作者: Tarik Zabaiou , Louis-A Dessaint , Innocent Kamwa
DOI: 10.1049/IET-GTD.2013.0724
关键词:
摘要: … The output of the state estimator is used to compute the vulnerability [40] and the line voltage stability [16] indices in order to verify the system security. When the network is overloaded …