A contingency partitioning approach for preventive-corrective security-constrained optimal power flow computation

•A novel and improved approach is proposed for preventive-corrective security-constrained optimal power flow (PCSCOPF) problem.•The contingencies are optimally partitioned into two exclusive sets: one is secured in the preventive control (PC) stage and the other in the corrective control (CC) stage....

Full description

Saved in:
Bibliographic Details
Published inElectric power systems research Vol. 132; pp. 132 - 140
Main Authors Xu, Yan, Yang, Hongming, Zhang, Rui, Dong, Zhao Yang, Lai, Mingyong, Wong, Kit Po
Format Journal Article
LanguageEnglish
Published Elsevier B.V 01.03.2016
Subjects
Online AccessGet full text
ISSN0378-7796
1873-2046
DOI10.1016/j.epsr.2015.11.012

Cover

Abstract •A novel and improved approach is proposed for preventive-corrective security-constrained optimal power flow (PCSCOPF) problem.•The contingencies are optimally partitioned into two exclusive sets: one is secured in the preventive control (PC) stage and the other in the corrective control (CC) stage.•The PC corresponds to an ordinary SCOPF model and solved by the Benders decomposition method; the CC corresponds to an ordinary OPF model.•The optimal partitioning of the contingencies is determined using an evolutionary algorithm (EA).•The searching dimension only depends on the number of insecure contingencies, hence tends to lead to a much higher solution speed. Security-constrained optimal power flow (SCOPF) is an important tool to optimize power system's operating state while satisfying security requirements with respect to credible contingencies. As a necessary extension to conventional SCOPFs, the recently proposed preventive–corrective SCOPF (PCSCOPF) aims to achieve the best coordination between the preventive control (PC) and corrective control (CC) considering the probabilistic nature of the contingencies and the cost of CC as well as other binding constraints. However, PCSCOPF renders a large-scale, multi-stage, non-linear programming problem which is difficult to directly solve. This paper proposes a novel and improved approach to the PCSCOPF problem. We aim to partition the contingencies into two exclusive sets: one is secured in the PC stage and the other in the corrective control CC stage. The PC corresponds to an ordinary SCOPF model and solved by the Benders decomposition method; the CC corresponds to an ordinary OPF model. The optimal partitioning of the contingencies is determined using an evolutionary algorithm (EA). Compared with the existing methods, the proposed approach is advantageous in that its searching dimension only depends on the number of insecure contingencies, hence tends to lead to a much higher solution speed. The proposed method is verified on the IEEE 118-bus system and compared with other two existing methods. Simulation results show that the proposed method can provide high-quality solutions with much higher computation speed.
AbstractList •A novel and improved approach is proposed for preventive-corrective security-constrained optimal power flow (PCSCOPF) problem.•The contingencies are optimally partitioned into two exclusive sets: one is secured in the preventive control (PC) stage and the other in the corrective control (CC) stage.•The PC corresponds to an ordinary SCOPF model and solved by the Benders decomposition method; the CC corresponds to an ordinary OPF model.•The optimal partitioning of the contingencies is determined using an evolutionary algorithm (EA).•The searching dimension only depends on the number of insecure contingencies, hence tends to lead to a much higher solution speed. Security-constrained optimal power flow (SCOPF) is an important tool to optimize power system's operating state while satisfying security requirements with respect to credible contingencies. As a necessary extension to conventional SCOPFs, the recently proposed preventive–corrective SCOPF (PCSCOPF) aims to achieve the best coordination between the preventive control (PC) and corrective control (CC) considering the probabilistic nature of the contingencies and the cost of CC as well as other binding constraints. However, PCSCOPF renders a large-scale, multi-stage, non-linear programming problem which is difficult to directly solve. This paper proposes a novel and improved approach to the PCSCOPF problem. We aim to partition the contingencies into two exclusive sets: one is secured in the PC stage and the other in the corrective control CC stage. The PC corresponds to an ordinary SCOPF model and solved by the Benders decomposition method; the CC corresponds to an ordinary OPF model. The optimal partitioning of the contingencies is determined using an evolutionary algorithm (EA). Compared with the existing methods, the proposed approach is advantageous in that its searching dimension only depends on the number of insecure contingencies, hence tends to lead to a much higher solution speed. The proposed method is verified on the IEEE 118-bus system and compared with other two existing methods. Simulation results show that the proposed method can provide high-quality solutions with much higher computation speed.
