Security Constrained Optimal Power Flow via proximal message passing
暂无分享,去创建一个
[1] B. H. Kim,et al. A comparison of distributed optimal power flow algorithms , 2000 .
[2] Jonathan Eckstein. Parallel alternating direction multiplier decomposition of convex programs , 1994 .
[3] J. Lavaei,et al. Network Topologies Guaranteeing Zero Duality Gap for Optimal Power Flow Problem , 2013 .
[4] Stephen P. Boyd,et al. Distributed Optimization and Statistical Learning via the Alternating Direction Method of Multipliers , 2011, Found. Trends Mach. Learn..
[5] M. Fortin,et al. Augmented Lagrangian methods : applications to the numerical solution of boundary-value problems , 1983 .
[6] O. Alsac,et al. Security analysis and optimization , 1987, Proceedings of the IEEE.
[7] Stephen P. Boyd,et al. Dynamic Network Energy Management via Proximal Message Passing , 2013, Found. Trends Optim..
[8] Euhanna Ghadimi,et al. On the Optimal Step-size Selection for the Alternating Direction Method of Multipliers* , 2012 .
[9] R. Glowinski,et al. Sur l'approximation, par éléments finis d'ordre un, et la résolution, par pénalisation-dualité d'une classe de problèmes de Dirichlet non linéaires , 1975 .
[10] S. Low,et al. Zero Duality Gap in Optimal Power Flow Problem , 2012, IEEE Transactions on Power Systems.
[11] Ross Baldick,et al. Coarse-grained distributed optimal power flow , 1997 .
[12] D. Gabay. Applications of the method of multipliers to variational inequalities , 1983 .
[13] M. B. Cain,et al. History of Optimal Power Flow and Formulations , 2012 .
[14] Masao Fukushima,et al. Some Reformulations and Applications of the Alternating Direction Method of Multipliers , 1994 .