A contingency partitioning approach for preventive-corrective security-constrained optimal power flow computation
•A novel and improved approach is proposed for preventive-corrective security-constrained optimal power flow (PCSCOPF) problem.•The contingencies are optimally partitioned into two exclusive sets: one is secured in the preventive control (PC) stage and the other in the corrective control (CC) stage....
Saved in:
| Published in | Electric power systems research Vol. 132; pp. 132 - 140 |
|---|---|
| Main Authors | , , , , , |
| Format | Journal Article |
| Language | English |
| Published |
Elsevier B.V
01.03.2016
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 0378-7796 1873-2046 |
| DOI | 10.1016/j.epsr.2015.11.012 |
Cover
| Abstract | •A novel and improved approach is proposed for preventive-corrective security-constrained optimal power flow (PCSCOPF) problem.•The contingencies are optimally partitioned into two exclusive sets: one is secured in the preventive control (PC) stage and the other in the corrective control (CC) stage.•The PC corresponds to an ordinary SCOPF model and solved by the Benders decomposition method; the CC corresponds to an ordinary OPF model.•The optimal partitioning of the contingencies is determined using an evolutionary algorithm (EA).•The searching dimension only depends on the number of insecure contingencies, hence tends to lead to a much higher solution speed.
Security-constrained optimal power flow (SCOPF) is an important tool to optimize power system's operating state while satisfying security requirements with respect to credible contingencies. As a necessary extension to conventional SCOPFs, the recently proposed preventive–corrective SCOPF (PCSCOPF) aims to achieve the best coordination between the preventive control (PC) and corrective control (CC) considering the probabilistic nature of the contingencies and the cost of CC as well as other binding constraints. However, PCSCOPF renders a large-scale, multi-stage, non-linear programming problem which is difficult to directly solve. This paper proposes a novel and improved approach to the PCSCOPF problem. We aim to partition the contingencies into two exclusive sets: one is secured in the PC stage and the other in the corrective control CC stage. The PC corresponds to an ordinary SCOPF model and solved by the Benders decomposition method; the CC corresponds to an ordinary OPF model. The optimal partitioning of the contingencies is determined using an evolutionary algorithm (EA). Compared with the existing methods, the proposed approach is advantageous in that its searching dimension only depends on the number of insecure contingencies, hence tends to lead to a much higher solution speed. The proposed method is verified on the IEEE 118-bus system and compared with other two existing methods. Simulation results show that the proposed method can provide high-quality solutions with much higher computation speed. |
|---|---|
| AbstractList | •A novel and improved approach is proposed for preventive-corrective security-constrained optimal power flow (PCSCOPF) problem.•The contingencies are optimally partitioned into two exclusive sets: one is secured in the preventive control (PC) stage and the other in the corrective control (CC) stage.•The PC corresponds to an ordinary SCOPF model and solved by the Benders decomposition method; the CC corresponds to an ordinary OPF model.•The optimal partitioning of the contingencies is determined using an evolutionary algorithm (EA).•The searching dimension only depends on the number of insecure contingencies, hence tends to lead to a much higher solution speed.
