Journal articles on the topic 'Security-Constrained Optimal Power Flow'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security-Constrained Optimal Power Flow.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Thomas, James Jamal, and Santiago Grijalva. "Flexible Security-Constrained Optimal Power Flow." IEEE Transactions on Power Systems 30, no. 3 (May 2015): 1195–202. http://dx.doi.org/10.1109/tpwrs.2014.2345753.
Full textHarsan, H., N. Hadjsaid, and P. Pruvot. "Cyclic security analysis for security constrained optimal power flow." IEEE Transactions on Power Systems 12, no. 2 (May 1997): 948–53. http://dx.doi.org/10.1109/59.589787.
Full textFu, Cong, Yashan Zhong, Pingping Zhang, Xiangzhen He, Yun Yang, and Jian Zuo. "VSC-HVDC Incorporated Corrective Security-Constrained Optimal Power Flow." Journal of Physics: Conference Series 2320, no. 1 (August 1, 2022): 012006. http://dx.doi.org/10.1088/1742-6596/2320/1/012006.
Full textMohammadi, Javad, Gabriela Hug, and Soummya Kar. "Agent-Based Distributed Security Constrained Optimal Power Flow." IEEE Transactions on Smart Grid 9, no. 2 (March 2018): 1118–30. http://dx.doi.org/10.1109/tsg.2016.2577684.
Full textGutierrez-Martinez, Victor J., Claudio A. Canizares, Claudio R. Fuerte-Esquivel, Alejandro Pizano-Martinez, and Xueping Gu. "Neural-Network Security-Boundary Constrained Optimal Power Flow." IEEE Transactions on Power Systems 26, no. 1 (February 2011): 63–72. http://dx.doi.org/10.1109/tpwrs.2010.2050344.
Full textCorrea-Posada, Carlos M., and Pedro Sanchez-Martin. "Security-Constrained Optimal Power and Natural-Gas Flow." IEEE Transactions on Power Systems 29, no. 4 (July 2014): 1780–87. http://dx.doi.org/10.1109/tpwrs.2014.2299714.
Full textSomasundaram, P., K. Kuppusamy, and R. P. Kumudini Devi. "Evolutionary programming based security constrained optimal power flow." Electric Power Systems Research 72, no. 2 (December 2004): 137–45. http://dx.doi.org/10.1016/j.epsr.2004.02.006.
Full textVaahedi, E., Y. Mansour, C. Fuchs, S. Granville, M. D. L. Latore, and H. Hamadanizadeh. "Dynamic security constrained optimal power flow/VAr planning." IEEE Transactions on Power Systems 16, no. 1 (2001): 38–43. http://dx.doi.org/10.1109/59.910779.
Full textBinkou, Alhabib, and Yixin Yu. "Security constrained distributed optimal power flow of interconnected power systems." Transactions of Tianjin University 14, no. 3 (June 2008): 208–16. http://dx.doi.org/10.1007/s12209-008-0038-2.
Full textLi, Hang, Zhe Zhang, Xianggen Yin, and Buhan Zhang. "Preventive Security-Constrained Optimal Power Flow with Probabilistic Guarantees." Energies 13, no. 9 (May 8, 2020): 2344. http://dx.doi.org/10.3390/en13092344.
Full textSalem, Reham H., M. Ezzat Abdelrahman, and Almoataz Y. Abdelaziz. "Security constrained optimal power flow by modern optimization tools." International Journal of Engineering, Science and Technology 9, no. 3 (June 26, 2017): 22. http://dx.doi.org/10.4314/ijest.v9i3.3.
Full textde Magalhaes Carvalho, Leonel, Armando Martins Leite da Silva, and Vladimiro Miranda. "Security-Constrained Optimal Power Flow via Cross-Entropy Method." IEEE Transactions on Power Systems 33, no. 6 (November 2018): 6621–29. http://dx.doi.org/10.1109/tpwrs.2018.2847766.
Full textWu, Xi, Zhengyu Zhou, Gang Liu, Wanchun Qi, and Zhenjian Xie. "Preventive Security-Constrained Optimal Power Flow Considering UPFC Control Modes." Energies 10, no. 8 (August 13, 2017): 1199. http://dx.doi.org/10.3390/en10081199.
