메뉴 건너뛰기




Volumn 28, Issue 2, 2013, Pages 1666-1675

A computational strategy to solve preventive risk-based security-constrained OPF

Author keywords

Benders decomposition; Operation; Optimal power flow; Preventive; Risk; Security

Indexed keywords

BENDERS DECOMPOSITION; OPERATION; OPTIMAL POWER FLOWS; PREVENTIVE; SECURITY;

EID: 84880919447     PISSN: 08858950     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPWRS.2012.2219080     Document Type: Article
Times cited : (83)

References (34)
  • 4
    • 0032070097 scopus 로고    scopus 로고
    • Why risk analysis outperforms probabilistic choice as the effective decision support paradigm for power system planning
    • May
    • V. Miranda and L. M. Proenca, "Why risk analysis outperforms probabilistic choice as the effective decision support paradigm for power system planning," IEEE Trans. Power Syst., vol. 13, no. 2, pp. 643-648, May 1998.
    • (1998) IEEE Trans. Power Syst. , vol.13 , Issue.2 , pp. 643-648
    • Miranda, V.1    Proenca, L.M.2
  • 5
  • 6
    • 0016061310 scopus 로고
    • Optimal load flow with steady-state security
    • May
    • O. Alsac and B. Stott, "Optimal load flow with steady-state security," IEEE Trans. Power App. Syst., vol. PAS-93, no. 3, pp. 745-751, May 1974.
    • (1974) IEEE Trans. Power App. Syst. , vol.93 , Issue.3 , pp. 745-751
    • Alsac, O.1    Stott, B.2
  • 7
    • 0020242686 scopus 로고
    • Economic dispatch with network security constraints using parametric quadratic programming
    • Sep.
    • K. Aoki and T. Satoh, "Economic dispatch with network security constraints using parametric quadratic programming," IEEE Trans. Power App. Syst., vol. PAS-101, no. 9, pp. 3502-3512, Sep. 1982.
    • (1982) IEEE Trans. Power App. Syst. , vol.PAS-101 , Issue.9 , pp. 3502-3512
    • Aoki, K.1    Satoh, T.2
  • 8
    • 0023292179 scopus 로고
    • Security-constrained optimal power flow with post-contingency corrective rescheduling
    • Feb.
    • A. Monticelli, M. V. F. Pereira, and S. Granville, "Security- constrained optimal power flow with post-contingency corrective rescheduling," IEEE Trans. Power Syst., vol. 2, no. 1, pp. 175-180, Feb. 1987.
    • (1987) IEEE Trans. Power Syst. , vol.2 , Issue.1 , pp. 175-180
    • Monticelli, A.1    Pereira, M.V.F.2    Granville, S.3
  • 9
    • 4444253501 scopus 로고    scopus 로고
    • Evolutionary programming based security constrained optimal power flow
    • P. Somasundaram, K. Kuppusamy, and R. P. Kumudini Devi, "Evolutionary programming based security constrained optimal power flow," Elect. Power Syst. Res., vol. 72, no. 2, pp. 137-145, 2004.
    • (2004) Elect. Power Syst. Res. , vol.72 , Issue.2 , pp. 137-145
    • Somasundaram, P.1    Kuppusamy, K.2    Kumudini Devi, R.P.3
  • 10
    • 36348993230 scopus 로고    scopus 로고
    • Contingency filtering techniques for preventive security-constrained optimal power flow
    • Feb.
    • F. Capitanescu, M. Glavic, D. Ernst, and L. Wehenkel, "Contingency filtering techniques for preventive security-constrained optimal power flow," IEEE Trans. Power Syst., vol. 22, no. 1, pp. 1690-1697, Feb. 2007.
    • (2007) IEEE Trans. Power Syst. , vol.22 , Issue.1 , pp. 1690-1697
