Hari Gupta, National Institute of Technology Jamshedpur, India
Anupam Kumar, National Institute of Technology, Patna, India

ISBN: 9788770041416 e-ISBN: 9788770041119

Available: November 2024


This book discusses real applications of soft computing (SC) in power systems. These SC techniques, inspired by the human mind and biological behavior, have proven to be excellent tools to overcome the challenges faced in power systems and related areas. The techniques are robust and provide low-cost solutions while also offering an effective solution for studying and modeling the behavior of renewable energy generation, operation of grid-connected renewable energy systems, and sustainable decision-making among alternatives. The tolerance of SC techniques to imprecision, uncertainty, partial truth, and approximation makes them highly useful alternatives to conventional techniques.

The rapid growth in SC techniques plays an important role in powerful representation, modeling paradigms and optimization mechanisms for solving power system issues such as power quality, reactive power control, oscillation and stability problems, renewable energy resource evaluation, design of energy efficiency systems, economic load dispatch problems or very different energy system applications in smart grids.
Optimization, HVDC transmission, load flow, energy management systems, cyber-attacks, information security, smart grid, information and communication technology
  1. Introduction
  2. Soft Computing Techniques
  3. AC-DC Load Flow
  4. Load Flow
  5. Energy Management Systems for Optimal Energy Scheduling
  6. Topological
  7. HVDC Systems
  8. Smart Grid - A Cyber-Physical Infrastructure and Security
  9. Protection Challenges During Power Swing
  10. Conclusion