Security constrained optimization-a case study (power system control)
暂无分享,去创建一个
[1] A. J. Elacqua,et al. Security Constrained Dispatch at the New York Power Pool , 1982, IEEE Power Engineering Review.
[2] A. Monticelli,et al. An integrated methodology for VAr sources planning , 1988 .
[3] Renato Lugtu,et al. Security Constrained Dispatch , 1979, IEEE Transactions on Power Apparatus and Systems.
[4] H. Happ,et al. Quadratically Convergent Optimal Power Flow , 1984, IEEE Transactions on Power Apparatus and Systems.
[5] W. Tinney,et al. Optimal Power Flow By Newton Approach , 1984, IEEE Transactions on Power Apparatus and Systems.
[6] O. Alsac,et al. Optimal Load Flow with Steady-State Security , 1974 .
[7] A. Monticelli,et al. Security-Constrained Optimal Power Flow with Post-Contingency Corrective Rescheduling , 1987, IEEE Transactions on Power Systems.
[8] H.H. Happ,et al. Large Scale Security Dispatching: an Exact Model , 1983, IEEE Transactions on Power Apparatus and Systems.
[9] H. Glavitsch,et al. Integrated security control using an optimal power flow and switching concepts , 1988 .
[10] B Stott,et al. Linear Programming for Power-System Network Security Applications , 1979, IEEE Transactions on Power Apparatus and Systems.
[11] V. F. Carvalho,et al. Assessment of Real-Time Optimal Voltage Control , 1986, IEEE Transactions on Power Systems.