2014 Clemson University Power Systems Conference 2014
DOI: 10.1109/psc.2014.6808131
|View full text |Cite
|
Sign up to set email alerts
|

Security Constrained Optimal Power Flow via proximal message passing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
47
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 33 publications
(47 citation statements)
references
References 7 publications
0
47
0
Order By: Relevance
“…The pioneering work on the Security Constrained OPF (SCOPF) was done by Stott et al in [30]. Some of the recent references include works by Chiang et al [31], Phan et al [32], Chakrabarti et al [2] etc. The last two deal with application of distributed algorithms to the SCOPF problem.…”
Section: Literature Survey and Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…The pioneering work on the Security Constrained OPF (SCOPF) was done by Stott et al in [30]. Some of the recent references include works by Chiang et al [31], Phan et al [32], Chakrabarti et al [2] etc. The last two deal with application of distributed algorithms to the SCOPF problem.…”
Section: Literature Survey and Related Workmentioning
confidence: 99%
“…In this paper we build on the static SCOPF problem formulation in [2]. We will develop the mathematical model for a look-ahead dispatch calculation that considers an upcoming and several subsequent dispatch intervals at the onset of each current dispatch interval and takes into account the possible variations of operating parameters across different scenarios represented in different subsequent dispatch intervals, so that at each interval the entire system is secure.…”
Section: Look-ahead Dispatch: Generalized Case Of Demand Variation Fomentioning
confidence: 99%
See 3 more Smart Citations