Security-constrained optimal power flow (SCOPF) is an important tool to optimize power system's operating state while satisfying security requirements with respect to credible contingencies. As a necessary extension to conventional SCOPFs, the recently proposed preventive–corrective SCOPF (PCSCOPF) aims to achieve the best coordination between the preventive control (PC) and corrective control (CC) considering the probabilistic nature of the contingencies and the cost of CC as well as other binding constraints. However, PCSCOPF renders a large-scale, multi-stage, non-linear programming problem which is difficult to directly solve. This paper proposes a novel and improved approach to the PCSCOPF problem. We aim to partition the contingencies into two exclusive sets: one is secured in the PC stage and the other in the corrective control CC stage. The PC corresponds to an ordinary SCOPF model and solved by the Benders decomposition method; the CC corresponds to an ordinary OPF model. The optimal partitioning of the contingencies is determined using an evolutionary algorithm (EA). Compared with the existing methods, the proposed approach is advantageous in that its searching dimension only depends on the number of insecure contingencies, hence tends to lead to a much higher solution speed. The proposed method is verified on the IEEE 118-bus system and compared with other two existing methods. Simulation results show that the proposed method can provide high-quality solutions with much higher computation speed. |
| Author | Yang, Hongming Xu, Yan Zhang, Rui Wong, Kit Po Lai, Mingyong Dong, Zhao Yang |
| Author_xml | – sequence: 1 givenname: Yan surname: Xu fullname: Xu, Yan organization: Hunan Provincial Key Laboratory of Smart Grids Operation and Control, International College, Changsha University of Science and Technology, Changsha 410114, China – sequence: 2 givenname: Hongming surname: Yang fullname: Yang, Hongming email: yhm5218@hotmail.com organization: Hunan Provincial Key Laboratory of Smart Grids Operation and Control, International College, Changsha University of Science and Technology, Changsha 410114, China – sequence: 3 givenname: Rui surname: Zhang fullname: Zhang, Rui organization: School of Electrical and Information Engineering, University of Sydney, Sydney, Australia – sequence: 4 givenname: Zhao Yang surname: Dong fullname: Dong, Zhao Yang organization: Hunan Provincial Key Laboratory of Smart Grids Operation and Control, International College, Changsha University of Science and Technology, Changsha 410114, China – sequence: 5 givenname: Mingyong surname: Lai fullname: Lai, Mingyong organization: Hunan Provincial Key Laboratory of Smart Grids Operation and Control, International College, Changsha University of Science and Technology, Changsha 410114, China – sequence: 6 givenname: Kit Po surname: Wong fullname: Wong, Kit Po organization: School of Electrical, Electronic, and Computer Engineering, University of Western Australia, Perth, Australia |
| BookMark | eNp9kEtOwzAQQC1UJNrCBVj5AgmeOLETiU1V8ZMqsYG15ToTcNXGxk5b9fY4KisWXc1oNG8-b0YmveuRkHtgOTAQD5scfQx5waDKAXIGxRWZQi15VrBSTMiUcVlnUjbihsxi3DDGRCOrKflZUOP6wfZf2JsT9ToMdrCuTwWqvQ9Om2_auUB9wAOmxgNmxoWAZkxpRLMPdjilWh-HoG2PLXV-sDu9pd4dMdBu645px87vBz1OviXXnd5GvPuLc_L5_PSxfM1W7y9vy8UqM1zUQya6Ym1K7IRcM6kR2m7NRSuhxBIqYaAUreiwbqAsWKtRgi6R85ZXUgDjTcPnpD7PNcHFGLBTxp4vGO_cKmBqVKc2alSnRnUKQCV1CS3-oT6kj8LpMvR4hjA9dbAYVDQ2ScXWjrZU6-wl_BcaF46O |
