-
1
-
-
0032592974
-
Contingency ranking based on severity indices in dynamic security analysis
-
Aug
-
C. Fu and A. Bose, "Contingency ranking based on severity indices in dynamic security analysis," IEEE Trans. Power Syst., vol. 14, no. 3, pp. 980-987, Aug. 1999.
-
(1999)
IEEE Trans. Power Syst
, vol.14
, Issue.3
, pp. 980-987
-
-
Fu, C.1
Bose, A.2
-
2
-
-
0034138973
-
Contingency screening for steady-state security analysis by using FFT and artificial neural networks
-
Feb
-
T. S. Sidhu and L. Cui, "Contingency screening for steady-state security analysis by using FFT and artificial neural networks," IEEE Trans. Power Syst., vol. 15, no. 1, pp. 421-426, Feb. 2000.
-
(2000)
IEEE Trans. Power Syst
, vol.15
, Issue.1
, pp. 421-426
-
-
Sidhu, T.S.1
Cui, L.2
-
3
-
-
0034139062
-
Multicontingency steady state security evaluation using fuzzy clustering techniques
-
Feb
-
M. A. Matos, N. D. Hatziargyriou, and J. A. P. Lopes, "Multicontingency steady state security evaluation using fuzzy clustering techniques," IEEE Trans. Power Syst., vol. 15, no. 1, pp. 177-184, Feb. 2000.
-
(2000)
IEEE Trans. Power Syst
, vol.15
, Issue.1
, pp. 177-184
-
-
Matos, M.A.1
Hatziargyriou, N.D.2
Lopes, J.A.P.3
-
4
-
-
0032592929
-
Probabilistic security analysis of bilateral transactions in a deregulated environment
-
Aug
-
J. W. M. Cheng, D. T. McGillis, and F. D. Galiana, "Probabilistic security analysis of bilateral transactions in a deregulated environment," IEEE Trans. Power Syst., vol. 14, no. 3, pp. 1153-1159, Aug. 1999.
-
(1999)
IEEE Trans. Power Syst
, vol.14
, Issue.3
, pp. 1153-1159
-
-
Cheng, J.W.M.1
McGillis, D.T.2
Galiana, F.D.3
-
5
-
-
4043166147
-
A probabilistic indicator of system stress
-
Aug
-
D. S. Kirschen, D. Jayaweera, D. Nedic, and R. N. Allan, "A probabilistic indicator of system stress," IEEE Trans. Power Syst. vol. 19, no. 3, pp. 1650-1657, Aug. 2004.
-
(2004)
IEEE Trans. Power Syst
, vol.19
, Issue.3
, pp. 1650-1657
-
-
Kirschen, D.S.1
Jayaweera, D.2
Nedic, D.3
Allan, R.N.4
-
6
-
-
0035506263
-
Annual risk assessment for overload security
-
Nov
-
Y. Dai, J. D. McCalley, N. Abi-Samra, and V. Vittal, "Annual risk assessment for overload security," IEEE Trans. Power Syst., vol. 16, no. 4, pp. 616-623, Nov. 2001.
-
(2001)
IEEE Trans. Power Syst
, vol.16
, Issue.4
, pp. 616-623
-
-
Dai, Y.1
McCalley, J.D.2
Abi-Samra, N.3
Vittal, V.4
-
7
-
-
18944382536
-
Identifying high risk N-k contingencies for online security assessment
-
May
-
Q. Chen and J. D. McCalley, "Identifying high risk N-k contingencies for online security assessment," IEEE Trans. Power Syst., vol. 20, no. 2, pp. 823-835, May 2005.
-
(2005)
IEEE Trans. Power Syst
, vol.20
, Issue.2
, pp. 823-835
-
-
Chen, Q.1
McCalley, J.D.2
-
8
-
-
0034138364
-
A second order method for contingency severity assessment with respect to voltage collapse
-
Feb
-
A. Berizzi, Y. G. Zeng, P. Marannino, A. Vaccarini, and P. A. Scarpellini, "A second order method for contingency severity assessment with respect to voltage collapse," IEEE Trans. Power Syst., vol. 15, no. 1, pp. 81-88, Feb. 2000.