Author Yang, Hongming
Xu, Yan
Zhang, Rui
Wong, Kit Po
Lai, Mingyong
Dong, Zhao Yang
Author_xml – sequence: 1
  givenname: Yan
  surname: Xu
  fullname: Xu, Yan
  organization: Hunan Provincial Key Laboratory of Smart Grids Operation and Control, International College, Changsha University of Science and Technology, Changsha 410114, China
– sequence: 2
  givenname: Hongming
  surname: Yang
  fullname: Yang, Hongming
  email: yhm5218@hotmail.com
  organization: Hunan Provincial Key Laboratory of Smart Grids Operation and Control, International College, Changsha University of Science and Technology, Changsha 410114, China
– sequence: 3
  givenname: Rui
  surname: Zhang
  fullname: Zhang, Rui
  organization: School of Electrical and Information Engineering, University of Sydney, Sydney, Australia
– sequence: 4
  givenname: Zhao Yang
  surname: Dong
  fullname: Dong, Zhao Yang
  organization: Hunan Provincial Key Laboratory of Smart Grids Operation and Control, International College, Changsha University of Science and Technology, Changsha 410114, China
– sequence: 5
  givenname: Mingyong
  surname: Lai
  fullname: Lai, Mingyong
  organization: Hunan Provincial Key Laboratory of Smart Grids Operation and Control, International College, Changsha University of Science and Technology, Changsha 410114, China
– sequence: 6
  givenname: Kit Po
  surname: Wong
  fullname: Wong, Kit Po
  organization: School of Electrical, Electronic, and Computer Engineering, University of Western Australia, Perth, Australia
BookMark eNp9kEtOwzAQQC1UJNrCBVj5AgmeOLETiU1V8ZMqsYG15ToTcNXGxk5b9fY4KisWXc1oNG8-b0YmveuRkHtgOTAQD5scfQx5waDKAXIGxRWZQi15VrBSTMiUcVlnUjbihsxi3DDGRCOrKflZUOP6wfZf2JsT9ToMdrCuTwWqvQ9Om2_auUB9wAOmxgNmxoWAZkxpRLMPdjilWh-HoG2PLXV-sDu9pd4dMdBu645px87vBz1OviXXnd5GvPuLc_L5_PSxfM1W7y9vy8UqM1zUQya6Ym1K7IRcM6kR2m7NRSuhxBIqYaAUreiwbqAsWKtRgi6R85ZXUgDjTcPnpD7PNcHFGLBTxp4vGO_cKmBqVKc2alSnRnUKQCV1CS3-oT6kj8LpMvR4hjA9dbAYVDQ2ScXWjrZU6-wl_BcaF46O
CitedBy_id crossref_primary_10_1007_s00202_017_0539_x
crossref_primary_10_1061_JLEED9_EYENG_4886
crossref_primary_10_1109_TSG_2018_2797103
crossref_primary_10_1016_j_ijepes_2023_109646
crossref_primary_10_1049_rpg2_12830
crossref_primary_10_1080_15325008_2018_1489432
crossref_primary_10_1109_ACCESS_2021_3067206
crossref_primary_10_1016_j_jclepro_2021_130342
crossref_primary_10_1109_TII_2016_2644738
crossref_primary_10_1002_er_7494
crossref_primary_10_1049_joe_2017_0653
crossref_primary_10_1007_s00202_021_01471_7
crossref_primary_10_1016_j_ijepes_2017_09_023
crossref_primary_10_1155_2017_9539506
crossref_primary_10_1016_j_epsr_2022_107784
crossref_primary_10_1016_j_asoc_2016_05_027
Cites_doi 10.1109/TPWRS.2007.913196
10.1109/TPWRS.2010.2051168
10.1109/TPWRS.2006.873407
10.1109/TPWRS.2008.2002175
10.1109/TPWRS.2011.2175455
10.1109/TPAS.1974.293972
10.1016/j.epsr.2011.04.003
10.1007/BF01386316
10.1109/TPWRS.2013.2293150
10.1109/TPWRS.2007.894850
10.1109/TPWRS.2007.907528
10.1109/TPWRS.2008.2012181
10.1109/TPWRS.1987.4335095
10.1109/59.709105
10.1016/j.neucom.2011.11.033
ContentType Journal Article
Copyright 2015 Elsevier B.V.