| CitedBy_id | crossref_primary_10_1007_s00202_017_0539_x crossref_primary_10_1061_JLEED9_EYENG_4886 crossref_primary_10_1109_TSG_2018_2797103 crossref_primary_10_1016_j_ijepes_2023_109646 crossref_primary_10_1049_rpg2_12830 crossref_primary_10_1080_15325008_2018_1489432 crossref_primary_10_1109_ACCESS_2021_3067206 crossref_primary_10_1016_j_jclepro_2021_130342 crossref_primary_10_1109_TII_2016_2644738 crossref_primary_10_1002_er_7494 crossref_primary_10_1049_joe_2017_0653 crossref_primary_10_1007_s00202_021_01471_7 crossref_primary_10_1016_j_ijepes_2017_09_023 crossref_primary_10_1155_2017_9539506 crossref_primary_10_1016_j_epsr_2022_107784 crossref_primary_10_1016_j_asoc_2016_05_027 |
| Cites_doi | 10.1109/TPWRS.2007.913196 10.1109/TPWRS.2010.2051168 10.1109/TPWRS.2006.873407 10.1109/TPWRS.2008.2002175 10.1109/TPWRS.2011.2175455 10.1109/TPAS.1974.293972 10.1016/j.epsr.2011.04.003 10.1007/BF01386316 10.1109/TPWRS.2013.2293150 10.1109/TPWRS.2007.894850 10.1109/TPWRS.2007.907528 10.1109/TPWRS.2008.2012181 10.1109/TPWRS.1987.4335095 10.1109/59.709105 10.1016/j.neucom.2011.11.033 |
| ContentType | Journal Article |
| Copyright | 2015 Elsevier B.V. |
| Copyright_xml | – notice: 2015 Elsevier B.V. |
| DBID | AAYXX CITATION |
| DOI | 10.1016/j.epsr.2015.11.012 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1873-2046 |
| EndPage | 140 |
| ExternalDocumentID | 10_1016_j_epsr_2015_11_012 S0378779615003454 |
| GroupedDBID | --K --M -~X .~1 0R~ 1B1 1~. 1~5 29G 4.4 457 4G. 5GY 5VS 7-5 71M 8P~ 9JN AABNK AACTN AAEDT AAEDW AAHCO AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AARJD AAXUO ABFNM ABMAC ABXDB ABYKQ ACAZW ACDAQ ACGFS ACIWK ACNNM ACRLP ADBBV ADEZE ADHUB ADMUD ADTZH AEBSH AECPX AEKER AENEX AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHIDL AHJVU AI. AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ ARUGR ASPBG AVWKF AXJTR AZFZN BELTK BJAXD BKOJK BLXMC CS3 DU5 E.L EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 FDB FEDTE FGOYB FIRID FNPLU FYGXN G-2 G-Q GBLVA HVGLF HZ~ IHE J1W JARJE JJJVA K-O KOM LY6 LY7 M41 MO0 N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. Q38 R2- RIG ROL RPZ SAC SDF SDG SES SET SEW SPC SPCBC SSR SST SSW SSZ T5K VH1 WUQ ZMT ~G- AATTM AAXKI AAYWO AAYXX ABJNI ABWVN ACLOT ACRPL ACVFH ADCNI ADNMO AEIPS AEUPX AFJKZ AFPUW AGQPQ AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP CITATION EFKBS ~HD |
| ID | FETCH-LOGICAL-c368t-6f2bc4ef67b07ae1dfb36d714e4156c146d6fe891420dae71a4e33d3576103993 |
| IEDL.DBID | .~1 |
| ISSN | 0378-7796 |
| IngestDate | Wed Oct 01 05:08:54 EDT 2025 Thu Apr 24 22:56:18 EDT 2025 Fri Feb 23 02:33:10 EST 2024 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | CC DE BD OPF SCOPF Corrective control IP CP SC Contingency partitioning PC Optimal power flow Benders decomposition PCOPF PCSCOPF EA |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c368t-6f2bc4ef67b07ae1dfb36d714e4156c146d6fe891420dae71a4e33d3576103993 |
| PageCount | 9 |
| ParticipantIDs | crossref_citationtrail_10_1016_j_epsr_2015_11_012 crossref_primary_10_1016_j_epsr_2015_11_012 elsevier_sciencedirect_doi_10_1016_j_epsr_2015_11_012 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2016-03-01 |
| PublicationDateYYYYMMDD | 2016-03-01 |
| PublicationDate_xml | – month: 03 year: 2016 text: 2016-03-01 day: 01 |
| PublicationDecade | 2010 |
| PublicationTitle | Electric power systems research |
| PublicationYear | 2016 |
| Publisher | Elsevier B.V |
| Publisher_xml | – name: Elsevier B.V |
