State-of-the-art, challenges, and future trends in security constrained optimal power flow
暂无分享,去创建一个
J. Ramos | L. Wehenkel | D. Kirschen | F. Capitanescu | J. Ramos | P. Panciatici | A. Marcolini | L. Platbrood | Ludovic Platbrood
[1] Jovica V. Milanovic,et al. PEGASE R&D project: advanced algorithms for state estimation and simulation of the Pan-European power system , 2012 .
[2] G. L. Torres,et al. Robust Optimal Power Flow Solution Using Trust Region and Interior-Point Methods , 2011, IEEE Transactions on Power Systems.
[3] L. Wehenkel,et al. Redispatching Active and Reactive Powers Using a Limited Number of Control Actions , 2011, IEEE Transactions on Power Systems.
[4] D. Ernst,et al. Multistage Stochastic Programming: A Scenario Tree Based Approach to Planning under Uncertainty , 2011 .
[5] L. Wehenkel,et al. Security management under uncertainty: From day-ahead planning to intraday operation , 2010, 2010 IREP Symposium Bulk Power System Dynamics and Control - VIII (IREP).
[6] L. Wehenkel,et al. Sensitivity-Based Approaches for Handling Discrete Variables in Optimal Power Flow Computations , 2010, IEEE Transactions on Power Systems.
[7] A.J. Conejo,et al. Securing Transient Stability Using Time-Domain Simulations Within an Optimal Power Flow , 2010, IEEE Transactions on Power Systems.
[8] L. Wehenkel,et al. Optimal Power Flow Computations With a Limited Number of Controls Allowed to Move , 2010, IEEE Transactions on Power Systems.
[9] D. Ruiz-Vega,et al. Global Transient Stability-Constrained Optimal Power Flow Using an OMIB Reference Trajectory , 2010, IEEE Transactions on Power Systems.
[10] S. Oren,et al. Optimal transmission switching with contingency analysis , 2009, IEEE PES General Meeting.
[11] Fabrice Zaoui,et al. Loss reduction as a Mixed Integer optimization problem , 2009, 2009 IEEE Bucharest PowerTech.
[12] L. Wehenkel,et al. Optimal power flow computations with constraints limiting the number of control actions , 2009, 2009 IEEE Bucharest PowerTech.
[13] Xifan Wang,et al. A Robust Approach to Optimal Power Flow With Discrete Variables , 2009, IEEE Transactions on Power Systems.
[14] L. Wehenkel,et al. Coupling Optimization and Dynamic Simulation for Preventive-Corrective Control of Voltage Instability , 2009, IEEE Transactions on Power Systems.
[15] J.D. McCalley,et al. Decomposed SCOPF for Improving Efficiency , 2009, IEEE Transactions on Power Systems.
[16] L. Wehenkel,et al. A New Iterative Approach to the Corrective Security-Constrained Optimal Power Flow Problem , 2008, IEEE Transactions on Power Systems.
[17] José Luis Martínez Ramos,et al. Optimal and Secure Operation of Transmission Systems , 2008 .
[18] K. Karoui,et al. New large-scale security constrained optimal power flow program using a new interior point algorithm , 2008, 2008 5th International Conference on the European Electricity Market.
[19] M. Ferris,et al. Optimal Transmission Switching , 2008, IEEE Transactions on Power Systems.
[20] K. Karoui,et al. LARGE SCALE SECURITY CONSTRAINED OPTIMAL POWER FLOW , 2008 .
[21] D. Ernst,et al. Contingency Filtering Techniques for Preventive Security-Constrained Optimal Power Flow , 2007, IEEE Transactions on Power Systems.
[22] J. McCalley,et al. Risk-Based Security and Economy Tradeoff Analysis for Real-Time Operation , 2007, IEEE Transactions on Power Systems.
[23] R.J. Thomas,et al. On Computational Issues of Market-Based Optimal Power Flow , 2007, IEEE Transactions on Power Systems.
[24] L. Wehenkel,et al. Improving the Statement of the Corrective Security-Constrained Optimal Power-Flow Problem , 2007, IEEE Transactions on Power Systems.
