2014
DOI: 10.1109/tpwrs.2013.2292112
|View full text |Cite
|
Sign up to set email alerts
|

Abstract: Abstract-This paper presents three new contributions to power flow analysis of unbalanced three-phase distribution systems. First, a complex vector based model in αβ0 stationary reference frame is developed to state the power flow equations using a compact matrix formulation. The proposed model is based on Kirchhoff' s current law (KCL) and Kirchhoff' s voltage law (KVL). Then, a general and exact power transformer model in the αβ0 reference frame is proposed. Finally, this transformer model is incorporated in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
38
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
7

Relationship

2
5

Authors

Journals

citations
Cited by 45 publications
(38 citation statements)
references
References 31 publications
0
38
0
Order By: Relevance
“…Thus, all properties of standard BFS procedure applied for balanced (per phase) power flow calculations are kept in GBFS procedure applied for unbalanced networks (mixed irregular ones included). Consequently, dealing with the following effects is taken on from well‐known references: (1) meshes , (2) three‐phase transformers with delta and ungrounded wye connected windings , (3) three‐winding transformers , and (4) underload tap changing transformers (ULTCTs)—load tap changing transformers and voltage regulators, as well as shunt capacitors, which are equipped with local control . Differently from the CI and NR, the GBFS procedure (like BFS) deals with the following in a very simple manner: (1) ULTCTs, (2) capacitor (inductors) banks with local control, (3) mutual couplings, and (4) short line sections, even ones with zero‐valued parameters.…”
Section: Introductionmentioning
confidence: 99%
“…Thus, all properties of standard BFS procedure applied for balanced (per phase) power flow calculations are kept in GBFS procedure applied for unbalanced networks (mixed irregular ones included). Consequently, dealing with the following effects is taken on from well‐known references: (1) meshes , (2) three‐phase transformers with delta and ungrounded wye connected windings , (3) three‐winding transformers , and (4) underload tap changing transformers (ULTCTs)—load tap changing transformers and voltage regulators, as well as shunt capacitors, which are equipped with local control . Differently from the CI and NR, the GBFS procedure (like BFS) deals with the following in a very simple manner: (1) ULTCTs, (2) capacitor (inductors) banks with local control, (3) mutual couplings, and (4) short line sections, even ones with zero‐valued parameters.…”
Section: Introductionmentioning
confidence: 99%
“…The PF algorithm and the solver are based on the one developed in [28] and [29] respectively. In those cases the formulation was adapted for using the αβ0 reference frame, while in the present research the abc reference has been used instead.…”
Section: Pf Solvermentioning
confidence: 99%
“…To study different operation modes, the incidence matrix approach is recognised as the most useful one. The usage of the network graph theory in this role is reviewed in [11][12][13][14][15][16][17]. In [11], the authors demonstrated the consequence of the calculated nodal voltages and branch currents to the eigenvalues and eigenvectors of the Laplacian matrix, which describes the connectivity of the electrical network.…”
Section: Introductionmentioning
confidence: 99%
“…The reason why grid-connected wind power should be mitigated is interpreted based on the complex network theory. In the work presented in [13], the authors demonstrated how a simple model of an AC network for three-phase unbalanced power flow with embedded transformers can be obtained, conjugating the use of a complex vector based model in a stationary reference frame and the node incidence matrix based formulation. Zhang [14] proposed a numerical method, which identifies all the single and double edges of the network cut-sets in order to address these vulnerabilities.…”
Section: Introductionmentioning
confidence: 99%