Copyright_xml – notice: 2015 Elsevier B.V.
DBID AAYXX
CITATION
DOI 10.1016/j.epsr.2015.11.012
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1873-2046
EndPage 140
ExternalDocumentID 10_1016_j_epsr_2015_11_012
S0378779615003454
GroupedDBID --K
--M
-~X
.~1
0R~
1B1
1~.
1~5
29G
4.4
457
4G.
5GY
5VS
7-5
71M
8P~
9JN
AABNK
AACTN
AAEDT
AAEDW
AAHCO
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AARJD
AAXUO
ABFNM
ABMAC
ABXDB
ABYKQ
ACAZW
ACDAQ
ACGFS
ACIWK
ACNNM
ACRLP
ADBBV
ADEZE
ADHUB
ADMUD
ADTZH
AEBSH
AECPX
AEKER
AENEX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHIDL
AHJVU
AI.
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
ARUGR
ASPBG
AVWKF
AXJTR
AZFZN
BELTK
BJAXD
BKOJK
BLXMC
CS3
DU5
E.L
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-2
G-Q
GBLVA
HVGLF
HZ~
IHE
J1W
JARJE
JJJVA
K-O
KOM
LY6
LY7
M41
MO0
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
Q38
R2-
RIG
ROL
RPZ
SAC
SDF
SDG
SES
SET
SEW
SPC
SPCBC
SSR
SST
SSW
SSZ
T5K
VH1
WUQ
ZMT
~G-
AATTM
AAXKI
AAYWO
AAYXX
ABJNI
ABWVN
ACLOT
ACRPL
ACVFH
ADCNI
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AGQPQ
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
CITATION
EFKBS
~HD
ID FETCH-LOGICAL-c368t-6f2bc4ef67b07ae1dfb36d714e4156c146d6fe891420dae71a4e33d3576103993
IEDL.DBID .~1
ISSN 0378-7796
IngestDate Wed Oct 01 05:08:54 EDT 2025
Thu Apr 24 22:56:18 EDT 2025
Fri Feb 23 02:33:10 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords CC
DE
BD
OPF
SCOPF
Corrective control
IP
CP
SC
Contingency partitioning
PC
Optimal power flow
Benders decomposition
PCOPF
PCSCOPF
EA
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c368t-6f2bc4ef67b07ae1dfb36d714e4156c146d6fe891420dae71a4e33d3576103993
PageCount 9
ParticipantIDs crossref_citationtrail_10_1016_j_epsr_2015_11_012
crossref_primary_10_1016_j_epsr_2015_11_012
elsevier_sciencedirect_doi_10_1016_j_epsr_2015_11_012
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2016-03-01
PublicationDateYYYYMMDD 2016-03-01
PublicationDate_xml – month: 03
  year: 2016
  text: 2016-03-01
  day: 01
PublicationDecade 2010
PublicationTitle Electric power systems research
PublicationYear 2016
Publisher Elsevier B.V
Publisher_xml – name: Elsevier B.V
References Amjady, Fatemi, Zareipour (bib0175) 2012; 27
(bib0145) 2008
Capitanescu, Glavic, Ernst, Wehenkel (bib0160) 2007; 22
Strbac, Ahmed, Kirschen, Allan (bib0115) 1998; 13
Xu, Dong, Xu, Zhang, Wong (bib0190) 2012
Xu, Dong, Zhang, Wong, Lai (bib0130) 2014; 29
Capitanescu, Wehenkel (bib0120) 2008; 2
Zimmerman, Murillo-Sánchez, Thomas (bib0165) 2011; 26
Wong, Dong (bib0180) 2008
Vesterstrom, Thomsen (bib0185) 2004
Capitanescu, Wehenkel (bib0135) 2007; 22
Capitanescu, Cutsem, Wehenkel (bib0140) 2009; 24
Yumbla, Ramirez, Coello Coello (bib0170) 2008; 23
Capitanescu, Martinez Ramos (bib0125) 2011; 81
Xiao, McCalley (bib0200) 2006
Benders (bib0150) 1962; 4
Wang, Fu, Mao, Menhas, Fei (bib0195) 2012; 98
Alsac, Stott (bib0105) 1974; PAS-93
Monticelli, Pereira, Granville (bib0110) 1987; 2
Fu, Shahidehpour, Li (bib0155) 2006; 21
Xu (10.1016/j.epsr.2015.11.012_bib0130) 2014; 29
Alsac (10.1016/j.epsr.2015.11.012_bib0105) 1974; PAS-93
Benders (10.1016/j.epsr.2015.11.012_bib0150) 1962; 4
Vesterstrom (10.1016/j.epsr.2015.11.012_bib0185) 2004
Xu (10.1016/j.epsr.2015.11.012_bib0190) 2012
