Buscar
Mostrando ítems 1-10 de 373
Optimal contract pricing of distributed generation under a competitive framework
(2010-07-26)
A bilevel programming approach for the optimal contract pricing of distributed generation (DG) in distribution networks is presented. The outer optimization problem corresponds to the owner of the DG who must decide the ...
Optimal contract pricing of distributed generation under a competitive framework
(2010-07-26)
A bilevel programming approach for the optimal contract pricing of distributed generation (DG) in distribution networks is presented. The outer optimization problem corresponds to the owner of the DG who must decide the ...
Bilevel approach for optimal location and contract pricing of distributed generation in radial distribution systems using mixed-integer linear programming
(2013-07-24)
In this study, a novel approach for the optimal location and contract pricing of distributed generation (DG) is presented. Such an approach is designed for a market environment in which the distribution company (DisCo) can ...
Bilevel approach for optimal location and contract pricing of distributed generation in radial distribution systems using mixed-integer linear programming
(2013-07-24)
In this study, a novel approach for the optimal location and contract pricing of distributed generation (DG) is presented. Such an approach is designed for a market environment in which the distribution company (DisCo) can ...
Market-driven security-constrained transmission network expansion planning
(2011-05-31)
This paper presents a Bi-level Programming (BP) approach to solve the Transmission Network Expansion Planning (TNEP) problem. The proposed model is envisaged under a market environment and considers security constraints. ...
Market-driven security-constrained transmission network expansion planning
(2011-05-31)
This paper presents a Bi-level Programming (BP) approach to solve the Transmission Network Expansion Planning (TNEP) problem. The proposed model is envisaged under a market environment and considers security constraints. ...