Static Voltage Security Analysis of Single Branch Outage Contingency

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Line outage contingency analysis including the system islanding scenario

The paper describes an algorithm for determining the line outage contingency of a line taking into account of line over load effect in remaining lines and subsequent tripping of over loaded line(s) leading to possible system split or islanding of a power system. The optimally ordered sparse [B 0], [B 00] matrices for the integrated system are used for load flow analysis to determine modified va...

متن کامل

Distributed Contingency Logic and Security

In information security, ignorance is not bliss. It is always stated that hiding the protocols (let the other be ignorant about it) does not increase the security of organizations. However, there are cases that ignorance creates protocols. In this paper, we propose distributed contingency logic, a proper extension of contingency (ignorance) logic. Intuitively, a formula is distributed contingen...

متن کامل

Artificial neural network model for voltage security based contingency ranking

The continual increase in demand for electrical energy and the tendency towards maximizing economic benefits in power transmission system has made real-time voltage security analysis an important issue in the operation of power system. The most important task in real time security analysis is the problem of identifying the critical contingencies from a large list of credible contingencies and r...

متن کامل

Static Analysis for Security

source-code security analysis with static analysis tools. Since ITS4's release in early 2000 (www.cigital.com/its4/), the idea of detecting security problems through source code has come of age. ITS4 is extremely simple—the tool basically scans through a file looking for syntactic matches based on several simple " rules " that might indicate possible security vulnera-bilities (for example, use ...

متن کامل

Static Program Analysis for Security

In this chapter, we discuss static analysis of the security of a system. First, we discuss the background on what types of static analysis is feasible in principle and then move on to what is practical. We next discuss static analysis of buffer overflow and mobile code followed by access control. Finally, we discuss static analysis of information flow expressed in a language that has been annot...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Applications

سال: 2019

ISSN: 0975-8887

DOI: 10.5120/ijca2019918306