1987
DOI: 10.1109/proc.1987.13931
|View full text |Cite
|
Sign up to set email alerts
|

Security analysis and optimization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
158
0
14

Year Published

1990
1990
2014
2014

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 483 publications
(178 citation statements)
references
References 65 publications
0
158
0
14
Order By: Relevance
“…handling of discrete variables, use of limited numbers of control actions, etc.) remain also to be carefully assessed [4,5,46,47]. In addition, improved ways to analyze and visualize the results of large-scale OPF, e.g.…”
Section: Discussion Conclusion and Perspectivesmentioning
confidence: 99%
See 2 more Smart Citations
“…handling of discrete variables, use of limited numbers of control actions, etc.) remain also to be carefully assessed [4,5,46,47]. In addition, improved ways to analyze and visualize the results of large-scale OPF, e.g.…”
Section: Discussion Conclusion and Perspectivesmentioning
confidence: 99%
“…4 More comprehensive data sets of this system are available upon request from the project PEGASE web-page: www.fp7-pegase.eu. …”
Section: Description Of the Power System Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…(2) - (7) (11) - (20) Note that once the TTC is obtained, it is trivial to compute Available Transfer Capability (ATC) [24]. The interface flow can be either of the point-to-point or the area-to-area type.…”
Section: An Extensionmentioning
confidence: 99%
“…Significant progress has been made in this area in recent years [19,20,21]. Given state-of-the-art OPF software, power engineers can perform studies for large systems with n-1 steady-state constraints in a reasonable amount of time.…”
Section: Introductionmentioning
confidence: 99%