SlideShare a Scribd company logo
1 of 24
Prepared By
Dr. R ASHOK KUMAR,
ASP / EEE, GRTIET
 The power system needs to be secured, we need
to protect it from the black out or any internal or
external damage.
 The operation of the power system is set to be
normal only when the flow of power and the bus
voltages are within the limits even though there is
a profitable change in the load or at the generation
side.
 Security function are of two type as follows:
 Security control :- It determines the exact and
proper security constraint scheduling which is
required to obtain the maximized security level.
 Security assessment :- It gives the security
level of the system in the operating state.
 1. System monitoring.
 2. Contingency analysis.
 3. Security constrained optimal power flow.
 System monitoring provides the operator of
the power system with pertinent up-to-date
information on the current conditions of the
power system.
 In its simplest form, this just detects violations
in the actual system operating state.
 Usually a state estimator is used in the control
centre to process these telemetered data and
compute the best estimates of the system
states.
 Contingency analysis is a mathematical
method for predicting equipment failure or a
specific line's failure and taking corrective
action before the system enters an unstable
state.
 Insertion or removal of one or more elements in
an electrical network could be one of the
contingencies.
 As a result of these adjustments, the power
system is no longer in the safe operating range.
 Corrective action should be taken as soon as
possible; otherwise, the system may enter an
unstable region.
 Major components of contingency analysis are:
 Contingency definition
 Contingency selection
 Contingency evaluation
 1. Contingency definition – It comprise of set of
contingency that occur in the power system.
 2. Selection – It is the process of selecting the
most severe contingencies from the contingency
list.
 Thus this process removes the unimportant
contingencies and hence the contingency list is
shortened.
 3. Evaluation –
 In this process it involves the necessary security
action or control to function in order to
remove the affect of contingency.
 Preventive and corrective actions are needed to
maintain a secure operation of a system or to
bring it to a secure operating state.
 Corrective actions such as switching of VAR
compensating devices, changing transformer
taps and phase shifters etc. are mainly
automatic in nature, and involve short duration.
 Preventive actions such as generation
rescheduling involve longer time scales.
 Security-constrained optimal power flow is an
example of rescheduling the generations in
the system in order to ensure a secure
operation.
 In earlier days, security assessment in a power system
was mainly offline in nature.
 Predefined set of rules or nomographs were used to
assist the operators in the decision-making process.
 However, due to the highly interconnected nature of
modern power systems, and deregulated energy market
scenarios, operating conditions and even the topology
of a power system changes frequently.
 Off-line techniques for security assessment are
therefore no- longer reliable in modern power
systems.
 On-line security assessment techniques use
near-real-time measurements from different
locations in a power system, and continuously
update the security assessment of the system.
 It is one of the easiest calculation way to
provide quick calculation of the possible
overloads.
 The system security assessment is carried out
by calculating system operating limits in the pre
contingency and post contingency operating
states.
 Pre contingency – It is the state of the power
system before the contingency has occurred.
 Post contingency– It is the state of the power
system after the contingency has occurred.
 It is assumed that this type of the contingency
has the security violations.
 Power flow:
 Determines the steady-state conditions of
the power system network for a specified
generation and load pattern.
 Calculates voltages, phase angles, and
flows across the entire system.
 Contingency analysis:
 Assesses the impact of a set of contingencies
on the state of the power system and
identifies potentially harmful contingencies
that cause operating limit violations.
 Optimal power flow:
 Recommends controller actions to optimize a
specified objective function (such as system
operating cost or losses) subject to a set of
power system operating constraints.
 Short-circuit analysis:
 Determines fault currents for single-phase
and three-phase faults for fault locations
across the entire power system network.
psoc subject topic - SYSTEM SECURITY.pptx

More Related Content

Similar to psoc subject topic - SYSTEM SECURITY.pptx

Power System Contingency Ranking Using Fast Decoupled Load Flow Method
Power System Contingency Ranking Using Fast Decoupled Load Flow MethodPower System Contingency Ranking Using Fast Decoupled Load Flow Method
Power System Contingency Ranking Using Fast Decoupled Load Flow Methodpaperpublications3
 
Continuation Power Flow Method based Assessment of Static Voltage Stability c...
Continuation Power Flow Method based Assessment of Static Voltage Stability c...Continuation Power Flow Method based Assessment of Static Voltage Stability c...
Continuation Power Flow Method based Assessment of Static Voltage Stability c...IJERA Editor
 
IRJET- Location Identification for FACTs Device
IRJET- Location Identification for FACTs DeviceIRJET- Location Identification for FACTs Device
IRJET- Location Identification for FACTs DeviceIRJET Journal
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
ENHANCEMENT OF POWER SYSTEM SECURITY USING PSO-NR OPTIMIZATION TECHNIQUE
ENHANCEMENT OF POWER SYSTEM SECURITY USING PSO-NR OPTIMIZATION TECHNIQUEENHANCEMENT OF POWER SYSTEM SECURITY USING PSO-NR OPTIMIZATION TECHNIQUE
ENHANCEMENT OF POWER SYSTEM SECURITY USING PSO-NR OPTIMIZATION TECHNIQUEIAEME Publication
 
