Academic literature on the topic 'Security-Constrained Optimal Power Flow'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security-Constrained Optimal Power Flow.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Security-Constrained Optimal Power Flow"
Thomas, James Jamal, and Santiago Grijalva. "Flexible Security-Constrained Optimal Power Flow." IEEE Transactions on Power Systems 30, no. 3 (May 2015): 1195–202. http://dx.doi.org/10.1109/tpwrs.2014.2345753.
Full textHarsan, H., N. Hadjsaid, and P. Pruvot. "Cyclic security analysis for security constrained optimal power flow." IEEE Transactions on Power Systems 12, no. 2 (May 1997): 948–53. http://dx.doi.org/10.1109/59.589787.
Full textFu, Cong, Yashan Zhong, Pingping Zhang, Xiangzhen He, Yun Yang, and Jian Zuo. "VSC-HVDC Incorporated Corrective Security-Constrained Optimal Power Flow." Journal of Physics: Conference Series 2320, no. 1 (August 1, 2022): 012006. http://dx.doi.org/10.1088/1742-6596/2320/1/012006.
Full textMohammadi, Javad, Gabriela Hug, and Soummya Kar. "Agent-Based Distributed Security Constrained Optimal Power Flow." IEEE Transactions on Smart Grid 9, no. 2 (March 2018): 1118–30. http://dx.doi.org/10.1109/tsg.2016.2577684.
Full textGutierrez-Martinez, Victor J., Claudio A. Canizares, Claudio R. Fuerte-Esquivel, Alejandro Pizano-Martinez, and Xueping Gu. "Neural-Network Security-Boundary Constrained Optimal Power Flow." IEEE Transactions on Power Systems 26, no. 1 (February 2011): 63–72. http://dx.doi.org/10.1109/tpwrs.2010.2050344.
Full textCorrea-Posada, Carlos M., and Pedro Sanchez-Martin. "Security-Constrained Optimal Power and Natural-Gas Flow." IEEE Transactions on Power Systems 29, no. 4 (July 2014): 1780–87. http://dx.doi.org/10.1109/tpwrs.2014.2299714.
Full textSomasundaram, P., K. Kuppusamy, and R. P. Kumudini Devi. "Evolutionary programming based security constrained optimal power flow." Electric Power Systems Research 72, no. 2 (December 2004): 137–45. http://dx.doi.org/10.1016/j.epsr.2004.02.006.
Full textVaahedi, E., Y. Mansour, C. Fuchs, S. Granville, M. D. L. Latore, and H. Hamadanizadeh. "Dynamic security constrained optimal power flow/VAr planning." IEEE Transactions on Power Systems 16, no. 1 (2001): 38–43. http://dx.doi.org/10.1109/59.910779.
Full textBinkou, Alhabib, and Yixin Yu. "Security constrained distributed optimal power flow of interconnected power systems." Transactions of Tianjin University 14, no. 3 (June 2008): 208–16. http://dx.doi.org/10.1007/s12209-008-0038-2.
Full textLi, Hang, Zhe Zhang, Xianggen Yin, and Buhan Zhang. "Preventive Security-Constrained Optimal Power Flow with Probabilistic Guarantees." Energies 13, no. 9 (May 8, 2020): 2344. http://dx.doi.org/10.3390/en13092344.
Full textDissertations / Theses on the topic "Security-Constrained Optimal Power Flow"
Zhang, Fan. "Solving Large Security-Constrained Optimal Power Flow for Power Grid Planning and Operations." Case Western Reserve University School of Graduate Studies / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=case1592567584117811.
Full textChiang, Naiyuan. "Structure-exploiting interior point methods for security constrained optimal power flow problems." Thesis, University of Edinburgh, 2013. http://hdl.handle.net/1842/8281.
Full textZhang, Shouming. "Security optimised optimal power flow." Thesis, Brunel University, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.320858.
Full textBahrami, Shahab. "Algorithm design for optimal power flow, security-constrained unit commitment, and demand response in energy systems." Thesis, University of British Columbia, 2017. http://hdl.handle.net/2429/62754.
