Prediction of Power System Security Levels
暂无分享,去创建一个
[1] V. Vittal,et al. Online Risk-Based Security Assessment , 2002, IEEE Power Engineering Review.
[2] Manuel A. Matos,et al. Multicontingency steady state security evaluation using fuzzy clustering techniques , 2000 .
[3] Robert M. Gray,et al. Image classification by a two dimensional hidden Markov model , 1999, 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258).
[4] A. Bose,et al. A fast voltage security assessment method using adaptive bounding , 1999, Proceedings of the 21st International Conference on Power Industry Computer Applications. Connecting Utilities. PICA 99. To the Millennium and Beyond (Cat. No.99CH36351).
[5] J. M. Nahman,et al. Security modeling for power system reliability evaluation , 2001 .
[6] V. Vittal,et al. Software Implementation of Online Risk-Based Security Assessment , 2002, IEEE Power Engineering Review.
[7] Alberto Berizzi,et al. A second order method for contingency severity assessment with respect to voltage collapse , 2000 .
[8] Francisco D. Galiana,et al. Probabilistic security analysis of bilateral transactions in a deregulated environment , 1999 .
[9] Tarlochan S. Sidhu,et al. Contingency screening for steady-state security analysis by using FFT and artificial neural networks , 2000 .
[10] James D. McCalley,et al. Online risk-based security assessment , 2002 .
[11] Vladik Kreinovich,et al. Multi-Criteria Optimization: An Important Foundation of Fuzzy System Design , 1998 .
[12] V. Vittal,et al. Annual Risk Assessment for Overload Security , 2001, IEEE Power Engineering Review.
[13] James D. McCalley,et al. Software implementation of online risk-based security assessment , 2002 .
[14] Samuel B. Richmond. Operations Research for Management Decisions , 1968 .
[15] J.D. McCalley,et al. Identifying high risk N-k contingencies for online security assessment , 2005, IEEE Transactions on Power Systems.
[16] Robert A. Schlueter,et al. Justification of the voltage stability security assessment and diagnostic procedure using a bifurcation subsystem method , 2000 .
[17] Aleksandar M. Stankovic,et al. A dynamic characterization of power system harmonics using Markov chains , 1998 .
[18] D.S. Kirschen,et al. A probabilistic indicator of system stress , 2004, IEEE Transactions on Power Systems.
[19] Lawrence R. Rabiner,et al. A tutorial on hidden Markov models and selected applications in speech recognition , 1989, Proc. IEEE.
[20] Sean R. Eddy,et al. Biological Sequence Analysis: Probabilistic Models of Proteins and Nucleic Acids , 1998 .
[21] Claudio A. Canizares,et al. Web-based security cost analysis in electricity markets , 2005 .
[22] M. Shahidehpour,et al. Security-constrained unit commitment for simultaneous clearing of energy and ancillary services markets , 2005, IEEE Transactions on Power Systems.
[23] Anjan Bose,et al. Contingency ranking based on severity indices in dynamic security analysis , 1999 .
[24] Carson W. Taylor,et al. Definition and Classification of Power System Stability , 2004 .
[25] S. Halilcevic,et al. An on-line determination of the ready reserve power , 1999 .
[26] Peter Green,et al. Markov chain Monte Carlo in Practice , 1996 .
[27] Bernd A. Berg. Markov Chain Monte Carlo Simulations and Their Statistical Analysis , 2004 .
[28] P. Kundur,et al. Definition and classification of power system stability IEEE/CIGRE joint task force on stability terms and definitions , 2004, IEEE Transactions on Power Systems.