Abstract:
The authors start out by recasting conventional power flow equations to reflect power market transactions. A new voltage security usage decomposition procedure can then b...Show MoreMetadata
Abstract:
The authors start out by recasting conventional power flow equations to reflect power market transactions. A new voltage security usage decomposition procedure can then be derived. Further, two reported transmission loss decomposition procedures are discussed using the recast power flow expressions.
Date of Conference: 23-26 May 2005
Date Added to IEEE Xplore: 25 July 2005
Print ISBN:0-7803-8834-8