{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T16:45:01Z","timestamp":1774457101493,"version":"3.50.1"},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2018,11,1]],"date-time":"2018-11-01T00:00:00Z","timestamp":1541030400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"ERDF \u2013 European Regional Development Fund through the Operational Programme for Competitiveness and Internationalization - COMPETE 2020 Programme"},{"name":"National Funds through the Portuguese funding agency, FCT - Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","award":["SAICTPAC\/0004\/2015- POCI-01-0145-FEDER-016434"],"award-info":[{"award-number":["SAICTPAC\/0004\/2015- POCI-01-0145-FEDER-016434"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Power Syst."],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1109\/tpwrs.2018.2847766","type":"journal-article","created":{"date-parts":[[2018,6,15]],"date-time":"2018-06-15T19:31:37Z","timestamp":1529091097000},"page":"6621-6629","source":"Crossref","is-referenced-by-count":26,"title":["Security-Constrained Optimal Power Flow via Cross-Entropy Method"],"prefix":"10.1109","volume":"33","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9097-3679","authenticated-orcid":false,"given":"Leonel","family":"de Magalhaes Carvalho","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4749-3303","authenticated-orcid":false,"given":"Armando Martins","family":"Leite da Silva","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5772-8452","authenticated-orcid":false,"given":"Vladimiro","family":"Miranda","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1017\/S0962492913000032"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2010.2051168"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2012.2213618"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2013.2267154"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2011.2112785"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2009.2036710"},{"key":"ref37","year":"0"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s11009-006-9753-0"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010091220143"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/S0377-2217(96)00385-2"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2011.04.003"},{"key":"ref40","year":"0"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2010.2044426"},{"key":"ref12","first-page":"836","article-title":"Some efficient optimization methods for solving the security-constrained optimal power flow\n poblem","volume":"29","author":"phan","year":"2012","journal-title":"IEEE Trans Power Syst"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2012.2186469"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2012.2219080"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2013.2271980"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2013.2289990"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2014.2345753"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1090\/fic\/055\/08"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1002\/9780470225868"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1002\/9780470230381"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.1987.4335095"},{"key":"ref27","author":"rubinstein","year":"2004","journal-title":"The Cross-Entropy Method A Unified Approach to Combinatorial Optimization Monte-Carlo Simulation and Machine Learning"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TPAS.1974.293972"},{"key":"ref6","author":"wood","year":"2014","journal-title":"Power Generation Operation and Control"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/PCT.2007.4538502"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1987.13931"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1002\/9780470466971"},{"key":"ref7","author":"momoh","year":"2009","journal-title":"Electric Power System Applications of Optimization"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAS.1968.292150"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/047122412X"},{"key":"ref1","first-page":"431","article-title":"Contribution &#x00E0; l&#x2019;&#x00E9;tude du dispatching\n &#x00E9;conomique","volume":"3","author":"carpentier","year":"1962","journal-title":"Bull Soc Fran&#x00E7;aise D'Electricit&#x00E9;"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2008.10.004"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2014.03.032"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2009.12.018"},{"key":"ref42","author":"grainger","year":"1994","journal-title":"Power System Analysis"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2010.2044242"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ISAP.2015.7325576"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1049\/iet-gtd.2009.0208"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1049\/iet-gtd.2010.0497"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2007.907528"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1007\/978-3-540-72377-6_6","article-title":"EPSO:\n Evolutionary particle swarms","volume":"66","author":"miranda","year":"2007","journal-title":"Chapter 6 in &#x201C;Advances in Evolutionary Computing for System Design&#x201D;"}],"container-title":["IEEE Transactions on Power Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/59\/8496918\/08386709.pdf?arnumber=8386709","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T18:51:28Z","timestamp":1643223088000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8386709\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":43,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tpwrs.2018.2847766","relation":{},"ISSN":["0885-8950","1558-0679"],"issn-type":[{"value":"0885-8950","type":"print"},{"value":"1558-0679","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,11]]}}}