Computing the value of security
暂无分享,去创建一个
D. Jayaweera | Keith Bell | Daniel S. Kirschen | Ronald N. Allan | D. P. Nedic | D. Kirschen | R. Allan | K. Bell | D. Jayaweera | D. Nedic
[1] Roy Billinton,et al. Transmission equipment reliability using the Canadian Electrical Association information system , 1995 .
[2] Roger Kearsley. Restoration in Sweden and Experience Gained from the Blackout of 1983 , 1987, IEEE Transactions on Power Systems.
[3] G. Sheblé,et al. Power generation operation and control — 2nd edition , 1996 .
[4] Daniel S. Kirschen,et al. MW/voltage control in a linear programming based optimal power flow , 1988 .
[5] Yasuo Tamura,et al. Real Time Control of System Voltage and Reactive Power , 1969 .
[6] R. W. Dunn,et al. Modelling of operator heuristics in dispatch for security enhancement , 1999 .
[7] O. Alsac,et al. Security analysis and optimization , 1987, Proceedings of the IEEE.
[8] Eric R. Ziegel,et al. Applied Statistics for Engineers and Physical Scientists , 1992 .
[9] James S. Thorp,et al. Anatomy of power system blackouts: preventive relaying strategies , 1996 .
[10] K. K. Kariuki,et al. Evaluation of reliability worth and value of lost load , 1996 .
[11] B. F. Wollenberg,et al. Power Operation, Generation and Control , 1996 .
[12] Roy Billinton,et al. Reliability evaluation of power systems , 1984 .