-
4
-
-
0032070097
-
Why risk analysis outperforms probabilistic choice as the effective decision support paradigm for power system planning
-
May
-
V. Miranda and L. M. Proenca, "Why risk analysis outperforms probabilistic choice as the effective decision support paradigm for power system planning," IEEE Trans. Power Syst., vol. 13, no. 2, pp. 643-648, May 1998.
-
(1998)
IEEE Trans. Power Syst.
, vol.13
, Issue.2
, pp. 643-648
-
-
Miranda, V.1
Proenca, L.M.2
-
5
-
-
0018324857
-
Automatic contingency selection
-
G. C. Ejebe and B. F. Wollenberg, "Automatic contingency selection," IEEE Trans. Power App. Syst., vol. PAS-98, no. 1, pp. 97-109, 1979.
-
(1979)
IEEE Trans. Power App. Syst.
, vol.PAS-98
, Issue.1
, pp. 97-109
-
-
Ejebe, G.C.1
Wollenberg, B.F.2
-
6
-
-
0016061310
-
Optimal load flow with steady-state security
-
May
-
O. Alsac and B. Stott, "Optimal load flow with steady-state security," IEEE Trans. Power App. Syst., vol. PAS-93, no. 3, pp. 745-751, May 1974.
-
(1974)
IEEE Trans. Power App. Syst.
, vol.93
, Issue.3
, pp. 745-751
-
-
Alsac, O.1
Stott, B.2
-
7
-
-
0020242686
-
Economic dispatch with network security constraints using parametric quadratic programming
-
Sep.
-
K. Aoki and T. Satoh, "Economic dispatch with network security constraints using parametric quadratic programming," IEEE Trans. Power App. Syst., vol. PAS-101, no. 9, pp. 3502-3512, Sep. 1982.
-
(1982)
IEEE Trans. Power App. Syst.
, vol.PAS-101
, Issue.9
, pp. 3502-3512
-
-
Aoki, K.1
Satoh, T.2
-
8
-
-
0023292179
-
Security-constrained optimal power flow with post-contingency corrective rescheduling
-
Feb.
-
A. Monticelli, M. V. F. Pereira, and S. Granville, "Security- constrained optimal power flow with post-contingency corrective rescheduling," IEEE Trans. Power Syst., vol. 2, no. 1, pp. 175-180, Feb. 1987.
-
(1987)
IEEE Trans. Power Syst.
, vol.2
, Issue.1
, pp. 175-180
-
-
Monticelli, A.1
Pereira, M.V.F.2
Granville, S.3
-
9
-
-
4444253501
-
Evolutionary programming based security constrained optimal power flow
-
P. Somasundaram, K. Kuppusamy, and R. P. Kumudini Devi, "Evolutionary programming based security constrained optimal power flow," Elect. Power Syst. Res., vol. 72, no. 2, pp. 137-145, 2004.
-
(2004)
Elect. Power Syst. Res.
, vol.72
, Issue.2
, pp. 137-145
-
-
Somasundaram, P.1
Kuppusamy, K.2
Kumudini Devi, R.P.3
-
10
-
-
36348993230
-
Contingency filtering techniques for preventive security-constrained optimal power flow
-
Feb.
-
F. Capitanescu, M. Glavic, D. Ernst, and L. Wehenkel, "Contingency filtering techniques for preventive security-constrained optimal power flow," IEEE Trans. Power Syst., vol. 22, no. 1, pp. 1690-1697, Feb. 2007.
-
(2007)
IEEE Trans. Power Syst.
, vol.22
, Issue.1
, pp. 1690-1697
-
-
Capitanescu, F.1
Glavic, M.2
Ernst, D.3
Wehenkel, L.4
-
11
-
-
0026140228
-
Risk and uncertainty in power system planning
-
H. M. Merrill and A. J. Wood, "Risk and uncertainty in power system planning," Int. J. Elect. Power Energy Syst., vol. 13, no. 2, pp. 81-90, 1991.
-
(1991)
Int. J. Elect. Power Energy Syst.
, vol.13
, Issue.2
, pp. 81-90
-
-
Merrill, H.M.1
Wood, A.J.2
-
12
-
-
0037292303
-
On-line risk-based security assessment
-
Feb.
-
M. Ni, J. McCalley, V. Vijay, and T. Tayyib, "On-line risk-based security assessment," IEEE Trans. Power Syst., vol. 18, no. 1, pp. 258-265, Feb. 2003.
-
(2003)
IEEE Trans. Power Syst.