5 operating anderstress
5 operating anderstress5 operating anderstress
5 operating anderstressaomlgati
 
WIDE AREA PROTECTION IN POWER SYSTEMS
WIDE AREA PROTECTION IN POWER SYSTEMSWIDE AREA PROTECTION IN POWER SYSTEMS
WIDE AREA PROTECTION IN POWER SYSTEMSmanogna gwen
 
STATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subjectSTATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subjectGayathriM270621
 
Cluster Computing Environment for On - line Static Security Assessment of lar...
Cluster Computing Environment for On - line Static Security Assessment of lar...Cluster Computing Environment for On - line Static Security Assessment of lar...
Cluster Computing Environment for On - line Static Security Assessment of lar...IDES Editor
 
Interconnection power system
Interconnection power systemInterconnection power system
Interconnection power systemNovia Putri
 
H15 POWER SYSTEM PROTECTION EMERSON EDUARDO RODRIGUES.pdf
H15 POWER SYSTEM PROTECTION EMERSON EDUARDO RODRIGUES.pdfH15 POWER SYSTEM PROTECTION EMERSON EDUARDO RODRIGUES.pdf
H15 POWER SYSTEM PROTECTION EMERSON EDUARDO RODRIGUES.pdfEMERSON EDUARDO RODRIGUES
 
Smart Power Grid Monitoring System
Smart Power Grid Monitoring SystemSmart Power Grid Monitoring System
Smart Power Grid Monitoring SystemImane Haf
 
Power system Protection Services in India
Power system Protection Services in IndiaPower system Protection Services in India
Power system Protection Services in IndiaSystem Protection
 
Transient Stability Assessment and Enhancement in Power System
Transient Stability Assessment and Enhancement in Power  SystemTransient Stability Assessment and Enhancement in Power  System
Transient Stability Assessment and Enhancement in Power SystemIJMER
 
Power System Protection
Power System ProtectionPower System Protection
Power System ProtectionRahul Mehra
 
Introduction-to-Alarm-Systems-in-Electrical-Protection-Systems.pdf
Introduction-to-Alarm-Systems-in-Electrical-Protection-Systems.pdfIntroduction-to-Alarm-Systems-in-Electrical-Protection-Systems.pdf
Introduction-to-Alarm-Systems-in-Electrical-Protection-Systems.pdfdreamll715
 

Similar to psoc subject topic - SYSTEM SECURITY.pptx (20)

operational states security constraints
operational states security constraintsoperational states security constraints
operational states security constraints
 
Power System Contingency Ranking Using Fast Decoupled Load Flow Method
Power System Contingency Ranking Using Fast Decoupled Load Flow MethodPower System Contingency Ranking Using Fast Decoupled Load Flow Method
Power System Contingency Ranking Using Fast Decoupled Load Flow Method
 
Continuation Power Flow Method based Assessment of Static Voltage Stability c...
Continuation Power Flow Method based Assessment of Static Voltage Stability c...Continuation Power Flow Method based Assessment of Static Voltage Stability c...
Continuation Power Flow Method based Assessment of Static Voltage Stability c...
 
IRJET- Location Identification for FACTs Device
IRJET- Location Identification for FACTs DeviceIRJET- Location Identification for FACTs Device
IRJET- Location Identification for FACTs Device
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
ENHANCEMENT OF POWER SYSTEM SECURITY USING PSO-NR OPTIMIZATION TECHNIQUE
ENHANCEMENT OF POWER SYSTEM SECURITY USING PSO-NR OPTIMIZATION TECHNIQUEENHANCEMENT OF POWER SYSTEM SECURITY USING PSO-NR OPTIMIZATION TECHNIQUE
ENHANCEMENT OF POWER SYSTEM SECURITY USING PSO-NR OPTIMIZATION TECHNIQUE
 
5 operating anderstress
5 operating anderstress5 operating anderstress
5 operating anderstress
 
WIDE AREA PROTECTION IN POWER SYSTEMS
WIDE AREA PROTECTION IN POWER SYSTEMSWIDE AREA PROTECTION IN POWER SYSTEMS
WIDE AREA PROTECTION IN POWER SYSTEMS
 
STATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subjectSTATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subject
 
Cluster Computing Environment for On - line Static Security Assessment of lar...
Cluster Computing Environment for On - line Static Security Assessment of lar...Cluster Computing Environment for On - line Static Security Assessment of lar...
Cluster Computing Environment for On - line Static Security Assessment of lar...
 