Full textApplied Science, Faculty of
Electrical and Computer Engineering, Department of
Graduate
Pajic, Slobodan. "Sequential quadratic programming-based contingency constrained optimal power flow." Link to electronic thesis, 2003. http://www.wpi.edu/Pubs/ETD/Available/etd-0430103-152758.
Full textMohammadi, Javad. "Distributed Computational Methods for Energy Management in Smart Grids." Research Showcase @ CMU, 2016. http://repository.cmu.edu/dissertations/710.
Full textMacfie, Peter. "Large-scale security constrained optimal reactive power flow for operational loss management on the GB electricity transmission network." Thesis, Brunel University, 2010. http://bura.brunel.ac.uk/handle/2438/5073.
Full textHamon, Camille. "Probabilistic security management for power system operations with large amounts of wind power." Doctoral thesis, KTH, Elektriska energisystem, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-166398.
Full textQC 20150508
Pajic, Slobodan. "Power System State Estimation and Contingency Constrained Optimal Power Flow - A Numerically Robust Implementation." Digital WPI, 2007. https://digitalcommons.wpi.edu/etd-dissertations/240.
Full textZhang, Wang. "Optimisation and Integration of Variable Renewable Energy Sources in Electricity Networks." Thesis, The University of Sydney, 2017. http://hdl.handle.net/2123/16858.
Full textBook chapters on the topic "Security-Constrained Optimal Power Flow"
Velay, Maxime, Meritxell Vinyals, Yvon Bésanger, and Nicolas Retière. "Agent-Based Security Constrained Optimal Power Flow with Primary Frequency Control." In Multi-Agent Systems and Agreement Technologies, 79–95. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-01713-2_7.
Full textXiaoqin, Xia, Xu Wei, Yuan Zhen, and Xu Xiaotong. "Parallel Decomposition and Coordination Algorithm for Security Constrained Optimal Power Flow." In Lecture Notes in Electrical Engineering, 107–16. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-7156-2_8.
Full textSomasundaram, P., and N. B. Muthuselvan. "Security Constrained Optimal Power Flow with FACTS Devices Using Modified Particle Swarm Optimization." In Swarm, Evolutionary, and Memetic Computing, 639–47. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-17563-3_75.
Full textFioretto, Ferdinando, and Pascal Van Hentenryck. "Constrained-Based Differential Privacy: Releasing Optimal Power Flow Benchmarks Privately." In Integration of Constraint Programming, Artificial Intelligence, and Operations Research, 215–31. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93031-2_15.
Full textRathod, Darshan B., and Rinkesh A. Jain. "Comparative Analysis on Security-Constrained Optimal Power Flow Using Linear Sensitivity Factors-Based Contingency Screening." In Advances in Intelligent Systems and Computing, 139–47. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1966-2_12.
Full textDevesh Raj, Mani, and Periyasami Somasundaram. "Small Signal Stability Constrained Optimal Power Flow Using Swarm Based Algorithm." In Swarm, Evolutionary, and Memetic Computing, 699–709. Cham: Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-319-03753-0_62.
Full textHuebner, Nico, Nils Schween, Michael Suriyah, Vincent Heuveline, and Thomas Leibfried. "Multi-area Coordination of Security-Constrained Dynamic Optimal Power Flow in AC-DC Grids with Energy Storage." In Trends in Mathematics, 27–40. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-32157-4_3.
Full textLiu, Shichuan, Teng Mu, and Aijun Zhang. "Optimal Power Flow Calculation of Power System Based on Vector Distance Immune Algorithm." In The 2021 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy, 815–21. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-89508-2_106.
Full textNithya, C., J. Preetha Roselyn, D. Devaraj, and Subhransu Sekhar Dash. "Voltage Stability Constrained Optimal Power Flow Using Non-dominated Sorting Genetic Algorithm-II (NSGA II)." In Swarm, Evolutionary, and Memetic Computing, 793–801. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35380-2_93.
Full textMahapatra, Sheila, Nitin Malik, and A. N. Jha. "Cuckoo Search Algorithm and Ant Lion Optimizer for Optimal Allocation of TCSC and Voltage Stability Constrained Optimal Power Flow." In International Conference on Intelligent Computing and Smart Communication 2019, 889–905. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-15-0633-8_92.
