18 research outputs found

    Investigation of the Adaptability of Transient Stability Assessment Methods to Real-Time Operation

    Get PDF
    peer reviewedIn this paper, an investigation of the adaptability of available transient stability assessment methods to real-time operation and their real-time performance is carried out. Two approaches based on Lyapunov’s method and the equal area criterion are analyzed. The results allow to determine the runtime of each method with respect to the number of inputs. Furthermore, it allows to identify, which method is preferable in case of changes in the power system such as the integration of distributed power resources (DER). A comparison of the performance of the analyzed methods leads to the suggestion that matrix reduction and time domain simulation are the most critical operations

    Towards the development of a two-time scale CUEP/BCU method

    Get PDF
    This paper proposes a new Two-Time Scale (TTS)\ud BCU method, and reports the first ever known use of the TTSCUEP\ud method in a multi-machine power system. The proposed\ud TTS-BCU method is a numerical algorithm to correctly compute\ud the slow and fast CUEPs of the TTS-CUEP method. It also\ud provides a more robust algorithm to compute the CUEP of the\ud original system.FAPES

    On-line Dynamic Security Assessment in Power Systems.

    Get PDF

    Procedures for the Establishment of Standards. Final Report. Vol.2

    Get PDF
    This final report summarizes two years of research on analyzing procedures for the establishment of standards. The research was sponsored by the Volkswagenwerk Foundation and jointly carried out at the International Institute for Applied Systems Analysis at Laxenburg and the Kernforschungszentrum Karlsruhe. The final report is meant to be both a problem-oriented review of related work in the area of environmental standard setting and an executive summary of the main research done during the contract period. The following eleven technical papers (Volume II of the Final Report) are reference reports written to accompany Volume I. They describe the studies and findings performed under the contract in more detail, and they have been either published as IIASA Research Memoranda or as outside publications, or were especially written for this report. These technical reports are structured in four parts: (1) policy analyses of standard setting procedures; (2) decision and game theoretic models for standard setting; (3) applications of decision game theoretic models to specific standard setting problems; and (4) biological basis for standard setting

    Transient Stability Assessment Using Energy Function Method

    Get PDF
    There are numerous assumptions made to dene the stability of power system models. Step-by-Step numerical integrations of power system models are used to simulate the system dynamic behavior. This type of power system stability analysis is based on the time-domain approach. The typical simulation period of post-fault system is 10s and can go beyond 15s if multi-swing instability is of concern. Energy Function theory is a method to describe the stability of power system and it eliminates the post-fault integration which reduces the simulation time

    Proceedings of the 2004 ONR Decision-Support Workshop Series: Interoperability

    Get PDF
    In August of 1998 the Collaborative Agent Design Research Center (CADRC) of the California Polytechnic State University in San Luis Obispo (Cal Poly), approached Dr. Phillip Abraham of the Office of Naval Research (ONR) with the proposal for an annual workshop focusing on emerging concepts in decision-support systems for military applications. The proposal was considered timely by the ONR Logistics Program Office for at least two reasons. First, rapid advances in information systems technology over the past decade had produced distributed collaborative computer-assistance capabilities with profound potential for providing meaningful support to military decision makers. Indeed, some systems based on these new capabilities such as the Integrated Marine Multi-Agent Command and Control System (IMMACCS) and the Integrated Computerized Deployment System (ICODES) had already reached the field-testing and final product stages, respectively. Second, over the past two decades the US Navy and Marine Corps had been increasingly challenged by missions demanding the rapid deployment of forces into hostile or devastate dterritories with minimum or non-existent indigenous support capabilities. Under these conditions Marine Corps forces had to rely mostly, if not entirely, on sea-based support and sustainment operations. Particularly today, operational strategies such as Operational Maneuver From The Sea (OMFTS) and Sea To Objective Maneuver (STOM) are very much in need of intelligent, near real-time and adaptive decision-support tools to assist military commanders and their staff under conditions of rapid change and overwhelming data loads. In the light of these developments the Logistics Program Office of ONR considered it timely to provide an annual forum for the interchange of ideas, needs and concepts that would address the decision-support requirements and opportunities in combined Navy and Marine Corps sea-based warfare and humanitarian relief operations. The first ONR Workshop was held April 20-22, 1999 at the Embassy Suites Hotel in San Luis Obispo, California. It focused on advances in technology with particular emphasis on an emerging family of powerful computer-based tools, and concluded that the most able members of this family of tools appear to be computer-based agents that are capable of communicating within a virtual environment of the real world. From 2001 onward the venue of the Workshop moved from the West Coast to Washington, and in 2003 the sponsorship was taken over by ONR’s Littoral Combat/Power Projection (FNC) Program Office (Program Manager: Mr. Barry Blumenthal). Themes and keynote speakers of past Workshops have included: 1999: ‘Collaborative Decision Making Tools’ Vadm Jerry Tuttle (USN Ret.); LtGen Paul Van Riper (USMC Ret.);Radm Leland Kollmorgen (USN Ret.); and, Dr. Gary Klein (KleinAssociates) 2000: ‘The Human-Computer Partnership in Decision-Support’ Dr. Ronald DeMarco (Associate Technical Director, ONR); Radm CharlesMunns; Col Robert Schmidle; and, Col Ray Cole (USMC Ret.) 2001: ‘Continuing the Revolution in Military Affairs’ Mr. Andrew Marshall (Director, Office of Net Assessment, OSD); and,Radm Jay M. Cohen (Chief of Naval Research, ONR) 2002: ‘Transformation ... ’ Vadm Jerry Tuttle (USN Ret.); and, Steve Cooper (CIO, Office ofHomeland Security) 2003: ‘Developing the New Infostructure’ Richard P. Lee (Assistant Deputy Under Secretary, OSD); and, MichaelO’Neil (Boeing) 2004: ‘Interoperability’ MajGen Bradley M. Lott (USMC), Deputy Commanding General, Marine Corps Combat Development Command; Donald Diggs, Director, C2 Policy, OASD (NII

