Benders decomposition algorithm for corrective security-constrained optimal power flow

被引:0
|
作者
Zhong, Shimin [1 ]
Han, Xueshan [1 ]
Liu, Daowei [1 ]
Wang, Mengxia [1 ]
机构
[1] School of Electrical Engineering, Shandong University, Shandong Ji'nan 250061, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:65 / 71
相关论文
共 50 条
  • [21] Security-Constrained Optimal Power and Natural-Gas Flow
    Correa-Posada, Carlos M.
    Sanchez-Martin, Pedro
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2014, 29 (04) : 1780 - 1787
  • [22] A new approach to security-constrained optimal power flow analysis
    Yan, P
    Sekar, A
    2001 POWER ENGINEERING SOCIETY SUMMER MEETING, VOLS 1-3, CONFERENCE PROCEEDINGS, 2001, : 1462 - 1467
  • [23] Preventive Security-Constrained Optimal Power Flow with Probabilistic Guarantees
    Li, Hang
    Zhang, Zhe
    Yin, Xianggen
    Zhang, Buhan
    ENERGIES, 2020, 13 (09)
  • [24] Adversarially Robust Learning for Security-Constrained Optimal Power Flow
    Donti, Priya L.
    Agarwal, Aayushya
    Bedmutha, Neeraj Vijay
    Pileggi, Larry
    Kolter, J. Zico
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 34 (NEURIPS 2021), 2021, 34
  • [25] A Comparative Study of Preventive Security-Constrained Optimal Power Flow
    Che, Liang
    Zhang, Xiaping
    Li, Zhiyi
    2016 IEEE POWER AND ENERGY SOCIETY GENERAL MEETING (PESGM), 2016,
  • [26] Preventive/Corrective Security Constrained Optimal Power Flow Using a Multiobjective Genetic Algorithm
    Galvani, Sadjad
    Talavat, Vahid
    Marjani, Saeed Rezaeian
    ELECTRIC POWER COMPONENTS AND SYSTEMS, 2018, 46 (13) : 1462 - 1477
  • [27] A heuristic benders-decomposition-based algorithm for transient stability constrained optimal power flow
    Saberi, Hossein
    Amraee, Turaj
    Zhang, Cuo
    Dong, Zhao Yang
    ELECTRIC POWER SYSTEMS RESEARCH, 2020, 185
  • [28] Fully Distributed Corrective Security Constrained Optimal Power Flow
    Mohammadi, Javad
    Kar, Soummya
    Hug, Gabriela
    2017 IEEE MANCHESTER POWERTECH, 2017,
  • [29] Unit Commitment considering Security-Constrained Optimal Power Flow by Lagrangian Relaxation with Genetic Algorithm
    Poommalee, Weeraya
    Damrongkulkamjorn, Parnjit
    ECTI-CON 2008: PROCEEDINGS OF THE 2008 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING/ELECTRONICS, COMPUTER, TELECOMMUNICATIONS AND INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2008, : 893 - 896
  • [30] Security-constrained optimal power flow by mixed-integer genetic algorithm with arithmetic operators
    Gaing, Zwe-Lee
    Chang, Rung-Fang
    2006 POWER ENGINEERING SOCIETY GENERAL MEETING, VOLS 1-9, 2006, : 4383 - +