Investigation on Security Constrained Optimal Power Flows using Meta-heuristic Techniques | IEEE Conference Publication | IEEE Xplore