Post-contingency equilibrium analysis of power systems

Research output: Chapter in Book/Report/Conference proceedingConference contribution


This paper presents alternative methods to compute the equilibrium condition immediately following a disturbance to an electric power system. The first uses the brute force method of simply integrating the dynamic model until it reaches steady state. The second uses the straightforward analytical choice of setting all time derivatives of the dynamic model to zero and solving the remaining algebraic equations for the equilibrium values of the dynamic states. This method requires the creation of new commercial software to solve the large-scale network algebraic equations simultaneously with the dynamic equilibrium equations. The third uses a method that takes advantage of existing commercial load flow software to perform the major portion of the solution process. These load flow solutions then iterate with the de-coupled algebraic equations for each generator.

Original languageEnglish (US)
Title of host publicationProceedings of the 35th Annual Hawaii International Conference on System Sciences, HICSS 2002
EditorsRalph H. Sprague
PublisherIEEE Computer Society
Number of pages4
ISBN (Electronic)0769514359
StatePublished - 2002
Event35th Annual Hawaii International Conference on System Sciences, HICSS 2002 - Big Island, United States
Duration: Jan 7 2002Jan 10 2002

Publication series

NameProceedings of the Annual Hawaii International Conference on System Sciences
ISSN (Print)1530-1605


Other35th Annual Hawaii International Conference on System Sciences, HICSS 2002
Country/TerritoryUnited States
CityBig Island


  • Control systems
  • Equations
  • Frequency
  • Load flow
  • Load flow analysis
  • Power generation
  • Power system analysis computing
  • Power system dynamics
  • Power system modeling
  • Voltage control

ASJC Scopus subject areas

  • Engineering(all)


Dive into the research topics of 'Post-contingency equilibrium analysis of power systems'. Together they form a unique fingerprint.

Cite this