-
1
-
-
0026818189
-
On-line power system security analysis
-
Balu N., Bertram T., Bose A., and Brandwajn V. On-line power system security analysis. Proc IEEE 80 2 (February 1992) 262-280
-
(1992)
Proc IEEE
, vol.80
, Issue.2
, pp. 262-280
-
-
Balu, N.1
Bertram, T.2
Bose, A.3
Brandwajn, V.4
-
2
-
-
0019570456
-
Equivalents for security analysis of power systems
-
Savulescu S.C. Equivalents for security analysis of power systems. IEEE Trans Power Sys PAS-100 5 (May 1981) 2672-2682
-
(1981)
IEEE Trans Power Sys
, vol.PAS-100
, Issue.5
, pp. 2672-2682
-
-
Savulescu, S.C.1
-
3
-
-
0025423610
-
An external network modeling approach for on-line security analysis
-
Lu C.N., Liu K.C., and Vemuri S. An external network modeling approach for on-line security analysis. IEEE Trans Power Sys 5 2 (May 1990) 565-573
-
(1990)
IEEE Trans Power Sys
, vol.5
, Issue.2
, pp. 565-573
-
-
Lu, C.N.1
Liu, K.C.2
Vemuri, S.3
-
4
-
-
0021481570
-
Modeling of external networks for on-line security analysis
-
Bose A. Modeling of external networks for on-line security analysis. IEEE Trans Power App Sys PAS-103 8 (August 1984) 2117-2125
-
(1984)
IEEE Trans Power App Sys
, vol.PAS-103
, Issue.8
, pp. 2117-2125
-
-
Bose, A.1
-
5
-
-
0010911202
-
The effects of external modeling on on-line security analysis
-
Bose A. The effects of external modeling on on-line security analysis. IEEE Trans Power Sys PWRS-1 1 (February 1986) 227-233
-
(1986)
IEEE Trans Power Sys
, vol.PWRS-1
, Issue.1
, pp. 227-233
-
-
Bose, A.1
-
6
-
-
38749114558
-
-
Lo KL, Peng LJ. Extended ward equivalent of external system for on-line security analysis. In: IEE 2nd international conference on advances in power systems control, operation and management. December 1993, pp. 54-9.
-
Lo KL, Peng LJ. Extended ward equivalent of external system for on-line security analysis. In: IEE 2nd international conference on advances in power systems control, operation and management. December 1993, pp. 54-9.
-
-
-
-
7
-
-
0024103894
-
External subsystem equivalent model for steady-state and dynamic security assessment
-
Machowski J. External subsystem equivalent model for steady-state and dynamic security assessment. IEEE Trans Power Sys 3 4 (Novenber 1988) 1456-1462
-
(1988)
IEEE Trans Power Sys
, vol.3
, Issue.4
, pp. 1456-1462
-
-
Machowski, J.1
-
8
-
-
0028369621
-
External network modeling-recent practical experience
-
Vemuri S., Smith R.A., and Savulescu S.C. External network modeling-recent practical experience. IEEE Trans Power Sys 9 1 (February 1994) 216-228
-
(1994)
IEEE Trans Power Sys
, vol.9
, Issue.1
, pp. 216-228
-
-
Vemuri, S.1
Smith, R.A.2
Savulescu, S.C.3
-
9
-
-
0022114851
-
Contingency ranking and simulation for on-line use
-
Kim J., Maria G., and Wong V. Contingency ranking and simulation for on-line use. IEEE Trans Power App Sys PAS-104 9 (September 1985) 2401-2407
-
(1985)
IEEE Trans Power App Sys
, vol.PAS-104
, Issue.9
, pp. 2401-2407
-
-
Kim, J.1
Maria, G.2
Wong, V.3
-
10
-
-
84938446439
-
Iterative linear AC power flow solution for fast approximate outage studies
-
Peterson N.M., Tinney W.F., and Bree D.W. Iterative linear AC power flow solution for fast approximate outage studies. IEEE Trans Power App Sys PAS-91 September (1972) 2048-2053
-
(1972)
IEEE Trans Power App Sys
, vol.PAS-91
, Issue.September
, pp. 2048-2053
-
-
Peterson, N.M.1
Tinney, W.F.2
Bree, D.W.3
-
11
-
-
0028549991
-
Envisioning power system data: vulnerability and severity representations for static security assessment
-
Mahadev P.M., and Christie R.D. Envisioning power system data: vulnerability and severity representations for static security assessment. IEEE Trans Power Sys 9 4 (November 1994) 1915-1920
-
(1994)
IEEE Trans Power Sys
, vol.9
, Issue.4
, pp. 1915-1920
-
-
Mahadev, P.M.1
Christie, R.D.2
-
12
-
-
28244437218
-
PTDF based power system equivalents
-
Cheng X., and Overbye T.J. PTDF based power system equivalents. IEEE Trans Power Sys 20 4 (November 2005) 1868-1876
-
(2005)
IEEE Trans Power Sys
, vol.20
, Issue.4
, pp. 1868-1876
-
-
Cheng, X.1
Overbye, T.J.2
-
13
-
-
0023592567
-
Security analysis and optimization
-
Stott B., Alsac O., and Monticelli A.J. Security analysis and optimization. Proc IEEE 75 12 (December 1987) 1623-1644
-
(1987)
Proc IEEE
, vol.75
, Issue.12
, pp. 1623-1644
-
-
Stott, B.1
Alsac, O.2
Monticelli, A.J.3
-
14
-
-
0018441328
-
Real-time external equivalents for static security analysis
-
Monticelli A., DEckmann S., Garcia A., and Stott B. Real-time external equivalents for static security analysis. IEEE Trans Power App Sys PAS-98 2 (March/April 1979) 498-508
-
(1979)
IEEE Trans Power App Sys
, vol.PAS-98
, Issue.2
, pp. 498-508
-
-
Monticelli, A.1
DEckmann, S.2
Garcia, A.3
Stott, B.4
|