Security Constraint Optimal Power Flow (SCOPF) A Comprehensive Survey

  • Mithun B
  • Muthyala S
  • Maheswarapu S
N/ACitations
Citations of this article
65Readers
Mendeley users who have this article in their library.

Abstract

This paper reviews the existing developments in Security Constrained Optimal Power Flow (SCOPF) from 1960"s to till date. Diverse schemes and approaches on Single Area/Multi-area, Algorithms, Contingency Selection, Steady and Dynamic SCOPF, Artificial Intelligence based SCOPF, Real time and SCOPF using Parallel/Distributed Processing, Economic Dispatch with Security Constraints, Decentralized SCOPF, Voltage Constrained SCOPF (VSCOPF), Incorporation of FACTS on SCOPF studies and Literatures on Applications of SCOPF etc., are appraised in a structured manner chronologically with detailed reviews on the strategies and the test systems used for the analysis are reported. A brief summary of the existing stratagems and test system data which can be retrieved are given in the conclusion for easy access of researchers.

Cite

CITATION STYLE

APA

Mithun, B. M., Muthyala, S., & Maheswarapu, S. (2010). Security Constraint Optimal Power Flow (SCOPF) A Comprehensive Survey. International Journal of Computer Applications, 11(6), 42–52. https://doi.org/10.5120/1583-2122

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free