2015
DOI: 10.1007/978-3-319-18320-6_12
|View full text |Cite
|
Sign up to set email alerts
|

Reactive Power and Voltage Control Based on Mesh Adaptive Direct Search Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
21
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(21 citation statements)
references
References 31 publications
0
21
0
Order By: Relevance
“…(1) To achieve the proper PMU number by optimizing a linear or a quadratic cost function under a topological constraint function considering the limitation of the PMU channel limit capacity. (2) To accomplish this task, branch-and-bound algorithms [37], sequential quadratic programming [42], interior-point methods [42], generalized pattern search algorithms [41,70,71], genetic algorithms [51], and binary swarm optimization [51] are utilized to achieve optimality. (3) We focus on finding the proper PMU number with a branch assignment set solution with a fixed number of channels.…”
Section: Consideration Of This Studymentioning
confidence: 99%
See 3 more Smart Citations
“…(1) To achieve the proper PMU number by optimizing a linear or a quadratic cost function under a topological constraint function considering the limitation of the PMU channel limit capacity. (2) To accomplish this task, branch-and-bound algorithms [37], sequential quadratic programming [42], interior-point methods [42], generalized pattern search algorithms [41,70,71], genetic algorithms [51], and binary swarm optimization [51] are utilized to achieve optimality. (3) We focus on finding the proper PMU number with a branch assignment set solution with a fixed number of channels.…”
Section: Consideration Of This Studymentioning
confidence: 99%
“…Furthermore, derivative-free optimizers (DFOs) are adopted to handle such a kind of nonlinear programming model [22,41,70,71].…”
Section: Definition 9 Statement Of the (P) Problemmentioning
confidence: 99%
See 2 more Smart Citations
“…Port sweeps in UDP represent a sizable bit of the Internet movement and nearly little research describes security in UDP port output action. To meet the developing pattern of attacks and other security challenges in the constantly advancing web field, this is paper displays a computationally clever intrusion detection instrument utilizing swarm insight worldview, especially ant colony improvement, to break down specimen arrange follows in UDP The fundamental point of this study [6] is introducing port outputs. This work goes for producing a DOS assault intrusion detection framework by3 utilizing support vector relapse and enhancing this calculation by consolidating two calculations of ant colony and firefly.…”
Section: Related Workmentioning
confidence: 99%