    • Capitanescu, F.1    Glavic, M.2    Ernst, D.3    Wehenkel, L.4
  • 11
    • 0026140228 scopus 로고
    • Risk and uncertainty in power system planning
    • H. M. Merrill and A. J. Wood, "Risk and uncertainty in power system planning," Int. J. Elect. Power Energy Syst., vol. 13, no. 2, pp. 81-90, 1991.
    • (1991) Int. J. Elect. Power Energy Syst. , vol.13 , Issue.2 , pp. 81-90
    • Merrill, H.M.1    Wood, A.J.2
  • 12
    • 0037292303 scopus 로고    scopus 로고
    • On-line risk-based security assessment
    • Feb.
    • M. Ni, J. McCalley, V. Vijay, and T. Tayyib, "On-line risk-based security assessment," IEEE Trans. Power Syst., vol. 18, no. 1, pp. 258-265, Feb. 2003.
    • (2003) IEEE Trans. Power Syst. , vol.18 , Issue.1 , pp. 258-265
    • Ni, M.1    McCalley, J.2    Vijay, V.3    Tayyib, T.4
  • 13
    • 36348998755 scopus 로고    scopus 로고
    • Risk-based security and economy tradeoff analysis for real-time operation
    • Nov.
    • F. Xiao and J. D. McCalley, "Risk-based security and economy tradeoff analysis for real-time operation," IEEE Trans. Power Syst., vol. 22, no. 4, pp. 2287-2288, Nov. 2007.
    • (2007) IEEE Trans. Power Syst. , vol.22 , Issue.4 , pp. 2287-2288
    • Xiao, F.1    McCalley, J.D.2
  • 15
    • 60149097823 scopus 로고    scopus 로고
    • Power system risk assessment and control in a multi-objective framework
    • Feb.
    • F. Xiao and J. McCalley, "Power system risk assessment and control in a multi-objective framework," IEEE Trans. Power Syst., vol. 24, no. 1, pp. 78-87, Feb. 2009.
    • (2009) IEEE Trans. Power Syst. , vol.24 , Issue.1 , pp. 78-87
    • Xiao, F.1    McCalley, J.2
  • 16
    • 84864447417 scopus 로고    scopus 로고
    • Long term benefits of online risk-based DC optimal power flow
    • R. Dai, H. Pham, Y. Wang, and J. D. McCalley, "Long term benefits of online risk-based DC optimal power flow," J. Risk Reliab., vol. 226, no. 1, pp. 65-74, 2012.
    • (2012) J. Risk Reliab. , vol.226 , Issue.1 , pp. 65-74
    • Dai, R.1    Pham, H.2    Wang, Y.3    McCalley, J.D.4
  • 17
    • 60649101841 scopus 로고    scopus 로고
    • N-1 security in optimal power flow control applied to limited areas
    • G. Hug-Glanzmann and G. Andersson, "N-1 security in optimal power flow control applied to limited areas," IET Gener. Transm. Distrib., vol. 3, no. 2, pp. 206-215, 2009.
    • (2009) IET Gener. Transm. Distrib. , vol.3 , Issue.2 , pp. 206-215
    • Hug-Glanzmann, G.1    Andersson, G.2
  • 18
    • 9644308639 scopus 로고
    • Partitioning procedures for solving mixed-variables programming problems
    • J. Benders, "Partitioning procedures for solving mixed-variables programming problems," J. Numer. Math., vol. 4, no. 1, pp. 238-252, 1962.
    • (1962) J. Numer. Math. , vol.4 , Issue.1 , pp. 238-252
    • Benders, J.1
  • 19
    • 0015419856 scopus 로고
    • Generalized Benders decomposition
    • A. Geoffrion, "Generalized Benders decomposition," J. Optim. Theory Appl., vol. 10, no. 4, pp. 237-260, 1972.
    • (1972) J. Optim. Theory Appl. , vol.10 , Issue.4 , pp. 237-260
    • Geoffrion, A.1
  • 20
    • 0041524223 scopus 로고    scopus 로고
    • Software implementation of online risk-based security assessment
    • Aug.
