A method for evaluating robust power system security against uncertainties
暂无分享,去创建一个
Naoto Yorino | Yutaka Sasaki | Muhammad Abdillah | Yoshifomi Zoka | N. Yorino | Y. Sasaki | M. Abdillah | Y. Zoka
[1] Eric Hobson,et al. Power System Security Control Calculations Using Linear Programming, Part II , 1978, IEEE Transactions on Power Apparatus and Systems.
[2] F.D. Galiana,et al. Power System Security Corridors Concept and Computation , 1981, IEEE Transactions on Power Apparatus and Systems.
[3] L. Wehenkel,et al. Security management under uncertainty: From day-ahead planning to intraday operation , 2010, 2010 IREP Symposium Bulk Power System Dynamics and Control - VIII (IREP).
[4] Naoto Yorino,et al. Issues for power system operation for future renewable energy penetration: Robust power system security , 2011 .
[5] H. Sasaki,et al. A New Formulation for FACTS Allocation for Security Enhancement against Voltage Collapse , 2002, IEEE Power Engineering Review.
[6] M. Shahidehpour,et al. Security-Constrained Unit Commitment With AC/DC Transmission Systems , 2010, IEEE Transactions on Power Systems.
[7] Naoto Yorino,et al. Dynamic load dispatch for power system robust security against uncertainties , 2013, 2013 IREP Symposium Bulk Power System Dynamics and Control - IX Optimization, Security and Control of the Emerging Power Grid.
[8] Essam A. Al-Ammar,et al. Application of operating security regions in power systems , 2010, IEEE PES T&D 2010.
[9] Sydulu Maheswarapu,et al. Security Constraint Optimal Power Flow (SCOPF) – A Comprehensive Survey , 2010 .
[10] V. Vittal,et al. Online Risk-Based Security Assessment , 2002, IEEE Power Engineering Review.
[11] Hongbo Sun,et al. Flexible steady-state security region of power system with uncertain load demand and soft security limits , 2000, 2000 Power Engineering Society Summer Meeting (Cat. No.00CH37134).
[12] Naoto Yorino,et al. An application of robust power system security to power system operation for high-penetration of PV , 2012, 2012 3rd IEEE PES Innovative Smart Grid Technologies Europe (ISGT Europe).
[13] Hiroshi Sasaki,et al. A solution of optimal power flow with multicontingency transient stability constraints , 2003 .
[14] G. Irisarri,et al. An Automatic Contingency Selection Method for On-Line Security Analysis , 1981, IEEE Transactions on Power Apparatus and Systems.
[15] O. Alsac,et al. Security analysis and optimization , 1987, Proceedings of the IEEE.
[16] Goran Andersson,et al. N-1 security in optimal power flow control applied to limited areas , 2009 .
[17] A. Conejo,et al. Market-clearing with stochastic security-part I: formulation , 2005, IEEE Transactions on Power Systems.
[18] B Stott,et al. Linear Programming for Power-System Network Security Applications , 1979, IEEE Transactions on Power Apparatus and Systems.
[19] L. Wehenkel,et al. Contingency Ranking With Respect to Overloads in Very Large Power Systems Taking Into Account Uncertainty, Preventive, and Corrective Actions , 2013, IEEE Transactions on Power Systems.
[20] Naoto Yorino Senior Member,et al. A new method of evaluating robust power system security against uncertainties , 2015 .
[21] H.H. Happ,et al. Large Scale Security Dispatching: an Exact Model , 1983, IEEE Transactions on Power Apparatus and Systems.
[22] Naoto Yorino,et al. A new method of evaluating robust power system security against uncertainties , 2015 .
[23] A. Monticelli,et al. Security-Constrained Optimal Power Flow with Post-Contingency Corrective Rescheduling , 1987, IEEE Transactions on Power Systems.
[24] Michael Power. Stochastic power system operation , 2010 .
[25] H. Kodama,et al. On-Line Contingency Selection Algorithm for Voltage Security Analysis , 1985, IEEE Transactions on Power Apparatus and Systems.