2003
DOI: 10.1016/s0378-7796(03)00076-2
|View full text |Cite
|
Sign up to set email alerts
|

A fuzzy evolutionary programming-based solution methodology for security-constrained generation maintenance scheduling

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
29
0
1

Year Published

2007
2007
2016
2016

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 49 publications
(30 citation statements)
references
References 6 publications
0
29
0
1
Order By: Relevance
“…The scope of work on the maintenance scheduling literature includes approaches, optimality studies, algorithms, techniques, constraints and limitations. Approaches in Maintenance Scheduling research include, but are not limited to, multistage, system, probabilistic [48], fuzzy modeling [19,25] and CPM with a bill of materials. Several effective and sufficient techniques have been suggested as alternatives to traditional optimization-based techniques where the problem size is large and exact optimal solution is not available.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…The scope of work on the maintenance scheduling literature includes approaches, optimality studies, algorithms, techniques, constraints and limitations. Approaches in Maintenance Scheduling research include, but are not limited to, multistage, system, probabilistic [48], fuzzy modeling [19,25] and CPM with a bill of materials. Several effective and sufficient techniques have been suggested as alternatives to traditional optimization-based techniques where the problem size is large and exact optimal solution is not available.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Various optimization studies have also been conducted, including by Billinton and Pan [6], Charles-Owaba [12], Christiaanse [16], El-Sharkh [25], Yamayee et al [74], and Zurn and Quintana [76,77]. Models have been developed for different situations: proportional intensities, full history, warranted products, finite source, uncertainty, deregulated systems and planning.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Price forecasts are obtained using an ANN approach [4]. The actual and forecasted market prices for the last 24 days just prior to the day of estimation d are used to estimate the covariance matrix at day d by using Equation (8).…”
Section: Case Studymentioning
confidence: 99%
“…Deterministic approaches include priority list (PL), dynamic programming (DP), Lagrangian Relaxation (LR), integer/ mixed-integer programming method and branch-and-bound method. Meta-heuristic approaches include expert systems (ES), fuzzy logic (FL), ANNs, genetic algorithm (GA), evolutionary programming (EP), simulated annealing (SA), tabu search (TS) and particle swarm optimizer (PSO) [7][8][9].…”
Section: Introductionmentioning
confidence: 99%
“…To find solution for GMS of large scale systems in a reasonable amount of time, intelligent optimization techniques have been proposed. The objective of minimizing the cost is considered and schedule is obtained for maintenance of generators using combination of logic programming, constraint satisfaction technique and Branch and Bound (B & B) algorithm [1], duality theory [2], Simulated Annealing (SA) [3], Genetic Algorithm (GA) [4], Tabu Search (TS) [5], Memetic Algorithm (MA) [6], Evolutionary Programming (EP) [7] and Particle Swarm Optimization (PSO) [8]. The reliability 2 objective of GMS is as important as cost objective.…”
Section: Introductionmentioning
confidence: 99%