1986
DOI: 10.1109/tpwrs.1986.4335024
|View full text |Cite
|
Sign up to set email alerts
|

Network Topology Optimization with Security Constraints

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
57
0
5

Year Published

2002
2002
2019
2019

Publication Types

Select...
6
1
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 145 publications
(62 citation statements)
references
References 3 publications
0
57
0
5
Order By: Relevance
“…It is not necessary to have all of these opening schemes evaluated by the comprehensive evaluation model and fuzzy evaluation algorithm, which usually costs a lot of computation time. Thus, the generated opening schemes should be filtered first using the filtering index defined in (11) in Section 3 The weighted factors of filtering index are assigned as λ1 = 0.5, λ2 = 0.5. Four generated opening schemes (No.…”
Section: Actual Ac/dc Interconnected Power Systemmentioning
confidence: 99%
“…It is not necessary to have all of these opening schemes evaluated by the comprehensive evaluation model and fuzzy evaluation algorithm, which usually costs a lot of computation time. Thus, the generated opening schemes should be filtered first using the filtering index defined in (11) in Section 3 The weighted factors of filtering index are assigned as λ1 = 0.5, λ2 = 0.5. Four generated opening schemes (No.…”
Section: Actual Ac/dc Interconnected Power Systemmentioning
confidence: 99%
“…Twenty nine line violations were found in the base case, with line overloads ranging from 110 to 237 percent. 9 Next, we opened line 153, the single line that improves the system dispatch cost the most, and conducted the n-1 contingency analysis. This resulted in 28 violations: 23 violations that occurred for the same contingency and on the same line as for the base case, and five violations not occurring in the base case.…”
Section: Contingency Analysismentioning
confidence: 99%
“…Transmission switching has been explored in the literature as a control method for problems such as over-or under-voltage situations, line overloads [6], loss and/or cost reduction [7], improving system security [8], or a combination of these [9] [10] [11]. Our investigation of optimal transmission switching extends this literature by probing the degree to which transmission switching could increase economic efficiency of power system dispatch.…”
mentioning
confidence: 94%
“…But things are changing gradually. There are researches employing linear programming algorithm to find the optimal line switching scheme with minimum power losses [11,12]. These researches only consider the branch active power flow constraint, and the bus voltage constraint is neglected.…”
Section: Introductionmentioning
confidence: 99%