메뉴 건너뛰기




Volumn 28, Issue 4, 2013, Pages 3924-3934

Identification of umbrella constraints in dc-based security-constrained optimal power flow

Author keywords

Computational complexity; Contingencies; Convex optimization; Generation dispatch; Linear programming; Preventive control; Security constrained optimal power flow; Umbrella constraint

Indexed keywords

CONTINGENCIES; GENERATION DISPATCH; PREVENTIVE CONTROL; SECURITY-CONSTRAINED OPTIMAL POWER FLOW; UMBRELLA CONSTRAINT;

EID: 84886091112     PISSN: 08858950     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPWRS.2013.2271980     Document Type: Article
Times cited : (145)

References (31)
  • 2
    • 28244448538 scopus 로고    scopus 로고
    • Market-clearing with stochastic security - Part II: Case studies
    • Nov.
    • F. Bouffard, F. D. Galiana, and A. J. Conejo, "Market-clearing with stochastic security - Part II: Case studies," IEEE Trans. Power Syst., vol. 20, no. 4, pp. 1827-1835, Nov. 2005.
    • (2005) IEEE Trans. Power Syst. , vol.20 , Issue.4 , pp. 1827-1835
    • Bouffard, F.1    Galiana, F.D.2    Conejo, A.J.3
  • 6
    • 0018324857 scopus 로고
    • Automatic contingency selection
    • Jan.
    • C. G. Ejebe and B. F. Wollenberg, "Automatic contingency selection," IEEE Trans. Power App. Syst., vol. PAS-98, no. 1, pp. 97-109, Jan. 1979.
    • (1979) IEEE Trans. Power App. Syst. , vol.PAS-98 , Issue.1 , pp. 97-109
    • Ejebe, C.G.1    Wollenberg, B.F.2
  • 7
    • 0019637826 scopus 로고
    • Power system security corridors concept and computation
    • Nov.
    • M. H. Banakar and F. D. Galiana, "Power system security corridors concept and computation," IEEE Trans. Power App. Syst., vol. PAS-100, no. 11, pp. 4524-4532, Nov. 1981.
    • (1981) IEEE Trans. Power App. Syst. , vol.PAS-100 , Issue.11 , pp. 4524-4532
    • Banakar, M.H.1    Galiana, F.D.2
  • 8
    • 0020206152 scopus 로고
    • The application of decision-theory to contingency selection
    • Nov.
    • R. Fischl, T. F. Halpin, and A. Guvenis, "The application of decision-theory to contingency selection," IEEE Trans. Circuits Syst., vol. CAS-29, no. 11, pp. 712-723, Nov. 1982.
    • (1982) IEEE Trans. Circuits Syst. , vol.CAS-29 , Issue.11 , pp. 712-723
    • Fischl, R.1    Halpin, T.F.2    Guvenis, A.3
  • 9
    • 0024668301 scopus 로고
    • Complete bounding for AC contingency analysis
    • May
    • V. Brandwajn and M. G. Lauby, "Complete bounding for AC contingency analysis," IEEE Trans. Power Syst., vol. 4, no. 2, pp. 724-729, May 1989.
    • (1989) IEEE Trans. Power Syst. , vol.4 , Issue.2 , pp. 724-729
    • Brandwajn, V.1    Lauby, M.G.2
  • 10
    • 0032136657 scopus 로고    scopus 로고
    • Integrated framework for dynamic security analysis
    • Aug.
    • A. B. R. Kumar, V. Brandwajn, A. Ipakchi, and R. Adapa, "Integrated framework for dynamic security analysis," IEEE Trans. Power Syst., vol. 13, no. 3, pp. 816-821, Aug. 1998.
    • (1998) IEEE Trans. Power Syst. , vol.13 , Issue.3 , pp. 816-821
    • Kumar, A.B.R.1    Brandwajn, V.2    Ipakchi, A.3    Adapa, R.4
  • 11
    • 0032592974 scopus 로고    scopus 로고
    • Contingency ranking based on severity indices in dynamic severity analysis
    • Aug.
    • C. Fu and A. Bose, "Contingency ranking based on severity indices in dynamic severity analysis," IEEE Trans. Power Syst., vol. 14, no. 3, pp. 980-986, Aug. 1999.
    • (1999) IEEE Trans. Power Syst. , vol.14 , Issue.3 , pp. 980-986
    • Fu, C.1    Bose, A.2
  • 12
    • 0035425987 scopus 로고    scopus 로고
    • A unified approach to transient stability contingency filtering, ranking and assessment
    • Aug.
    • D. Ernst, D. Ruiz-Vega, M. Pavella, P. M. Hirsch, and D. Sobajic, "A unified approach to transient stability contingency filtering, ranking and assessment," IEEE Trans. Power Syst., vol. 16, no. 3, pp. 435-443, Aug. 2001.
    • (2001) IEEE Trans. Power Syst. , vol.16 , Issue.3 , pp. 435-443
    • Ernst, D.1    Ruiz-Vega, D.2    Pavella, M.3    Hirsch, P.M.4    Sobajic, D.5
  • 13
    • 36348993230 scopus 로고    scopus 로고
