Inequality Constraints
Network security constraints
Violation of constrains can take place subsequent to
abnormal conditions like a line outage, either
scheduled or forced, which affects the security of the
network
Sometimes a so called (x-1 study) is performed to
examine the reliability and security of the system
The x-1 study means that the network is studied with
outage of one branch at a time


Inequality Constraints
Transformer tap settings
Sometimes, there is a possibility to change the
voltage in steps, i.e. to chose between different
values rather than varying the voltage smoothly
0 ≤ t ≤ tmax
For auto-transformers, tmax can be unity


 Transformer tap settings

Phase shift-ing transformers have phase shift limits
θmin ≤ θ ≤ θmax

معلومات عن التدوينة 21 فبراير 2014 عدد الزيارات: (850) عدد التعليقات: 2 الكاتب:iHussam للإبلاغ عن رابط معطوب اضغط هنا للإبلاغ عن رابط معطوب اضغط هنا جميع الحقوق محفوظة ( إتفاقية نقل ونشر المحتوى )

Post a Comment

 
Top