Zimmerman (10.1016/j.epsr.2015.11.012_bib0165) 2011; 26
(10.1016/j.epsr.2015.11.012_bib0145) 2008
Capitanescu (10.1016/j.epsr.2015.11.012_bib0120) 2008; 2
Capitanescu (10.1016/j.epsr.2015.11.012_bib0160) 2007; 22
Capitanescu (10.1016/j.epsr.2015.11.012_bib0140) 2009; 24
Xiao (10.1016/j.epsr.2015.11.012_bib0200) 2006
Fu (10.1016/j.epsr.2015.11.012_bib0155) 2006; 21
Strbac (10.1016/j.epsr.2015.11.012_bib0115) 1998; 13
Amjady (10.1016/j.epsr.2015.11.012_bib0175) 2012; 27
Wang (10.1016/j.epsr.2015.11.012_bib0195) 2012; 98
Wong (10.1016/j.epsr.2015.11.012_bib0180) 2008
Capitanescu (10.1016/j.epsr.2015.11.012_bib0135) 2007; 22
Monticelli (10.1016/j.epsr.2015.11.012_bib0110) 1987; 2
Capitanescu (10.1016/j.epsr.2015.11.012_bib0125) 2011; 81
Yumbla (10.1016/j.epsr.2015.11.012_bib0170) 2008; 23
References_xml – start-page: 1980
  year: 2004
  end-page: 1987
  ident: bib0185
  article-title: A comparative study of differential evolution, particle swarm optimization, and evolutionary algorithms on numerical benchmark problems
  publication-title: Proc. IEEE Congr. Evolutionary Computation
– volume: 24
  start-page: 796
  year: 2009
  end-page: 805
  ident: bib0140
  article-title: Coupling optimization and dynamic simulation for preventive–corrective control of voltage instability
  publication-title: IEEE Trans. Power Syst.
– year: 2012
  ident: bib0190
  article-title: Power system transient stability-constrained optimal power flow: a comprehensive review
  publication-title: Proc. 2012 IEEE PES General Meeting
– volume: PAS-93
  start-page: 745
  year: 1974
  end-page: 751
  ident: bib0105
  article-title: Optimal load flow with steady-state security
  publication-title: IEEE Trans. Power Appl. Syst.
– volume: 2
  start-page: 1533
  year: 2008
  end-page: 1541
  ident: bib0120
  article-title: A new iterative approach to the corrective security-constrained optimal power flow problem
  publication-title: IEEE Trans. Power Syst.
– volume: 29
  start-page: 1345
  year: 2014
  end-page: 1355
  ident: bib0130
  article-title: Solving preventive–corrective SCOPF by a hybrid computational strategy
  publication-title: IEEE Trans. Power Syst.
– volume: 27
  start-page: 1311
  year: 2012
  end-page: 1323
  ident: bib0175
  article-title: Solution of optimal power flow subject to security constraints by a new improved bacterial foraging method
  publication-title: IEEE Trans. Power Syst.
– year: 2006
  ident: bib0200
  article-title: Contingency probability estimation using weather and geographical data for on-line security assessment
  publication-title: Proc. Int. Conf. Probabilistic Methods Applied to Power Systems
– volume: 13
  start-page: 1096
  year: 1998
  end-page: 1102
  ident: bib0115
  article-title: A method for computing the value of corrective security
  publication-title: IEEE Trans. Power Syst.
– start-page: 171
  year: 2008
  end-page: 187
  ident: bib0180
  article-title: Differential evolution, an alternative approach to evolutionary algorithm
  publication-title: Modern Heuristic Optimization Techniques: Theory and Applications to Power Systems
– volume: 2
  start-page: 175
  year: 1987
  end-page: 182
  ident: bib0110
  article-title: Security-constrained optimal power flow with post-contingency corrective rescheduling
  publication-title: IEEE Trans. Power Syst.
