Renewable energy inclusion on economic power optimization using thunderstorm algorithm

A. N. Afandi, Goro Fujita, Nguyen Phuc Khai, Yunis Sulistyorini, Nedim Tutkun

Research output: Chapter in Book/Report/Conference proceedingConference contribution

19 Citations (Scopus)

Abstract

This paper presents an economic operation considered renewable energy which is optimized using thunderstorm algorithm. The problem is constrained by an emission standard and various technical limits implemented on the 62-bus system model. Simulations showed that the renewable energy inclusion penetrates to the unit commitment of generating units with strongly approach for the computational solution. This inclusion also affects to the individual power production in accordance to the fuel cost and pollutant discharge.

Original languageEnglish
Title of host publicationProceedings - 2017 4th International Conference on Electrical Engineering, Computer Science and Informatics, EECSI 2017
EditorsHatib Rahmawan, Mochammad Facta, Munawar A. Riyadi, Deris Stiawan
PublisherInstitute of Advanced Engineering and Science
ISBN (Electronic)9781538605486
DOIs
Publication statusPublished - 2017 Dec 22
Event4th International Conference on Electrical Engineering, Computer Science and Informatics, EECSI 2017 - Yogyakarta, Indonesia
Duration: 2017 Sept 192017 Sept 21

Publication series

NameInternational Conference on Electrical Engineering, Computer Science and Informatics (EECSI)
Volume2017-December
ISSN (Print)2407-439X

Other

Other4th International Conference on Electrical Engineering, Computer Science and Informatics, EECSI 2017
Country/TerritoryIndonesia
CityYogyakarta
Period17/9/1917/9/21

Keywords

  • Economic operation
  • Pollutant emission
  • Renewable energy
  • Thunderstorm algorithm

ASJC Scopus subject areas

  • Computer Science (miscellaneous)
  • Information Systems
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Renewable energy inclusion on economic power optimization using thunderstorm algorithm'. Together they form a unique fingerprint.

Cite this