Full textMonticelli, A., M. V. F. Pereira, and S. Granville. "Security-Constrained Optimal Power Flow with Post-Contingency Corrective Rescheduling." IEEE Power Engineering Review PER-7, no. 2 (February 1987): 43–44. http://dx.doi.org/10.1109/mper.1987.5527553.
Full textDvorkin, Yury, Pierre Henneaux, Daniel S. Kirschen, and Hrvoje Pandzic. "Optimizing Primary Response in Preventive Security-Constrained Optimal Power Flow." IEEE Systems Journal 12, no. 1 (March 2018): 414–23. http://dx.doi.org/10.1109/jsyst.2016.2527726.
Full textCapitanescu, Florin, Mevludin Glavic, Damien Ernst, and Louis Wehenkel. "Contingency Filtering Techniques for Preventive Security-Constrained Optimal Power Flow." IEEE Transactions on Power Systems 22, no. 4 (November 2007): 1690–97. http://dx.doi.org/10.1109/tpwrs.2007.907528.
Full textMonticelli, A., M. V. F. Pereira, and S. Granville. "Security-Constrained Optimal Power Flow with Post-Contingency Corrective Rescheduling." IEEE Transactions on Power Systems 2, no. 1 (1987): 175–80. http://dx.doi.org/10.1109/tpwrs.1987.4335095.
Full textZhang, Rui, Yan Xu, Mingyong Lai, Zhao Yang Dong, and Kit Po Wong. "Hybrid computation of corrective security-constrained optimal power flow problems." IET Generation, Transmission & Distribution 8, no. 6 (June 1, 2014): 995–1006. http://dx.doi.org/10.1049/iet-gtd.2013.0384.
Full textDevaraj, D., and J. Preetha Roselyn. "Improved genetic algorithm for voltage security constrained optimal power flow problem." International Journal of Energy Technology and Policy 5, no. 4 (2007): 475. http://dx.doi.org/10.1504/ijetp.2007.014888.
Full textChunduri, Rambabu, Y. P. Obulesu, and Ch Saibabu. "Particle swarm optimisation for security constrained optimal power flow including TCSC." International Journal of Power and Energy Conversion 5, no. 3 (2014): 298. http://dx.doi.org/10.1504/ijpec.2014.063202.
Full textWon, Jong-Ryul, and Kil Choi. "Security-Constrained Optimal Power Flow Using First-Order Contingency Sensitivity Matrix." IFAC Proceedings Volumes 36, no. 20 (September 2003): 1019–23. http://dx.doi.org/10.1016/s1474-6670(17)34608-6.
Full textWang, Qin, James D. McCalley, and Wanning Li. "Voltage instability performance of risk-based security constrained optimal power flow." Electric Power Systems Research 116 (November 2014): 45–53. http://dx.doi.org/10.1016/j.epsr.2014.04.006.
Full textChavez-Lugo, Miguel, Claudio R. Fuerte-Esquivel, Claudio A. Canizares, and Victor J. Gutierrez-Martinez. "Practical Security Boundary-Constrained DC Optimal Power Flow for Electricity Markets." IEEE Transactions on Power Systems 31, no. 5 (September 2016): 3358–68. http://dx.doi.org/10.1109/tpwrs.2015.2504870.
Full textVelay, M., M. Vinyals, Y. Besanger, and N. Retiere. "Fully distributed security constrained optimal power flow with primary frequency control." International Journal of Electrical Power & Energy Systems 110 (September 2019): 536–47. http://dx.doi.org/10.1016/j.ijepes.2019.03.028.
Full textMarcelino, Carolina G., Paulo E. M. Almeida, Elizabeth F. Wanner, Manuel Baumann, Marcel Weil, Leonel M. Carvalho, and Vladimiro Miranda. "Solving security constrained optimal power flow problems: a hybrid evolutionary approach." Applied Intelligence 48, no. 10 (April 17, 2018): 3672–90. http://dx.doi.org/10.1007/s10489-018-1167-5.
