Abstract
This paper proposes a dynamic-decision-based realtime dispatch method to coordinate the economic objective with multiple types of security dispatch objectives while reducing constraint violations in the process of adjusting the system operation point to the optimum. In each decision moment, the following tasks are executed in turn: ① locally linearizing the system model at the current operation point with the online model identification by using measurements; ② narrowing down the gaps between unsatisfied security requirements and their security thresholds in order of priority; ③ minimizing the generation cost; ④ minimizing the security indicators within their security thresholds. Compared with the existing real-time dispatch strategies, the proposed method can adjust the deviations caused by unpredictable power flow fluctuations, avoid dispatch bias caused by model parameter errors, and reduce the constraint violations in the dispatch decision process. The effectiveness of the proposed method is verified with the IEEE 39-bus system.
THE conventional power system dispatch is determined by off-line system models and predicted operation conditions every 5 min or longer to maintain the system under reliable and secure conditions with the minimum economic and environmental costs [
Since power fluctuations are almost unpredictable in the real-time scale, existing real-time dispatch strategies are often single-period. The optimal operation point is calculated at each decision moment, and the generator outputs will be regulated towards it as much as possible until the next decision moment. In this case, the system will gradually approach the optimal operation point as shown in

Fig. 1 Moving track of operation point during real-time dispatch.
To simultaneously consider the comprehensive economic and security requirements such as costs, static security [
An example of constraint violations is given in

Fig. 2 An example of constraint violation problem.
In practice, the system operation conditions may hardly remain constant so that the benefit of moving the system operation point directly towards a temporary and distant optimum at every decision moment will be even less. If the operation condition fluctuates wildly, following up with these fluctuations and continuously tracking the optimal operation points will be impossible. As a result, the choice of actually reducing the constraint violations while improving other dispatch objectives will be more meaningful.
Moreover, with the increasing number of economic and security requirements to be considered, the possibility of simultaneous violation of multiple constraints is increasing. In this case, the coordination and the tradeoff should be made among different dispatch objectives at each decision moment to ensure the most urgent security problem is solved with the highest priority. In this case, the objective function of the dispatch problem needs to be regulated dynamically, leading to a dynamic-decision-based real-time dispatch problem.
This paper proposes a novel dynamic-decision-based real-time dispatch method that minimizes the number of constraint violations at each decision moment while tracking the optimal operation points. Besides, more merits include: ① handling the priority of different dispatch objectives at different operation points; ② approximating the system model in a measurement-based way to reduce the computational complexity; ③ simultaneously considering the generation cost, N-1 line loading, and damping ratios of the system.
Contributions of this paper include two aspects.
1) A multi-objective real-time dispatch model is proposed to consider three categories of typical dispatch objectives and the constraint violations while moving the operation point towards the optimum.
2) A decision-based solution method is proposed to solve the proposed dispatch model in real time, while the priority of different security objectives can be set in advance.
The remainder of this paper is organized as follows. Section II presents a brief review of existing dispatch strategies. Section III describes the proposed dispatch model to handle multiple dispatch objectives considering constraint violations. Section IV gives the solution method for the proposed model to make the optimal dispatch decision at each decision moment. Section V tests the proposed model and solution with three study cases. Section VI concludes this paper.
Different economic or security indicators should be considered in dispatch strategies to achieve different dispatch objectives. There are many different forms of these indicators, which fall into three categories as follows.
1) Indicators with predetermined model parameters are independent of either system dynamics or operation conditions. Economic and environmental objectives often consider this type of the indicators.
2) Indicators with model parameters are only related to the system topology and the impedance. Static security objectives often consider this type of indicators.
3) Indicators are related to system dynamics. Dynamic security objectives belong to this category.
Since dispatch objectives in the same category often consider similar indicators, three typical dispatch objectives are used to consider the aforementioned three categories of economic or security indicators, respectively: generation cost reduction, static security, and small-signal stability.

