메뉴 건너뛰기




Volumn 23, Issue 4, 2008, Pages 1533-1541

A new iterative approach to the corrective security-constrained optimal power flow problem

Author keywords

Benders decomposition; Contingency filtering; Optimal power flow; Security constrained optimal power flow

Indexed keywords

BENDERS DECOMPOSITION; CONTINGENCY FILTERING; CONTINGENCY STATE; CORRECTIVE ACTIONS; DIRECT APPROACH; ITERATIVE APPROACH; OPTIMAL POWER FLOW; SECURITY ANALYSIS; SECURITY-CONSTRAINED OPTIMAL POWER FLOW; THREE SYSTEMS;

EID: 70350541098     PISSN: 08858950     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPWRS.2008.2002175     Document Type: Article
Times cited : (126)

References (20)
  • 1
    • 0016061310 scopus 로고
    • Optimal load flow with steady-state security
    • May/Jun
    • O. Alsac and B. Stott, "Optimal load flow with steady-state security," IEEE Trans. Power App. Syst., vol. PAS-93, no. 3, pp. 745-751, May/Jun. 1974.
    • (1974) IEEE Trans. Power App. Syst , vol.PAS-93 , Issue.3 , pp. 745-751
    • Alsac, O.1    Stott, B.2
  • 2
    • 0023292179 scopus 로고
    • Security-constrained optimal power flow with post-contingency corrective rescheduling
    • Feb
    • A. J. Monticelli, M. V. P. Pereira, and S. Granville, "Security-constrained optimal power flow with post-contingency corrective rescheduling," IEEE Trans. Power Syst., vol. 2, no. 1, pp. 175-182, Feb. 1987.
    • (1987) IEEE Trans. Power Syst , vol.2 , Issue.1 , pp. 175-182
    • Monticelli, A.J.1    Pereira, M.V.P.2    Granville, S.3
  • 3
    • 0023592567 scopus 로고
    • Security analysis and optimization (Invited Paper)
    • Dec
    • B. Stott, O. Alsac, and A. J. Monticelli, "Security analysis and optimization (Invited Paper)," Proc. IEEE, vol. 75, no. 12, pp. 1623-1644, Dec. 1987.
    • (1987) Proc. IEEE , vol.75 , Issue.12 , pp. 1623-1644
    • Stott, B.1    Alsac, O.2    Monticelli, A.J.3
  • 6
    • 9644308639 scopus 로고
    • Partitioning procedure for solving mixed variables programming problems
    • J. F. Benders, "Partitioning procedure for solving mixed variables programming problems," Numer. Math., vol. 4, pp. 238-252, 1962.
    • (1962) Numer. Math , vol.4 , pp. 238-252
    • Benders, J.F.1
  • 7
    • 0015419856 scopus 로고
    • Generalized Benders decomposition
    • A. M. Geoffrion, "Generalized Benders decomposition," J. Optim. Theory Appl., vol. 10, no. 4, pp. 237-260, 1972.
    • (1972) J. Optim. Theory Appl , vol.10 , Issue.4 , pp. 237-260
    • Geoffrion, A.M.1
  • 8
    • 0026203985 scopus 로고
    • A security-constrained decomposition approach to optimal reactive power planning
    • Aug
    • T. Gomez, I. J. Perez-Arriaga, J. Lumbreras, and V. M. Parra, "A security-constrained decomposition approach to optimal reactive power planning," IEEE Trans. Power Syst., vol. 6, no. 3, pp. 1069-1076, Aug. 1991.
    • (1991) IEEE Trans. Power Syst , vol.6 , Issue.3 , pp. 1069-1076
    • Gomez, T.1    Perez-Arriaga, I.J.2    Lumbreras, J.3    Parra, V.M.4
  • 9
    • 0028549992 scopus 로고
    • Application of decomposition techniques to var planning: Methodological and computational aspects
    • Nov
    • S. Granville and M. C. A. Lima, "Application of decomposition techniques to var planning: Methodological and computational aspects," IEEE Trans. Power Syst., vol. 9, no. 4, pp. 1780-1787, Nov. 1994.
    • (1994) IEEE Trans. Power Syst , vol.9 , Issue.4 , pp. 1780-1787
    • Granville, S.1    Lima, M.C.A.2
  • 10
    • 0032137761 scopus 로고    scopus 로고
    • A method for computing the value of corrective security
    • Aug
    • G. Strbac, S. Ahmed, D. Kirschen, and R. Allan, "A method for computing the value of corrective security," IEEE Trans. Power Syst., vol. 13, no. 3, pp. 1096-1102, Aug. 1998.
