By Topic

Engineering foundations for the determination of security costs

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

5 Author(s)
F. Alvarado ; Wisconsin Univ., Madison, WI, USA ; Y. Hu ; D. Ray ; R. Stevenson
more authors

Power system security is characterized by using distances to system operational limits (including voltage collapse limits, stability limits, line and transformer overloads, and generator limits). It uses the point of collapse method based on the singularity of the power flow Jacobian to define an operational limit boundary in load demand space. Distances to this boundary are then translated into probabilistic measures of likelihood of system failure: probability of normal status, expected demand not served, expected unserved energy, and, ultimately, expected outage cost. Sensitivities of these measures to load and generation changes (important for operational decisions and real-time pricing) are also described. A numerical example is presented. Computational issues are discussed

Published in:

IEEE Transactions on Power Systems  (Volume:6 ,  Issue: 3 )