Probabilistic N‐k failure‐identification for power systems
暂无分享,去创建一个
Russell Bent | Harsha Nagarajan | Carleton Coffrin | Kaarthik Sundar | Carleton Coffrin | Harsha Nagarajan | R. Bent | K. Sundar
[1] Saleh Soltan,et al. Quantifying the effect of k-line failures in power grids , 2016, 2016 IEEE Power and Energy Society General Meeting (PESGM).
[2] M. Enns,et al. Fast Linear Contingency Analysis , 1982, IEEE Transactions on Power Apparatus and Systems.
[3] R. Jabr. Radial distribution load flow using conic programming , 2006, IEEE Transactions on Power Systems.
[4] J. Salmeron,et al. Worst-Case Interdiction Analysis of Large-Scale Electric Power Grids , 2009, IEEE Transactions on Power Systems.
[5] Daniel Bienstock,et al. The N-k Problem in Power Grids: New Models, Formulations, and Numerical Experiments , 2009, SIAM J. Optim..
[6] Jeff T. Linderoth,et al. Reformulation and sampling to solve a stochastic network interdiction problem , 2008, Networks.
[7] Mohammad Shahidehpour,et al. The IEEE Reliability Test System-1996. A report prepared by the Reliability Test System Task Force of the Application of Probability Methods Subcommittee , 1999 .
[8] S. Oren,et al. Bound Tightening for the Alternating Current Optimal Power Flow Problem , 2016, IEEE Transactions on Power Systems.
[9] T. J. Overbye,et al. Multiple Element Contingency Screening , 2011, IEEE Transactions on Power Systems.
[10] Jeff T. Linderoth,et al. Reformulation and sampling to solve a stochastic network interdiction problem , 2008 .
[11] Rogelio E. Alvarez. Interdicting Electrical Power Grids , 2004 .
[12] Russell Bent,et al. Resilient Transmission Grid Design: AC Relaxation vs. DC approximation , 2017, ArXiv.
[13] Stephen J. Wright,et al. Analyzing Vulnerability of Power Systems with Continuous Optimization Formulations , 2016, IEEE Transactions on Network Science and Engineering.
[14] Ian A. Hiskens,et al. Moment-based relaxation of the optimal power flow problem , 2013, 2014 Power Systems Computation Conference.
[15] Dusko P. Nedic,et al. Simulation Of Large System Disturbances , 2003 .
[16] Pascal Van Hentenryck,et al. Convex quadratic relaxations for mixed-integer nonlinear programs in power systems , 2016, Mathematical Programming Computation.
[17] Qiang Qiang,et al. A unified network performance measure with importance identification and the ranking of network components , 2007, Optim. Lett..
[18] F.D. Galiana,et al. A mixed-integer LP procedure for the analysis of electric grid security under disruptive threat , 2005, IEEE Transactions on Power Systems.
[19] K. Fujisawa,et al. Semidefinite programming for optimal power flow problems , 2008 .
[20] Carleton Coffrin,et al. The QC Relaxation: A Theoretical and Computational Study on Optimal Power Flow , 2017, IEEE Transactions on Power Systems.
[21] David P. Morton,et al. Stochastic Network Interdiction , 1998, Oper. Res..
[22] Pascal Van Hentenryck,et al. AC-Feasibility on Tree Networks is NP-Hard , 2014, IEEE Transactions on Power Systems.
[23] Lorenz T. Biegler,et al. On the implementation of an interior-point filter line-search algorithm for large-scale nonlinear programming , 2006, Math. Program..
[24] Vicki M. Bier,et al. Methodology for identifying near-optimal interdiction strategies for a power transmission system , 2007, Reliab. Eng. Syst. Saf..
[25] Pascal Van Hentenryck,et al. Primal and dual bounds for Optimal Transmission Switching , 2014, 2014 Power Systems Computation Conference.
[26] Abhinav Verma,et al. Power grid security analysis: an optimization approach , 2010 .
[27] Juan C. Meza,et al. Optimization Strategies for the Vulnerability Analysis of the Electric Power Grid , 2010, SIAM J. Optim..
[28] J. Arroyo,et al. On the solution of the bilevel programming formulation of the terrorist threat problem , 2005, IEEE Transactions on Power Systems.
[29] J. Salmeron,et al. Analysis of electric grid security under terrorist threat , 2004, IEEE Transactions on Power Systems.
[30] Paul Hines,et al. A “Random Chemistry” Algorithm for Identifying Collections of Multiple Contingencies That Initiate Cascading Failure , 2012, IEEE Transactions on Power Systems.
[31] R. Kevin Wood,et al. Shortest‐path network interdiction , 2002, Networks.
[32] Natalia Alguacil,et al. Analysis of Electric Grid Interdiction With Line Switching , 2010, IEEE Transactions on Power Systems.
[33] Gerald G. Brown,et al. Defending Critical Infrastructure , 2006, Interfaces.
[34] Russell Bent,et al. PowerModels.J1: An Open-Source Framework for Exploring Power Flow Formulations , 2017, 2018 Power Systems Computation Conference (PSCC).
[35] Chao Yang,et al. Severe Multiple Contingency Screening in Electric Power Systems , 2008, IEEE Transactions on Power Systems.
[36] David P. Morton,et al. A Stochastic Program for Interdicting Smuggled Nuclear Material , 2003 .
[37] Jose M. Arroyo,et al. Bilevel programming applied to power system vulnerability analysis under multiple contingencies , 2010 .
[38] Jose M. Arroyo,et al. Application of a genetic algorithm to n-K power system security assessment , 2013 .
[39] Xin-She Yang,et al. Introduction to Algorithms , 2021, Nature-Inspired Optimization Algorithms.