2015
DOI: 10.1007/s40565-015-0137-8
|View full text |Cite
|
Sign up to set email alerts
|

Transmission network expansion planning with embedded constraints of short circuit currents and N-1 security

Abstract: An approach of transmission network expansion planning with embedded constraints of short circuit currents and N-1 security is proposed in this paper. The problem brought on by the strong nonlinearity property of short circuit currents is solved with a linearization method based on the DC power flow. The model can be converted to a mixed-integer linear programming problem, realizing the optimization of planning model that considers the constraints of linearized short circuit currents and N-1 security. To compe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
26
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 30 publications
(26 citation statements)
references
References 17 publications
0
26
0
Order By: Relevance
“…The reliability criteria followed here is strict N − 1 criteria [10]. Based on the above linearization method, we proposed a linear scenariobased RTN planning model meeting N − 1 criteria, which is similar to the single-period OTS model in Ref.…”
Section: Constraints Of Transmission Network Planningmentioning
confidence: 99%
See 1 more Smart Citation
“…The reliability criteria followed here is strict N − 1 criteria [10]. Based on the above linearization method, we proposed a linear scenariobased RTN planning model meeting N − 1 criteria, which is similar to the single-period OTS model in Ref.…”
Section: Constraints Of Transmission Network Planningmentioning
confidence: 99%
“…Numerous research works have been done on the topic of transmission expansion planning (TEP) with wind power penetration [7][8][9][10]. All the researchers tacitly assumed that wind power with certain capacity connected to certain buses of the transmission networks.…”
Section: Introductionmentioning
confidence: 99%
“…This paper presents the sensitivity matrix of the interaction effects between information attack and physical attack to resolve attack path characteristics issues [11]. Due to the problem of solving the sensitivity matrix can be abstracted into HMM state transition matrix to solve the problem [12], so we use the Forward-Backward algorithm to calculate the sensitivity matrix in a time stamp [13]. It is very important to select the appropriate value in the initialization of the sensitivity matrix.…”
Section: Determine the Sensitivity Matrix A Of The Interaction Effmentioning
confidence: 99%
“…In general, there are two types of methods for dealing with security in TEP, i.e. À post-check: check whether the security criterion is satisfied after obtaining a transmission construction plan [3];`constraint embedded: integrate the security criterion as one constraint into the planning formulation and explicitly model all contingencies [4]. However, both methods have limitations.…”
Section: Introductionmentioning
confidence: 99%