A. Sana, R. Marceau, C. Todde, D. Do, J. Mahseredjian, G. Joós
{"title":"电力传输网络中不对称性的利用","authors":"A. Sana, R. Marceau, C. Todde, D. Do, J. Mahseredjian, G. Joós","doi":"10.1109/CCECE.1998.685539","DOIUrl":null,"url":null,"abstract":"For more than a century electric networks have evolved on the basis of a three phase symmetrical equilibrium system. If the current and voltage distortion is seen as inevitable in the daily exploitation, the philosophy basically remains the same: the three phases are considered as a single symmetric ensemble. In high, very high and ultra high voltage (HV, VHV, and UHV) the appearance of a contingency automatically carries out cutting of the three phase line into single, two or three phases all at once. But, having the same reaction vis-a-vis the whole, the case of faults is not optimal. In this article, we effect a revue of methods and criteria actually used in the assertion of security limits, we set out the concepts and basis of constraints binding the exploitation of a three phase line as three independent lines and discuss a realisable solution for the exploitation of a HV or VHV transmission network managing asymmetry and security.","PeriodicalId":177613,"journal":{"name":"Conference Proceedings. IEEE Canadian Conference on Electrical and Computer Engineering (Cat. No.98TH8341)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1998-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"The exploitation of asymmetry in electric power transmission networks\",\"authors\":\"A. Sana, R. Marceau, C. Todde, D. Do, J. Mahseredjian, G. Joós\",\"doi\":\"10.1109/CCECE.1998.685539\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"For more than a century electric networks have evolved on the basis of a three phase symmetrical equilibrium system. If the current and voltage distortion is seen as inevitable in the daily exploitation, the philosophy basically remains the same: the three phases are considered as a single symmetric ensemble. In high, very high and ultra high voltage (HV, VHV, and UHV) the appearance of a contingency automatically carries out cutting of the three phase line into single, two or three phases all at once. But, having the same reaction vis-a-vis the whole, the case of faults is not optimal. In this article, we effect a revue of methods and criteria actually used in the assertion of security limits, we set out the concepts and basis of constraints binding the exploitation of a three phase line as three independent lines and discuss a realisable solution for the exploitation of a HV or VHV transmission network managing asymmetry and security.\",\"PeriodicalId\":177613,\"journal\":{\"name\":\"Conference Proceedings. IEEE Canadian Conference on Electrical and Computer Engineering (Cat. No.98TH8341)\",\"volume\":\"116 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1998-05-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Conference Proceedings. IEEE Canadian Conference on Electrical and Computer Engineering (Cat. No.98TH8341)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCECE.1998.685539\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Conference Proceedings. IEEE Canadian Conference on Electrical and Computer Engineering (Cat. No.98TH8341)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCECE.1998.685539","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The exploitation of asymmetry in electric power transmission networks
For more than a century electric networks have evolved on the basis of a three phase symmetrical equilibrium system. If the current and voltage distortion is seen as inevitable in the daily exploitation, the philosophy basically remains the same: the three phases are considered as a single symmetric ensemble. In high, very high and ultra high voltage (HV, VHV, and UHV) the appearance of a contingency automatically carries out cutting of the three phase line into single, two or three phases all at once. But, having the same reaction vis-a-vis the whole, the case of faults is not optimal. In this article, we effect a revue of methods and criteria actually used in the assertion of security limits, we set out the concepts and basis of constraints binding the exploitation of a three phase line as three independent lines and discuss a realisable solution for the exploitation of a HV or VHV transmission network managing asymmetry and security.