[25] Patrice Marcotte,et al. An overview of bilevel optimization , 2007, Ann. Oper. Res..
[26] O. Alsaç,et al. Security Constrained Unit Commitment: Network Modeling and Solution Issues , 2006, 2006 IEEE PES Power Systems Conference and Exposition.
[27] Fang Liu,et al. A hybrid genetic algorithm-interior point method for optimal reactive power flow , 2006, IEEE Transactions on Power Systems.
[28] M. Shahidehpour,et al. AC contingency dispatch based on security-constrained unit commitment , 2006, IEEE Transactions on Power Systems.
[29] Lorenz T. Biegler,et al. On the implementation of an interior-point filter line-search algorithm for large-scale nonlinear programming , 2006, Math. Program..
[30] T. Gedra,et al. Optimal power flow with expected security costs , 2006, IEEE Transactions on Power Systems.
[31] Mario Montagna,et al. Optimal network reconfiguration for congestion management by deterministic and genetic algorithms , 2006 .
[32] J. Usaola,et al. Security-constrained optimal generation scheduling in large-scale power systems , 2006, IEEE Transactions on Power Systems.
[33] V. Vittal,et al. Corrective switching algorithm for relieving overloads and voltage violations , 2005, IEEE Transactions on Power Systems.
[34] F. Bouffard,et al. Market-clearing with stochastic security-part II: case studies , 2005, IEEE Transactions on Power Systems.
[35] A. Conejo,et al. Market-clearing with stochastic security-part I: formulation , 2005, IEEE Transactions on Power Systems.
[36] J. Arroyo,et al. Umbrella contingencies in security-constrained optimal power flow , 2005 .
[37] Wei Qiu,et al. A new parallel algorithm for security constrained optimal power flow with a nonlinear interior point method , 2005, IEEE Power Engineering Society General Meeting, 2005.
[38] Wang Min,et al. A trust region interior point algorithm for optimal power flow problems , 2005 .
[39] Federico Milano,et al. Voltage stability constrained OPF market models considering N−1 contingency criteria , 2005 .
[40] Gerardo López Camino,et al. A practical approach to solve power system constraints with application to the Spanish electricity market , 2004, IEEE Transactions on Power Systems.
[41] Interior point cutting plane method for optimal power flow , 2004 .
[42] Y. Ho,et al. An ordinal optimization theory-based algorithm for solving the optimal power flow problem with discrete control variables , 2004 .
[43] A comparison of the AC and DC power flow models for LMP calculations , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[44] Mania Pavella,et al. A comprehensive approach to transient stability control. I. Near optimal preventive control , 2003 .
[45] Sae-Hyuk Kwon,et al. Reactive reserve-based contingency constrained optimal power flow (RCCOPF) for enhancement of voltage stability margins , 2003 .
[46] Hiroshi Sasaki,et al. A solution of optimal power flow with multicontingency transient stability constraints , 2003 .
[47] Yixin Ni,et al. Available transfer capability calculation with static security constraints , 2003, 2003 IEEE Power Engineering Society General Meeting (IEEE Cat. No.03CH37491).
[48] M. Pavella,et al. A comprehensive approach to transient stability control part 1: near optimal preventive control , 2003, 2003 IEEE Power Engineering Society General Meeting (IEEE Cat. No.03CH37491).
[49] Slobodan Pajic,et al. Stochastic OPF by constraint relaxation , 2003, 2003 IEEE Bologna Power Tech Conference Proceedings,.
[50] R. Casanova,et al. A mixed-integer LP based network topology optimization algorithm for overload alleviation , 2003, 2003 IEEE Bologna Power Tech Conference Proceedings,.
[51] D. Jayaweera,et al. Value of Security: Modeling Time-Dependent Phenomena and Weather Conditions , 2002, IEEE Power Engineering Review.
[52] S. Tso,et al. An Extended Nonlinear Primal-Dual Interior-Point Algorithm for Reactive-Power Optimization of Large-Scale Power Systems with Discrete Control Variables , 2002, IEEE Power Engineering Review.