Fig. 3 Development of dispatch strategies.
The generation cost is often formulated as the objective function of the economic dispatch (ED) strategy, where all the parameters are given in advance [
On a longer time scale, the stochastic optimization is introduced to minimize the mathematical expectation of the generation cost in advance based on the probability distribution of potential operation conditions, leading to stochastic dispatch strategies [
While the generation schedules obtained by stochastic methods minimize the expectation of generation cost for possible scenarios, the real-time dispatch is used to get a further optimization on the actual generation cost for each particular scenario on a shorter time scale [
N-1 line loadings and other static security objectives are often formulated as constraints of the dispatch problem and handled by static security-constrained (SSC) dispatch strategies [
The single-stage robust dispatch often suffers from the drawback of over-conservativeness since the scheduled generator outputs will be optimal only for the worst operation condition. To solve this problem, the real-time dispatch is used as a second-stage dispatch to adjust the generation in actual operation conditions. In [
The small-signal stability problem is one of the significant threats to the security and reliability of the power system. An unstable mode can cause violent oscillations and lead to large-scale blackouts. To avoid this situation, maintaining a sufficient small-signal stability margin becomes an important dispatch objective, which leads to the birth of small-signal stability constrained (SSSC) dispatch strategies [
The dispatch strategies mentioned above can handle different typical dispatch objectives, while the tools that can be used in real time considering all three types of objectives under the uncertainties from both the power flow and model parameters are very limited. Stochastic methods like the stochastic optimization and the robust optimization require a system model that can be used in hypothetical operation conditions far from the actual operation point. In this case, only deterministic measurement-based real-time methods can be used.
In existing real-time dispatch strategies, the security objectives are formulated as constraints. As a result, different types of security objectives may lead to constraint violations, as mentioned in the introduction part. Therefore, a new method is proposed in this paper to solve this problem by coordinating the priorities of different security objectives.
In this section, a dynamic-decision-based real-time dispatch model is proposed, which considers multiple security and economic indicators, as well as their priorities.
The typical security indicators mentioned in Section II, i.e., the generation cost, line loadings in N-1 conditions, and the damping ratios, are chosen as dispatch objectives formulated in the dispatch model. Considering a system that consists of buses indexed by , generators indexed by , loads indexed by , transmission lines indexed by , and dominant oscillation modes indexed by , the indicators can be formulated as follows.
For each generator , the generation cost can be expressed as a quadratic function of its active power output:
(1) |
where are the cost coefficients; and is the decision vector, among which is the active power generation of the generator .
For each transmission line , the line loading indicator denotes the active power transmitted through it and the security threshold denotes its rated line capacity. The line loading indicators can be formulated as a linear function:
(2) |
where is the vector of all the ; is the vector of all the nodal active power injections denoted by ; and is a constant coefficient matrix that can be calculated by branch impedances [
Assume that denotes the active power flow of line under the contingency of generator , whose security threshold is denoted as . can be calculated by power transfer distribution factors (PTDFs) as:
(3) |
where is a given participation factor of generator under the contingency of generator ; \{g} is a set contains all the generators excepted for generator g; and is the change of line loading in line when transferring 1.0 p.u. of active power from generator at bus to generator at bus , which can be calculated by :
(4) |
where is the element at row and column of .
The active power in line under the contingency of line is denoted as , whose security threshold is . can be calculated as:
(5) |
where is the line outage distribution factor (LODF), which indicates the change of line loading in line after an outage of line and can be calculated by:
(6) |
where and are the from-bus and to-bus of line
The small-signal stability refers to the system ability to suppress power system oscillations caused by small perturbations [
In practice, damping ratios are often formulated as local linearized functions for a single operation point in real-time dispatch.
The fundamental goal of power system dispatch is to achieve an ideal operation point through a series of dispatch actions. This destination can be determined according to the following three principles.
1) All security requirements and other constraints should be satisfied.
2) The Pareto optimization of all the indicators presented in Section III-A should be attained.
3) The generation cost should be minimized without violating principles 1) and 2).
Thus, the dispatch problem can be formulated as:
(7) |
where is the Pareto solution set of (8).
(8) |
where and are the vectors of line loading indicators in N-1 conditions; is the load demand of load ; is the vector of the damping ratios for all the dominant oscillation modes of the system; is the installed capacity of generator ; and is the total active power loss in the system, which can be approximated to a linear function of .
The proposed optimization model can be shown schematically in

