2021
DOI: 10.1016/j.epsr.2020.107017
|View full text |Cite
|
Sign up to set email alerts
|

Security-Constrained generation and transmission expansion planning based on optimal bidding in the energy and reserve markets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
69
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 50 publications
(70 citation statements)
references
References 29 publications
0
69
0
1
Order By: Relevance
“…It is noted that, in constraints ( 35) and (36), the binary variable of ts helps prevent charging-discharging operation at the same time in the TSS. is issue can be implemented in ESS and EVs parking lots using binary variables of es and ev, respectively, according to constraints (40), (41) v�1 BC v , respectively, where SOC and BC are related to the state of charge (SOC) of the EV's battery and its capacity and N A and N D are, respectively, the numbers of EVs at arrival and departure times [31].…”
Section: Hub Formulationmentioning
confidence: 99%
“…It is noted that, in constraints ( 35) and (36), the binary variable of ts helps prevent charging-discharging operation at the same time in the TSS. is issue can be implemented in ESS and EVs parking lots using binary variables of es and ev, respectively, according to constraints (40), (41) v�1 BC v , respectively, where SOC and BC are related to the state of charge (SOC) of the EV's battery and its capacity and N A and N D are, respectively, the numbers of EVs at arrival and departure times [31].…”
Section: Hub Formulationmentioning
confidence: 99%
“…Equations ( 16)-( 21) are named "AC power flow formulation". Moreover, the operation boundaries of the network, such as bus voltages and the capacities of lines and substations, are given in ( 22)- (24), respectively [29,30]. In these equations, it is assumed that the distribution network is connected to the upstream network via a substation placed on the slack bus.…”
Section: Stage 2 (Sdg Planning Considering Operation and Protection I...mentioning
confidence: 99%
“…From the viewpoint of optimization methods to provide optimal schemes in a computationally tractable manner, the previous studies can be classified as metaheuristic-and mathematical-based ones. The first class of references applies approaches like real genetic algorithm (GA) [8,9], decimal codification GA [47,48], non-dominated sorting genetic algorithm II (NSGA II) [17,18], particle swarm optimization (PSO) [10][11][12]29], improved discrete PSO [49,50], a combination of PSO and GA (PSO+GA) [27], differential evolution (DE) [13][14][15][16], DE-continuous population-based incremental learning (DE-PBILC) [24,25], artificial bee colony (ABC) [46], modified ABC [19][20][21], discrete ABC [52], improved discrete ABC [51], ant colony optimization algorithm for continuous domains (ACOR) [23], a combination of firefly algorithm and harmonic search algorithm (FFA+HAS) [39], adaptive tabu search (TS) [53], and hybridization of GA, TS, and artificial neural network (GA + TS + ANN) [28]. The latter one uses interior point method (IPM) [7], primal-dual interior-point method (PDIPM) [26], benders decomposition [34,38,40,44] or describes MINLP [22,36], mixed-integer linear programming (MILP) [30-33, 39, 41, 45, 52], and mixed-integer second-order cone programming (MISOCP) …”
Section: Motivation and Backgroundmentioning
confidence: 99%