Full textConference papers on the topic "Security-Constrained Optimal Power Flow"
Vrakopoulou, Maria, Marina Katsampani, Kostas Margellos, John Lygeros, and Goran Andersson. "Probabilistic security-constrained AC optimal power flow." In 2013 IEEE Grenoble PowerTech. IEEE, 2013. http://dx.doi.org/10.1109/ptc.2013.6652374.
Full textRahman, Jubeyer, Cong Feng, and Jie Zhang. "Machine Learning-Aided Security Constrained Optimal Power Flow." In 2020 IEEE Power & Energy Society General Meeting (PESGM). IEEE, 2020. http://dx.doi.org/10.1109/pesgm41954.2020.9281941.
Full textZhong, Chiyang, A. P. Sakis Meliopoulos, Maad AlOwaifeer, Jiahao Xie, and Gad Ilunga. "Object-Oriented Security Constrained Quadratic Optimal Power Flow." In 2020 IEEE Power & Energy Society General Meeting (PESGM). IEEE, 2020. http://dx.doi.org/10.1109/pesgm41954.2020.9282106.
Full textMohammadi, Javad, Soummya Kar, and Gabriela Hug. "Fully distributed corrective security constrained optimal power flow." In 2017 IEEE Manchester PowerTech. IEEE, 2017. http://dx.doi.org/10.1109/ptc.2017.7981066.
Full textCanizares, C., W. Rosehart, A. Berizzi, and C. Bovo. "Comparison of voltage security constrained optimal power flow techniques." In Proceedings of Power Engineering Society Summer Meeting. IEEE, 2001. http://dx.doi.org/10.1109/pess.2001.970328.
Full textChakrabarti, Sambuddha, Matt Kraning, Eric Chu, Ross Baldick, and Stephen Boyd. "Security Constrained Optimal Power Flow via proximal message passing." In 2014 Clemson University Power Systems Conference (PSC). IEEE, 2014. http://dx.doi.org/10.1109/psc.2014.6808131.
Full textVahedi, H., S. H. Hosseini, and R. Noroozian. "Bacterial Foraging Algorithm for security constrained optimal power flow." In 2010 7th International Conference on the European Energy Market (EEM 2010). IEEE, 2010. http://dx.doi.org/10.1109/eem.2010.5558709.
Full textWibowo, Rony Seto, Rendhi Maulana, Annisaa Taradini, Feby A. Pamuji, Adi Soeprijanto, and Ontoseno Penangsang. "Quadratic programming approach for security constrained optimal power flow." In 2015 7th International Conference on Information Technology and Electrical Engineering (ICITEE). IEEE, 2015. http://dx.doi.org/10.1109/iciteed.2015.7408941.
Full textTriwijaya, Santi, Nurdin Sugiantoro, Yuli Prasetyo, Firdaus, Rony Seto Wibowo, and Ontoseno Penangsang. "Security Constrained Optimal Power Flow Considering Dynamic Line Rating." In 2018 10th International Conference on Information Technology and Electrical Engineering (ICITEE). IEEE, 2018. http://dx.doi.org/10.1109/iciteed.2018.8534755.
Full textFeng Dong. "Practical applications of Preventive Security Constrained Optimal Power Flow." In 2012 IEEE Power & Energy Society General Meeting. New Energy Horizons - Opportunities and Challenges. IEEE, 2012. http://dx.doi.org/10.1109/pesgm.2012.6344734.
Full textReports on the topic "Security-Constrained Optimal Power Flow"
Kim, Kibaek, Youngdae Kim, Daniel Maldonado, Michel Schanen, Victor Zavala, and Nai-Yuan Chiang. A Scalable Mixed-Integer Decomposition Method for Security-Constrained Optimal Power Flow with Complementarity Constraints. Office of Scientific and Technical Information (OSTI), November 2021. http://dx.doi.org/10.2172/1835277.
Full textBienstock, Daniel, Michael Chertkov, and Sean Harnett. Chance Constrained Optimal Power Flow: Risk-Aware Network Control under Uncertainty. Office of Scientific and Technical Information (OSTI), September 2012. http://dx.doi.org/10.2172/1052351.
Full text