, vol.18
, Issue.1
, pp. 258-265
-
-
Ni, M.1
McCalley, J.2
Vijay, V.3
Tayyib, T.4
-
13
-
-
36348998755
-
Risk-based security and economy tradeoff analysis for real-time operation
-
Nov.
-
F. Xiao and J. D. McCalley, "Risk-based security and economy tradeoff analysis for real-time operation," IEEE Trans. Power Syst., vol. 22, no. 4, pp. 2287-2288, Nov. 2007.
-
(2007)
IEEE Trans. Power Syst.
, vol.22
, Issue.4
, pp. 2287-2288
-
-
Xiao, F.1
McCalley, J.D.2
-
14
-
-
71849087478
-
Risk-based optimal power flow and system operation state
-
Y. Li and J. McCalley, "Risk-based optimal power flow and system operation state," in Proc. IEEE Power & Energy Soc. General Meeting, Calgary, AB, Canada, Jul. 2009.
-
Proc. IEEE Power & Energy Soc. General Meeting, Calgary, AB, Canada, Jul. 2009
-
-
Li, Y.1
McCalley, J.2
-
15
-
-
60149097823
-
Power system risk assessment and control in a multi-objective framework
-
Feb.
-
F. Xiao and J. McCalley, "Power system risk assessment and control in a multi-objective framework," IEEE Trans. Power Syst., vol. 24, no. 1, pp. 78-87, Feb. 2009.
-
(2009)
IEEE Trans. Power Syst.
, vol.24
, Issue.1
, pp. 78-87
-
-
Xiao, F.1
McCalley, J.2
-
16
-
-
84864447417
-
Long term benefits of online risk-based DC optimal power flow
-
R. Dai, H. Pham, Y. Wang, and J. D. McCalley, "Long term benefits of online risk-based DC optimal power flow," J. Risk Reliab., vol. 226, no. 1, pp. 65-74, 2012.
-
(2012)
J. Risk Reliab.
, vol.226
, Issue.1
, pp. 65-74
-
-
Dai, R.1
Pham, H.2
Wang, Y.3
McCalley, J.D.4
-
17
-
-
60649101841
-
N-1 security in optimal power flow control applied to limited areas
-
G. Hug-Glanzmann and G. Andersson, "N-1 security in optimal power flow control applied to limited areas," IET Gener. Transm. Distrib., vol. 3, no. 2, pp. 206-215, 2009.
-
(2009)
IET Gener. Transm. Distrib.
, vol.3
, Issue.2
, pp. 206-215
-
-
Hug-Glanzmann, G.1
Andersson, G.2
-
18
-
-
9644308639
-
Partitioning procedures for solving mixed-variables programming problems
-
J. Benders, "Partitioning procedures for solving mixed-variables programming problems," J. Numer. Math., vol. 4, no. 1, pp. 238-252, 1962.
-
(1962)
J. Numer. Math.
, vol.4
, Issue.1
, pp. 238-252
-
-
Benders, J.1
-
19
-
-
0015419856
-
Generalized Benders decomposition
-
A. Geoffrion, "Generalized Benders decomposition," J. Optim. Theory Appl., vol. 10, no. 4, pp. 237-260, 1972.
-
(1972)
J. Optim. Theory Appl.
, vol.10
, Issue.4
, pp. 237-260
-
-
Geoffrion, A.1
-
20
-
-
0041524223
-
Software implementation of online risk-based security assessment
-
Aug.
-
M. Ni et al., "Software implementation of online risk-based security assessment," IEEE Trans. Power Syst., vol. 18, no. 3, pp. 1165-1172, Aug. 2003.
-
(2003)
IEEE Trans. Power Syst.
, vol.18
, Issue.3
, pp. 1165-1172
-
-
Ni, M.1
-
23
-
-
84864492150
-
-
Ph.D. dissertation, Dept. Elect. and Comput. Eng., Iowa State Univ., Ames, IA
-
F. Xiao, "Risk based multi-objective security control and congestion management," Ph.D. dissertation, Dept. Elect. and Comput. Eng., Iowa State Univ., Ames, IA, 2007.
-
(2007)
Risk Based Multi-objective Security Control and Congestion Management
-
-
Xiao, F.1
-
24
-
-
2542546568
-
Marginal loss modeling in LMP calculation
-
May
-
E. Litvinov, T. Zheng, G. Rosenwald, and P. Shamsollahi, "Marginal loss modeling in LMP calculation," IEEE Trans. Power Syst., vol. 19, no. 2, pp. 880-888, May 2004.
