It was shown almost fifty years ago how to apply sparsity programming techniques to power flow analysis, and several decades later ways were found to adapt those techniques to vector processing. But this kind of processing for security analysis required expensive supercomputers. Now, thanks to inexpensive processing cards spun off from those used in computerized gaming, we are on our way to being able to process large numbers of AC power flow cases on power system models and identify worrisome cases.
High Performance Computing and Security Analysis
Posted: 13 Jun 2013
Primary Committee:IEEE Smart Grid Newsletters
Sponsoring Society Members: Free
IEEE Members: $5.00
Please sign in at the top of the page. If you are not an IEEE member, please create a free account to make a purchase or become a society member to have access to all materials for free.
Slides for Webinar: Storage as a Transmission Asset in PJM presented by Amanda Long and Christina Catalano
Slides for Webinar: Advances in Distribution System Time-Series Analysis for Studying DER Impacts presented by Matthew Reno
Advances in Distribution System Time-Series Analysis for Studying DER Impacts presented by Matthew Reno