2006 IEEE PES Power Systems Conference and Exposition 2006
DOI: 10.1109/psce.2006.296146
|View full text |Cite
|
Sign up to set email alerts
|

A Direct Approach for the Security Constrained

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2008
2008
2022
2022

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 15 publications
0
5
0
Order By: Relevance
“…In addition, the theory developed in this paper using the DC power flow model has a straightforward extension to the non-linear AC power flow model. One could use existing numerical techniques to handle the non-convexity of ACOPF [18] and implement our reduced formulations in the ACOPF context.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…In addition, the theory developed in this paper using the DC power flow model has a straightforward extension to the non-linear AC power flow model. One could use existing numerical techniques to handle the non-convexity of ACOPF [18] and implement our reduced formulations in the ACOPF context.…”
Section: Discussionmentioning
confidence: 99%
“…Due to the design of the power system the probability that a contingency occurs is very low and is thus hard to estimate. Therefore, it is common practice in the literature to not consider the cost of generation under contingencies [14], [18]. For the normal state, the power balance, generation capacity, normal transmission line capacity, and ramping constraints are (1b), (1c), (1d), and (1e), respectively.…”
Section: Comprehensive Lascopfmentioning
confidence: 99%
See 1 more Smart Citation
“…[14]. However, such approaches suffer from the limitation of depending on centralised decision making and extensive communication of analysis results to very many different locations.…”
Section: Existing Approaches: Hand-coded Targets and Reactive Systemsmentioning
confidence: 99%
“…The ordering was done using MATLAB functions. Reference [14] uses MUMPS, a parallel multifrontal solver [15][16][17][18][19][20][21], on a Linux platform for symmetric indefinite matrices that arises in the solution of security constrained AC-OPF problem. We are not aware of any other multifrontal implementations for the power system AC load flow solutions with unsymmetric Jacobian matrices.…”
Section: Introductionmentioning
confidence: 99%