scispace - formally typeset
Search or ask a question
Author

V. Brandwajn

Bio: V. Brandwajn is an academic researcher. The author has contributed to research in topics: Sparse matrix & AC power. The author has an hindex of 5, co-authored 5 publications receiving 774 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: The efficiency of the sparse vector methods is verified by tests on a 156-bus, a 1598-bus and a 2265-bus system and the new methods are significantly faster than the established sparse matrix techniques.
Abstract: Sparse vector methods enhance the efficiency of matrix solution algorithms by exploiting the sparsity of the independent vector and/or the desire to know only a subset of the unknown vector. This paper shows how these methods can be efficiently implemented for sparse matrices. The efficiency of the sparse vector methods is verified by tests on a 156-bus, a 1598-bus and a 2265-bus system. In all cases tested, the new methods are significantly faster than the established sparse matrix techniques.

338 citations

Journal ArticleDOI
TL;DR: Two new partial refactorization methods for sparse matrices are presented that are significantly more efficient than existing techniques, and have the potential to speed up a number of important power system problems.
Abstract: Partial refactorization methods update the LDU factors of a matrix to reflect changes In some Its elements. This paper presents two new partial refactorization methods for sparse matrices. Test results Indicate that they are significantly more efficient than existing techniques, and have the potential to speed up a number of important power system problems.

172 citations

Journal ArticleDOI
TL;DR: A very efficient contingency analysis method for detecting branch megawatt flow violation is presented, based on the linear incremental-power-flow model and consequently does not consider reactive power.
Abstract: A very efficient contingency analysis method for detecting branch megawatt flow violation is presented. The efficiency stems from the use of a bounding criterion that drastically reduces the number of branch-flow computations and limits checking, and the use of state-of-the-art compensation and sparse matrix/vector methods. The method requires no offline setup, is highly efficient, and can handle contingencies with any time of network topology and load/generation changes. The method is based on the linear incremental-power-flow model and consequently does not consider reactive power. >

137 citations

Journal ArticleDOI
TL;DR: A new contingency analysis technique is described which overcomes the deficiencies of existing methods and has been implemented in a production-grade program designed for real-time applications.
Abstract: The analysis of the effects of hundreds of outages on line flows and bus voltages is required for the real-time security analysis and contingency enumeration. This increases the demands on the speed, accuracy and adaptability of the solution methods. Ideally, an ac power flow should be solved for each contingency, followed by a check for limit violations and major shifts from the initial system conditions. Such an approach is not feasible for practical systems consisting of hundreds of buses. To cope with this computational barrier, various approximate methods have been developed based on the idea that the vast majority of outages does not cause major shifts/violations. There are two classes of such methods, explicit and implicit techniques, which ease the computational burden by identifying cases with severe system limit violations. The explicit methods do not identify or solve for specific violations. Rather, they quantify the severity of each outage by a scalar index by which all the contingencies can be ranked. The explicit methods are not completely reliable since they are prone to masking errors. Specifically, a contingency with a few severe violations can be ranked equally with one with many minor violations or even worse, with one without violations. The implicit methods, though more demanding in CPU resources, permit the identification of actual violations/ major shifts and, therefore avoid masking errors. This paper describes a new contingency analysis technique which overcomes the deficiencies of existing methods. This technique has been implemented in a production-grade program designed for real-time applications.

131 citations

Proceedings ArticleDOI
05 Sep 1993

9 citations


Cited by
More filters
Book
01 Jan 1998
TL;DR: This volume treats the numerical solution of dense and large-scale eigenvalue problems with an emphasis on algorithms and the theoretical background required to understand them.
Abstract: This book is the second volume in a projected five-volume survey of numerical linear algebra and matrix algorithms. This volume treats the numerical solution of dense and large-scale eigenvalue problems with an emphasis on algorithms and the theoretical background required to understand them. Stressing depth over breadth, Professor Stewart treats the derivation and implementation of the more important algorithms in detail. The notes and references sections contain pointers to other methods along with historical comments. The book is divided into two parts: dense eigenproblems and large eigenproblems. The first part gives a full treatment of the widely used QR algorithm, which is then applied to the solution of generalized eigenproblems and the computation of the singular value decomposition. The second part treats Krylov sequence methods such as the Lanczos and Arnoldi algorithms and presents a new treatment of the Jacobi-Davidson method. The volumes in this survey are not intended to be encyclopedic. By treating carefully selected topics in depth, each volume gives the reader the theoretical and practical background to read the research literature and implement or modify new algorithms. The algorithms treated are illustrated by pseudocode that has been tested in MATLAB implementations.

