Cart (Loading....) | Create Account
Close category search window

Engineering foundations for the determination of security costs

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

5 Author(s)
Alvarado, F. ; Wisconsin Univ., Madison, WI, USA ; Hu, Y. ; Ray, D. ; Stevenson, R.
more authors

Power system security is characterized by using distances to system operational limits (including voltage collapse limits, stability limits, line and transformer overloads, and generator limits). It uses the point of collapse method based on the singularity of the power flow Jacobian to define an operational limit boundary in load demand space. Distances to this boundary are then translated into probabilistic measures of likelihood of system failure: probability of normal status, expected demand not served, expected unserved energy, and, ultimately, expected outage cost. Sensitivities of these measures to load and generation changes (important for operational decisions and real-time pricing) are also described. A numerical example is presented. Computational issues are discussed

Published in:

Power Systems, IEEE Transactions on  (Volume:6 ,  Issue: 3 )

Date of Publication:

Aug 1991

Need Help?

IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.