참고문헌
- B. Stott, O. Alsac, and A. J. Monticelli, 'Security analysis and optimization,' Proceedings of the IEEE, 75(12), pp. 1623-1644, December 1987
- Balho Kim, Ross Baldick, 'Coarse-grained distributed optimal power flow,' IEEE Transactions on Power Systems, Vol. 12, No. 2, pp.932-939, May 1997 https://doi.org/10.1109/59.589777
- Ross Baldick, Balho H. Kim, Craig Chase, 'A Fast Distributed Implementation of Optimal Power Flow,' IEEE/PES Summer Meeting, San Diego, CA, 1998
- Guy Cohen, 'Auxiliary problem principle and decomposition of optimization problems,' Journal of Optimization Theory and Applications, Vol. 32, No. 3, pp.277-305, November 1980 https://doi.org/10.1007/BF00934554
- Guy Cohen and Dao Li Zhu, 'Decomposition coordination methods in large scale optimization problems,' Advances in Large Scale Systems, Vol. 1, pp.203-266,1984
- Alex Papalexopoulos, Shangyou Hao, Edwin Liu, Ziad Alaywan, and Ken Kato, 'Cost/benefit analysis of an optimal power flow : The PG&E experience,' IEEE Transactions on Power Systems, 9(2), pp.796-804, May 1994 https://doi.org/10.1109/59.317637
- Ross Baldick, Economic Operation of Power Systems, Lecture Notes in Electrical and Computer Engineering. The University of Texas at Austin, 1995
- S.A. Farghal and M.A. Tantawy, 'Fast technique for power system security assessment using sensativity parameters of linear programming,' IEEE Transactions on Power Apparatus and Systems, 103(5), pp.946-952, May 1984 https://doi.org/10.1109/TPAS.1984.318697
- A. Monticelli, M. V. F Pereria, and S. Granville, 'Security constrained optimal power flow with post-contingency corrective scheduling,' IEEE Transactions on Power Systems, PWRS-2(1), pp.175-182, February 1987
- H.J.C.P. Pinto, M.V. F. Pereria, and M.J. Teixeira, 'New parallel algorithm for the security-constrained dispatch with post-contigency corrective actions,' PSCC Conference Proc., Graz. pp. 848-854, 1990
- F.L. Alvarado, 'Penalty factors from Newton's method, IEEE Transactions on Power Apparatus and Systems,' 97(6), pp.2031-2040, Nov/Dec 1978 https://doi.org/10.1109/TPAS.1978.354706
- W.Y. Ng, 'Generalized generation distribution factors for power systems security evaluations,' IEEE Transactions on Power Apparatus and Systems, 100(3), pp.1001-1005, March 1981 https://doi.org/10.1109/TPAS.1981.316635
- R.C. Burchett and H. H. Happ, 'Large scale security dispatching: An exact model,' IEEE Transactions on Power Apparatus and Systems, 102(9), pp.2995-2999, September 1983 https://doi.org/10.1109/TPAS.1983.318104
- A.J. Elcaqua and S.L. Corey, 'Security constrained dispatch at the new york power pool,' IEEE Transactions on Power Apparatus and Systems, 101(8), pp.2876-2883, August 1982 https://doi.org/10.1109/TPAS.1982.317613
- R. Lugtu. Security constrained dispatch. IEEE Transactions on Power Apparatus and Systems, 98(1), pp.270-274, January/February 1979 https://doi.org/10.1109/TPAS.1979.319527
- Balho H. Kim. Modifications to interior point OPF code. Technical report, University of Texas at Austin, 1997
- Balbo H. Kim. Multi-area distributed OPF User's guide. Technical Report, University of Texas at Austin, 1997
-
Allen J. Wood and Bruce F. Wollenberg. Power Generation, Operation, and Control,
$2^{nd}$ Edition, New York : Wiley, 1996 - GAMS User's Guide ver. 2.25