Académique Documents
Professionnel Documents
Culture Documents
[Ber98] Berizzi A. et al., First and second orde r methods for voltage collapse
assessmentand security enhancement,IEEE Transactions on Power Systems
, Vol. 13, No. 2, May 1998, pp. 543-549.
[Chi95] Chiang H.-D. et al., CPFLOW: a practical tool for tracing power system
steady-state stationary behavior due to load and generation variations, IEEE
Transactions on Power Systems , Vol. 10, No. 2, May 1995, pp. 623-630.
[Chi97] Chiang H.-D. et al., Look-ahead voltage and load margin contingency
selection functions for large-scale power systems, IEEE Transactions on Power
Systems , Vol. 12, No. 1, February 1997, pp. 173-179.
[Cor94] Cory B.J. et al., Towards a neural network based voltage stability
assessment, Proceedings of International Conference on Intelligent Systems
Application on Power Systems , Montpellier, France, 1994, pp. 529-534.
[Cut87] Cuthbert T.R.,Optimization using personal computers with applications to
electrical networks , John Wiley & Sons, New York, USA, 1987, 474 p.
[Cut91] Van Cutsem T., A method to compute reactive power margins with respect
to voltage collapse, IEEE Transactions on Power Systems , Vol. 6, No. 1, February
1991, pp. 145-153.
[Cut97] Van Cutsem T. and Mailhot R., Validation of a fast voltage stability
analysis method on the Hydro-Quebec system, IEEE Transactions on Power
Systems ,Vol. 12, No. 1, February 1997, pp. 282-288.
[Cut98] Van Cutsem T. and Vournas C.,Voltage stability of electric power systems
,Kluwer academic publishers, Boston, USA, 1998, 378 p.147
[Cut99] Van Cutsem T. et al., Determination of secure operating limits with respect
tovoltage collapse,IEEE Transactions on Power Systems , Vol. 14, No. 1, February
1999, pp. 327-333.
[Dac84] Sa Da Costa J. and Munro N., Pattern recognition in power system
security, Electrical Power & Energy Systems , vol. 6, no. 1, January 1984, pp. 3136.
[Deb91] Debs A.S.,Modern power systems control and operation: A study of realtimeoperation of power utility control centres , Kluwer academic publishers,
Boston,USA, 1991, 361 p.
[Dil96] Dillon T.S. and Niebur D.,Neural networks applications in power systems
[Fow86] Fowler F.G. and Fowler H.W.,The pocket Oxford dictionary of current
English,Oxford University Press, Oxford, UK, 1986, 1057 p.
[Gao92] Gao B. et al., Voltage stability evaluation using modal analysis,
IEEE Transactions on Power Systems , Vol. 7, No. 4, November 1992, pp. 15291536.148
[Gao96] Gao B. et al., Towards the development of a systematic approach for
voltage stability assessment of large-scale power systems,IEEE Transactions on
Power Systems , Vol. 11, No. 3, August 1996, pp. 1314-1324.
[Gol96] Golub G.H. and van Load C.F.,Matrix computations , The Johns Hopkins
University Press, Baltimore, USA, 1996, 694 p.
[Gra99] Gravener M.H. and Nwankpa C., Available transfer capability and first
order sensitivity,IEEE Transactions on Power Systems , Vol. 14, No. 2, May 1999,
pp. 512-518.
[Gre99] Greene S. et al., Contingency ranking for voltage collapse via sensitivities
from a single nose curve,IEEE Transactions on Power Systems , Vol. 14, No.
1,February 1999, pp. 232-238.
[Haj98] Hajagos L.M. and Danai B., Laboratory measurements and models of
modern loads and their effect on voltage stability studies, IEEE Transactions on
Power Systems , Vol. 13, No. 2, May 1998, pp. 584-591.
[Har96] Harsan H. et al., Combining parallel processing and cyclic approach to
speed-up the static security analysis,Proceedings of the 12 Power Systems
Computation Conference , Dresden, Germany, August 1996, pp. 932-938.
th
343.
[Rog95] Rogers G. and Chow J., Hands-on teaching of power system dynamics,
IEEE Computer Application in Power , January 1995, pp. 12-16.
[Sal95] Salatino D. et al., Online voltage stability assessment of load centers by
using neural networks, Electric Power Systems Research , 32, 1995, pp. 165-173.
[San99] Riquelme Santos J. et al., Distributed contingency analysis: practical
issues,IEEE Transactions on Power Systems , Vol. 14, No. 4, November 1999, pp.
1349-1354.
[Sar01] Sarle W.S. (editor),Neural network FAQ , the FAQ locates at
ftp://ftp.sas.com/pub/neural/FAQ.html, 2001.
[Sch97] Schittenkopf C. et al., Two strateg ies to avoid overfitting in feedforward
networks, Neural networks , Vol. 10, No. 3, 1997, pp.505-516.
[Sin95] Sinha A.K., Power system security assessment using pattern recognition
and fuzzy estimation, Electrical Power & Energy Systems , Vol. 17, No. 1, 1995,
pp.11-19.
[Son97] Song Y.H. et al., Kohonen neural network based approach to voltage weak
buses/areas identification,IEE Proceeding on Generation, Transmission and
Distribution , Vol. 144, No. 3, May 1997, pp. 340-344.[Sve94] Svensk Energi,
Avbrottskostnader fr elkunder, Report, Sweden, 1994, 80 p.
[Sh79] Shkntuottajien yhteistyvaltuuskunta,Report on the value of nondistributed energy , English summary of report 1/79, Helsinki, Finland, 1979, 37 p.
[Tay94] Taylor C.W.,Power system voltage stability , McGraw-Hill, New York,
USA,1994, 273 p.
[Tay97] Taylor C.W. and Erickson D.C., Recording and analyzing the July 2
cascading outage,IEEE Computer Applications in Power , January 1997, pp. 26-30.
[Tou74] Tou J.T. and Gonzalez R.C., Pattern recognition principles , AddisonWesley,Massachusetts, USA, 1974, 377 p.152
[Tra00] Transient security assessment tool (TSAT) , Product brochure, Powertech
Labs Inc, the information is available at http://www.powertech.bc.ca/, 2000.
404.
[Zen93] Zeng Z.C. et al., A simplified approach to estimate maximum loading
conditions in the load flow problem, IEEE Transactions on Power Systems
, Vol. 8, No. 2, May 1993, pp. 646-652.
[Zho99] Zhou G and McCalley J.D., Composite security boundary visualisation,
IEEE Transactions on Power Systems , Vol. 14, No. 2, May 1999, pp. 725-731.