Full textSharifzadeh, Hossein, and Nima Amjady. "Stochastic security-constrained optimal power flow incorporating preventive and corrective actions." International Transactions on Electrical Energy Systems 26, no. 11 (March 22, 2016): 2337–52. http://dx.doi.org/10.1002/etep.2207.
Full textPandya, Sundaram B., James Visumathi, Miroslav Mahdal, Tapan K. Mahanta, and Pradeep Jangir. "A Novel MOGNDO Algorithm for Security-Constrained Optimal Power Flow Problems." Electronics 11, no. 22 (November 21, 2022): 3825. http://dx.doi.org/10.3390/electronics11223825.
Full textGan, D., R. J. Thomas, and R. D. Zimmerman. "Stability-constrained optimal power flow." IEEE Transactions on Power Systems 15, no. 2 (May 2000): 535–40. http://dx.doi.org/10.1109/59.867137.
Full textAzevedo, Anibal T. de, Carlos A. Castro, Aurelio R. L. Oliveira, and Secundino Soares. "Security constrained optimal active power flow via network model and interior point method." Sba: Controle & Automação Sociedade Brasileira de Automatica 20, no. 2 (June 2009): 206–16. http://dx.doi.org/10.1590/s0103-17592009000200008.
Full textMinh Le, Phuong, Thanh Long Duong, Dieu Ngoc Vo, Tung Thanh Le, and Sy Quoc Nguyen. "An Efficient Hybrid Method for Solving Security-Constrained Optimal Power Flow Problem." International Journal on Electrical Engineering and Informatics 12, no. 4 (December 31, 2020): 933–55. http://dx.doi.org/10.15676/ijeei.2020.12.4.14.
Full textVelloso, Alexandre, Pascal Van Hentenryck, and Emma S. Johnson. "An exact and scalable problem decomposition for security-constrained optimal power flow." Electric Power Systems Research 195 (June 2021): 106677. http://dx.doi.org/10.1016/j.epsr.2020.106677.
Full textSakthivel, S., K. Kavipriya, P. Poovarasi, and B. Prema. "Application of Fruit Fly Algorithm for Security Constrained Optimal Power Flow Problem." International Journal of Computer Applications 162, no. 12 (March 15, 2017): 16–21. http://dx.doi.org/10.5120/ijca2017913420.
Full textDegeneff, R. C., W. Neugebauer, C. H. Saylor, and S. L. Corey. "Security constrained optimization: an added dimension in utility systems optimal power flow." IEEE Computer Applications in Power 1, no. 4 (October 1988): 26–30. http://dx.doi.org/10.1109/67.20549.
Full textWeinhold, Richard, and Robert Mieth. "Fast Security-Constrained Optimal Power Flow Through Low-Impact and Redundancy Screening." IEEE Transactions on Power Systems 35, no. 6 (November 2020): 4574–84. http://dx.doi.org/10.1109/tpwrs.2020.2994764.
Full textCapitanescu, Florin, and Louis Wehenkel. "Improving the Statement of the Corrective Security-Constrained Optimal Power-Flow Problem." IEEE Transactions on Power Systems 22, no. 2 (May 2007): 887–89. http://dx.doi.org/10.1109/tpwrs.2007.894850.
Full textArdakani, Ali Jahanbani, and Francois Bouffard. "Identification of Umbrella Constraints in DC-Based Security-Constrained Optimal Power Flow." IEEE Transactions on Power Systems 28, no. 4 (November 2013): 3924–34. http://dx.doi.org/10.1109/tpwrs.2013.2271980.
Full textThitithamrongchai, C., and B. Eua-Arporn. "Security-constrained Optimal Power Flow: A Parallel Self-adaptive Differential Evolution Approach." Electric Power Components and Systems 36, no. 3 (February 21, 2008): 280–98. http://dx.doi.org/10.1080/15325000701603942.
Full textGalvani, Sadjad, Vahid Talavat, and Saeed Rezaeian Marjani. "Preventive/Corrective Security Constrained Optimal Power Flow Using a Multiobjective Genetic Algorithm." Electric Power Components and Systems 46, no. 13 (August 9, 2018): 1462–77. http://dx.doi.org/10.1080/15325008.2018.1489432.