Fig. 4 Feasible region and Pareto front of the proposed model.
Conventional measurement-based real time dispatch solutions normally try to solve (7) continuously in real time to ensure that the system operation point can meet the principles given in Section III-B, such as the approach presented in [
The following characteristics should be considered to plan for a path to reduce the duration of the constraint violations.
1) The chosen path should connect the current operation point and the solution of (7).
2) The portion outside the security boundary should be as short as possible.
As the uncertain fluctuations of load demands and other operation conditions on a very short time scale are unpredictable, it is difficult to plan for an optimal path with the presented characteristics in advance like what the prediction-based dispatch on a longer time scale does. Instead, the dispatch decision is optimized at each step to form an acceptable path meeting the above requirements. Thus, the dispatch decision for a single dispatch period should be made according to the following three principles.
1) The gaps between the unsatisfied security requirements and their security thresholds should be as narrow as possible.
2) The generation cost should be minimized without violating principle 1).
3) The satisfied security requirements should be improved as much as possible without violating principles 1) and 2).
Thus, the presented dispatch problem for every single decision moment of real-time dispatch can be formulated as:
(9) |
where is a subset of the Pareto solution set of (10).
(10) |
where is a subset of the Pareto solution set of (11).
(11) |
where , , and are the gaps between the unsatisfied security requirements and their security thresholds; is the ramp limitation of generator within the time scale of a single real-time dispatch; and is the initial value of at the beginning of this step of real-time dispatch.
Unlike model (7), model (9) gives priority to narrowing down security thresholds. Only if there is more than one operation point which can narrow down security thresholds as much as possible, the proposed model will then consider the economic indicator.
In practice, the constraint violations with larger threats need to be prioritized. In that case, instead of the whole Pareto solution set, and will use a subset of the Pareto solution set that considers the priority of security indicators.
Because is very small for the very short time scale of real-time dispatch, can be approximated by a locally linearized model as:
(12) |
where is the damping ratio vector of the current operation point; is the initial value vector of at the beginning of current step of real-time dispatch; and is the sensitivity matrix of damping ratios with respect to the active power generation. can be calculated directly if a detailed dynamic model of the system can be obtained; otherwise, it can be identified with the real-time measurement by using eigenvalue sensitivity methods, which are well studied in [
The dynamic-decision-based real-time dispatch model presented in Section III is a multi-objective optimization problem with a complex hierarchical structure, where the choice of the subsets S and S determines the dispatch decision. This section presents a multi-step method to determine the subsets and solve the model in real time.
The implementation of the seven key steps is as follows. , , and are the queues created for storing the security indicators. stores the indicators to be optimized, stores the indicators that have already been optimized in the current dispatch, and stores the indicators that have already satisfied their constraints. Denote , , and as the first elements of the queues. For a single indicator , denote its initial value as , its optimized value as , and its corresponding security threshold as .
Step 1: identify model parameters.
The parameters matrices and can be calculated with a detailed model of the system or estimated by historical phasor measurement unit (PMU) data. To avoid the influence of the model error, the latter method is chosen to identify the parameters.
As this paper does not focus on the technical details of the sensitivity estimation, more details are in [
Step 2: calculate security indicators.
The current values of can be measured directly, while , , and can be calculated by (3), (5), and (12) after obtaining and in Step 1. By comparing the current values and thresholds of the security indicators, the unsatisfied security requirements and the enqueue of the corresponding indicators can be screened out into to be optimized, while other indicators are enqueued to .
Step 3: order the indicators in in reverse order of priority.
The priority of security indicators should be evaluated considering the type of security requirements, the severity of the over-limits, and the expert knowledge in practice. In this paper, the following evaluation criteria are used.