[53] A. Bakirtzis,et al. Optimal Power Flow by Enhanced Genetic Algorithm , 2002, IEEE Power Engineering Review.
[54] T. Van Cutsem,et al. Preventive control of voltage security margins : a multi-contingency sensitivity-based approach , 2002, IEEE Power Engineering Society Summer Meeting,.
[55] E. De Tuglie,et al. Transient security dispatch for the concurrent optimization of plural postulated contingencies , 2002, IEEE Power Engineering Society Summer Meeting,.
[56] Robert A. Schlueter,et al. Preventive and corrective open access system dispatch based on the voltage stability security assessment and diagnosis , 2001 .
[57] Anna Pinnarelli,et al. A model for the ISO insecurity costs management in a deregulated market scenario , 2001, 2001 IEEE Porto Power Tech Proceedings (Cat. No.01EX502).
[58] G. L. Torres,et al. On a nonlinear multiple-centrality-corrections interior-point method for optimal power flow , 2001, PICA 2001. Innovative Computing for Power - Electric Energy Meets the Market. 22nd IEEE Power Engineering Society. International Conference on Power Industry Computer Applications (Cat. No.01CH37195).
[59] V. H. Quintana,et al. On a Nonlinear Multiple-Centralitycorrections Interior-Point Method for Optimal Power Flow , 2001, IEEE Power Engineering Review.
[60] E. Vaahedi,et al. Dynamic security constrained optimal power flow/VAr planning , 2001 .
[61] M. Dicorato,et al. A corrective control for angle and voltage stability enhancement on the transient time-scale , 2001, 2001 IEEE Power Engineering Society Winter Meeting. Conference Proceedings (Cat. No.01CH37194).
[62] B. J. Cory,et al. A homogeneous linear programming algorithm for the security constrained economic dispatch problem , 2000 .
[63] Deqiang Gan,et al. Stability-constrained optimal power flow , 2000 .
[64] Robert J. Vanderbei,et al. Interior-point methods for nonconvex nonlinear programming: orderings and higher-order methods , 2000, Math. Program..
[65] D. Ernst,et al. Transient stability-constrained optimal power flow , 1999, PowerTech Budapest 99. Abstract Records. (Cat. No.99EX376).
[66] P. Scarpellini,et al. Real-time preventive actions for the enhancement of voltage-degraded trajectories , 1999 .
[67] J. G. Rolim,et al. A study of the use of corrective switching in transmission systems , 1999 .
[68] G. L. Torres,et al. An interior-point method for nonlinear optimal power flow using voltage rectangular coordinates , 1998 .
[69] Goran Strbac,et al. A method for computing the value of corrective security , 1998 .
[70] Michele Trovato,et al. On-line dynamic preventive control: an algorithm for transient security dispatch , 1998 .
[71] Luonan Chen,et al. Mean field theory for optimal power flow , 1997 .
[72] John R. Birge,et al. Introduction to Stochastic Programming , 1997 .
[73] Hua Wei,et al. An interior point nonlinear programming for optimal power flow problems with a novel data structure , 1997, Proceedings of the 20th International Conference on Power Industry Computer Applications.
[74] P. Pruvot,et al. Cyclic security analysis for security constrained optimal power flow , 1997 .
[75] James A. Momoh,et al. Challenges to optimal power flow , 1997 .
[76] G. Irisarri,et al. Maximum loadability of power systems using interior point nonlinear optimization method , 1997 .
[77] Alex D. Papalexopoulos,et al. Challenges To On-line Opf Implementation , 1997 .
[78] S. Granville,et al. Application of interior point methods to power flow unsolvability , 1996 .
[79] J. Doyle,et al. Robust and optimal control , 1995, Proceedings of 35th IEEE Conference on Decision and Control.
[80] X. Guan,et al. Fuzzy constraint enforcement and control action curtailment in an optimal power flow , 1995, Proceedings of Power Industry Computer Applications Conference.
