Archive > Volume 18 Issue 2 > 1995,18(2):102-108 CSTR:[cstr] Prev Next

Application of Linear Programming in the Steady-State Real Power Security Region