In a companion paper, a theoretical framework of an algorithm was described which determines the optimal power flows of a network via the Dommel‐Tinney approach with or without the incorporation of security constraints. This can be handled via sensitivity analysis and least‐squares minimization techniques. The aim of this paper is to report on the computational experiments of the method using the 5‐bus, 14‐ and 30‐bus networks.