By Topic

Security constrained optimization-a case study (power system control)

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
W. C. Merritt ; Niagara Mohawk Power Corp., Syracuse, NY, USA ; C. H. Saylor ; R. C. Burchett ; H. H. Happ

A comparison has been made between two approaches for steady-state bulk transmission system voltage analysis: a conventional approach using both a power flow program and an optimal power flow program (OPF), and a novel software tool. This program, the security-constrained optimization program (SCO), has been introduced and demonstrated to be effective in solving difficult capacitor planning studies. The solutions from the SCO not only optimize the precontingency system conditions as an OPF, but the effects of all of the postcontingency constraints are included. All existing system control variables are set at their optimal preventive mode values by the program. The algorithm is efficient, requiring little overhead per contingency beyond a conventional OPF solution. The results of a comparison between the SCO and a conventional study solution show that the SCO computes accurate solutions in a fraction of the time required using conventional means.<>

Published in:

IEEE Transactions on Power Systems  (Volume:3 ,  Issue: 3 )