Static Security Assessment and Control : a Short Survey

[1]  S. Granville Optimal reactive dispatch through interior point methods , 1994 .

[2]  R. Fischl,et al.  An Algorithm for Automatically Tuning the Weights of Performance Indices for Monitoring Power System Loading or Security , 1986, IEEE Transactions on Power Systems.

[3]  E. Handschin,et al.  Integration of an expert system for security assessment into an energy management system , 1992 .

[4]  J. L. Carpentier,et al.  Improved efficient bounding method for DC contingency analysis using reciprocity properties , 1994 .

[5]  Robert A. W. van Amerongan A general-purpose version of the fast decoupled load flow , 1989 .

[6]  O. P. Malik,et al.  Multi-contingency preprocessing for security assessment using physical concepts and CQR with classifications , 1993 .

[7]  H. Glavitsch,et al.  Security enhancement using an optimal switching power flow , 1989, Conference Papers Power Industry Computer Application Conference.

[8]  J. L. Carpentier Basic Theoretical Properties for an Advanced Automatic Generation Control , 1984 .

[9]  A. J. Elacqua,et al.  Security Constrained Dispatch at the New York Power Pool , 1982, IEEE Power Engineering Review.

[10]  Tomas E. Dy Liacco,et al.  The Adaptive Reliability Control System , 1967 .

[11]  G. C. Ejebe,et al.  Fast contingency screening and evaluation for voltage security analysis , 1988 .

[12]  V. Brandwajn,et al.  Pre-screening of single contingencies causing network topology changes , 1991, IEEE Power Engineering Review.

[13]  W. F. Tinney,et al.  Sparsity-Oriented Compensation Methods for Modified Network Solutions , 1983, IEEE Transactions on Power Apparatus and Systems.

[14]  W. F. Tinney,et al.  Sparse Vector Methods , 1985, IEEE Transactions on Power Apparatus and Systems.

[15]  R. Bacher,et al.  Faster Local Power Flow Solutions: The Zero Mismatch Approach , 1989, IEEE Power Engineering Review.

[16]  V. Brandwajn,et al.  Complete Bounding Method for AC Contingency Screening , 1989, IEEE Power Engineering Review.

[17]  S.N. Talukdar,et al.  CQR: a hybrid expert system for security assessment (of power systems) , 1989, Conference Papers Power Industry Computer Application Conference.

[18]  H. Glavitsch,et al.  Features of a hybrid expert system for security enhancement , 1991 .

[19]  R.A.M. VanAmerongen A general-purpose version of the fast decoupled loadflow , 1989 .

[20]  P. Pruvot,et al.  Secure automatic generation control. Principle, simulation models and results , 1991 .

[21]  O. Alsac,et al.  Fast Decoupled Load Flow , 1974 .

[22]  R. Bacher,et al.  Network Topology Optimization with Security Constraints , 1986, IEEE Power Engineering Review.

[23]  Vladimir Brandwajn,et al.  Partial Matrix Refactorization , 1986, IEEE Transactions on Power Systems.

[24]  Chen-Ching Liu,et al.  An Expert System Assisting Decision-Making of Reactive Power/Voltage Control , 1986, IEEE Power Engineering Review.

[25]  R. Bacher,et al.  Approximate sparse vector techniques for power network solutions , 1991, Conference Papers Power Industry Computer Application Conference.

[26]  L.D.B. Terra,et al.  Security-constrained reactive power dispatch , 1991, IEEE Power Engineering Review.

[27]  B. F. Wollenberg,et al.  Corrective Control of Power System Flows by Line and Bus-Bar Switching , 1986, IEEE Transactions on Power Systems.

[28]  John Zaborszky,et al.  Fast Contingency Evaluation Using Concentric Relaxation , 1980, IEEE Transactions on Power Apparatus and Systems.

[29]  J. Ryckbosch A Method for Solving the Problem of Optimal Switching , 1987 .

[30]  A. Monticelli,et al.  Security-Constrained Optimal Power Flow with Post-Contingency Corrective Rescheduling , 1987, IEEE Transactions on Power Systems.

[31]  J. L. Carpentier,et al.  Optimal Power Flows: Uses, Methods and Developments , 1985 .

[32]  W. F. Tinney,et al.  An adaptive localization method for real-time security analysis , 1991 .

[33]  Chen-Ching Liu,et al.  Reactive management and voltage monitoring and control , 1992 .

[34]  Francisco D. Galiana,et al.  A survey of the optimal power flow literature , 1991 .

[35]  O. Alsaç,et al.  Analytical and computational improvements in performance-index ranking algorithms for networks , 1985 .

[36]  H. Glavitsch,et al.  Integrated security control using an optimal power flow and switching concepts , 1988 .

[37]  Dagmar Niebur,et al.  Unsupervised Neural Net Classification of Power System Static Security States , 1991 .

[38]  H. Glavitsch,et al.  Power System Security Enhanced by Post-Contingency Switching and Rescheduling , 1993, Proceedings. Joint International Power Conference Athens Power Tech,.

[39]  J. L. Carpentier,et al.  New Concepts for Automatic Generation Control in Electric Power Systems Using Parametric Quadratic Programming , 1983 .

[40]  V. Brandwajn,et al.  Efficient bounding method for linear contingency analysis , 1988 .

[41]  J. Carpentier,et al.  Towards a More Integrated Secure Operation , 1993, Proceedings. Joint International Power Conference Athens Power Tech,.

[42]  พงศ์ศักดิ์ บินสมประสงค์,et al.  FORMATION OF A SPARSE BUS IMPEDANCE MATRIX AND ITS APPLICATION TO SHORT CIRCUIT STUDY , 1980 .

[43]  B. Stott,et al.  Further developments in LP-based optimal power flow , 1990 .

[44]  F.D. Galiana,et al.  Bound Estimates of the Severity of Line Outages in Power System Contingency Analysis and Ranking , 1984, IEEE Transactions on Power Apparatus and Systems.