1. Trang chủ
  2. » Luận Văn - Báo Cáo

Áp dụng whale optimization algorithm giải bài toán phân bố tối ưu công suất có ràng buộc an ninh

95 72 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 95
Dung lượng 2,35 MB

Nội dung

Ngày đăng: 27/01/2021, 17:23

Nguồn tham khảo

Tài liệu tham khảo Loại Chi tiết
[1] Boumediène ALLAOUA, Abdellah LAOUFI, “Optimal Power Flow Solution Using Ant Manners for Electrical Network,” Bachar University,B.P 417 CHAR 08000 Algeria, Vol.9.No.1, 2009 Sách, tạp chí
Tiêu đề: Optimal Power Flow Solution Using Ant Manners for Electrical Network
[2] Anastasios G.Bakirtzis, “Optimal Power Flow by Enhanced Genetic Algorithm,”IEEE Transactions on Power Systems,Vol.17, No.2, May 2002 Sách, tạp chí
Tiêu đề: Optimal Power Flow by Enhanced Genetic Algorithm
[3] Yuhui Shi, “Particle Swarm Optimization,”IEEE Neural Networks Society, 2004 Sách, tạp chí
Tiêu đề: Particle Swarm Optimization
[4] J.Kennedy, R.Eberhart, “Particle Swarm Optimization,” Proc.IEEE Int.Conf.on Neural Networks, 1995 Sách, tạp chí
Tiêu đề: Particle Swarm Optimization
[5] Ankush Dutta, “Single Objective Optimal Power Flow using Particle Swarm Optimization,”Master of Engineering in Power Systems and Electrical Drives,July 2009 Sách, tạp chí
Tiêu đề: Single Objective Optimal Power Flow using Particle Swarm Optimization
[6] Allen J.Wood, Bruce F.Wollenberg, “Power generation operation and control”, 1996, Second Edition, John Wiley & Sons, INC Sách, tạp chí
Tiêu đề: Power generation operation and control
[7] Shen, C.M. and Laughton, M A., "Power System Load Scheduling with Security Constraints using Dual Linear programming”, IEE Proceedings, Vol. 117, No. 11, Nov.1970 Sách, tạp chí
Tiêu đề: Power System Load Scheduling with Security Constraints using Dual Linear programming
[8] Seyedali Mirjalili , Andrew Lewis, “The Whale Optimization Algorithm “, 2016 [9] AJ Wood, BF Wollenberg, “Power generation, operation, and control” , 2012 [10] J Zhu, “Optimization of power system operation “, 2015 Sách, tạp chí
Tiêu đề: The Whale Optimization Algorithm “, 2016 [9] AJ Wood, BF Wollenberg, “Power generation, operation, and control
[18] Hongye Wang, “On The Computation And Application Of Multi Period Security Constrained Optimal Power Flow For Real Time Electricity Market Operations”, May 2007 Sách, tạp chí
Tiêu đề: On The Computation And Application Of Multi Period Security Constrained Optimal Power Flow For Real Time Electricity Market Operations
[19] Lalitha S, Aniruddha Bhattacharya, “Risk-Informed Security Constrained Optimal Power Flow Inspired By The Foraging Habits Of Social Spiders”, 2016 [20] YH Song, “Modern optimisation techniques in power systems “, 2013 Sách, tạp chí
Tiêu đề: Risk-Informed Security Constrained Optimal Power Flow Inspired By The Foraging Habits Of Social Spiders
[23] Trần Thế Tùng, “Ứng dụng thuật toán Particle Swarm Optimization cải tiến giải toán tối ưu công suất có ràng buộc an ninh”, Luận văn thạc sĩ, tháng 11 năm 2012 Sách, tạp chí
Tiêu đề: Ứng dụng thuật toán Particle Swarm Optimization cải tiến giải toán tối ưu công suất có ràng buộc an ninh
[25] P. Somasundaram, K. Kuppusamy, R.P. Kumudini Devi, “Evolutionary programming based securityconstrained optimal power flow”, Electric Power Systems Research 72 (2004) 137–145 Sách, tạp chí
Tiêu đề: Evolutionary programming based securityconstrained optimal power flow
[26] S.Kirkpatrick, C.D.Gelatt,M.P.Vecchi, “Optimization by Simulated Annealing” Science, New Series,Vol.220, No.4598, pp.671-680, May 13, 1983 Sách, tạp chí
Tiêu đề: Optimization by Simulated Annealing
[27] D.Devaraj, R.Narmatha Banu “Optimal Power Flow for Steady State Security Enhancement using Enhanced Genetic Algorithm with FACTS Devices” , Asian Power Electronics Journal, Vol. 4, No.3 December 2010 Sách, tạp chí
Tiêu đề: Optimal Power Flow for Steady State Security Enhancement using Enhanced Genetic Algorithm with FACTS Devices
[11] University Estadual de São Paulo, “Security Constranined Optimal Active Powern Flow Via Network Model And Interior Point Method “, 2009 Khác
[12] Nai-Yuan Chiang ã Andreas Grothey, “Solving Security Constrained Optimal Power Flow Problems by a Structure Exploiting Interior Point Method “ Khác
[13] Zwe-Lee Gaing , Rung-Fang Chang, “Security-Constrained Optimal Power Flow by Mixed-Integer Genetic Algorithm with Arithmetic Operators “, 2006 Khác
[14] D. Kishore Kumar , Mr. G. Sasikumar, “Security Constrained Optimal Power Flow Using Benders Cut Principle “, 2015 Khác
[15] Pablo E. Oủate, Juan M. Ramirez, Carlos A. Coello Coello, “Optimal power flow subject to security constraints solved with a particle swarm optimizer “ [16] Priyadarshini. M, Murali Babu. B, “Differential Evolution Algorithm for Security Constrained Optimal Power Flow “, 2013 Khác
[17] Brian Stott, Ongun Alsac, “Optima Power Flow – Basic Requirements For Real Life Problems and their Solutions “, 2012 Khác

TỪ KHÓA LIÊN QUAN

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN