Security constrained optimization-a case study (power system control)
- 1 August 1988
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Power Systems
- Vol. 3 (3), 970-977
- https://doi.org/10.1109/59.14549
Abstract
A comparison has been made between two approaches for steady-state bulk transmission system voltage analysis: a conventional approach using both a power flow program and an optimal power flow program (OPF), and a novel software tool. This program, the security-constrained optimization program (SCO), has been introduced and demonstrated to be effective in solving difficult capacitor planning studies. The solutions from the SCO not only optimize the precontingency system conditions as an OPF, but the effects of all of the postcontingency constraints are included. All existing system control variables are set at their optimal preventive mode values by the program. The algorithm is efficient, requiring little overhead per contingency beyond a conventional OPF solution. The results of a comparison between the SCO and a conventional study solution show that the SCO computes accurate solutions in a fraction of the time required using conventional means.<>Keywords
This publication has 10 references indexed in Scilit:
- An integrated methodology for VAr sources planningIEEE Transactions on Power Systems, 1988
- Integrated security control using an optimal power flow and switching conceptsIEEE Transactions on Power Systems, 1988
- Security-Constrained Optimal Power Flow with Post-Contingency Corrective ReschedulingIEEE Transactions on Power Systems, 1987
- Assessment of Real-Time Optimal Voltage ControlIEEE Transactions on Power Systems, 1986
- Quadratically Convergent Optimal Power FlowIEEE Transactions on Power Apparatus and Systems, 1984
- Optimal Power Flow By Newton ApproachIEEE Transactions on Power Apparatus and Systems, 1984
- Large Scale Security Dispatching: an Exact ModelIEEE Transactions on Power Apparatus and Systems, 1983
- Security Constrained Dispatch at the New York Power PoolIEEE Transactions on Power Apparatus and Systems, 1982
- Linear Programming for Power-System Network Security ApplicationsIEEE Transactions on Power Apparatus and Systems, 1979
- Security Constrained DispatchIEEE Transactions on Power Apparatus and Systems, 1979