Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
8
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 21 publications
0
8
0
Order By: Relevance
“…Secure and economical operation of power systems is becoming difficult to achieve due to increased occurrences of power system disturbances as a result of the intrinsic and extrinsic changing nature of the electricity industry . Hence, optimal planning of power systems operation is crucial for the safe and cost‐effective operation of large interconnected power systems, especially at the transmission and subtransmission level, due to the complex and increasingly dynamic nature of electricity networks . The complexity of grid operation is further increased by the liberal and competitive structure of the modern electricity markets.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Secure and economical operation of power systems is becoming difficult to achieve due to increased occurrences of power system disturbances as a result of the intrinsic and extrinsic changing nature of the electricity industry . Hence, optimal planning of power systems operation is crucial for the safe and cost‐effective operation of large interconnected power systems, especially at the transmission and subtransmission level, due to the complex and increasingly dynamic nature of electricity networks . The complexity of grid operation is further increased by the liberal and competitive structure of the modern electricity markets.…”
Section: Introductionmentioning
confidence: 99%
“…1,2 Hence, optimal planning of power systems operation is crucial for the safe and cost-effective operation of large interconnected power systems, especially at the transmission and subtransmission level, due to the complex and increasingly dynamic nature of electricity networks. 3 The complexity of grid operation is further increased by the liberal and competitive structure of the modern electricity markets. The continuous quest for modernization and economic growth is the chief driver for the recent industrialization efforts of several countries, and this has also contributed to the essentiality of optimal planning of power system operation.…”
Section: Introductionmentioning
confidence: 99%
“…Hence in recent time, the need for adequate planning and scheduling of large interconnected power system is increasingly becoming intense due to the need for better returns on investment for energy investors and quality service delivery to customers [2]. The dynamism of the electricity network makes it one of the most complex machine to operate despite the increasing sophistication of the power system monitoring and control technologies [3]. The scope of electricity market interactions has increased; it is no longer a monopolistic/one way dealings of a sole power producer/supplier or a group of power producers working for the common self-interest of profit maximization at the expense of the less fortunate downstream market participants.…”
Section: Introductionmentioning
confidence: 99%
“…The usage of an ICT layer offers improved exploitation of the CI and increases the performance of the system while reducing the overall cost. The main objectives of such a control structure are: (1) to maintain safe operational goals by limiting the probability of undesirable behavior, (2) to meet the production demands by keeping certain process values within prescribed limits, and (3) to maximize production profit.…”
Section: Introductionmentioning
confidence: 99%
“…In general, any offensive tactic/action against information systems, infrastructures, computer networks conducted by individuals or whole organizations can be considered as a cyber-attack. The purpose of this malicious act can vary and usually includes stealing, falsification, or even destruction of information and/or system components [1,2]. Integrity attacks are the ones which alter the data transmitted within the infrastructure serving the attacker's purposes while remaining undetected.…”
Section: Introductionmentioning
confidence: 99%