1) Priority order among different categories of indicators (high to low) is line loading, damping ratio (smaller than 3%), line loading in the N-1 condition, and damping ratio (smaller than 5%).
2) Priority order of the same category of indicators depends on the priority indicator calculated by (13).
(13) |
Step 4: optimize .
Dequeue , which is the indicator with the highest priority in , and optimize it by (14).
(14) |
where , , and are the indicators contained in , , and , respectively. For a single indicator , denote its initial value as , its optimized value as , and its corresponding security threshold as .
For a single indicator , denote its initial value as = (), its optimized value as , and its corresponding security threshold as . Set the to be the optimal value obtained by (14), then move to if ; otherwise, move to . Repeat this process until is empty.
Step 5: optimize the generation cost.
After all of the indicators in have been moved to or , none of the gaps towards unsatisfied security requirements can be further optimized without sacrificing others. By fixing all of the bound values in (14), a subset of the Pareto solution set of (11) considering the priority order given in key Step 3 is determined, which can be used as S in (10). On this basis, the generation cost should be optimized by (15).
(15) |
Denote the optimal solution of (15) as , which will be used in subsequent steps. Though the optimal solution solved in (15) is a Pareto solution of (11), it may not be a Pareto solution of (10) for some of the security indicators that can be further optimized after its security constraint is met. These indicators will be handled in the following steps.
Step 6: order the indicators in in reverse order of priority.
The evaluation of priority among indicators in is similar to those in .
1) Priority order among different categories of indicators (high to low) is that line loading in the N-1 condition is superior to damping ratio. The order of line loading indicators and N-1 indicators changes because N-1 indicators are often more critical than line loading indicators.
2) Priority order of the same category of indicators depends on the priority indicator calculated by (16).
(16) |
Step 7: optimize .
Dequeue , and then optimize it by (17). Set to be the optimal value obtained from (17), then move to . Repeat this process until is empty, then set the optimal solution of (17) in the last loop as the active reference.
(17) |
After all the indicators have been moved to , none can be further optimized without sacrificing others. In that case, is a Pareto solution of (10) with the minimum generation cost, so it is also the optimal solution of (9).
Because both (15) and (17) are linear programming problems that can be solved in polynomial time, the presented solution can be efficiently calculated on a time scale that meets the requirement for the real-time implementation.
The IEEE 39-bus system [
Because the system has 10 generators and 34 branches, there will be 340 (34×10) line loading indicators under single-generator contingencies as well as 1156 (34×34) line loading indicators under single-line contingencies. With the additional small-signal stability indicators of eight dominant oscillation modes with small damping ratios, a total of 1504 security indicators need to be considered.
The time resolution of the intra-hour dispatch module is assumed to be 15 min, which means that the effect of uncertain load fluctuations within 15 min should be dampened by the dispatch modules with a shorter time scale. In this paper, this task is undertaken by the real-time dispatch approach. The time resolution of real-time dispatch is set to be 1 min. The parameters and in the generation cost function (1) are defined as [0.11, 0.10, 0.09, 0.12, 0.10, 0.11, 0.13, 0.11, 0.10, 0.10
PowerFactory-DIGSILENT is used as the simulation platform. The simulation step size is set to be 30 steps per second, which is the same as the sampling period of a PMU. A small uniform distribution random perturbation is added to all of the loads in every step to simulate the micro-disturbance of loads [
Three cases are provided to verify the performance of the solution proposed in this paper. Case 1 verifies if the proposed method can consider all types of security indicators; case 2 verifies if the proposed method can reduce the constraints violations while driving the system to the optimal opertion point with a static operation condition; and case 3 provides a large sample experiment with continuously varying random operation conditions to check if the proposed method can reduce the constraint violations.
The real-time security-constrained ED (SCED) presented in [
The net loads at the transmission level are modeled as fluctuating time series, as shown in

