Inequality Constraints
Network security constraints
Violation of constrains can take place subsequent to
abnormal conditions like a line outage, either
scheduled or forced, which affects the security of the
network
Sometimes a so called (x-1 study) is performed to
examine the reliability and security of the system
The x-1 study means that the network is studied with
outage of one branch at a time
Post a Comment