-
(2000)
IEEE Trans. Power Syst
, vol.15
, Issue.1
, pp. 81-88
-
-
Berizzi, A.1
Zeng, Y.G.2
Marannino, P.3
Vaccarini, A.4
Scarpellini, P.A.5
-
9
-
-
0034242063
-
Justification of the voltage stability security assessment and diagnostic procedure using a bifurcation subsystem method
-
Aug
-
R. A. Schlueter, S. Z. Liu, and K. Ben-Kilani, "Justification of the voltage stability security assessment and diagnostic procedure using a bifurcation subsystem method," IEEE Trans. Power Syst., vol. 15, no. 3, pp. 1105-1112, Aug. 2000.
-
(2000)
IEEE Trans. Power Syst
, vol.15
, Issue.3
, pp. 1105-1112
-
-
Schlueter, R.A.1
Liu, S.Z.2
Ben-Kilani, K.3
-
10
-
-
0034244445
-
A fast voltage security assessment method using adaptive bounding
-
Aug
-
H. Lin, A. Bose, and V. Venkatasubramanian, "A fast voltage security assessment method using adaptive bounding," IEEE Trans. Power Syst. vol. 15, no. 3, pp. 1137-1142, Aug. 2000.
-
(2000)
IEEE Trans. Power Syst
, vol.15
, Issue.3
, pp. 1137-1142
-
-
Lin, H.1
Bose, A.2
Venkatasubramanian, V.3
-
11
-
-
0035248664
-
Security modeling for power system reliability evaluation
-
Feb
-
V. A. Levi, J. M. Nahman, and D. P. Nedic, "Security modeling for power system reliability evaluation," IEEE Trans. Power Syst., vol. 16, no. 1, pp. 29-37, Feb. 2001.
-
(2001)
IEEE Trans. Power Syst
, vol.16
, Issue.1
, pp. 29-37
-
-
Levi, V.A.1
Nahman, J.M.2
Nedic, D.P.3
-
12
-
-
18944368632
-
Web-based security cost analysis in electricity markets
-
May
-
H. Chen, C. A. Canizares, and A. Singh, "Web-based security cost analysis in electricity markets," IEEE Trans. Power Syst., vol. 20, no. 2, pp. 659-667, May 2005.
-
(2005)
IEEE Trans. Power Syst
, vol.20
, Issue.2
, pp. 659-667
-
-
Chen, H.1
Canizares, C.A.2
Singh, A.3
-
13
-
-
18944367302
-
Security-constrained unit commitment for simultaneous clearing of energy and ancillary services markets
-
May
-
Z. Li and M. Shahidehpour, "Security-constrained unit commitment for simultaneous clearing of energy and ancillary services markets," IEEE Trans. Power Syst., vol. 20, no. 2, pp. 1079-1089, May 2005.
-
(2005)
IEEE Trans. Power Syst
, vol.20
, Issue.2
, pp. 1079-1089
-
-
Li, Z.1
Shahidehpour, M.2
-
14
-
-
0041524223
-
Software implementation of online risk-based security assessment
-
Aug
-
M. Ni, J. D. McCalley, V. Vittal, S. Greene, C. W. Ten, V. S. Ganugula, and T. Tayyib, "Software implementation of online risk-based security assessment," IEEE Trans. Power Syst., vol. 18, no. 3, pp. 1165-1173, Aug. 2003.
-
(2003)
IEEE Trans. Power Syst
, vol.18
, Issue.3
, pp. 1165-1173
-
-
Ni, M.1
McCalley, J.D.2
Vittal, V.3
Greene, S.4
Ten, C.W.5
Ganugula, V.S.6
Tayyib, T.7
-
15
-
-
0037292303
-
On-line risk-based security assessment
-
Feb
-
M. Ni, J. McCalley, V. Vittal, and T. Tayyib, "On-line risk-based security assessment," IEEE Trans. Power Syst., vol. 18, no. 1, pp. 258-265, Feb. 2003.
-
(2003)
IEEE Trans. Power Syst
, vol.18
, Issue.1
, pp. 258-265
-
-
Ni, M.1
McCalley, J.2
Vittal, V.3
Tayyib, T.4
-
17
-
-
4043101022
-
Definition and classification of power system stability
-
May
-
P. Kundur, J. Paserba, V. Ajjarapu, G. Andersson, A. Bose, C. Canizares, N. Hatziargyriou, D. Hill, A. Stanković, C. Taylor, T. Van Cutsem, and V. Vittal, "Definition and classification of power system stability," IEEE Trans. Power Syst., vol. 19, no. 2, pp. 1387-1401, May 2004.
