Quadratic programming approach for security constrained optimal power flow
暂无分享,去创建一个
Adi Soeprijanto | Ontoseno Penangsang | Rony Seto Wibowo | Annisaa Taradini | Rendhi Maulana | Feby A. Pamuji
[1] Adi Soeprijanto,et al. Security constrained optimal power flow incorporating preventive and corrective control , 2014, 2014 Electrical Power, Electronics, Communicatons, Control and Informatics Seminar (EECCIS).
[2] Adi Soeprijanto,et al. Security constrained optimal power flow with FACTS devices using bender decomposition , 2014, TENCON 2014 - 2014 IEEE Region 10 Conference.
[3] T. Gedra,et al. Optimal power flow with expected security costs , 2006, IEEE Transactions on Power Systems.
[4] J.M. Ramirez,et al. Optimal Power Flow Subject to Security Constraints Solved With a Particle Swarm Optimizer , 2008, IEEE Transactions on Power Systems.
[5] Allen J. Wood,et al. Power Generation, Operation, and Control , 1984 .