653 citations

Journal ArticleDOI
01 Dec 1987
TL;DR: This paper reviews present formulations and methods, and tries to point out areas of difficulty that constitute the main challenges for successful practical on-line implementations over the coming years.
Abstract: An operationally "secure" power system is one with low probability of blackout or equipment damage. The power system control processes needed to maintain a designated security level at minimum operating cost are extremely complicated. They increasingly depend upon on-line computer security analysis and optimization. This on-line technology is still relatively new, with enormous further potential. Since security and optimality are normally conflicting requirements of power system control, it is inappropriate to treat them separately. Therefore, they are slowly becoming coalesced into a unified hierarchical mathematical problem formulation: one that is, however, far too complex to afford anything but an approximate, near-optimal solution. The practical validity of this unifying trend relies on being able to incorporate all significant security constraints within the process. The main two current computational tools in this field are contingency analysis and special operations-oriented versions of optimal power flow (OPF). Contingency analysis identifies potential emergencies through extensive "what if?." simulations on the power system network. OPF is a major extension to the conventional dispatch calculation. It can respect system static security limits, and can schedule reactive as well as active power. Moreover, the advanced versions of OPF include or interface with contingency analysis. This paper reviews present formulations and methods, and tries to point out areas of difficulty that constitute the main challenges for successful practical on-line implementations over the coming years.

533 citations

Journal ArticleDOI
09 May 2005
TL;DR: The thesis of this paper is that the changing environment requires a new look at the operation of the power grid and a complete redesign of the control, communication and computation infrastructure.
Abstract: The power grid is not only a network interconnecting generators and loads through a transmission and distribution system, but is overlaid with a communication and control system that enables economic and secure operation. This multilayered infrastructure has evolved over many decades utilizing new technologies as they have appeared. This evolution has been slow and incremental, as the operation of the power system consisting of vertically integrated utilities has, until recently, changed very little. The monitoring of the grid is still done by a hierarchical design with polling for data at scanning rates in seconds that reflects the conceptual design of the 1960s. This design was adequate for vertically integrated utilities with limited feedback and wide-area controls; however, the thesis of this paper is that the changing environment, in both policy and technology, requires a new look at the operation of the power grid and a complete redesign of the control, communication and computation infrastructure. We provide several example novel control and communication regimes for such a new infrastructure.

337 citations

Journal ArticleDOI
G.C. Ejebe1, J. Tong, J.G. Waight, J.G. Frame, Xiaojian Wang, W.F. Tinney 
TL;DR: In this article, a program for available (transmission) transfer capability (ATC) calculations based on full AC power flow solution to incorporate the effects of reactive power flows, voltage limits and voltage collapse as well as the traditional line flow (thermal loading) effects is presented.
Abstract: This paper reports on the features and implementation of a program for available (transmission) transfer capability (ATC) calculations. A novel formulation of the ATC problem has been adopted based on full AC power flow solution to incorporate the effects of reactive power flows, voltage limits and voltage collapse as well as the traditional line flow (thermal loading) effects. An efficient continuation power flow approach with adaptive localization enhances speed in processing a large number of contingencies to determine ATC for each specified transfer. Test and performance results for practical power system models are presented.

329 citations

Journal ArticleDOI
TL;DR: In this article, an analysis of real-time pricing policies of reactive power using a modification of the OPF (optimal power flow) model is presented, followed by a case study illustrating the magnitudes and ranges that realtime prices might take on under different circumstances.
Abstract: An analysis is made of real-time pricing policies of reactive power using a modification of the OPF (optimal power flow) model. The theory of real-time pricing of reactive power is presented, followed by a case study illustrating the magnitudes and ranges that real-time prices of reactive power might take on under different circumstances. The efficiency implications of real-time pricing of reactive power are compared with traditional power factor penalties. It is concluded that real-time pricing of reactive power should develop simultaneously with that of active power for maximum economic efficiency and smooth operation of the electricity marketplace. >

291 citations