DocumentCode :
3009442
Title :
Security constrained optimization for power systems
Author :
Debs, A.S.
Author_Institution :
Georgia Institute of Technology, Atlanta, Georiga
fYear :
1975
fDate :
10-12 Dec. 1975
Firstpage :
303
Lastpage :
308
Abstract :
Secure power system operation is obtained, to a large extent, by on-line monitoring of the system assessing its security, and providing control action to improve its security level. Traditionally, the economy of system operation was the overriding factor. By combining economy with security, the problem becomes quite complex from the points of view of: (a) Methodology of security assessment (b) Overall objectives of system optimization, and (c) Computational feasibility for on-line analysis. In this paper, an overview of the application of optimization theory to this problem is examined. A critical analysis of a selected subset of methodologies is provided.
Keywords :
Constraint optimization; Control systems; Load flow; Optimization methods; Power generation economics; Power system control; Power system reliability; Power system restoration; Power system security; Power systems;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Decision and Control including the 14th Symposium on Adaptive Processes, 1975 IEEE Conference on
Conference_Location :
Houston, TX, USA
Type :
conf
DOI :
10.1109/CDC.1975.270697
Filename :
4045424
Link To Document :
بازگشت