-
(2004)
IEEE Trans. Power Syst
, vol.19
, Issue.2
, pp. 1387-1401
-
-
Kundur, P.1
Paserba, J.2
Ajjarapu, V.3
Andersson, G.4
Bose, A.5
Canizares, C.6
Hatziargyriou, N.7
Hill, D.8
Stanković, A.9
Taylor, C.10
Van Cutsem, T.11
Vittal, V.12
-
18
-
-
60149105456
-
Multi-criteria optimization: An important foundation of fuzzy system design
-
L. Reznik, V. Dimitrov, and J. Kacprzyk, Eds. Heidelberg, Germany: Physica Verlag, Fuzzy System Design
-
H. T. Nguyen and V. Kremovich, "Multi-criteria optimization: An important foundation of fuzzy system design," in Studies in Fuzzines and Soft Computing, L. Reznik, V. Dimitrov, and J. Kacprzyk, Eds. Heidelberg, Germany: Physica Verlag, 1998, Fuzzy System Design.
-
(1998)
Studies in Fuzzines and Soft Computing
-
-
Nguyen, H.T.1
Kremovich, V.2
-
19
-
-
60149106248
-
ERCOT Methodologies for Determining Ancillary Service Requirements
-
ERCOT Methodologies, Tech. Rep
-
ERCOT Methodologies, ERCOT Methodologies for Determining Ancillary Service Requirements, 2001, Tech. Rep..
-
(2001)
-
-
-
20
-
-
0033221710
-
An on-line determination of the ready reserve power
-
Nov
-
S. Halilčević and F. Gubina, "An on-line determination of the ready reserve power," IEEE Trans. Power Syst., vol. 14, no. 4, pp. 1514-1520, Nov. 1999.
-
(1999)
IEEE Trans. Power Syst
, vol.14
, Issue.4
, pp. 1514-1520
-
-
Halilčević, S.1
Gubina, F.2
-
22
-
-
0032075499
-
A dynamic characterization of power system harmonics using Markov chains
-
May
-
A. M. Stanković and E. A. Marengo, "A dynamic characterization of power system harmonics using Markov chains," IEEE Trans. Power Syst. vol. 13, no. 2, pp. 442-449, May 1998.
-
(1998)
IEEE Trans. Power Syst
, vol.13
, Issue.2
, pp. 442-449
-
-
Stanković, A.M.1
Marengo, E.A.2
-
23
-
-
0003516147
-
-
Cambridge, U.K, Cambridge Univ. Press
-
R. Durbin, S. R. Eddy, A. Krogh, and G. Mitchison, Biological Sequence Analysis: Probabilistic Models of Proteins and Nucleic Acids Cambridge, U.K.: Cambridge Univ. Press, 1999, p. 46.
-
(1999)
Biological Sequence Analysis: Probabilistic Models of Proteins and Nucleic Acids
, pp. 46
-
-
Durbin, R.1
Eddy, S.R.2
Krogh, A.3
Mitchison, G.4
-
24
-
-
0024610919
-
A tutorial on hidden Markov models and selected applications in speech recognition
-
Feb
-
L. Rabiner, "A tutorial on hidden Markov models and selected applications in speech recognition," Proc. IEEE, vol. 77, no. 2, pp. 257-286, Feb. 1989.
-
(1989)
Proc. IEEE
, vol.77
, Issue.2
, pp. 257-286
-
-
Rabiner, L.1
-
25
-
-
0033882275
-
Image classification by a two dimensional hidden Markov model
-
Feb
-
J. Li, A. Najmi, and R. M. Gray, "Image classification by a two dimensional hidden Markov model," IEEE Trans. Signal Process., vol. 48, no. 2, pp. 517-533, Feb. 2000.
-
(2000)
IEEE Trans. Signal Process
, vol.48
, Issue.2
, pp. 517-533
-
-
Li, J.1
Najmi, A.2
Gray, R.M.3
-
26
-
-
0003860037
-
-
London, U.K, Chapman & Hall/CRC
-
W. R. Gilks, S. Richardson, and D. J. Spiegelhalter, Markov Chain Monte Carlo in Practice. London, U.K.: Chapman & Hall/CRC, 1996, p. 105.
-
(1996)
Markov Chain Monte Carlo in Practice
, pp. 105
-
-
Gilks, W.R.1
Richardson, S.2
Spiegelhalter, D.J.3
-
28
-
-
60149101826
-
-
L. Kleinrock, Queuing Systems. New York: Wiley, 1975, p. 76.
-
L. Kleinrock, Queuing Systems. New York: Wiley, 1975, p. 76.
-
-
-
|