| References | Amjady, Fatemi, Zareipour (bib0175) 2012; 27 (bib0145) 2008 Capitanescu, Glavic, Ernst, Wehenkel (bib0160) 2007; 22 Strbac, Ahmed, Kirschen, Allan (bib0115) 1998; 13 Xu, Dong, Xu, Zhang, Wong (bib0190) 2012 Xu, Dong, Zhang, Wong, Lai (bib0130) 2014; 29 Capitanescu, Wehenkel (bib0120) 2008; 2 Zimmerman, Murillo-Sánchez, Thomas (bib0165) 2011; 26 Wong, Dong (bib0180) 2008 Vesterstrom, Thomsen (bib0185) 2004 Capitanescu, Wehenkel (bib0135) 2007; 22 Capitanescu, Cutsem, Wehenkel (bib0140) 2009; 24 Yumbla, Ramirez, Coello Coello (bib0170) 2008; 23 Capitanescu, Martinez Ramos (bib0125) 2011; 81 Xiao, McCalley (bib0200) 2006 Benders (bib0150) 1962; 4 Wang, Fu, Mao, Menhas, Fei (bib0195) 2012; 98 Alsac, Stott (bib0105) 1974; PAS-93 Monticelli, Pereira, Granville (bib0110) 1987; 2 Fu, Shahidehpour, Li (bib0155) 2006; 21 Xu (10.1016/j.epsr.2015.11.012_bib0130) 2014; 29 Alsac (10.1016/j.epsr.2015.11.012_bib0105) 1974; PAS-93 Benders (10.1016/j.epsr.2015.11.012_bib0150) 1962; 4 Vesterstrom (10.1016/j.epsr.2015.11.012_bib0185) 2004 Xu (10.1016/j.epsr.2015.11.012_bib0190) 2012 Zimmerman (10.1016/j.epsr.2015.11.012_bib0165) 2011; 26 (10.1016/j.epsr.2015.11.012_bib0145) 2008 Capitanescu (10.1016/j.epsr.2015.11.012_bib0120) 2008; 2 Capitanescu (10.1016/j.epsr.2015.11.012_bib0160) 2007; 22 Capitanescu (10.1016/j.epsr.2015.11.012_bib0140) 2009; 24 Xiao (10.1016/j.epsr.2015.11.012_bib0200) 2006 Fu (10.1016/j.epsr.2015.11.012_bib0155) 2006; 21 Strbac (10.1016/j.epsr.2015.11.012_bib0115) 1998; 13 Amjady (10.1016/j.epsr.2015.11.012_bib0175) 2012; 27 Wang (10.1016/j.epsr.2015.11.012_bib0195) 2012; 98 Wong (10.1016/j.epsr.2015.11.012_bib0180) 2008 Capitanescu (10.1016/j.epsr.2015.11.012_bib0135) 2007; 22 Monticelli (10.1016/j.epsr.2015.11.012_bib0110) 1987; 2 Capitanescu (10.1016/j.epsr.2015.11.012_bib0125) 2011; 81 Yumbla (10.1016/j.epsr.2015.11.012_bib0170) 2008; 23 |
| References_xml | – start-page: 1980 year: 2004 end-page: 1987 ident: bib0185 article-title: A comparative study of differential evolution, particle swarm optimization, and evolutionary algorithms on numerical benchmark problems publication-title: Proc. IEEE Congr. Evolutionary Computation – volume: 24 start-page: 796 year: 2009 end-page: 805 ident: bib0140 article-title: Coupling optimization and dynamic simulation for preventive–corrective control of voltage instability publication-title: IEEE Trans. Power Syst. – year: 2012 ident: bib0190 article-title: Power system transient stability-constrained optimal power flow: a comprehensive review publication-title: Proc. 2012 IEEE PES General Meeting – volume: PAS-93 start-page: 745 year: 1974 end-page: 751 ident: bib0105 article-title: Optimal load flow with steady-state security publication-title: IEEE Trans. Power Appl. Syst. – volume: 2 start-page: 1533 year: 2008 end-page: 1541 ident: bib0120 article-title: A new iterative approach to the corrective security-constrained optimal power flow problem publication-title: IEEE Trans. Power Syst. – volume: 29 start-page: 1345 year: 2014 end-page: 1355 ident: bib0130 article-title: Solving preventive–corrective SCOPF by a hybrid computational strategy publication-title: IEEE Trans. Power Syst. – volume: 27 start-page: 1311 year: 2012 end-page: 1323 ident: bib0175 article-title: Solution of optimal power flow subject to security constraints by a new improved bacterial foraging method publication-title: IEEE Trans. Power Syst. – year: 2006 ident: bib0200 article-title: Contingency probability estimation using weather and geographical data for on-line security assessment publication-title: Proc. Int. Conf. Probabilistic Methods Applied to Power Systems – volume: 13 start-page: 1096 year: 1998 end-page: 1102 ident: bib0115 article-title: A method for computing the value of corrective security publication-title: IEEE Trans. Power Syst. – start-page: 171 year: 2008 end-page: 187 ident: bib0180 article-title: Differential evolution, an