A new method of evaluating robust power system security against uncertainties

[1]  Hiroshi Sasaki,et al.  A solution of optimal power flow with multicontingency transient stability constraints , 2003 .

[2]  G. Irisarri,et al.  An Automatic Contingency Selection Method for On-Line Security Analysis , 1981, IEEE Transactions on Power Apparatus and Systems.

[3]  Essam A. Al-Ammar,et al.  Application of operating security regions in power systems , 2010, IEEE PES T&D 2010.

[4]  F.D. Galiana,et al.  Power System Security Corridors Concept and Computation , 1981, IEEE Transactions on Power Apparatus and Systems.

[5]  V. Vittal,et al.  Online Risk-Based Security Assessment , 2002, IEEE Power Engineering Review.

[6]  Hongbo Sun,et al.  Flexible steady-state security region of power system with uncertain load demand and soft security limits , 2000, 2000 Power Engineering Society Summer Meeting (Cat. No.00CH37134).

[7]  Naoto Yorino,et al.  Issues for power system operation for future renewable energy penetration: Robust power system security , 2011 .

[8]  Naoto Yorino,et al.  An application of robust power system security to power system operation for high-penetration of PV , 2012, 2012 3rd IEEE PES Innovative Smart Grid Technologies Europe (ISGT Europe).

[9]  Goran Andersson,et al.  N-1 security in optimal power flow control applied to limited areas , 2009 .

[10]  A. Monticelli,et al.  Security-Constrained Optimal Power Flow with Post-Contingency Corrective Rescheduling , 1987, IEEE Transactions on Power Systems.

[11]  A. Conejo,et al.  Market-clearing with stochastic security-part I: formulation , 2005, IEEE Transactions on Power Systems.

[12]  T. E. Dy Liacco,et al.  Power/energy: System security: The computer's role: Several security-related functions can be aided by the digital computer, and linked together by a software scheme , 1978 .

[13]  L. Wehenkel,et al.  Contingency Ranking With Respect to Overloads in Very Large Power Systems Taking Into Account Uncertainty, Preventive, and Corrective Actions , 2013, IEEE Transactions on Power Systems.

[14]  O. Alsac,et al.  Security analysis and optimization , 1987, Proceedings of the IEEE.

[15]  H. Sasaki,et al.  A New Formulation for FACTS Allocation for Security Enhancement against Voltage Collapse , 2002, IEEE Power Engineering Review.

[16]  L. Wehenkel,et al.  Security management under uncertainty: From day-ahead planning to intraday operation , 2010, 2010 IREP Symposium Bulk Power System Dynamics and Control - VIII (IREP).

[17]  Naoto Yorino,et al.  Dynamic load dispatch for power system robust security against uncertainties , 2013, 2013 IREP Symposium Bulk Power System Dynamics and Control - IX Optimization, Security and Control of the Emerging Power Grid.

[18]  B Stott,et al.  Linear Programming for Power-System Network Security Applications , 1979, IEEE Transactions on Power Apparatus and Systems.

[19]  Eric Hobson,et al.  Power System Security Control Calculations Using Linear Programming, Part II , 1978, IEEE Transactions on Power Apparatus and Systems.

[20]  Sydulu Maheswarapu,et al.  Security Constraint Optimal Power Flow (SCOPF) – A Comprehensive Survey , 2010 .