Fig. 5 Load fluctuation of each load within 15 min.
This case provides a more intuitive example to show the trajectory of the operation point under different real-time dispatch solutions. The initial operation point is shown in

Fig. 6 Initial operation point of case II. (a) Load demand. (b) Active power generation.
In this case, the line loading of branch 6-11 under the contingency of branch 13-14 will be out of limit, which cannot be maintained in a single step of real-time dispatch under the ramp limitation of 2% per minute. The proposed method and the SCED method are used as respective real-time dispatch solutions to maintain the N-1 indicator and minimize the power loss. Since SCED does not consider the ramp limitation, the unattainable change in power generation will be slacked by other generators.
Case 1 is proposed to verify whether the proposed method can handle the multiple types of dispatch indicators, while case 2 verifies whether the system can finally reach the optimal operation point through a safer path by the proposed dynamic decision than by the existing dispatch strategy. Case 3 wants to verify the proposed method in a broader way. One hundred random processes are generated, where each process lasts 15 min and the initial condition is the same as that of case 1. For each process, the power flow will change every 1 min by adding a random value of -10% to 10% of its previous value under the uniform distribution. The step size of the power dispatch is also 1 min. The proposed method is compared with the measurement-based method without a dynamic decision.
As shown in Figs.

Fig. 7 The highest branch flow loading under N-1 conditions in case 1.

Fig. 8 The minimum damping ratio in case 1.

Fig. 9 Total generation costs in case 1.
Case 1 shows the proposed method can simultaneously consider multiple kinds of objectives and perform dispatch methods that can only focus on one type of objective, with a small rise in generation cost.
The simulation results of case 2 are shown in Figs.

Fig. 10 The highest branch flow loading under N-1 conditions in case 2.

Fig. 11 Total generation costs in case 2.
For case 3, the constraint violations of the worst N-1 line loadings and the smallest damping ratios in the 100 samples are shown in Figs.

Fig. 12 Constraint violations of the worst N-1 line loadings in 100 samples.

