{"title":"电力系统安全约束优化","authors":"A. Debs","doi":"10.1109/CDC.1975.270697","DOIUrl":null,"url":null,"abstract":"Secure power system operation is obtained, to a large extent, by on-line monitoring of the system assessing its security, and providing control action to improve its security level. Traditionally, the economy of system operation was the overriding factor. By combining economy with security, the problem becomes quite complex from the points of view of: (a) Methodology of security assessment (b) Overall objectives of system optimization, and (c) Computational feasibility for on-line analysis. In this paper, an overview of the application of optimization theory to this problem is examined. A critical analysis of a selected subset of methodologies is provided.","PeriodicalId":164707,"journal":{"name":"1975 IEEE Conference on Decision and Control including the 14th Symposium on Adaptive Processes","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1975-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Security constrained optimization for power systems\",\"authors\":\"A. Debs\",\"doi\":\"10.1109/CDC.1975.270697\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Secure power system operation is obtained, to a large extent, by on-line monitoring of the system assessing its security, and providing control action to improve its security level. Traditionally, the economy of system operation was the overriding factor. By combining economy with security, the problem becomes quite complex from the points of view of: (a) Methodology of security assessment (b) Overall objectives of system optimization, and (c) Computational feasibility for on-line analysis. In this paper, an overview of the application of optimization theory to this problem is examined. A critical analysis of a selected subset of methodologies is provided.\",\"PeriodicalId\":164707,\"journal\":{\"name\":\"1975 IEEE Conference on Decision and Control including the 14th Symposium on Adaptive Processes\",\"volume\":\"8 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1975-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"1975 IEEE Conference on Decision and Control including the 14th Symposium on Adaptive Processes\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CDC.1975.270697\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"1975 IEEE Conference on Decision and Control including the 14th Symposium on Adaptive Processes","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CDC.1975.270697","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security constrained optimization for power systems
Secure power system operation is obtained, to a large extent, by on-line monitoring of the system assessing its security, and providing control action to improve its security level. Traditionally, the economy of system operation was the overriding factor. By combining economy with security, the problem becomes quite complex from the points of view of: (a) Methodology of security assessment (b) Overall objectives of system optimization, and (c) Computational feasibility for on-line analysis. In this paper, an overview of the application of optimization theory to this problem is examined. A critical analysis of a selected subset of methodologies is provided.