Scheduled System Maintenance:
Some services will be unavailable Sunday, March 29th through Monday, March 30th. We apologize for the inconvenience.
By Topic

Network Topology Optimization with Security Constraints

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

The purchase and pricing options are temporarily unavailable. Please try again later.
2 Author(s)
Bacher, R. ; Swiss Federal Institute of Technology CH 8092 Zÿrich, Switzerland ; Glavitsch, H.

Strategic switching can be achieved by a current injection scheme which simulates the change in topology. The injected currents are applied to the terminals of the elements of a socalled base network corresponding to those actually switched. This requires that the base network must contain all elements in the "in" state. The injected currents to be used as a compensation in the commonly employed system matrices (Y, Z) for the real change in topology can be taken as control variables in an optimization procedure for the switching problem. With the aid of a method similar to linear programming (LP) objective functions such as line current, short circuit current or even losses can be formulated. By means of a switching sequence consisting of elementary switching operations the desired objective function will be brought to its optimum value.

Published in:

Power Systems, IEEE Transactions on  (Volume:1 ,  Issue: 4 )