    Nahuatl contemporary writing: studying convergence in the absence of a written norm

    Get PDF
    Language revitalisation (LR) is influenced by a concern with authenticity around which written conventions are largely seen as the result of careful designs based on authentic spoken usage. This dissertation proposes to see written conventions as the result of an authentication process carried on by a community of practice of writers, and to explore the points of convergence in this practice as a set of examples which could eventually become shared conventions in most varieties of a linguistic continuum. I focus on the revitalisation of Nahuatl, a linguistic continuum spoken in Mexico. The study of convergence in the written practice of Nahuatl must be carried out in a context of ideological, linguistic, and orthographical heterogeneity. I have tested a methodology to extensively investigate points of convergence between eight contemporary Nahuatl texts from eight contemporary varieties, comparing them with Classical Nahuatl (CN), an old Nahuatl variety codified in prescriptive sources. I have attempted to locate commonalities in these texts by identifying nuclear clauses (NCs): morphosyntactic structures which are a common feature across the Nahuatl continuum. I have used a Finite State (FS) model of CN to attempt a morphological analysis of the word types found in the contemporary texts. The word types that could be plausibly analysed as CN NCs by our FS model, were proposed as plausible points of convergence between the texts and CN. Using a force atlas diagram, each text was represented as a node in a network, with the distance between them being proportional to the number of plausible points of convergence between them. Findings are that the ambiguity of analyses proposed by the developing FS model are currently a pitfall of our approach, but that the plausible points of convergence could be used to locate texts occupying a ‘central’ position in an expanding network

    2011 annual report of the selectmen, departments, boards and commissions of the town of Raymond, NH, for the year ending December 31, 2011.

    Get PDF
    This is an annual report containing vital statistics for a town/city in the state of New Hampshire

    Online Peer-to-Peer Lending Regulation: Justification, Classification and Remit in UK Law

    Get PDF
    Despite its benefits, online peer-to-peer lending bears the risks associated with traditional forms of institutionalised lending. However, because individuals have taken over the role of the institutional lender, and the institutional participant in this form of lending takes a step back by acting only as an intermediary between the borrowers and lenders, ordinary individuals are left to bear the type of risks that institutions have traditionally borne, but without the same means of doing so. There has been little academic analysis of the role and form that regulation should take in the regulation of peer-to-peer lending and most discussions centre on the American regulatory experience. This thesis sets out to examine the theoretical classification of online peer-to-peer lending and the theoretical and practical justifications for regulating it. The aim is to ascertain the most appropriate way to regulate peer-to-peer lending, taking into account the underlying conceptual model which underpins it. The study adopts a theoretical analysis of P2PL participants and regulation based on the concepts of consumer protection and paternalism. It includes a doctrinal analysis of the UK peer-to-peer lending legislation and regulation to identify, describe and explain the rules pertaining to the industry. It also uses a comparative approach to compare P2PL with existing forms of financial lending and similar (dis)intermediated forms of transacting between individuals to show that online peer-to-peer lending is a unique form of intermediated transaction. The thesis argues that it is important that regulation displays an understanding of the underlying conceptual framework of the business model it aims to regulate. In doing so, it also argues that the peer-to-peer lending users are more than just ‘consumers’. They demonstrate a shift in the conception of individuals from consumers to prosumers because they participate in the production side of the services they receive. It goes further than existing discussions of prosumption by positing the concept of the ‘lendsumer’ to give a more accurate account of the role and experiences of peer-to-peer lenders and the effect this has on their transactional relationships and the risks they face because of this role. Based on this analysis, the thesis shows that the UK regulatory regime has limited suitability because it lacks awareness of the underlying prosumption model of peer-to-peer lending, focusing only on the business-to-consumer aspects. Consequently, it does not resolve all the issues resulting from the tripartite, participatory nature of the peer-to-peer lending transaction. In light of these findings, the thesis proposes the regulatory use of two main concepts and highlights their implications for peer-to-peer lending regulation. The first is the ‘lendsumer’ as a new paradigm of the consumer which has implications for the regulatory protections afforded to the P2P lenders. The second is the use of gatekeeper liability, adapted to online peer-to-peer lending, as a way to affect these protections in light of the particular vulnerabilities and risks experienced by the peer-to-peer lender
    corecore