POWER-SYSTEM STEADY-STATE SECURITY ANALYSIS USING VECTOR PROCESSING COMPUTERS

被引:11
|
作者
ANDERSON, DM
WOLLENBERG, BF
机构
[1] University of Minnesota, Minneapolis Minnesota
关键词
Electric power system interconnection;
D O I
10.1109/59.207367
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Power system steady state security analysis is one of many power system computation problems that requires very high speed to be of use. Whether used in system reliability calculations or in on line security analysis, users wish to know what overloads and voltage limit violations will result for a very large list of possible equipment outages. The length of the list of outages is in fact the major problem in security analysis since it usually includes at least each individual piece of equipment taken one at a time and a large number of cases with multiple outages. The use of contingency selection and screening has opened the way to reducing this burden, but the fact still remains that a very large number of individual cases must be run to satisfy the need to be sure that no cases have gone unchecked. The efforts described in this paper have extended the computational speed with which this can be accomplished and opens the way for the implementation of very high performance security analysis codes.
引用
收藏
页码:1451 / 1455
页数:5
相关论文
共 50 条
  • [31] Probabilistic steady-state and dynamic security assessment of power transmission system
    YanLi Liu
    YiXin Yu
    Science China Technological Sciences, 2013, 56 : 1198 - 1207
  • [32] FAST IDENTIFICATION OF THE STEADY-STATE SECURITY REGIONS FOR POWER SYSTEM SECURITY ENHANCEMENT.
    DeMaio, J.A.
    Fischl, R.
    1976,
  • [33] Probabilistic steady-state security assessment of an electric power system using a Monte Carlo approach
    Faustino Agreira, C. I.
    Fonseca de Jesus, S. M.
    de Figueiredo, S. Lopes
    Ferreira, C. Machado
    Dias Pinto, J. A.
    Maciel Barbosa, F. P.
    PROCEEDINGS OF THE 41ST INTERNATIONAL UNIVERSITIES POWER ENGINEERING CONFERENCE, VOLS 1 AND 2, 2006, : 408 - +
  • [34] ONLINE POWER-SYSTEM SECURITY ANALYSIS
    BALU, N
    BERTRAM, T
    BOSE, A
    BRANDWAJN, V
    CAULEY, G
    CURTICE, D
    FOUAD, A
    FINK, L
    LAUBY, MG
    WOLLENBERG, BF
    WRUBEL, JN
    PROCEEDINGS OF THE IEEE, 1992, 80 (02) : 262 - 280
  • [35] Steady-state security analysis using artificial neural network
    Misra, RK
    Singh, SP
    ELECTRIC POWER COMPONENTS AND SYSTEMS, 2004, 32 (11) : 1063 - 1081
  • [36] COMPUTERS IN POWER-SYSTEM OPERATIONS
    WU, FF
    MASIELLO, RD
    PROCEEDINGS OF THE IEEE, 1987, 75 (12) : 1555 - 1557
  • [37] COMPUTERS IN POWER-SYSTEM PLANNING
    KNIGHT, UG
    BOOTH, RR
    MALLARD, SA
    LEWIS, DM
    PROCEEDINGS OF THE IEEE, 1974, 62 (07) : 872 - 883
  • [38] IDENTIFICATION OF POWER SYSTEM STEADY-STATE SECURITY REGIONS UNDER LOAD UNCERTAINTY
    FISCHL, R
    EJEBE, GC
    DEMAIO, JA
    IEEE TRANSACTIONS ON POWER APPARATUS AND SYSTEMS, 1976, 95 (06): : 1767 - 1767
  • [39] A STUDY ON REACTIVE POWER STEADY-STATE SECURITY REGIONS
    YU, YX
    HUANG, CH
    FENG, F
    ELECTRIC MACHINES AND POWER SYSTEMS, 1989, 17 (03): : 155 - 166
  • [40] STEADY-STATE SECURITY REGIONS OF POWER-SYSTEMS
    WU, FF
    KUMAGAI, S
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS, 1982, 29 (11): : 703 - 711