Interconnection power system
Interconnection power systemInterconnection power system
Interconnection power system
 
H15 POWER SYSTEM PROTECTION EMERSON EDUARDO RODRIGUES.pdf
H15 POWER SYSTEM PROTECTION EMERSON EDUARDO RODRIGUES.pdfH15 POWER SYSTEM PROTECTION EMERSON EDUARDO RODRIGUES.pdf
H15 POWER SYSTEM PROTECTION EMERSON EDUARDO RODRIGUES.pdf
 
Reliability of the GCC Interconnector
Reliability of the GCC InterconnectorReliability of the GCC Interconnector
Reliability of the GCC Interconnector
 
Smart Power Grid Monitoring System
Smart Power Grid Monitoring SystemSmart Power Grid Monitoring System
Smart Power Grid Monitoring System
 
Wide area monitoring, protection and control in future smart grid
Wide area monitoring, protection and control in future smart gridWide area monitoring, protection and control in future smart grid
Wide area monitoring, protection and control in future smart grid
 
Power system Protection Services in India
Power system Protection Services in IndiaPower system Protection Services in India
Power system Protection Services in India
 
CHAPTER- 4.ppt
CHAPTER- 4.pptCHAPTER- 4.ppt
CHAPTER- 4.ppt
 
Transient Stability Assessment and Enhancement in Power System
Transient Stability Assessment and Enhancement in Power  SystemTransient Stability Assessment and Enhancement in Power  System
Transient Stability Assessment and Enhancement in Power System
 
Power System Protection
Power System ProtectionPower System Protection
Power System Protection
 
Introduction-to-Alarm-Systems-in-Electrical-Protection-Systems.pdf
Introduction-to-Alarm-Systems-in-Electrical-Protection-Systems.pdfIntroduction-to-Alarm-Systems-in-Electrical-Protection-Systems.pdf
Introduction-to-Alarm-Systems-in-Electrical-Protection-Systems.pdf
 

Recently uploaded

notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfRagavanV2
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdfSuman Jyoti
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoordharasingh5698
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 

Recently uploaded (20)

notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 

psoc subject topic - SYSTEM SECURITY.pptx

  • 1. Prepared By Dr. R ASHOK KUMAR, ASP / EEE, GRTIET
  • 2.  The power system needs to be secured, we need to protect it from the black out or any internal or external damage.  The operation of the power system is set to be normal only when the flow of power and the bus voltages are within the limits even though there is a profitable change in the load or at the generation side.
  • 3.  Security function are of two type as follows:  Security control :- It determines the exact and proper security constraint scheduling which is required to obtain the maximized security level.  Security assessment :- It gives the security level of the system in the operating state.
  • 4.  1. System monitoring.  2. Contingency analysis.  3. Security constrained optimal power flow.
  • 5.  System monitoring provides the operator of the power system with pertinent up-to-date information on the current conditions of the power system.  In its simplest form, this just detects violations in the actual system operating state.
  • 6.  Usually a state estimator is used in the control centre to process these telemetered data and compute the best estimates of the system states.
  • 7.  Contingency analysis is a mathematical method for predicting equipment failure or a specific line's failure and taking corrective action before the system enters an unstable state.
  • 8.  Insertion or removal of one or more elements in an electrical network could be one of the contingencies.  As a result of these adjustments, the power system is no longer in the safe operating range.  Corrective action should be taken as soon as possible; otherwise, the system may enter an unstable region.
  • 9.  Major components of contingency analysis are:  Contingency definition  Contingency selection  Contingency evaluation
  • 10.  1. Contingency definition – It comprise of set of contingency that occur in the power system.  2. Selection – It is the process of selecting the most severe contingencies from the contingency list.  Thus this process removes the unimportant contingencies and hence the contingency list is shortened.
  • 11.  3. Evaluation –  In this process it involves the necessary security action or control to function in order to remove the affect of contingency.
  • 12.  Preventive and corrective actions are needed to maintain a secure operation of a system or to bring it to a secure operating state.  Corrective actions such as switching of VAR compensating devices, changing transformer taps and phase shifters etc. are mainly automatic in nature, and involve short duration.
  • 13.  Preventive actions such as generation rescheduling involve longer time scales.  Security-constrained optimal power flow is an example of rescheduling the generations in the system in order to ensure a secure operation.
  • 14.  In earlier days, security assessment in a power system was mainly offline in nature.  Predefined set of rules or nomographs were used to assist the operators in the decision-making process.  However, due to the highly interconnected nature of modern power systems, and deregulated energy market scenarios, operating conditions and even the topology of a power system changes frequently.
  • 15.  Off-line techniques for security assessment are therefore no- longer reliable in modern power systems.  On-line security assessment techniques use near-real-time measurements from different locations in a power system, and continuously update the security assessment of the system.
  • 16.  It is one of the easiest calculation way to provide quick calculation of the possible overloads.  The system security assessment is carried out by calculating system operating limits in the pre contingency and post contingency operating states.
  • 17.  Pre contingency – It is the state of the power system before the contingency has occurred.  Post contingency– It is the state of the power system after the contingency has occurred.  It is assumed that this type of the contingency has the security violations.
  • 18.
  • 19.
  • 20.  Power flow:  Determines the steady-state conditions of the power system network for a specified generation and load pattern.  Calculates voltages, phase angles, and flows across the entire system.
  • 21.  Contingency analysis:  Assesses the impact of a set of contingencies on the state of the power system and identifies potentially harmful contingencies that cause operating limit violations.
  • 22.  Optimal power flow:  Recommends controller actions to optimize a specified objective function (such as system operating cost or losses) subject to a set of power system operating constraints.
  • 23.  Short-circuit analysis:  Determines fault currents for single-phase and three-phase faults for fault locations across the entire power system network.