The MIT Libraries is completing a major upgrade to DSpace@MIT.
Starting May 5 2026, DSpace will remain functional, viewable, searchable, and downloadable, however, you will not be able to edit existing collections or add new material.
We are aiming to have full functionality restored by May 18, 2026, but intermittent service interruptions may occur.
Please email dspace-lib@mit.edu with any questions.
Thank you for your patience as we implement this important upgrade.
Simple certificate for power distribution network security assessment
| dc.contributor.advisor | Konstantin Turitsyn. | en_US |
| dc.contributor.author | Yu, Suhyoun | en_US |
| dc.contributor.other | Massachusetts Institute of Technology. Department of Mechanical Engineering. | en_US |
| dc.date.accessioned | 2018-02-16T20:04:13Z | |
| dc.date.available | 2018-02-16T20:04:13Z | |
| dc.date.copyright | 2017 | en_US |
| dc.date.issued | 2017 | en_US |
| dc.identifier.uri | http://hdl.handle.net/1721.1/113748 | |
| dc.description | Thesis: S.M., Massachusetts Institute of Technology, Department of Mechanical Engineering, 2017. | en_US |
| dc.description | Cataloged from PDF version of thesis. | en_US |
| dc.description | Includes bibliographical references (pages 53-54). | en_US |
| dc.description.abstract | The integration of volatile renewable energy sources, non-traditional load managements, and unforeseen natural disasters introduce uncertainties that could easily jeopardize the security of power systems. Meanwhile, constructing the real solvable boundary-crucial for contingency analysis, security assessment, and planning network processes-in multidimensional parameter space is burdensome and time consuming; hence there is an urgent need for a tool to identify the security region, or the set of viable injections. This thesis presents fast and reliable inner approximation techniques for solvable boundaries of power distribution systems based on Banach fixed point theorem and Kantorovich theorem. The novel method is in a simple "certificate" form-a single lined inequality condition that involves the system variables and parameters. Our certificate is noniterative, therefore computationally efficient, and the simulation results confirm that the presented approach constructs regions that are sufficiently large for most security-constrained functions. The construction for our "certificates" begins with re-formulating power-flow equations into appropriate forms such that they are applicable to the aforementioned two major theorems. Practical applications of the proposed technique include fast screening tool for feasible injection change, certified solvability margins, and new computationally robust continuation power flow algorithms. | en_US |
| dc.description.statementofresponsibility | by Suhyoun Yu. | en_US |
| dc.format.extent | 54 pages | en_US |
| dc.language.iso | eng | en_US |
| dc.publisher | Massachusetts Institute of Technology | en_US |
| dc.rights | MIT theses are protected by copyright. They may be viewed, downloaded, or printed from this source but further reproduction or distribution in any format is prohibited without written permission. | en_US |
| dc.rights.uri | http://dspace.mit.edu/handle/1721.1/7582 | en_US |
| dc.subject | Mechanical Engineering. | en_US |
| dc.title | Simple certificate for power distribution network security assessment | en_US |
| dc.type | Thesis | en_US |
| dc.description.degree | S.M. | en_US |
| dc.contributor.department | Massachusetts Institute of Technology. Department of Mechanical Engineering | |
| dc.identifier.oclc | 1021853726 | en_US |
