Steady-state security assessment method based on distance to security region boundaries
暂无分享,去创建一个
[1] Essam A. Al-Ammar,et al. Framework for Identification of Power System Operating Security Regions , 2009, 2009 Third International Conference on Network and System Security.
[2] A. R. Phadke,et al. Determination of worst case loading margin using Genetic Algorithm , 2009, 2009 International Conference on Power Systems.
[3] Pei Zhang,et al. Development of a New Tool for Dynamic Security Assessment Using Dynamic Security Region , 2006, 2006 International Conference on Power System Technology.
[4] Felix F. Wu,et al. Probabilistic dynamic security assessment of power systems-I: Basic model , 1983 .
[5] Jizhong Zhu,et al. Construction of maximal steady-state security regions of power systems using optimization method , 1998 .
[6] A.M. Stankovic,et al. Applications of Ellipsoidal Approximations to Polyhedral Sets in Power System Optimization , 2008, IEEE Transactions on Power Systems.
[7] Chen-Ching Liu. A New Method for the Construction of Maximal Steady-State Security Regions of Power Systems , 1986, IEEE Transactions on Power Systems.
[8] Pierre Dersin,et al. Feasibility Sets for Steady-State Loads in Electric Power Networks , 1982, IEEE Transactions on Power Apparatus and Systems.
[9] Yixin Yu. Security region of bulk power system , 2002, Proceedings. International Conference on Power System Technology.
[10] Hongbo Sun,et al. Flexible steady-state security region of power system with uncertain load demand and soft security limits , 2000, 2000 Power Engineering Society Summer Meeting (Cat. No.00CH37134).
[11] J. Z. Zhu. Optimal power system steady-state security regions with fuzzy constraints , 2002, 2002 IEEE Power Engineering Society Winter Meeting. Conference Proceedings (Cat. No.02CH37309).
[12] Carlos A. Castro,et al. Fast method for computing power system security margins to voltage collapse , 2004 .