alternative approach to evolutionary algorithm publication-title: Modern Heuristic Optimization Techniques: Theory and Applications to Power Systems – volume: 2 start-page: 175 year: 1987 end-page: 182 ident: bib0110 article-title: Security-constrained optimal power flow with post-contingency corrective rescheduling publication-title: IEEE Trans. Power Syst. – volume: 22 start-page: 887 year: 2007 end-page: 889 ident: bib0135 article-title: Improving the statement of the corrective security-constrained optimal power flow problem publication-title: IEEE Trans. Power Syst. – start-page: 171 year: 2008 end-page: 187 ident: bib0145 publication-title: Modern Heuristic Optimization Techniques: Theory and Applications to Power Systems – volume: 22 start-page: 1690 year: 2007 end-page: 1697 ident: bib0160 article-title: Contingency filtering techniques for preventive security-constrained optimal power flow publication-title: IEEE Trans. Power Syst. – volume: 23 start-page: 33 year: 2008 end-page: 40 ident: bib0170 article-title: Optimal power flow subject to security constraints solved with a particle swarm optimizer publication-title: IEEE Trans. Power Syst. – volume: 26 start-page: 12 year: 2011 end-page: 19 ident: bib0165 article-title: MATPOWER steady-state operations, planning and analysis tools for power systems research and education publication-title: IEEE Trans. Power Syst. – volume: 4 start-page: 238 year: 1962 end-page: 252 ident: bib0150 article-title: Partitioning procedures for solving mixed-variables programming problems publication-title: J. Numer. Math. – volume: 98 start-page: 55 year: 2012 end-page: 75 ident: bib0195 article-title: A novel modified binary differential evolution algorithm and its applications publication-title: Neurocomputing – volume: 81 start-page: 1731 year: 2011 end-page: 1741 ident: bib0125 article-title: State-of-the-art, challenges, and future trends in security constrained optimal power flow publication-title: Electr. Power Syst. Res. – volume: 21 start-page: 897 year: 2006 end-page: 908 ident: bib0155 article-title: AC contingency dispatch based on security-constrained unit commitment publication-title: IEEE Trans. Power Syst. – volume: 23 start-page: 33 issue: Feb (1) year: 2008 ident: 10.1016/j.epsr.2015.11.012_bib0170 article-title: Optimal power flow subject to security constraints solved with a particle swarm optimizer publication-title: IEEE Trans. Power Syst. doi: 10.1109/TPWRS.2007.913196 – volume: 26 start-page: 12 issue: Feb (1) year: 2011 ident: 10.1016/j.epsr.2015.11.012_bib0165 article-title: MATPOWER steady-state operations, planning and analysis tools for power systems research and education publication-title: IEEE Trans. Power Syst. doi: 10.1109/TPWRS.2010.2051168 – volume: 21 start-page: 897 issue: May (2) year: 2006 ident: 10.1016/j.epsr.2015.11.012_bib0155 article-title: AC contingency dispatch based on security-constrained unit commitment publication-title: IEEE Trans. Power Syst. doi: 10.1109/TPWRS.2006.873407 – start-page: 171 year: 2008 ident: 10.1016/j.epsr.2015.11.012_bib0145 – year: 2012 ident: 10.1016/j.epsr.2015.11.012_bib0190 article-title: Power system transient stability-constrained optimal power flow: a comprehensive review – volume: 2 start-page: 1533 issue: Nov (4) year: 2008 ident: 10.1016/j.epsr.2015.11.012_bib0120 article-title: A new iterative approach to the corrective security-constrained optimal power flow problem publication-title: IEEE Trans. Power Syst. doi: 10.1109/TPWRS.2008.2002175 – volume: 27 start-page: 1311 issue: Aug (3) year: 2012 ident: 10.1016/j.epsr.2015.11.012_bib0175 