2019
DOI: 10.1109/tpwrs.2018.2868752
|View full text |Cite
|
Sign up to set email alerts
|

Constructing Convex Inner Approximations of Steady-State Security Regions

Abstract: Constructing convex inner approximations of steady-state security regions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
26
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 53 publications
(28 citation statements)
references
References 20 publications
0
26
0
Order By: Relevance
“…The problem ( 7) is widely used in literature [29]. One challenge associated with this optimization is the nonlinear and non-convex power flow constraints that makes solving this control problem inefficient.…”
Section: A Centralized Voltage Controlmentioning
confidence: 99%
“…The problem ( 7) is widely used in literature [29]. One challenge associated with this optimization is the nonlinear and non-convex power flow constraints that makes solving this control problem inefficient.…”
Section: A Centralized Voltage Controlmentioning
confidence: 99%
“…We propose Algorithm 1 to approximate U defined in (7). It starts with a region U poly that is chosen based on experience and large enough to contain U .…”
Section: B Approximating Socp-relaxed Feasible Regionmentioning
confidence: 99%
“…For instance, reference [5] solved nonlinear programs to get a set of boundary points that each make a different safety limit binding, and then built a feasible region heuristically as the convex hull of those boundary points. Certified inner approximations of feasible regions were solved from convex programs based on a tightened-relaxed second-order cone approximation [6] or refined linear approximations [7], [8] to AC power flow. In particular, the refined linearizations [7], [8] may be more accurate than the DC models [1]- [3], by replacing the nonlinear terms with their improved constant estimates rather than zero.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The research on "SSSR" proposed in the literature study [20] could improve the shortcomings of static security analysis of multi-energy systems to a certain extent. An algorithm to construct inner approximations of static security was developed [21]. Furthermore, the maximal static security region was also proposed [22].…”
Section: Introductionmentioning
confidence: 99%