– volume: 22
  start-page: 887
  year: 2007
  end-page: 889
  ident: bib0135
  article-title: Improving the statement of the corrective security-constrained optimal power flow problem
  publication-title: IEEE Trans. Power Syst.
– start-page: 171
  year: 2008
  end-page: 187
  ident: bib0145
  publication-title: Modern Heuristic Optimization Techniques: Theory and Applications to Power Systems
– volume: 22
  start-page: 1690
  year: 2007
  end-page: 1697
  ident: bib0160
  article-title: Contingency filtering techniques for preventive security-constrained optimal power flow
  publication-title: IEEE Trans. Power Syst.
– volume: 23
  start-page: 33
  year: 2008
  end-page: 40
  ident: bib0170
  article-title: Optimal power flow subject to security constraints solved with a particle swarm optimizer
  publication-title: IEEE Trans. Power Syst.
– volume: 26
  start-page: 12
  year: 2011
  end-page: 19
  ident: bib0165
  article-title: MATPOWER steady-state operations, planning and analysis tools for power systems research and education
  publication-title: IEEE Trans. Power Syst.
– volume: 4
  start-page: 238
  year: 1962
  end-page: 252
  ident: bib0150
  article-title: Partitioning procedures for solving mixed-variables programming problems
  publication-title: J. Numer. Math.
– volume: 98
  start-page: 55
  year: 2012
  end-page: 75
  ident: bib0195
  article-title: A novel modified binary differential evolution algorithm and its applications
  publication-title: Neurocomputing
– volume: 81
  start-page: 1731
  year: 2011
  end-page: 1741
  ident: bib0125
  article-title: State-of-the-art, challenges, and future trends in security constrained optimal power flow
  publication-title: Electr. Power Syst. Res.
– volume: 21
  start-page: 897
  year: 2006
  end-page: 908
  ident: bib0155
  article-title: AC contingency dispatch based on security-constrained unit commitment
  publication-title: IEEE Trans. Power Syst.
– volume: 23
  start-page: 33
  issue: Feb (1)
  year: 2008
  ident: 10.1016/j.epsr.2015.11.012_bib0170
  article-title: Optimal power flow subject to security constraints solved with a particle swarm optimizer
  publication-title: IEEE Trans. Power Syst.
  doi: 10.1109/TPWRS.2007.913196
– volume: 26
  start-page: 12
  issue: Feb (1)
  year: 2011
  ident: 10.1016/j.epsr.2015.11.012_bib0165
  article-title: MATPOWER steady-state operations, planning and analysis tools for power systems research and education
  publication-title: IEEE Trans. Power Syst.
  doi: 10.1109/TPWRS.2010.2051168
– volume: 21
  start-page: 897
  issue: May (2)
  year: 2006
  ident: 10.1016/j.epsr.2015.11.012_bib0155
  article-title: AC contingency dispatch based on security-constrained unit commitment
  publication-title: IEEE Trans. Power Syst.
  doi: 10.1109/TPWRS.2006.873407
– start-page: 171
  year: 2008
  ident: 10.1016/j.epsr.2015.11.012_bib0145
– year: 2012
  ident: 10.1016/j.epsr.2015.11.012_bib0190
  article-title: Power system transient stability-constrained optimal power flow: a comprehensive review
– volume: 2
  start-page: 1533
  issue: Nov (4)
  year: 2008
  ident: 10.1016/j.epsr.2015.11.012_bib0120
  article-title: A new iterative approach to the corrective security-constrained optimal power flow problem
  publication-title: IEEE Trans. Power Syst.
  doi: 10.1109/TPWRS.2008.2002175
– volume: 27
  start-page: 1311
  issue: Aug (3)
  year: 2012
  ident: 10.1016/j.epsr.2015.11.012_bib0175
  article-title: Solution of optimal power flow subject to security constraints by a new improved bacterial foraging method
  publication-title: IEEE Trans. Power Syst.