Fig. 13 Constraint violations of the smallest damping ratios in 100 samples.
For case 3, a constraint violation indicator (CVI) is proposed with the formulation of (18) to evaluate the severity of constraint violations.
(18) |
where is a type of security objective; is the security threshold of ; is the actual value of the security objective at time ; tmax is the total simulation time; (·)+ is an operator to change all the negative values to zero; and is the time integral of security objective violations. The CVI of the worst N-1 line loadings and the smallest damping ratios in the 100 samples are shown in Figs.
Regarding the computation performance, a 2.20 GHz CPU is used to estimate the sensitivity matrices and solve all the optimal problems. The time cost of all the calculations is less than 0.5 s for any calculation period, which is fast enough to allow the method to work in real time. For larger systems, since (15) and (17) are both linear programming, developed algorithms for solving linear programming problems can be used to ensure the real-time performance.
This paper establishes a new dynamic-decision-based real-time dispatch method to reduce constraint violations during the dispatch process before the system reaches the optimal operation point. The proposed method considers the priorities of different dispatch objectives including generation cost, N-1 line loading, and damping ratios of the system at different operation points. At each decision moment, the proposed method first narrows down the gaps between the unsatisfied security requirements and their security thresholds as much as possible, then minimizes the generation cost without widening the gaps or causing new unsatisfied constraints. Finally, the margin for the satisfied security requirements is optimized. The proposed method is evaluated with the IEEE 39-bus system and the results demonstrate that the proposed method can move the operation point of the system to an optimal solution considering multiple security indicators as well as significantly reduce constraint violations. In particular, the proposed method only takes 62.5% of the time to eliminate constraint violations of the N-1 line loading compared with the SCED method. A randomized controlled simulation with 100 samples shows the superiority of the proposed method under different situations with drastic power fluctuations.
References
Q. Wang, A. Yang, F. Wen et al., “Risk-based security-constrained economic dispatch in power systems,” Journal of Modern Power Systems and Clean Energy, vol. 1, no. 2, pp. 142-149, Sept. 2013. [Baidu Scholar]
E. Marris, “Energy: upgrading the grid,” Nature, vol. 454, no. 7204, pp. 570-573, Jul. 2008. [Baidu Scholar]
D. N. Kosterev, C. W. Taylor, and W. A. Mittelstadt, “Model validation for the August 10 1996 WSCC system outage,” IEEE Transactions on Power Systems, vol. 14, no. 3, pp. 967-979, Aug. 1999. [Baidu Scholar]
L. Che, X. Liu, X. Zhu et al., “Intra-interval security based dispatch for power systems with high wind penetration,” IEEE Transactions on Power Systems, vol. 34, no. 2, pp. 1243-1255, Mar. 2019. [Baidu Scholar]
B. Khorramdel, A. Zare, C. Y. Chung et al., “A generic convex model for a chance-constrained look-ahead economic dispatch problem incorporating an efficient wind power distribution modeling,” IEEE Transactions on Power Systems, vol. 35, no. 2, pp. 873-886, Mar. 2020. [Baidu Scholar]
X. Zheng, H. Chen, Y. Xu et al., “A hierarchical method for robust SCUC of multi-area power systems with novel uncertainty sets,” IEEE Transactions on Power Systems, vol. 35, no. 2, pp. 1364-1375, Mar. 2020. [Baidu Scholar]
K. E. van Horn, A. D. Domínguez-García, and P. W. Sauer, “Measurement-based real-time security-constrained economic dispatch,” IEEE Transactions on Power Systems, vol. 31, no. 5, pp. 3548-3560, Sept. 2016. [Baidu Scholar]
J. Zhang, C. Lu, C. Y. Chung et al., “Online re-dispatching of power systems based on modal sensitivity identification,” IET Generation Transmission & Distribution, vol. 9, no. 12, pp. 1352-1360, Sept. 2015. [Baidu Scholar]
G. Wang, Z. Li, F. Zhang et al., “Data-driven probabilistic static security assessment for power system operation using high-order moments,” Journal of Modern Power Systems and Clean Energy, vol. 9, no. 5, pp. 1233-1236, Sept. 2021. [Baidu Scholar]
P. Li, Y. Wei, J. Qi et al., “A closed-form formulation of eigenvalue sensitivity based on matrix calculus for small-signal stability analysis in power system,” Journal of Modern Power Systems and Clean Energy, vol. 9, no. 6, pp. 1436-1445, Nov. 2021. [Baidu Scholar]
P. Carpentier, G. Gohen, J. Culioli et al., “Stochastic optimization of unit commitment: a new decomposition framework,” IEEE Transactions on Power Systems, vol. 11, no. 2, pp. 1067-1073, May 1996. [Baidu Scholar]
J. Hetzer, D. Yu, and K. Bhattarai, “An economic dispatch model incorporating wind power,” IEEE Transactions on Energy Conversion, vol. 23, no. 2, pp. 603-611, Jun. 2008. [Baidu Scholar]