article-title: Solution of optimal power flow subject to security constraints by a new improved bacterial foraging method publication-title: IEEE Trans. Power Syst. doi: 10.1109/TPWRS.2011.2175455 – start-page: 171 year: 2008 ident: 10.1016/j.epsr.2015.11.012_bib0180 article-title: Differential evolution, an alternative approach to evolutionary algorithm – start-page: 1980 year: 2004 ident: 10.1016/j.epsr.2015.11.012_bib0185 article-title: A comparative study of differential evolution, particle swarm optimization, and evolutionary algorithms on numerical benchmark problems – volume: PAS-93 start-page: 745 issue: 3 year: 1974 ident: 10.1016/j.epsr.2015.11.012_bib0105 article-title: Optimal load flow with steady-state security publication-title: IEEE Trans. Power Appl. Syst. doi: 10.1109/TPAS.1974.293972 – volume: 81 start-page: 1731 issue: 8 year: 2011 ident: 10.1016/j.epsr.2015.11.012_bib0125 article-title: State-of-the-art, challenges, and future trends in security constrained optimal power flow publication-title: Electr. Power Syst. Res. doi: 10.1016/j.epsr.2011.04.003 – volume: 4 start-page: 238 issue: 1 year: 1962 ident: 10.1016/j.epsr.2015.11.012_bib0150 article-title: Partitioning procedures for solving mixed-variables programming problems publication-title: J. Numer. Math. doi: 10.1007/BF01386316 – volume: 29 start-page: 1345 issue: May (3) year: 2014 ident: 10.1016/j.epsr.2015.11.012_bib0130 article-title: Solving preventive–corrective SCOPF by a hybrid computational strategy publication-title: IEEE Trans. Power Syst. doi: 10.1109/TPWRS.2013.2293150 – volume: 22 start-page: 887 issue: May (2) year: 2007 ident: 10.1016/j.epsr.2015.11.012_bib0135 article-title: Improving the statement of the corrective security-constrained optimal power flow problem publication-title: IEEE Trans. Power Syst. doi: 10.1109/TPWRS.2007.894850 – volume: 22 start-page: 1690 issue: Feb (1) year: 2007 ident: 10.1016/j.epsr.2015.11.012_bib0160 article-title: Contingency filtering techniques for preventive security-constrained optimal power flow publication-title: IEEE Trans. Power Syst. doi: 10.1109/TPWRS.2007.907528 – volume: 24 start-page: 796 issue: May (2) year: 2009 ident: 10.1016/j.epsr.2015.11.012_bib0140 article-title: Coupling optimization and dynamic simulation for preventive–corrective control of voltage instability publication-title: IEEE Trans. Power Syst. doi: 10.1109/TPWRS.2008.2012181 – volume: 2 start-page: 175 issue: Feb (1) year: 1987 ident: 10.1016/j.epsr.2015.11.012_bib0110 article-title: Security-constrained optimal power flow with post-contingency corrective rescheduling publication-title: IEEE Trans. Power Syst. doi: 10.1109/TPWRS.1987.4335095 – volume: 13 start-page: 1096 issue: Aug (3) year: 1998 ident: 10.1016/j.epsr.2015.11.012_bib0115 article-title: A method for computing the value of corrective security publication-title: IEEE Trans. Power Syst. doi: 10.1109/59.709105 – year: 2006 ident: 10.1016/j.epsr.2015.11.012_bib0200 article-title: Contingency probability estimation using weather and geographical data for on-line security assessment – volume: 98 start-page: 55 year: 2012 ident: 10.1016/j.epsr.2015.11.012_bib0195 article-title: A novel modified binary differential evolution algorithm and its applications publication-title: Neurocomputing doi: 10.1016/j.neucom.2011.11.033 |
| SSID | ssj0006975 |
| Score | 2.3002763 |
| Snippet | •A novel and improved approach is proposed for preventive-corrective security-constrained optimal power flow (PCSCOPF) problem.•The contingencies are optimally... |
| SourceID | crossref elsevier |
| SourceType | Enrichment Source Index Database Publisher |
