Tài liệu tham khảo |
Loại |
Chi tiết |
[1] Boumediène ALLAOUA, Abdellah LAOUFI, “Optimal Power Flow Solution Using Ant Manners for Electrical Network,” Bachar University,B.P 417 CHAR 08000 Algeria, Vol.9.No.1, 2009 |
Sách, tạp chí |
Tiêu đề: |
Optimal Power Flow Solution Using Ant Manners for Electrical Network |
|
[2] Anastasios G.Bakirtzis, “Optimal Power Flow by Enhanced Genetic Algorithm,”IEEE Transactions on Power Systems,Vol.17, No.2, May 2002 |
Sách, tạp chí |
Tiêu đề: |
Optimal Power Flow by Enhanced Genetic Algorithm |
|
[3] Yuhui Shi, “Particle Swarm Optimization,”IEEE Neural Networks Society, 2004 |
Sách, tạp chí |
Tiêu đề: |
Particle Swarm Optimization |
|
[4] J.Kennedy, R.Eberhart, “Particle Swarm Optimization,” Proc.IEEE Int.Conf.on Neural Networks, 1995 |
Sách, tạp chí |
Tiêu đề: |
Particle Swarm Optimization |
|
[5] Ankush Dutta, “Single Objective Optimal Power Flow using Particle Swarm Optimization,”Master of Engineering in Power Systems and Electrical Drives,July 2009 |
Sách, tạp chí |
Tiêu đề: |
Single Objective Optimal Power Flow using Particle Swarm Optimization |
|
[6] Allen J.Wood, Bruce F.Wollenberg, “Power generation operation and control”, 1996, Second Edition, John Wiley & Sons, INC |
Sách, tạp chí |
Tiêu đề: |
Power generation operation and control |
|
[7] Shen, C.M. and Laughton, M A., "Power System Load Scheduling with Security Constraints using Dual Linear programming”, IEE Proceedings, Vol. 117, No. 11, Nov.1970 |
Sách, tạp chí |
Tiêu đề: |
Power System Load Scheduling with Security Constraints using Dual Linear programming |
|
[8] Seyedali Mirjalili , Andrew Lewis, “The Whale Optimization Algorithm “, 2016 [9] AJ Wood, BF Wollenberg, “Power generation, operation, and control” , 2012 [10] J Zhu, “Optimization of power system operation “, 2015 |
Sách, tạp chí |
Tiêu đề: |
The Whale Optimization Algorithm “, 2016 [9] AJ Wood, BF Wollenberg, “Power generation, operation, and control |
|
[18] Hongye Wang, “On The Computation And Application Of Multi Period Security Constrained Optimal Power Flow For Real Time Electricity Market Operations”, May 2007 |
Sách, tạp chí |
Tiêu đề: |
On The Computation And Application Of Multi Period Security Constrained Optimal Power Flow For Real Time Electricity Market Operations |
|
[19] Lalitha S, Aniruddha Bhattacharya, “Risk-Informed Security Constrained Optimal Power Flow Inspired By The Foraging Habits Of Social Spiders”, 2016 [20] YH Song, “Modern optimisation techniques in power systems “, 2013 |
Sách, tạp chí |
Tiêu đề: |
Risk-Informed Security Constrained Optimal Power Flow Inspired By The Foraging Habits Of Social Spiders |
|
[23] Trần Thế Tùng, “Ứng dụng thuật toán Particle Swarm Optimization cải tiến giải toán tối ưu công suất có ràng buộc an ninh”, Luận văn thạc sĩ, tháng 11 năm 2012 |
Sách, tạp chí |
Tiêu đề: |
Ứng dụng thuật toán Particle Swarm Optimization cải tiến giải toán tối ưu công suất có ràng buộc an ninh |
|
[25] P. Somasundaram, K. Kuppusamy, R.P. Kumudini Devi, “Evolutionary programming based securityconstrained optimal power flow”, Electric Power Systems Research 72 (2004) 137–145 |
Sách, tạp chí |
Tiêu đề: |
Evolutionary programming based securityconstrained optimal power flow |
|
[26] S.Kirkpatrick, C.D.Gelatt,M.P.Vecchi, “Optimization by Simulated Annealing” Science, New Series,Vol.220, No.4598, pp.671-680, May 13, 1983 |
Sách, tạp chí |
Tiêu đề: |
Optimization by Simulated Annealing |
|
[27] D.Devaraj, R.Narmatha Banu “Optimal Power Flow for Steady State Security Enhancement using Enhanced Genetic Algorithm with FACTS Devices” , Asian Power Electronics Journal, Vol. 4, No.3 December 2010 |
Sách, tạp chí |
Tiêu đề: |
Optimal Power Flow for Steady State Security Enhancement using Enhanced Genetic Algorithm with FACTS Devices |
|
[11] University Estadual de São Paulo, “Security Constranined Optimal Active Powern Flow Via Network Model And Interior Point Method “, 2009 |
Khác |
|
[12] Nai-Yuan Chiang ã Andreas Grothey, “Solving Security Constrained Optimal Power Flow Problems by a Structure Exploiting Interior Point Method “ |
Khác |
|
[13] Zwe-Lee Gaing , Rung-Fang Chang, “Security-Constrained Optimal Power Flow by Mixed-Integer Genetic Algorithm with Arithmetic Operators “, 2006 |
Khác |
|
[14] D. Kishore Kumar , Mr. G. Sasikumar, “Security Constrained Optimal Power Flow Using Benders Cut Principle “, 2015 |
Khác |
|
[15] Pablo E. Oủate, Juan M. Ramirez, Carlos A. Coello Coello, “Optimal power flow subject to security constraints solved with a particle swarm optimizer “ [16] Priyadarshini. M, Murali Babu. B, “Differential Evolution Algorithm for Security Constrained Optimal Power Flow “, 2013 |
Khác |
|
[17] Brian Stott, Ongun Alsac, “Optima Power Flow – Basic Requirements For Real Life Problems and their Solutions “, 2012 |
Khác |
|