Search

Showing total 25 results
25 results

Search Results

1. Fast Security-Constrained Optimal Power Flow Through Low-Impact and Redundancy Screening.

2. Chance-Constrained Economic Dispatch Considering Curtailment Strategy of Renewable Energy.

3. Robust Security Constrained ACOPF via Conic Programming: Identifying the Worst Contingencies.

4. A Generalized Decomposition Framework for Large-Scale Transmission Expansion Planning.

5. Co-Optimization of Energy and Ancillary Services for Hydrothermal Operation Planning Under a General Security Criterion.

6. Improving Power System Static Security Margins by Means of a Real Coded Genetic Algorithm.

7. An Integrated Security-Constrained Model-Based Dynamic Power Management Approach for Isolated Microgrids in All-Electric Ships.

8. An Adjustable Robust Optimization Approach for Contingency-Constrained Transmission Expansion Planning.

9. Enhanced Security-Constrained OPF With Distributed Battery Energy Storage.

10. Coordination Strategies for Securing AC/DC Flexible Transmission Networks With Renewables.

11. An Online Optimization Algorithm for Alleviating Contingencies in Transmission Networks.

12. Energy and Reserve Scheduling Under a Joint Generation and Transmission Security Criterion: An Adjustable Robust Optimization Approach.

13. Two-Stage Robust Optimization for N-k Contingency-Constrained Unit Commitment.

14. Multi-Objective Mixed-Integer Dynamic Optimization Method Applied to Optimal Allocation of Dynamic Var Sources of Power Systems.

15. Early Detection and Optimal Corrective Measures of Power System Insecurity in Enhanced Look-Ahead Dispatch.

16. Unit Commitment With Volatile Node Injections by Using Interval Optimization.

17. Contingency-Constrained Unit Commitment With n - K Security Criterion: A Robust Optimization Approach.

18. Analytic Deep Learning-Based Surrogate Model for Operational Planning With Dynamic TTC Constraints.

19. Optimal Transmission Switching Considering Voltage Security and N-1 Contingency Analysis.

20. Closure to the Discussion of “Adaptive Robust Optimization for the Security Constrained Unit Commitment Problem”.

21. Data-Aided Offline and Online Screening for Security Constraint.

22. Preventive and Curative Actions by Meshed Bipolar HVDC-Overlay-Systems.

23. Convexification of the Nash Bargaining Based Environmental-Economic Dispatch.

24. Variable Resource Dispatch Through Do-Not-Exceed Limit.

25. A Probabilistic Framework for Reserve Scheduling and N-1 Security Assessment of Systems With High Wind Power Penetration.