  doi: 10.1109/TPWRS.2011.2175455
– start-page: 171
  year: 2008
  ident: 10.1016/j.epsr.2015.11.012_bib0180
  article-title: Differential evolution, an alternative approach to evolutionary algorithm
– start-page: 1980
  year: 2004
  ident: 10.1016/j.epsr.2015.11.012_bib0185
  article-title: A comparative study of differential evolution, particle swarm optimization, and evolutionary algorithms on numerical benchmark problems
– volume: PAS-93
  start-page: 745
  issue: 3
  year: 1974
  ident: 10.1016/j.epsr.2015.11.012_bib0105
  article-title: Optimal load flow with steady-state security
  publication-title: IEEE Trans. Power Appl. Syst.
  doi: 10.1109/TPAS.1974.293972
– volume: 81
  start-page: 1731
  issue: 8
  year: 2011
  ident: 10.1016/j.epsr.2015.11.012_bib0125
  article-title: State-of-the-art, challenges, and future trends in security constrained optimal power flow
  publication-title: Electr. Power Syst. Res.
  doi: 10.1016/j.epsr.2011.04.003
– volume: 4
  start-page: 238
  issue: 1
  year: 1962
  ident: 10.1016/j.epsr.2015.11.012_bib0150
  article-title: Partitioning procedures for solving mixed-variables programming problems
  publication-title: J. Numer. Math.
  doi: 10.1007/BF01386316
– volume: 29
  start-page: 1345
  issue: May (3)
  year: 2014
  ident: 10.1016/j.epsr.2015.11.012_bib0130
  article-title: Solving preventive–corrective SCOPF by a hybrid computational strategy
  publication-title: IEEE Trans. Power Syst.
  doi: 10.1109/TPWRS.2013.2293150
– volume: 22
  start-page: 887
  issue: May (2)
  year: 2007
  ident: 10.1016/j.epsr.2015.11.012_bib0135
  article-title: Improving the statement of the corrective security-constrained optimal power flow problem
  publication-title: IEEE Trans. Power Syst.
  doi: 10.1109/TPWRS.2007.894850
– volume: 22
  start-page: 1690
  issue: Feb (1)
  year: 2007
  ident: 10.1016/j.epsr.2015.11.012_bib0160
  article-title: Contingency filtering techniques for preventive security-constrained optimal power flow
  publication-title: IEEE Trans. Power Syst.
  doi: 10.1109/TPWRS.2007.907528
– volume: 24
  start-page: 796
  issue: May (2)
  year: 2009
  ident: 10.1016/j.epsr.2015.11.012_bib0140
  article-title: Coupling optimization and dynamic simulation for preventive–corrective control of voltage instability
  publication-title: IEEE Trans. Power Syst.
  doi: 10.1109/TPWRS.2008.2012181
– volume: 2
  start-page: 175
  issue: Feb (1)
  year: 1987
  ident: 10.1016/j.epsr.2015.11.012_bib0110
  article-title: Security-constrained optimal power flow with post-contingency corrective rescheduling
  publication-title: IEEE Trans. Power Syst.
  doi: 10.1109/TPWRS.1987.4335095
– volume: 13
  start-page: 1096
  issue: Aug (3)
  year: 1998
  ident: 10.1016/j.epsr.2015.11.012_bib0115
  article-title: A method for computing the value of corrective security
  publication-title: IEEE Trans. Power Syst.
  doi: 10.1109/59.709105
– year: 2006
  ident: 10.1016/j.epsr.2015.11.012_bib0200
  article-title: Contingency probability estimation using weather and geographical data for on-line security assessment
– volume: 98
  start-page: 55
  year: 2012
  ident: 10.1016/j.epsr.2015.11.012_bib0195
  article-title: A novel modified binary differential evolution algorithm and its applications
  publication-title: Neurocomputing
  doi: 10.1016/j.neucom.2011.11.033
SSID ssj0006975
Score 2.3002763
Snippet •A novel and improved approach is proposed for preventive-corrective security-constrained optimal power flow (PCSCOPF) problem.•The contingencies are optimally...
