Static Security Assessment and Control : a Short Survey
暂无分享,去创建一个
[1] S. Granville. Optimal reactive dispatch through interior point methods , 1994 .
[2] R. Fischl,et al. An Algorithm for Automatically Tuning the Weights of Performance Indices for Monitoring Power System Loading or Security , 1986, IEEE Transactions on Power Systems.
[3] E. Handschin,et al. Integration of an expert system for security assessment into an energy management system , 1992 .
[4] J. L. Carpentier,et al. Improved efficient bounding method for DC contingency analysis using reciprocity properties , 1994 .
[5] Robert A. W. van Amerongan. A general-purpose version of the fast decoupled load flow , 1989 .
[6] O. P. Malik,et al. Multi-contingency preprocessing for security assessment using physical concepts and CQR with classifications , 1993 .
[7] H. Glavitsch,et al. Security enhancement using an optimal switching power flow , 1989, Conference Papers Power Industry Computer Application Conference.
[8] J. L. Carpentier. Basic Theoretical Properties for an Advanced Automatic Generation Control , 1984 .
[9] A. J. Elacqua,et al. Security Constrained Dispatch at the New York Power Pool , 1982, IEEE Power Engineering Review.
[10] Tomas E. Dy Liacco,et al. The Adaptive Reliability Control System , 1967 .
[11] G. C. Ejebe,et al. Fast contingency screening and evaluation for voltage security analysis , 1988 .
[12] V. Brandwajn,et al. Pre-screening of single contingencies causing network topology changes , 1991, IEEE Power Engineering Review.
[13] W. F. Tinney,et al. Sparsity-Oriented Compensation Methods for Modified Network Solutions , 1983, IEEE Transactions on Power Apparatus and Systems.
[14] W. F. Tinney,et al. Sparse Vector Methods , 1985, IEEE Transactions on Power Apparatus and Systems.
[15] R. Bacher,et al. Faster Local Power Flow Solutions: The Zero Mismatch Approach , 1989, IEEE Power Engineering Review.
[16] V. Brandwajn,et al. Complete Bounding Method for AC Contingency Screening , 1989, IEEE Power Engineering Review.
[17] S.N. Talukdar,et al. CQR: a hybrid expert system for security assessment (of power systems) , 1989, Conference Papers Power Industry Computer Application Conference.
[18] H. Glavitsch,et al. Features of a hybrid expert system for security enhancement , 1991 .
[19] R.A.M. VanAmerongen. A general-purpose version of the fast decoupled loadflow , 1989 .
[20] P. Pruvot,et al. Secure automatic generation control. Principle, simulation models and results , 1991 .
[21] O. Alsac,et al. Fast Decoupled Load Flow , 1974 .
[22] R. Bacher,et al. Network Topology Optimization with Security Constraints , 1986, IEEE Power Engineering Review.
[23] Vladimir Brandwajn,et al. Partial Matrix Refactorization , 1986, IEEE Transactions on Power Systems.
[24] Chen-Ching Liu,et al. An Expert System Assisting Decision-Making of Reactive Power/Voltage Control , 1986, IEEE Power Engineering Review.
[25] R. Bacher,et al. Approximate sparse vector techniques for power network solutions , 1991, Conference Papers Power Industry Computer Application Conference.
[26] L.D.B. Terra,et al. Security-constrained reactive power dispatch , 1991, IEEE Power Engineering Review.
[27] B. F. Wollenberg,et al. Corrective Control of Power System Flows by Line and Bus-Bar Switching , 1986, IEEE Transactions on Power Systems.
[28] John Zaborszky,et al. Fast Contingency Evaluation Using Concentric Relaxation , 1980, IEEE Transactions on Power Apparatus and Systems.
[29] J. Ryckbosch. A Method for Solving the Problem of Optimal Switching , 1987 .
[30] A. Monticelli,et al. Security-Constrained Optimal Power Flow with Post-Contingency Corrective Rescheduling , 1987, IEEE Transactions on Power Systems.
[31] J. L. Carpentier,et al. Optimal Power Flows: Uses, Methods and Developments , 1985 .
[32] W. F. Tinney,et al. An adaptive localization method for real-time security analysis , 1991 .
[33] Chen-Ching Liu,et al. Reactive management and voltage monitoring and control , 1992 .
[34] Francisco D. Galiana,et al. A survey of the optimal power flow literature , 1991 .
[35] O. Alsaç,et al. Analytical and computational improvements in performance-index ranking algorithms for networks , 1985 .
[36] H. Glavitsch,et al. Integrated security control using an optimal power flow and switching concepts , 1988 .
[37] Dagmar Niebur,et al. Unsupervised Neural Net Classification of Power System Static Security States , 1991 .
[38] H. Glavitsch,et al. Power System Security Enhanced by Post-Contingency Switching and Rescheduling , 1993, Proceedings. Joint International Power Conference Athens Power Tech,.
[39] J. L. Carpentier,et al. New Concepts for Automatic Generation Control in Electric Power Systems Using Parametric Quadratic Programming , 1983 .
[40] V. Brandwajn,et al. Efficient bounding method for linear contingency analysis , 1988 .
[41] J. Carpentier,et al. Towards a More Integrated Secure Operation , 1993, Proceedings. Joint International Power Conference Athens Power Tech,.
[42] พงศ์ศักดิ์ บินสมประสงค์,et al. FORMATION OF A SPARSE BUS IMPEDANCE MATRIX AND ITS APPLICATION TO SHORT CIRCUIT STUDY , 1980 .
[43] B. Stott,et al. Further developments in LP-based optimal power flow , 1990 .
[44] F.D. Galiana,et al. Bound Estimates of the Severity of Line Outages in Power System Contingency Analysis and Ranking , 1984, IEEE Transactions on Power Apparatus and Systems.