By Topic

Power system steady state security analysis using vector processing computers

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Anderson, D.M. ; Minnesota Univ., Minneapolis, MN, USA ; Wollenberg, B.F.

The main difficulties encountered in applying a vector processor to the solution of a power flow is the sparsity of the power flow matrices which results in very short vectors when the nonzero terms are gathered into a packed vector format. The authors describe a steady-state security analysis code which overcomes the problem of very short vectors. The length of the list of outages is the major problem in security analysis since it usually includes at least each individual piece of equipment taken one at a time, and a large number of cases with multiple outages. The use of contingency selection and screening has opened the way to reducing this burden, but a very large number of individual cases must be run to satisfy the need to be sure that no cases have gone unchecked. The efforts described have extended the computational speed with which this can be accomplished, and the implementation of very high performance security analysis codes has been made possible

Published in:

Power Systems, IEEE Transactions on  (Volume:7 ,  Issue: 4 )