    • M. Ni et al., "Software implementation of online risk-based security assessment," IEEE Trans. Power Syst., vol. 18, no. 3, pp. 1165-1172, Aug. 2003.
    • (2003) IEEE Trans. Power Syst. , vol.18 , Issue.3 , pp. 1165-1172
    • Ni, M.1
  • 25
    • 33646379100 scopus 로고    scopus 로고
    • Ac contingency dispatch based on security-constrained unit commitment
    • May
    • Y. Fu, M. Shahidehpour, and Z. Li, "Ac contingency dispatch based on security-constrained unit commitment," IEEE Trans. Power Syst., vol. 21, no. 2, pp. 897-908, May 2006.
    • (2006) IEEE Trans. Power Syst. , vol.21 , Issue.2 , pp. 897-908
    • Fu, Y.1    Shahidehpour, M.2    Li, Z.3
  • 26
    • 39749144016 scopus 로고    scopus 로고
    • Optimal power flow subject to security constraints solved with a particle swarm optimizer
    • Feb.
    • P. Yumbla, J. M. Ramirez, and C. Coello, "Optimal power flow subject to security constraints solved with a particle swarm optimizer," IEEE Trans. Power Syst., vol. 23, no. 1, pp. 33-40, Feb. 2008.
    • (2008) IEEE Trans. Power Syst. , vol.23 , Issue.1 , pp. 33-40
    • Yumbla, P.1    Ramirez, J.M.2    Coello, C.3
  • 28
    • 32144455377 scopus 로고    scopus 로고
    • Security-constrained optimal generation scheduling in large-scale power systems
    • Feb.
    • J. Martinez-Crespo, J. Usaola, and J. L. Fernandez, "Security- constrained optimal generation scheduling in large-scale power systems," IEEE Trans. Power Syst., vol. 21, no. 1, pp. 321-332, Feb. 2006.
    • (2006) IEEE Trans. Power Syst. , vol.21 , Issue.1 , pp. 321-332
    • Martinez-Crespo, J.1    Usaola, J.2    Fernandez, J.L.3
  • 29
    • 70350541098 scopus 로고    scopus 로고
    • A new iterative approach to the corrective security-constrained optimal power flow problem
    • Nov.
    • F. Capitanescu and L. Wehenkel, "A new iterative approach to the corrective security-constrained optimal power flow problem," IEEE Trans. Power Syst., vol. 23, no. 4, pp. 1533-1541, Nov. 2008.
    • (2008) IEEE Trans. Power Syst. , vol.23 , Issue.4 , pp. 1533-1541
    • Capitanescu, F.1    Wehenkel, L.2
  • 31
    • 84886430070 scopus 로고    scopus 로고
    • Recent ISO Software Enhancements and Future Software and Modeling Plans
    • [Online]. Available
    • FERC Report, Recent ISO Software Enhancements and Future Software and Modeling Plans. [Online]. Available: http://www.ferc.gov/industries/electric/ indus-act/rto/rto-iso-soft-2011.pdf.
    • FERC Report
  • 32
    • 16244405919 scopus 로고    scopus 로고
    • Benders decomposition: Applying Benders decomposition to power systems
    • Mar./Apr.
    • M. Shahidehopour and Y. Fu, "Benders decomposition: applying Benders decomposition to power systems," IEEE Power Energy Mag., vol. 3, no. 2, pp. 20-21, Mar./Apr. 2005.
    • (2005) IEEE Power Energy Mag. , vol.3 , Issue.2 , pp. 20-21
    • Shahidehopour, M.1    Fu, Y.2
  • 33
    • 36348988575 scopus 로고    scopus 로고
    • Fast SCUC for large-scale power systems
    • Nov
    • Y. Fu and M. Shahidehpour, "Fast SCUC for large-scale power systems," IEEE Trans. Power Syst., vol. 22, no. 4, pp. 2144-2151, Nov, 2007.
    • (2007) IEEE Trans. Power Syst. , vol.22 , Issue.4 , pp. 2144-2151
    • Fu, Y.1    Shahidehpour, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.