Full textSun, Guoqiang, Sheng Chen, Zhinong Wei, Kwok W. Cheung, and Haixiang Zang. "Corrective Security-Constrained Optimal Power and Gas Flow With Binding Contingency Identification." IEEE Transactions on Sustainable Energy 11, no. 2 (April 2020): 1033–42. http://dx.doi.org/10.1109/tste.2019.2917016.
Full textAlizadeh, Mohammad Iman, Muhammad Usman, and Florin Capitanescu. "Envisioning security control in renewable dominated power systems through stochastic multi-period AC security constrained optimal power flow." International Journal of Electrical Power & Energy Systems 139 (July 2022): 107992. http://dx.doi.org/10.1016/j.ijepes.2022.107992.
Full textRoselyn, J. Preetha, D. Devaraj, and Subhransu Sekhar Dash. "Multi-Objective Differential Evolution for Voltage Security Constrained Optimal Power Flow in Deregulated Power Systems." International Journal of Emerging Electric Power Systems 14, no. 6 (November 2, 2013): 591–607. http://dx.doi.org/10.1515/ijeeps-2013-0086.
Full textJavanbakht, Pirooz, and Salman Mohagheghi. "A risk-averse security-constrained optimal power flow for a power grid subject to hurricanes." Electric Power Systems Research 116 (November 2014): 408–18. http://dx.doi.org/10.1016/j.epsr.2014.07.018.
Full textVelloso, Alexandre, and Pascal Van Hentenryck. "Combining Deep Learning and Optimization for Preventive Security-Constrained DC Optimal Power Flow." IEEE Transactions on Power Systems 36, no. 4 (July 2021): 3618–28. http://dx.doi.org/10.1109/tpwrs.2021.3054341.
Full textLiu, Daichen, Cuo Zhang, Guo Chen, Yan Xu, and Zhao Yang Dong. "Stochastic security-constrained optimal power flow for a microgrid considering tie-line switching." International Journal of Electrical Power & Energy Systems 134 (January 2022): 107357. http://dx.doi.org/10.1016/j.ijepes.2021.107357.
Full textLyu, Jae-kun, Mun-Kyeom Kim, and Jong-Keun Park. "Security Cost Analysis with Linear Ramp Model using Contingency Constrained Optimal Power Flow." Journal of Electrical Engineering and Technology 4, no. 3 (September 1, 2009): 353–59. http://dx.doi.org/10.5370/jeet.2009.4.3.353.
Full textCapitanescu, F., and L. Wehenkel. "A New Iterative Approach to the Corrective Security-Constrained Optimal Power Flow Problem." IEEE Transactions on Power Systems 23, no. 4 (November 2008): 1533–41. http://dx.doi.org/10.1109/tpwrs.2008.2002175.
Full textPhan, Dzung, and Jayant Kalagnanam. "Some Efficient Optimization Methods for Solving the Security-Constrained Optimal Power Flow Problem." IEEE Transactions on Power Systems 29, no. 2 (March 2014): 863–72. http://dx.doi.org/10.1109/tpwrs.2013.2283175.
Full textJiang, Quanyuan, and Kai Xu. "A Novel Iterative Contingency Filtering Approach to Corrective Security-Constrained Optimal Power Flow." IEEE Transactions on Power Systems 29, no. 3 (May 2014): 1099–109. http://dx.doi.org/10.1109/tpwrs.2013.2291775.
Full textPhan, Dzung T., and Xu Andy Sun. "Minimal Impact Corrective Actions in Security-Constrained Optimal Power Flow Via Sparsity Regularization." IEEE Transactions on Power Systems 30, no. 4 (July 2015): 1947–56. http://dx.doi.org/10.1109/tpwrs.2014.2357713.
Full textXu, Yan, Hongming Yang, Rui Zhang, Zhao Yang Dong, Mingyong Lai, and Kit Po Wong. "A contingency partitioning approach for preventive-corrective security-constrained optimal power flow computation." Electric Power Systems Research 132 (March 2016): 132–40. http://dx.doi.org/10.1016/j.epsr.2015.11.012.
Full text