-
(2004)
IEEE Trans. Power Syst.
, vol.19
, Issue.2
, pp. 880-888
-
-
Litvinov, E.1
Zheng, T.2
Rosenwald, G.3
Shamsollahi, P.4
-
25
-
-
33646379100
-
Ac contingency dispatch based on security-constrained unit commitment
-
May
-
Y. Fu, M. Shahidehpour, and Z. Li, "Ac contingency dispatch based on security-constrained unit commitment," IEEE Trans. Power Syst., vol. 21, no. 2, pp. 897-908, May 2006.
-
(2006)
IEEE Trans. Power Syst.
, vol.21
, Issue.2
, pp. 897-908
-
-
Fu, Y.1
Shahidehpour, M.2
Li, Z.3
-
26
-
-
39749144016
-
Optimal power flow subject to security constraints solved with a particle swarm optimizer
-
Feb.
-
P. Yumbla, J. M. Ramirez, and C. Coello, "Optimal power flow subject to security constraints solved with a particle swarm optimizer," IEEE Trans. Power Syst., vol. 23, no. 1, pp. 33-40, Feb. 2008.
-
(2008)
IEEE Trans. Power Syst.
, vol.23
, Issue.1
, pp. 33-40
-
-
Yumbla, P.1
Ramirez, J.M.2
Coello, C.3
-
27
-
-
0035248665
-
Dynamic security constrained optimal power flow/VAR planning
-
Feb.
-
E. Vaahedi, Y. Mansour, C. Fuchs, S. Granville, M. de Lujan Latore, and H. Hamadanizadeh, "Dynamic security constrained optimal power flow/VAR planning," IEEE Trans. Power Syst., vol. 16, no. 1, pp. 38-43, Feb. 2001.
-
(2001)
IEEE Trans. Power Syst.
, vol.16
, Issue.1
, pp. 38-43
-
-
Vaahedi, E.1
Mansour, Y.2
Fuchs, C.3
Granville, S.4
De Lujan Latore, M.5
Hamadanizadeh, H.6
-
28
-
-
32144455377
-
Security-constrained optimal generation scheduling in large-scale power systems
-
Feb.
-
J. Martinez-Crespo, J. Usaola, and J. L. Fernandez, "Security- constrained optimal generation scheduling in large-scale power systems," IEEE Trans. Power Syst., vol. 21, no. 1, pp. 321-332, Feb. 2006.
-
(2006)
IEEE Trans. Power Syst.
, vol.21
, Issue.1
, pp. 321-332
-
-
Martinez-Crespo, J.1
Usaola, J.2
Fernandez, J.L.3
-
29
-
-
70350541098
-
A new iterative approach to the corrective security-constrained optimal power flow problem
-
Nov.
-
F. Capitanescu and L. Wehenkel, "A new iterative approach to the corrective security-constrained optimal power flow problem," IEEE Trans. Power Syst., vol. 23, no. 4, pp. 1533-1541, Nov. 2008.
-
(2008)
IEEE Trans. Power Syst.
, vol.23
, Issue.4
, pp. 1533-1541
-
-
Capitanescu, F.1
Wehenkel, L.2
-
31
-
-
84886430070
-
Recent ISO Software Enhancements and Future Software and Modeling Plans
-
[Online]. Available
-
FERC Report, Recent ISO Software Enhancements and Future Software and Modeling Plans. [Online]. Available: http://www.ferc.gov/industries/electric/ indus-act/rto/rto-iso-soft-2011.pdf.
-
FERC Report
-
-
-
32
-
-
16244405919
-
Benders decomposition: Applying Benders decomposition to power systems
-
Mar./Apr.
-
M. Shahidehopour and Y. Fu, "Benders decomposition: applying Benders decomposition to power systems," IEEE Power Energy Mag., vol. 3, no. 2, pp. 20-21, Mar./Apr. 2005.
-
(2005)
IEEE Power Energy Mag.
, vol.3
, Issue.2
, pp. 20-21
-
-
Shahidehopour, M.1
Fu, Y.2
-
33
-
-
36348988575
-
Fast SCUC for large-scale power systems
-
Nov
-
Y. Fu and M. Shahidehpour, "Fast SCUC for large-scale power systems," IEEE Trans. Power Syst., vol. 22, no. 4, pp. 2144-2151, Nov, 2007.
-
(2007)
IEEE Trans. Power Syst.
, vol.22
, Issue.4
, pp. 2144-2151
-
-
Fu, Y.1
Shahidehpour, M.2
|