    • (1998) IEEE Trans. Power Syst , vol.13 , Issue.3 , pp. 1096-1102
    • Strbac, G.1    Ahmed, S.2    Kirschen, D.3    Allan, R.4
  • 11
    • 0035976456 scopus 로고    scopus 로고
    • Preventive and corrective open access system dispatch based on the voltage stability security assessment and diagnosis
    • R. A. Schlueter, S. Liu, and N. Alemadi, "Preventive and corrective open access system dispatch based on the voltage stability security assessment and diagnosis," Elect. Power Syst. Res., vol. 60, pp. 17-28, 2001.
    • (2001) Elect. Power Syst. Res , vol.60 , pp. 17-28
    • Schlueter, R.A.1    Liu, S.2    Alemadi, N.3
  • 13
    • 28244483147 scopus 로고    scopus 로고
    • Market-clearing with stochastic security (parts I and II)
    • Nov
    • F. Bouffard, F. D. Galiana, and A. J. Conejo, "Market-clearing with stochastic security (parts I and II)," IEEE Trans. Power Syst., vol. 20, no. 4, pp. 1818-1835, Nov. 2005.
    • (2005) IEEE Trans. Power Syst , vol.20 , Issue.4 , pp. 1818-1835
    • Bouffard, F.1    Galiana, F.D.2    Conejo, A.J.3
  • 14
    • 33646379100 scopus 로고    scopus 로고
    • Ac contingency dispatch based on security-constrained unit commitment
    • May
    • M. Shahidehpour and Z. Li, "Ac contingency dispatch based on security-constrained unit commitment," IEEE Trans. Power Syst., vol. 21, no. 2, pp. 897-908, May 2006.
    • (2006) IEEE Trans. Power Syst , vol.21 , Issue.2 , pp. 897-908
    • Shahidehpour, M.1    Li, Z.2
  • 15
    • 32144455377 scopus 로고    scopus 로고
    • Security-constrained optimal generation scheduling in large-scale power systems
    • Feb
    • J. Martinez-Crespo, J. Usaola, and J. L. Fernandez, "Security-constrained optimal generation scheduling in large-scale power systems," IEEE Trans. Power Syst., vol. 21, no. 1, pp. 321-332, Feb. 2006.
    • (2006) IEEE Trans. Power Syst , vol.21 , Issue.1 , pp. 321-332
    • Martinez-Crespo, J.1    Usaola, J.2    Fernandez, J.L.3
  • 16
    • 16244405919 scopus 로고    scopus 로고
    • Benders decomposition: Applying Benders decomposition to power systems
    • Mar./Apr
    • M. Shahidehopour and Y. Fu, "Benders decomposition: Applying Benders decomposition to power systems," IEEE Power Energy Mag., vol. 3, no. 2, pp. 20-21, Mar./Apr. 2005.
    • (2005) IEEE Power Energy Mag , vol.3 , Issue.2 , pp. 20-21
    • Shahidehopour, M.1    Fu, Y.2
  • 17
    • 33846594334 scopus 로고    scopus 로고
    • Interior-point based algorithms for the solution of optimal power flow problems
    • Apr
    • F. Capitanescu, M. Glavic, D. Ernst, and L. Wehenkel, "Interior-point based algorithms for the solution of optimal power flow problems," Elect. Power Syst. Res., vol. 77, no. 5-6, pp. 508-517, Apr. 2007.
    • (2007) Elect. Power Syst. Res , vol.77 , Issue.5-6 , pp. 508-517
    • Capitanescu, F.1    Glavic, M.2    Ernst, D.3    Wehenkel, L.4
  • 18
    • 36348993230 scopus 로고    scopus 로고
    • Contingency filtering techniques for preventive security-constrained optimal power flow
    • Nov
    • F. Capitanescu, M. Glavic, D. Ernst, and L. Wehenkel, "Contingency filtering techniques for preventive security-constrained optimal power flow," IEEE Trans. Power Syst., vol. 22, no. 4, pp. 1690-1697, Nov. 2007.
    • (2007) IEEE Trans. Power Syst , vol.22 , Issue.4 , pp. 1690-1697
    • Capitanescu, F.1    Glavic, M.2    Ernst, D.3    Wehenkel, L.4
  • 19
    • 70350547051 scopus 로고    scopus 로고
    • Long-Term Dynamics, Phase II, CIGRE Task Force 38.02.08, 1995.
    • Long-Term Dynamics, Phase II, CIGRE Task Force 38.02.08, 1995.
  • 20
    • 4143061857 scopus 로고    scopus 로고
    • Online, Available
    • IEEE-118 Bus System, 1996. [Online]. Available: http://www.ee. washington.edu.
    • (1996) IEEE-118 Bus System


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.