A new method of evaluating robust power system security against uncertainties
暂无分享,去创建一个
Naoto Yorino | Yoshifumi Zoka | Yutaka Sasaki | Muhammad Abdillah | Tomohiro Isoya | N. Yorino | Y. Zoka | Y. Sasaki | M. Abdillah | Tomohiro Isoya
[1] Hiroshi Sasaki,et al. A solution of optimal power flow with multicontingency transient stability constraints , 2003 .
[2] G. Irisarri,et al. An Automatic Contingency Selection Method for On-Line Security Analysis , 1981, IEEE Transactions on Power Apparatus and Systems.
[3] Essam A. Al-Ammar,et al. Application of operating security regions in power systems , 2010, IEEE PES T&D 2010.
[4] F.D. Galiana,et al. Power System Security Corridors Concept and Computation , 1981, IEEE Transactions on Power Apparatus and Systems.
[5] V. Vittal,et al. Online Risk-Based Security Assessment , 2002, IEEE Power Engineering Review.
[6] Hongbo Sun,et al. Flexible steady-state security region of power system with uncertain load demand and soft security limits , 2000, 2000 Power Engineering Society Summer Meeting (Cat. No.00CH37134).
[7] Naoto Yorino,et al. Issues for power system operation for future renewable energy penetration: Robust power system security , 2011 .
[8] Naoto Yorino,et al. An application of robust power system security to power system operation for high-penetration of PV , 2012, 2012 3rd IEEE PES Innovative Smart Grid Technologies Europe (ISGT Europe).
[9] Goran Andersson,et al. N-1 security in optimal power flow control applied to limited areas , 2009 .
[10] A. Monticelli,et al. Security-Constrained Optimal Power Flow with Post-Contingency Corrective Rescheduling , 1987, IEEE Transactions on Power Systems.
[11] A. Conejo,et al. Market-clearing with stochastic security-part I: formulation , 2005, IEEE Transactions on Power Systems.
[12] T. E. Dy Liacco,et al. Power/energy: System security: The computer's role: Several security-related functions can be aided by the digital computer, and linked together by a software scheme , 1978 .
[13] L. Wehenkel,et al. Contingency Ranking With Respect to Overloads in Very Large Power Systems Taking Into Account Uncertainty, Preventive, and Corrective Actions , 2013, IEEE Transactions on Power Systems.
[14] O. Alsac,et al. Security analysis and optimization , 1987, Proceedings of the IEEE.
[15] H. Sasaki,et al. A New Formulation for FACTS Allocation for Security Enhancement against Voltage Collapse , 2002, IEEE Power Engineering Review.
[16] L. Wehenkel,et al. Security management under uncertainty: From day-ahead planning to intraday operation , 2010, 2010 IREP Symposium Bulk Power System Dynamics and Control - VIII (IREP).
[17] Naoto Yorino,et al. Dynamic load dispatch for power system robust security against uncertainties , 2013, 2013 IREP Symposium Bulk Power System Dynamics and Control - IX Optimization, Security and Control of the Emerging Power Grid.
[18] B Stott,et al. Linear Programming for Power-System Network Security Applications , 1979, IEEE Transactions on Power Apparatus and Systems.
[19] Eric Hobson,et al. Power System Security Control Calculations Using Linear Programming, Part II , 1978, IEEE Transactions on Power Apparatus and Systems.
[20] Sydulu Maheswarapu,et al. Security Constraint Optimal Power Flow (SCOPF) – A Comprehensive Survey , 2010 .