    • Contingency filtering techniques for preventive security-constrained optimal power flow
    • Nov.
    • F. Capitanescu, M. Glavic, D. Ernst, and L. Wehenkel, "Contingency filtering techniques for preventive security-constrained optimal power flow," IEEE Trans. Power Syst., vol. 22, no. 4, pp. 1690-1697, Nov. 2007.
    • (2007) IEEE Trans. Power Syst. , vol.22 , Issue.4 , pp. 1690-1697
    • Capitanescu, F.1    Glavic, M.2    Ernst, D.3    Wehenkel, L.4
  • 14
    • 70350541098 scopus 로고    scopus 로고
    • A new iterative approach to the corrective security-constrained optimal power flow problem
    • Nov.
    • F. Capitanescu and L. Wehenkel, "A new iterative approach to the corrective security-constrained optimal power flow problem," IEEE Trans. Power Syst., vol. 23, no. 4, pp. 1533-1541, Nov. 2008.
    • (2008) IEEE Trans. Power Syst. , vol.23 , Issue.4 , pp. 1533-1541
    • Capitanescu, F.1    Wehenkel, L.2
  • 16
    • 0018919267 scopus 로고
    • Fast contingency evaluation using concentric relaxation
    • Jan.
    • J. Zaborszky, K.-W. Whang, and K. Prasad, "Fast contingency evaluation using concentric relaxation," IEEE Trans. Power App. Syst., vol. PAS-99, no. 1, pp. 28-36, Jan. 1980.
    • (1980) IEEE Trans. Power App. Syst. , vol.PAS-99 , Issue.1 , pp. 28-36
    • Zaborszky, J.1    Whang, K.-W.2    Prasad, K.3
  • 17
    • 0023291420 scopus 로고
    • Efficient bounding method for linear contingency analysis
    • Feb.
    • V. Brandwajn, "Efficient bounding method for linear contingency analysis," IEEE Trans. Power Syst., vol. 3, no. 1, pp. 38-43, Feb. 1988.
    • (1988) IEEE Trans. Power Syst. , vol.3 , Issue.1 , pp. 38-43
    • Brandwajn, V.1
  • 18
    • 77958471988 scopus 로고    scopus 로고
    • Fast identification of inactive security constraints in SCUC problems
    • Nov.
    • Q. Zhai, X. Guan, J. Cheng, and H. Wu, "Fast identification of inactive security constraints in SCUC problems," IEEE Trans. Power Syst., vol. 25, no. 4, pp. 1946-1954, Nov. 2010.
    • (2010) IEEE Trans. Power Syst. , vol.25 , Issue.4 , pp. 1946-1954
    • Zhai, Q.1    Guan, X.2    Cheng, J.3    Wu, H.4
  • 19
    • 79960893303 scopus 로고    scopus 로고
    • Contingency-constrained unit commitment with n - k security criterion: A robust optimization approach
    • Aug.
    • A. Street, F. Oliveira, and J. Arroyo, "Contingency-constrained unit commitment with n - k security criterion: A robust optimization approach," IEEE Trans. Power Syst., vol. 26, no. 3, pp. 1581-1590, Aug. 2011.
    • (2011) IEEE Trans. Power Syst. , vol.26 , Issue.3 , pp. 1581-1590
    • Street, A.1    Oliveira, F.2    Arroyo, J.3
  • 20
    • 34248550993 scopus 로고    scopus 로고
    • Security-constrained resource planning in electricity markets
    • May
    • J. H. Roh, M. Shahidehpour, and Y. Fu, "Security-constrained resource planning in electricity markets," IEEE Trans. Power Syst., vol. 22, no. 2, pp. 812-820, May 2007.
    • (2007) IEEE Trans. Power Syst. , vol.22 , Issue.2 , pp. 812-820
    • Roh, J.H.1    Shahidehpour, M.2    Fu, Y.3
  • 22
    • 0032592961 scopus 로고    scopus 로고
    • The IEEE reliability test system - 1996
    • Reliability Test System Task Force, Aug.
    • Reliability Test System Task Force, "The IEEE reliability test system - 1996," IEEE Trans. Power Syst., vol. 14, no. 3, pp. 1010-1020, Aug. 1999.
    • (1999) IEEE Trans. Power Syst. , vol.14 , Issue.3 , pp. 1010-1020
  • 27
    • 84926117279 scopus 로고    scopus 로고
    • Cambridge, U.K.: Cambridge Univ. Press
    • R. Baldick, Applied Optimization. Cambridge, U.K.: Cambridge Univ. Press, 2006.
    • (2006) Applied Optimization
    • Baldick, R.1
  • 31
    • 0022720167 scopus 로고
    • Decoupled optimal load flow using linear or quadratic programming
    • May
    • G. C. Contaxis, C. Delkis, and G. Korres, "Decoupled optimal load flow using linear or quadratic programming," IEEE Trans. Power Syst., vol. 1, no. 2, pp. 1-7, May 1986.
    • (1986) IEEE Trans. Power Syst. , vol.1 , Issue.2 , pp. 1-7
    • Contaxis, G.C.1    Delkis, C.2    Korres, G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.