Security-constrained optimization. Added dimension in utility systems optimal power flow
- Software Services at GE Industry (US)
- Power Systems Research ofr Niagara Mohawk Corp.
- Computer Applications Analyst
Compared to the tempered environment of the late 1960s and early 1970s, the 1980s have been, and will continue to be, a time of challenge for utilities. Today's utility executive most confront a spectrum of technical issues, ranging from wheeling and transmission line access to loop flow. There are other challenges to face. The traditional utility corporate structure is being reorganized, with utility staffs shrinking in size. And public scrutiny has become more intense as public bodies question the technical and environmental impact, as well as the financial and legal prudence of a utility's activities. Utilities are successfully meeting these challenges and becoming more productive, due, in part to their use of innovative computer programs and tools. One of these tools is an optimal power flow (OPF). The following describes a new dimension in the optimal power flow technology known as the security-constrained optimization (SCO) program.
- OSTI ID:
- 6459458
- Journal Information:
- IEEE Comput. Applicat. Power; (United States), Vol. 1:4
- Country of Publication:
- United States
- Language:
- English
Similar Records
A Surrogate-Based Asynchronous Decomposition Technique for Realistic Security-Constrained Optimal Power Flow Problems
Security analysis and optimization
Related Subjects
24 POWER TRANSMISSION AND DISTRIBUTION
99 GENERAL AND MISCELLANEOUS//MATHEMATICS, COMPUTING, AND INFORMATION SCIENCE
COMPUTER CODES
TECHNOLOGY UTILIZATION
ELECTRIC UTILITIES
OPTIMIZATION
POWER TRANSMISSION LINES
ENVIRONMENTAL IMPACTS
SECURITY
PUBLIC UTILITIES
200104* - Fossil-Fueled Power Plants- Components
200300 - Electric Power Engineering- Power Transmission & Distribution- (-1989)
990220 - Computers
Computerized Models
& Computer Programs- (1987-1989)