[81] J.N. Wrubel,et al. Practical experience with corrective switching algorithm for on-line applications , 1995, Proceedings of Power Industry Computer Applications Conference.
[82] Pierre Hansen,et al. Links Between Linear Bilevel and Mixed 0–1 Programming Problems , 1995 .
[83] A. Monticelli,et al. Asynchronous programming model for the concurrent solution of the security constrained optimal power flow problem , 1994 .
[84] S. Granville,et al. Application of decomposition techniques to VAr planning: methodological and computational aspects , 1994 .
[85] S. A. Soman,et al. Curtailed number and reduced controller movement optimization algorithms for real time voltage/reactive power control , 1994 .
[86] S. Granville. Optimal reactive dispatch through interior point methods , 1994 .
[87] R. E. Marsten,et al. A direct nonlinear predictor-corrector primal-dual interior point algorithm for optimal power flows , 1993, Conference Proceedings Power Industry Computer Application Conference.
[88] R. Bacher,et al. Power System Models, Objectives and Constraints in Optimal Power Flow Calculations , 1993 .
[89] S. M. Shahidehpour,et al. Stochastic Approach to Small Disturbance Stability Analysis , 1992, IEEE Power Engineering Review.
[90] W. Tinney,et al. Discrete Shunt Controls in Newton Optimal Power Flow , 1992, IEEE Power Engineering Review.
[91] Ignacio J. Pérez-Arriaga,et al. A security-constrained decomposition approach to optimal reactive power planning , 1991 .
[92] B. Stott,et al. Further developments in LP-based optimal power flow , 1990 .
[93] T.J. Bertram,et al. An integrated package for real-time security enhancement , 1989, Conference Papers Power Industry Computer Application Conference.
[94] Felix F. Wu,et al. Large-scale optimal power flow , 1989 .
[95] Ebrahim Vaahedi,et al. Considerations in Applying Optimal Power Flow to Power System Operation , 1989, IEEE Power Engineering Review.
[96] Felix F. Wu,et al. Large-Scale Optimal Power Flow: Effects of Initialization, Decoupling & Discretization , 1989, IEEE Power Engineering Review.
[97] H. Glavitsch,et al. Security enhancement using an optimal switching power flow , 1989, Conference Papers Power Industry Computer Application Conference.
[98] Kenichi Aoki,et al. Optimal VAr planning by approximation method for recursive mixed-integer linear programming , 1988 .
[99] W. F. Tinney,et al. Some deficiencies in optimal power flow , 1988 .
[100] R. Bacher,et al. Loss reduction by network switching , 1988 .
[101] Daniel S. Kirschen,et al. MW/voltage control in a linear programming based optimal power flow , 1988 .
[102] O. Alsac,et al. Security analysis and optimization , 1987, Proceedings of the IEEE.
[103] A. G. Bakirtzis,et al. Incorporation of Switching Operations in Power System Corrective Control Computations , 1987, IEEE Transactions on Power Systems.
[104] A. Monticelli,et al. Security-Constrained Optimal Power Flow with Post-Contingency Corrective Rescheduling , 1987, IEEE Transactions on Power Systems.
[105] R. Bacher,et al. Network Topology Optimization with Security Constraints , 1986, IEEE Power Engineering Review.
[106] B. F. Wollenberg,et al. Corrective Control of Power System Flows by Line and Bus-Bar Switching , 1986, IEEE Transactions on Power Systems.
[107] H. Glavitsch,et al. Switching as means of control in the power system , 1985 .
[108] A. Germond,et al. NETWORK TOPOLOGY OPTIMIZATION FOR POWER SYSTEM SECURITY ENHANCEMENT. , 1983 .
[109] O. Alsac,et al. Optimal Load Flow with Steady-State Security , 1974 .
[110] A. M. Geoffrion. Generalized Benders decomposition , 1972 .
[111] William F. Tinney,et al. Optimal Power Flow Solutions , 1968 .
[112] J. F. Benders. Partitioning procedures for solving mixed-variables programming problems , 1962 .