L. Yang, M. He, V. Vittal et al., “Stochastic optimization-based economic dispatch and interruptible load management with increased wind penetration,” IEEE Transactions on Smart Grid, vol. 7, no. 2, pp. 730-739, Mar. 2016. [Baidu Scholar]
Z. Li, W. Wu, B. Zhang et al., “Adjustable robust real-time power dispatch with large-scale wind power integration,” IEEE Transactions on Sustainable Energy, vol. 6, no. 2, pp. 357-368, Apr. 2015. [Baidu Scholar]
P. Srikantha and D. Kundur, “A game theoretic approach to real-time robust distributed generation dispatch,” IEEE Transactions on Industrial Informatics, vol. 13, no. 3, pp. 1006-1016, Jun. 2017. [Baidu Scholar]
A. Zhou, M. Yang, Z. Wang et al., “A linear solution method of generalized robust chance constrained real-time dispatch,” IEEE Transactions on Power Systems, vol. 33, no. 6, pp. 7313-7316, Nov. 2018. [Baidu Scholar]
W. Zhang, W. Liu, X. Wang et al., “Online optimal generation control based on constrained distributed gradient algorithm,” IEEE Transactions on Power Systems, vol. 30, no. 1, pp. 35-45, Jan. 2015. [Baidu Scholar]
R. Patel, C. Li, L. Meegahapola et al., “Enhancing optimal automatic generation control in a multi-area power system with diverse energy resources,” IEEE Transactions on Power Systems, vol. 34, no. 5, pp. 3465-3475, Sept. 2019. [Baidu Scholar]
Y. Jia, Z. Y. Dong, C. Sun et al., “Cooperation-based distributed economic MPC for economic load dispatch and load frequency control of interconnected power systems,” IEEE Transactions on Power Systems, vol. 34, no. 5, pp. 3964-3966, Sept. 2019. [Baidu Scholar]
O. Alsaç and B. Stott, “Optimal load flow with steady-state security,” IEEE Transactions on Power Apparatus Systems, vol. 93, no. 3, pp. 745-751, May 1974. [Baidu Scholar]
A. Gupta and C. L. Anderson, “Statistical bus ranking for flexible robust unit commitment,” IEEE Transactions on Power Systems, vol. 34, no. 1, pp. 236-245, Jan. 2019. [Baidu Scholar]
C. He, L. Wu, T. Liu et al., “Robust co-optimization planning of interdependent electricity and natural gas systems with a joint N-1 and probabilistic reliability criterion,” IEEE Transactions on Power Systems, vol. 33, no. 2, pp. 2140-2154, Mar. 2018. [Baidu Scholar]
A. Zhou, M. Yang, M. Wang et al., “A linear programming approximation of distributionally robust chance-constrained dispatch with Wasserstein distance,” IEEE Transactions on Power Systems, vol. 35, no. 5, pp. 3366-3377, Sept. 2020. [Baidu Scholar]
M. S. Modarresi, L. Xie, M. C. Campi et al., “Scenario-based economic dispatch with tunable risk levels in high-renewable power systems,” IEEE Transactions on Power Systems, vol. 34, no. 6, pp. 5103-5114, Nov. 2019. [Baidu Scholar]
P. Li, M. Yang, and Q. Wu, “Confidence interval based distributionally robust real-time economic dispatch approach considering wind power accommodation risk,” IEEE Transactions on Sustainable Energy, vol. 12, no. 1, pp. 58-61, Jan. 2021. [Baidu Scholar]
J. Condren and T. W. Gedra, “Expected-security cost optimal power flow with small-signal stability constraints,” IEEE Transactions on Power Systems, vol. 21, no. 4, pp. 1736-1743, Nov. 2006. [Baidu Scholar]
R. Zárate-Miñano, F. Milano, and A. J. Conejo, “An OPF methodology to ensure small-signal stability,” IEEE Transactions on Power Systems, vol. 26, no. 3, pp. 1050-1061, Aug. 2011. [Baidu Scholar]
P. Li, J. Qi, J. Wang et al., “An SQP method combined with gradient sampling for small-signal stability constrained OPF,” IEEE Transactions on Power Systems, vol. 32, no. 3, pp. 2372-2381, May 2017. [Baidu Scholar]
Y. Li, G. Geng, Q. Jiang et al., “A sequential approach for small signal stability enhancement with optimizing generation cost,” IEEE Transactions on Power Systems, vol. 34, no. 6, pp. 4828-4836, Nov. 2019. [Baidu Scholar]
S. Mendoza-Armenta and I. Dobson, “Applying a formula for generator redispatch to damp interarea oscillations using synchrophasors,” IEEE Transactions on Power Systems, vol. 31, no. 4, pp. 3119-3128, Jul. 2016. [Baidu Scholar]
B. Wood, B. Wollenberg, and G. Sheblé, Power Generation, Operation, and Control, 3rd ed. New Jersey: John Wiley and Sons, Inc., 2014. [Baidu Scholar]
Y. Chen, A. Domínguez-García, and P. Sauer, “Measurement-based estimation of linear sensitivity distribution factors and applications” IEEE Transactions on Power Systems, vol. 29, no. 3, pp. 1372-1382, May 2014. [Baidu Scholar]
P. Kundur, Power System Stability and Control. New York: McGraw-Hill, 1994. [Baidu Scholar]
S. A. N. Sarmadi and V. Venkatasubramanian, “Electromechanical mode estimation using recursive adaptive stochastic subspace identification,” IEEE Transactions on Power Systems, vol. 29, no. 1, pp. 349-358, Jan. 2014. [Baidu Scholar]
J. Zhang, Z. Wang, X. Zheng et al., “Locally weighted ridge regression for power system online sensitivity identification considering data collinearity,” IEEE Transactions on Power Systems, vol. 33, no. 2, pp. 1624-1633, Mar. 2018. [Baidu Scholar]
T. Athay, R. Podmore, and S. Virmani, “A practical method for the direct analysis of transient stability,” IEEE Transactions on Power Apparatus Systems, vol. 98, no. 2, pp. 573-584, Mar. 1979. [Baidu Scholar]