2011
DOI: 10.1016/j.asoc.2011.02.022
|View full text |Cite
|
Sign up to set email alerts
|

Multi-objective electricity market clearing considering dynamic security by lexicographic optimization and augmented epsilon constraint method

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
69
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 150 publications
(70 citation statements)
references
References 28 publications
0
69
0
Order By: Relevance
“…Augmented-weighted epsilon-constraint technique is suggested to remedy this deficiency. The details of incorporating lexicographic optimization and augmented-weighted epsilon-constraint technique have been described in our previous paper in the area [37,38]. To avoid tautology in writing, these matters have not been repeated in this paper.…”
Section: Multiobjective Mathematical Programming (Mmp)mentioning
confidence: 99%
See 3 more Smart Citations
“…Augmented-weighted epsilon-constraint technique is suggested to remedy this deficiency. The details of incorporating lexicographic optimization and augmented-weighted epsilon-constraint technique have been described in our previous paper in the area [37,38]. To avoid tautology in writing, these matters have not been repeated in this paper.…”
Section: Multiobjective Mathematical Programming (Mmp)mentioning
confidence: 99%
“…For a general multi-objective optimization problem of (25) (40) where, the superscript U and SN refer to the value of the objective function in the utopia and pseudo nadir points as shown in (32) and (36), respectively. The constraints of the MMP problem should be also considered in each of these optimization subproblems in addition to the objective function constraints mentioned in (38). By solving each optimization subproblem, one Pareto-optimal solution is obtained in the ε-constraint technique.…”
Section: Multiobjective Mathematical Programming (Mmp)mentioning
confidence: 99%
See 2 more Smart Citations
“…He/She will encrypt the data with public key of desktop user. Thus desktop user will access data with its private key [48][49] [50]. …”
Section: Key Management At Centralized Servermentioning
confidence: 99%