SourceID crossref
elsevier
SourceType Enrichment Source
Index Database
Publisher
StartPage 132
SubjectTerms Benders decomposition
Contingency partitioning
Corrective control
Optimal power flow
Title A contingency partitioning approach for preventive-corrective security-constrained optimal power flow computation
URI https://dx.doi.org/10.1016/j.epsr.2015.11.012
Volume 132
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Baden-Württemberg Complete Freedom Collection (Elsevier)
  customDbUrl:
  eissn: 1873-2046
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0006975
  issn: 0378-7796
  databaseCode: GBLVA
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: Elsevier SD Complete Freedom Collection [SCCMFC]
  customDbUrl:
  eissn: 1873-2046
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0006975
  issn: 0378-7796
  databaseCode: ACRLP
  dateStart: 19950101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection
  customDbUrl:
  eissn: 1873-2046
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0006975
  issn: 0378-7796
  databaseCode: .~1
  dateStart: 19950101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: ScienceDirect Freedom Collection Journals
  customDbUrl:
  eissn: 1873-2046
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0006975
  issn: 0378-7796
  databaseCode: AIKHN
  dateStart: 19950101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVLSH
  databaseName: Elsevier Journals
  customDbUrl:
  mediaType: online
  eissn: 1873-2046
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0006975
  issn: 0378-7796
  databaseCode: AKRWK
  dateStart: 19770901
  isFulltext: true
  providerName: Library Specific Holdings
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwELaqssCAeIryqDywIbdJ7DjJWFVUBUQXqNQtcmJbKiptoAXEwm_nLnF4SKgDYyxfYp1Pn-_iu-8IOc9COPaEjllmlWUiUJKphAuWgTueeTr0TFlbdTuSw7G4noSTBunXtTCYVumwv8L0Eq3dSNdps1tMp907j4OxRQkymntchMgJKkSEXQw6H99pHjIpyXZxMsPZrnCmyvEyxRI5Qf2wg0yefvD34fTjwBnskG3nKdJetZhd0jDzPbL1gz9wnzz1KKaal_VR-TstcOHuByutycIpeKW0cERNr4bl2I6jBDm6dL3rYAx5ZBW8WNMFYMgjfLfA9mnUzhZvNC87P5RbeEDGg8v7_pC5Hgos5zJeMWmDLBfGyijzImV8bTMudeQLg5FbDjippTVx4ovA08pEvhKGc80hDMFL4oQfkuZ8MTdHhAo_sEbJKFAqFFLxWMskETy24NNZCDtaxK-Vl-aOYBzXPkvrTLKHFBWeosIh8khB4S1y8SVTVPQaa2eH9Z6kv4wkBfxfI3f8T7kTsglPsko5OyXN1fOLOQMfZJW1SyNrk43e1c1w9Altut5J
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwELagDMCAeIo3HtiQ2zh2nGSsEFV5LoDULXJiWwKVNkABsfDbuUscHhLqwOr4ktP5dI_47jtCDvMI3J40CcuddkyGWjGdCslyCMfzwESBrXqrLq9U_1aeDaLBDDluemGwrNLb_tqmV9bar3S8NDvl3V3nOhCgbHGKiOaBkJGcJXMyCmPMwNof33UeKq3QdnE3w-2-c6Yu8rLlM4KC8qiNUJ48_Ns7_fA4vWWy5ENF2q25WSEzdrRKFn8ACK6Rxy7FWvOqQap4pyVy7v-w0gYtnEJYSkuP1PRqWYHzOCorR5_98DpYQyBZDS82dAxG5AG-W-L8NOqG4zdaVKMfqjNcJ7e9k5vjPvNDFFghVDJhyoV5Ia1TcR7E2nLjcqFMzKXF1K0AQ2mUs0nKZRgYbWOupRXCCMhD8JY4FRukNRqP7CahkofOahWHWkdSaZEYlaZSJA6COgd5xxbhjfCywiOMI-_DrCklu89Q4BkKHFKPDAS-RY6-aMoaX2Pq7qg5k-yXlmTgAKbQbf-T7oDM928uL7KL06vzHbIAT1Rdf7ZLWpOnF7sHAckk368U7hOtTN_e
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+contingency+partitioning+approach+for+preventive-corrective+security-constrained+optimal+power+flow+computation&rft.jtitle=Electric+power+systems+research&rft.au=Xu%2C+Yan&rft.au=Yang%2C+Hongming&rft.au=Zhang%2C+Rui&rft.au=Dong%2C+Zhao+Yang&rft.date=2016-03-01&rft.pub=Elsevier+B.V&rft.issn=0378-7796&rft.eissn=1873-2046&rft.volume=132&rft.spage=132&rft.epage=140&rft_id=info:doi/10.1016%2Fj.epsr.2015.11.012&rft.externalDocID=S0378779615003454
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0378-7796&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0378-7796&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0378-7796&client=summon