This paper characterizes system security by using distances to system operational limits (including voltage collapse limits, stability limits, line and transformer overloads, and generator limits). It. uses the Point of Collapse method based on the singularity of the power flow Jacobian to define an Operational Limit Boundary in load demand space. Distances to this boundary are then translated into probabilistic measures of likelihood of system failure: Probability of Normal Status, Expected Demand Not Served, Expected Unserved Energy and, ultimately, Expected Outage Cost. Sensitivities of these measures to load and generation changes (important for operational decisions and real-time pricing) are also described. A numerical example is presented. Computational issues are discussed. eywords: Sestability.curity, adequacy, outage costs, loadability, vo + tage collapse, I n t r o d u c t i o nThis paper establishes foundations for the determination of the expected costs resulting from system outages. Outages refer to the inability of the system to supply part or all of the system load, not to equipment outages. The paper uses primarily static system security (system adequacy) concepts to separate regions of normal operation from regions where outages occur."Outage costs" are not normally in the vocabulary of power engineers. Systems have traditionally been operated on the basis of "economic dispatch"' sabject to "security constraints." The constraints typically assume that secure operation is of the utmost importance, overriding cost considerations. However, as systems become more strained and as the responsibility for system operation becomes increasingly diversified, knowledge of the limits of secure operation becomes more important. The very idea of a system that is either "secure" or "insecure" comes into question. Systems have varying degrees of security. Absolute security can never be attained.All decisions about a system influence security to some 91 FE1 183-L PidRS A paper r e c o m e d e c ? and approved by t h e I E Z Porrer Systen Engineering Comnittee of t h e IEEZ Porrer Engineering S o c i e t y f o r p r e s e n t a t i o n a t t h e IE;E/PCS 1991 Winter I.leeting, Keir York, New York, r e b r u a r y 3-7, 1991 . !'anuscri?t s u b n i i t t e dSeptember 5, 1990; made a v a i l a u l e for p r i n t i n ;J a n u a r y 22, 1991.Dennis Ray Rodney Stevenson Eileen Cashman Member Non-member Non-member G r a d u a t e School of Business T h e University of Wisconsin -Madison degree. Security is a function of configuration and operating condition. Often, security is expressed as a function of a single variable (such as total load or transfer capability between two areas). More likely, it is expressed as a constraint on this variable. This can be done because security is highly nonlinear. When the system is secure, most actions have negligible impact on security. However, when security is in jeopardy, many actions can have a significant effect on security. Thus, while at times security can be ignored,...
No abstract
A framework is presented for implementing feminist pedagogy along with demonstrative examples from engineering curricula.The framework for incorporating the values of feminism into the learning experience focuses on three aspects: 1) learning management strategies, 2) assessment and evaluation strategies and 3) strategies for critiquing existing power structures and the engineering process. Feminist pedagogy strategies suggested by others include cooperative learning, providing students a voice in classroom management decisions, structuring student interactions to facilitate all students' participation, having students participate in designing evaluation rubrics and assigning projects that require more than technical skills. A unique feature which feminist pedagogy offers to engineering education is the critique of power structures in relation to the engineering process. For example, the following questions can be addressed: How are engineering processes influenced by the historical frameworks of their development? How are decisions made? Who makes decisions? Who benefits from the decisions? What values do they reflect?
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.