1974
DOI: 10.1109/tpas.1974.293896
|View full text |Cite
|
Sign up to set email alerts
|

A Real Time Optimizer for Security Dispatch

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

1979
1979
2015
2015

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 52 publications
(8 citation statements)
references
References 14 publications
0
8
0
Order By: Relevance
“…For a given working-set the iteration rule governing the search for an optimal solution is based on the Newton-Raphson approach to Linearization of the constraint functions as in [1,4,5] defining the SGR and the network constraints yields an approximation to R and T in a simple implicit form involving the solution of linear simultaneous equations of low-dimensionality which may be readily solved by forward and backward substitutions.…”
Section: Solution Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…For a given working-set the iteration rule governing the search for an optimal solution is based on the Newton-Raphson approach to Linearization of the constraint functions as in [1,4,5] defining the SGR and the network constraints yields an approximation to R and T in a simple implicit form involving the solution of linear simultaneous equations of low-dimensionality which may be readily solved by forward and backward substitutions.…”
Section: Solution Methodsmentioning
confidence: 99%
“…The SGR and the network constraints are both modeled as linear constraints about the current operating point as in [1].…”
Section: Constraint Modelingmentioning
confidence: 99%
“…The literature recalls this well-known model as the classical DC power flow [1], [2], which results in large errors (due to the lossless assumption) for non-small power systems and systems with , as reported in [11]- [14].…”
Section: B Cold-start Modelmentioning
confidence: 99%
“…These quantities are necessary for electricity market applications, such as real-time security constrained economic dispatch (SCED) [1], [2], security constrained unit commitment (SCUC) [3]- [5], financial transmission rights (FTR), congestion revenue rights (CRR) auctions and allocations [6], [7], locational marginal pricing (LMPs) where prices are constrained by network congestion, as well as contingency analysis such as evaluating line loading constraints. Inaccuracies in either of these quantities can lead to significant economic costs or system failures.…”
Section: Introductionmentioning
confidence: 99%
“…These iterative algorithms appeared in the 1970' s , wollenberg & Stadlin 1974, Shoults 1977. Bas ically, they use the EICC method as a subprobleLl, updating nonlinear information and handling dependent constraints at each iteration.…”
mentioning
confidence: 99%