نتایج جستجو برای: power system security

تعداد نتایج: 2696271  

In this paper, the integrated unit commitment problem and gas network operation in which in the presence of renewable wind and solar power plants is modeled. Both wind and solar energy are variable sources of energy, but because solar energy is only available at certain times of the day, it has caused the load curve behavior to change. This change in load curve, known as the "duck curve, has ra...

2017
Zhong Chen Hui Chen Minhui Zhuang Siqi Bu

A conventional steady-state power flow security check only implements point-by-point assessment, which cannot provide a security margin for system operation. The concept of a steady-state security region is proposed to effectively tackle this problem. Considering that the commissioning of the increasing number of HVDC (High Voltage Direct Current) and the fluctuation of renewable energy have si...

2010
Marayati Marsadek Azah Mohamed

Power system security assessment based on the concept of risk is required in the current power environment. In risk based security assessment, the likelihood and severity of security violation are the two main factors that determine the security level of a power system. To evaluate likelihood of security violation, the probability technique based on Poisson probability distribution function is ...

bag-mohammadi, Mozafar, Pishdar, Mohammad, Seifi, Younes,

RPL (Routing Protocol for Low Power and Lossy Networks) has been designed for low power networks with high packet loss. Generally, devices with low processing power and limited memory are used in this type of network. IoT (Internet of Things) is a typical example of low power lossy networks. In this technology, objects are interconnected through a network consisted of low-power circuits. Exampl...

This paper aims to firstly explain the significance of the U.S oil independency and its consequences on the U.S foreign strategy in international politics. Secondly, the implications of this energy policy on the U.S foreign policy in the international system context is examined. The hypothesis to address these inquiries is postulated using neo-realism theory. Accordingly, following oil independ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه زنجان 1386

چکیده ندارد.

2011
Sai Kumar

Security Management at the industries or remote terminals like ATM centers is very essential. Security can be provided with man power but in practice this traditional methods are not up to the demand. As increasing number of people needs, number of ATMs increasing and there is no enough man power to monitor each and every terminal with this traditional way. So In this paper we analyzed the pres...

2015
Mehran Rashidi Haidar Samet

Existing security and reliability based EMS applications (e.g. Online Dispatcher Power Flow, Online Contingency Evaluation, Online Short Circuit Calculation, etc.) normally take real time snapshot of the system and perform necessary studies to evaluate the security and reliability of the network. As these applications do not provide any information about the security level of the system for the...

2012
Xin Yan Yang Wu

Power supply in the 21st century is facing more and more challenges, e.g., environment protection, energy shortage etc, such that the techniques related to power supply imminently need to be promoted. Complying with the development of green and lowcarbon economy, the concept of Smart Grid has been proposed. By and large, Smart Grid may be regarded as an important application of the techniques o...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید