نتایج جستجو برای: power system security
تعداد نتایج: 2696271 فیلتر نتایج به سال:
In this paper, the integrated unit commitment problem and gas network operation in which in the presence of renewable wind and solar power plants is modeled. Both wind and solar energy are variable sources of energy, but because solar energy is only available at certain times of the day, it has caused the load curve behavior to change. This change in load curve, known as the "duck curve, has ra...
this paper presents a probabilistic confidence-interval based method for optimal placement of shunt capacitors in distribution networks by considering probabilistic characteristics of loads. the main objective function are reducing loss and improving the voltage profile. backward forward sweep method has been employed to obtain the power flow results in distribution system. in addition, integer...
با اتصال سیستم های قدرت برای استفاده از مزیت های آن، پیچیدگی سیستم افزایش یافته است. از این رو کنترل سیستم دشوار شده و اغتشاشات ایجاد شده در یک ناحیه از سیستم به سایر نواحی منتقل می شود . تجدید ساختار و مشکلات ناشی از آن، از جمله کاهش قابلیت اطمینان و امنیت، مسائل پایداری زاویه ای و پایداری گذرا و پایداری ولتاژ، افزایش سطح اتصال کوتاه و افزایش تقاضای انرژی الکتریکی و در عین حال کمبود ظرفیت انتق...
Based on reactive power-voltage characteristics analysis of air conditioners, the effects of air conditioner load on voltage stability of an urban power system are investigated in this paper. Indexes for evaluating bus voltage security are proposed, and static voltage stability analysis method is adopted. The computational analysis of a real urban power system in East China shows that air condi...
The doubly fed induction generator (DFIG) is one of the most popular technologies used in wind power systems. With the growing use of DFIGs and increasing power system dependence on them in recent years, protecting of these generators against internal faults is more considered. Loss of excitation (LOE) event is among the most frequent failures in electric generators. However, LOE detection stud...
In this paper, we investigate the effect of data size on mobile device’s computing power for different security protocol. Based on the fact that the computing power efficiency of security protocol may depend on the data size, we propose a system prototype, Spirit, which can minimize its computation power by selecting the security protocol dynamically according to different data types which may ...
This paper provides discussion of security issues for power line networks (PLC). The home network based on power line communication has been used widely however security of PLC has not been discussed sufficiently. Though PLC uses power line as medium it has similar characterises with wireless communications in the view of security. The authentication and cryptographic scheme used in PLC standar...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید