[1]
Aguado J. A. and Quintana V.H. 2009. Optimal Power Flows of Interconnected Power Systems, IEEE Power Engineering Society Summer Meeting, Vol. 2, p.814 –819.
DOI: 10.1109/pess.1999.787421
Google Scholar
[2]
Padhy N.P. and Kumari L. 2004. Evolutionary Programming Based Economic Power Dispatch Solutions With Independent Power Producers, 2004 IEEE International Conference on Electric Utility Deregulation, Restructuring and Power Technologies (DRPT2004) Hong Kong Vol. 1, pp.172-177.
DOI: 10.1109/drpt.2004.1338488
Google Scholar
[3]
Kumar A. and Chanana S. 2008. Security Constrained Economic Dispatch with Secure Bilateral Transactions in Hybrid Electricity Markets, Power System Technology and IEEE Power India Conference, pp.1-6.
DOI: 10.1109/icpst.2008.4745172
Google Scholar
[4]
Cheng J. W. M., McGills D. T. and Galiana F. D. 1999. Probabilistic security analysis of bilateral transactions in a deregulated environment, , IEEE Transaction on Power systems, Vol. 14, No. 3, pp.1153-1159.
DOI: 10.1109/59.780948
Google Scholar
[5]
Raglend J., Karthikeyan P., and Kothari D. P. 2008. Comparison of Intelligent Techniques to Solve Economic Load Dispatch with Bilateral and Multilateral Transactions, TENCON 2008 IEEE Region 10 Conference, Hyderabad, pp.1-6, 19-21.
DOI: 10.1109/tencon.2008.4766644
Google Scholar
[6]
J. Allen Wood, B.F. Wollenberg, 1996. Power Generation Operation and Control, Wiley.
Google Scholar
[7]
M. Shahidehpour, H. Yamin, Z. Li. 2002. Market Operation in Electric Power Systems, John Wiley & Sons Inc., New York, USA.
Google Scholar
[8]
J. Bialek. 1996. Tracing the flow of electricity, , IEE Proceedings Generation Transmission and Distribution 143 (July (4) 313–320 (1996).
DOI: 10.1049/ip-gtd:19960461
Google Scholar
[9]
D. Kirschen, R. Allan, G. Strbac. 1997. Contribution of individual generations to loads and flows, IEEE Transactions on Power Systems 12 (February (1) 52–60.
DOI: 10.1109/59.574923
Google Scholar
[10]
Y. Pablo Onate, Juan M. Ramirez and Carlos A. Coello Coello. 2009. An optimal power flow plus transmission costs solution, Electric Power Systems Research, Volume 79, No. 8, p.1240–1246.
DOI: 10.1016/j.epsr.2009.03.005
Google Scholar
[11]
C. Dai, Y. Zhu, and W. Chen. 2007. Seeker optimization algorithm, in Computational Intelligence and Security, vol. 4456, Lecture Notes in Artificial Intelligence, Y. Wang, Y. Cheung, and H. Liu, Eds. Berlin, Germany: Springer-Verlag, p.167–176.
DOI: 10.1007/978-3-540-74377-4_18
Google Scholar
[12]
Chaohua Dai, Weirong Chen, and Yunfang Zhu. 2009. Seeker optimization algorithm for digital IIR filter design, IEEE Transactions on Industrial Electronics. 57(5), 1710-1718.
DOI: 10.1109/tie.2009.2031194
Google Scholar
[13]
CondrenJ, Gendra TW, Damrongkulkamjorn P. 2006. Optimal power flow with expected security costs,. IEEE Transactions on Power System, 21(2): 541– 547.
DOI: 10.1109/tpwrs.2006.873114
Google Scholar