Security constrained optimal power flow for the evaluation of transmission capability on Korea electric power system
暂无分享,去创建一个
Jong-Keun Park | Kwang-Myoung Son | D. Hur | Byeang Hyean Kim | Jong-keun Park | D. Hur | B.H. Kim | K. Son
[1] B. H. Kim,et al. A comparison of distributed optimal power flow algorithms , 2000 .
[2] Balho H. Kim,et al. A fast distributed implementation of optimal power flow , 1999 .
[3] H.J.C.P. Pinto,et al. Developing concurrent processing applications to power system planning and operations , 1989, Conference Papers Power Industry Computer Application Conference.
[4] Allen J. Wood,et al. Power Generation, Operation, and Control , 1984 .
[5] Ross Baldick,et al. Coarse-grained distributed optimal power flow , 1997 .
[6] O. Alsac,et al. Optimal Load Flow with Steady-State Security , 1974 .
[7] B Stott,et al. Linear Programming for Power-System Network Security Applications , 1979, IEEE Transactions on Power Apparatus and Systems.
[8] M.A. Tantawy,et al. Fast Technique for Power System Security Assessment Using Sensitivity Parameters of Linear Programming , 1984, IEEE Transactions on Power Apparatus and Systems.
[9] A. J. Elacqua,et al. Security Constrained Dispatch at the New York Power Pool , 1982, IEEE Power Engineering Review.
[10] H.H. Happ,et al. Large Scale Security Dispatching: an Exact Model , 1983, IEEE Transactions on Power Apparatus and Systems.
[11] A. Monticelli,et al. Security-Constrained Optimal Power Flow with Post-Contingency Corrective Rescheduling , 1987, IEEE Transactions on Power Systems.
[12] O. Alsac,et al. Security analysis and optimization , 1987, Proceedings of the IEEE.