| StartPage | 132 |
| SubjectTerms | Benders decomposition Contingency partitioning Corrective control Optimal power flow |
| Title | A contingency partitioning approach for preventive-corrective security-constrained optimal power flow computation |
| URI | https://dx.doi.org/10.1016/j.epsr.2015.11.012 |
| Volume | 132 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Baden-Württemberg Complete Freedom Collection (Elsevier) customDbUrl: eissn: 1873-2046 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0006975 issn: 0378-7796 databaseCode: GBLVA dateStart: 20110101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVESC databaseName: Elsevier SD Complete Freedom Collection [SCCMFC] customDbUrl: eissn: 1873-2046 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0006975 issn: 0378-7796 databaseCode: ACRLP dateStart: 19950101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection customDbUrl: eissn: 1873-2046 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0006975 issn: 0378-7796 databaseCode: .~1 dateStart: 19950101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVESC databaseName: ScienceDirect Freedom Collection Journals customDbUrl: eissn: 1873-2046 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0006975 issn: 0378-7796 databaseCode: AIKHN dateStart: 19950101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVLSH databaseName: Elsevier Journals customDbUrl: mediaType: online eissn: 1873-2046 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0006975 issn: 0378-7796 databaseCode: AKRWK dateStart: 19770901 isFulltext: true providerName: Library Specific Holdings |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwELaqssCAeIryqDywIbdJ7DjJWFVUBUQXqNQtcmJbKiptoAXEwm_nLnF4SKgDYyxfYp1Pn-_iu-8IOc9COPaEjllmlWUiUJKphAuWgTueeTr0TFlbdTuSw7G4noSTBunXtTCYVumwv8L0Eq3dSNdps1tMp907j4OxRQkymntchMgJKkSEXQw6H99pHjIpyXZxMsPZrnCmyvEyxRI5Qf2wg0yefvD34fTjwBnskG3nKdJetZhd0jDzPbL1gz9wnzz1KKaal_VR-TstcOHuByutycIpeKW0cERNr4bl2I6jBDm6dL3rYAx5ZBW8WNMFYMgjfLfA9mnUzhZvNC87P5RbeEDGg8v7_pC5Hgos5zJeMWmDLBfGyijzImV8bTMudeQLg5FbDjippTVx4ovA08pEvhKGc80hDMFL4oQfkuZ8MTdHhAo_sEbJKFAqFFLxWMskETy24NNZCDtaxK-Vl-aOYBzXPkvrTLKHFBWeosIh8khB4S1y8SVTVPQaa2eH9Z6kv4wkBfxfI3f8T7kTsglPsko5OyXN1fOLOQMfZJW1SyNrk43e1c1w9Altut5J |
| linkProvider | Elsevier |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwELagDMCAeIo3HtiQ2zh2nGSsEFV5LoDULXJiWwKVNkABsfDbuUscHhLqwOr4ktP5dI_47jtCDvMI3J40CcuddkyGWjGdCslyCMfzwESBrXqrLq9U_1aeDaLBDDluemGwrNLb_tqmV9bar3S8NDvl3V3nOhCgbHGKiOaBkJGcJXMyCmPMwNof33UeKq3QdnE3w-2-c6Yu8rLlM4KC8qiNUJ48_Ns7_fA4vWWy5ENF2q25WSEzdrRKFn8ACK6Rxy7FWvOqQap4pyVy7v-w0gYtnEJYSkuP1PRqWYHzOCorR5_98DpYQyBZDS82dAxG5AG-W-L8NOqG4zdaVKMfqjNcJ7e9k5vjPvNDFFghVDJhyoV5Ia1TcR7E2nLjcqFMzKXF1K0AQ2mUs0nKZRgYbWOupRXCCMhD8JY4FRukNRqP7CahkofOahWHWkdSaZEYlaZSJA6COgd5xxbhjfCywiOMI-_DrCklu89Q4BkKHFKPDAS-RY6-aMoaX2Pq7qg5k-yXlmTgAKbQbf-T7oDM928uL7KL06vzHbIAT1Rdf7ZLWpOnF7sHAckk368U7hOtTN_e |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+contingency+partitioning+approach+for+preventive-corrective+security-constrained+optimal+power+flow+computation&rft.jtitle=Electric+power+systems+research&rft.au=Xu%2C+Yan&rft.au=Yang%2C+Hongming&rft.au=Zhang%2C+Rui&rft.au=Dong%2C+Zhao+Yang&rft.date=2016-03-01&rft.pub=Elsevier+B.V&rft.issn=0378-7796&rft.eissn=1873-2046&rft.volume=132&rft.spage=132&rft.epage=140&rft_id=info:doi/10.1016%2Fj.epsr.2015.11.012&rft.externalDocID=S0378779615003454 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0378-7796&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0378-7796&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0378-7796&client=summon |