Por favor, use este identificador para citar o enlazar este ítem:
http://hdl.handle.net/11531/5596
Registro completo de metadatos
Campo DC | Valor | Lengua/Idioma |
---|---|---|
dc.contributor.author | Delgadillo Vega, Andrés Ramiro | es-ES |
dc.contributor.author | Arroyo Sánchez, José Manuel | es-ES |
dc.contributor.author | Alguacil Conde, Natalia | es-ES |
dc.date.accessioned | 2016-01-15T11:27:17Z | - |
dc.date.available | 2016-01-15T11:27:17Z | - |
dc.date.issued | 2010-07-25 | es_ES |
dc.identifier.uri | http://hdl.handle.net/11531/5596 | - |
dc.description | Capítulos en libros | es_ES |
dc.description.abstract | es-ES | |
dc.description.abstract | This paper addresses the vulnerability analysis of the electric grid under terrorist threat. This problem is formulated as a mixed-integer non-linear bilevel program. In the upper-level optimization, the terrorist agent maximizes the damage caused in the power system, which is measured in terms of the level of system load shed. On the other hand, in the lower-level optimization, the system operator minimizes the damage by means of an optimal operation of the power system. The distinctive modeling feature introduced in this paper is that, among the different corrective actions available, the system operator has the capability to modify the network topology. | en-GB |
dc.format.mimetype | application/pdf | es_ES |
dc.language.iso | en-GB | es_ES |
dc.publisher | Sin editorial (Minneapolis, Estados Unidos de América) | es_ES |
dc.rights | es_ES | |
dc.rights.uri | es_ES | |
dc.source | Libro: IEEE Power & Energy Society General Meeting - IEEE PES GM 2010, Página inicial: 1-1, Página final: | es_ES |
dc.subject.other | Instituto de Investigación Tecnológica (IIT) | es_ES |
dc.title | Analysis of electric grid interdiction with line switching | es_ES |
dc.type | info:eu-repo/semantics/bookPart | es_ES |
dc.description.version | info:eu-repo/semantics/publishedVersion | es_ES |
dc.rights.accessRights | info:eu-repo/semantics/restrictedAccess | es_ES |
dc.keywords | es-ES | |
dc.keywords | Benders decomposition, bilevel programming, deliberate outages, line switching, load shedding, vulnerability | en-GB |
Aparece en las colecciones: | Artículos |
Ficheros en este ítem:
Fichero | Descripción | Tamaño | Formato | |
---|---|---|---|---|
IIT-10-054A.pdf | 430,69 kB | Adobe PDF | Visualizar/Abrir Request a copy |
Los ítems de DSpace están protegidos por copyright, con todos los derechos reservados, a menos que se indique lo contrario.