IEEE Power Engineering Society Summer Meeting,
DOI: 10.1109/pess.2002.1043612
|View full text |Cite
|
Sign up to set email alerts
|

Security assessment in the electricity market environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…The objective of the optimization problem is to minimize the cost for security management. The network constraints are considered as line flow limits in Equations (7)- (8). In Equation (4), the nodal power balance is written for each bus w.r.t.…”
Section: Models For Security Managementmentioning
confidence: 99%
See 2 more Smart Citations
“…The objective of the optimization problem is to minimize the cost for security management. The network constraints are considered as line flow limits in Equations (7)- (8). In Equation (4), the nodal power balance is written for each bus w.r.t.…”
Section: Models For Security Managementmentioning
confidence: 99%
“…In that scenario, different security problems with different objectives, such as minimum cost or minimum shift from the unconstrained solution, have been considered [8][9].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation