2014 Electric Power Quality and Supply Reliability Conference (PQ) 2014
DOI: 10.1109/pq.2014.6866783
|View full text |Cite
|
Sign up to set email alerts
|

Computation of steady state nodal voltages for fast security assessment in power systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2015
2015
2017
2017

Publication Types

Select...
1
1

Relationship

2
0

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 18 publications
0
4
0
Order By: Relevance
“…The method of obtaining post-contingency nodal voltages on basis of Thevenin equivalent representation was demonstrated in [1] where solutions for post-contingency steady-states were found to be in good agreement with time-domain simulations. The procedure is stated in algorithm 1 for quick reference.…”
Section: B Assessment Algorithmmentioning
confidence: 97%
See 1 more Smart Citation
“…The method of obtaining post-contingency nodal voltages on basis of Thevenin equivalent representation was demonstrated in [1] where solutions for post-contingency steady-states were found to be in good agreement with time-domain simulations. The procedure is stated in algorithm 1 for quick reference.…”
Section: B Assessment Algorithmmentioning
confidence: 97%
“…A power system solver based on Thevenin equivalent representations was previously demonstrated as a mean of static security assessment for the purpose of obtaining postcontingency steady-state nodal voltages [1]. This paper develops the Thevenin equivalent static contingency assessment (TESCA) with the purpose of evaluating aperiodic small signal stability following a contingency.…”
Section: Introductionmentioning
confidence: 99%
“…Re-using computations and vectorisation of for-loops leads to a revised expression for the GTC-matrix: (2). For the sake of generality loads are represented by a current source cs injecting a current of arbitrary direction in the network.…”
Section: Schur's Complement and Thévenin Equivalentsmentioning
confidence: 99%
“…It is intended for analyzing contingencies in an online security assessment based on a steady-state hypothesis from a state estimator. Profiling the method has revealed that computation of Thévenin equivalents takes a significant share of the time spent by the algorithm [2]. This directed the author's attention towards efficient algorithms for Thévenin equivalent computations.…”
Section: Introductionmentioning
confidence: 99%