نتایج جستجو برای: security constrained unitcommitment

تعداد نتایج: 252998  

2016
Yonghong Chen Fengyu Wang

As a part of the day-ahead market clearing process, Midcontinent Independent System Operator (MISO) solves one of the largest and most challenging Security Constrained Unit Commitment (SCUC) models. Better computational performance of SCUC models not only improves the market efficiency but also facilitates future market development. This paper introduces two developments on Mixed Integer Progra...

2017
Andrew M'manga Shamal Faily John McAlaney Christopher Williams

There are several standard approaches to risk analysis recommended for use in information security, however, the actual application of risk analysis by security analysts follows an opaque mix of standard risk analysis procedures and adaptations based on an analyst’s understanding of risk. We refer to these approaches as Folk Risk Analysis. To understand folk risk analysis, we present the result...

Journal: :Applied sciences 2021

Currently, optimization models for the safe and reliable operation of power systems deal with two major challenges: first one is reduction computational load when considering N−1 contingencies; second adequate modeling uncertainty intermittent generation demand. This paper proposes a new affinely adjustable robust model to solve security constrained unit commitment problem these sources uncerta...

Journal: :Iet Generation Transmission & Distribution 2022

The security of energy systems has always been one the most important issues operation. multi-carrier multi-microgrid (MCMMG) is novel structures in power system. High penetration renewable resources and their uncertainty, ability to operate isolation mode, presence hubs MCMMG increase importance assessment this type This paper presents a decentralized risk-based security-constrained optimal fl...

2004
Simon N. Foley Barry P. Mulcahy Thomas B. Quillinan

User authorisation is traditionally coordinated by system administrators processing delegation requests. This overhead influences an enterprise's ability to respond efficiently and contributes to the total cost of ownership. We propose to reduce this bottleneck by supporting Dynamic Administrative Coalitions of ordinary users that hold administrative powers reflecting their authority. These coa...

2010
Susana Eiroa Iluminada Baturone Antonio J. Acosta Jorge Dávila

Physical unclonable functions (PUFs) are drawing a crescent interest in hardware oriented security due to their special characteristics of simplicity and safety. However, their nature as well as early stage of study makes them constitute currently a diverse and non-standardized set for designers. This work tries to establish one organization of existing PUF structures, giving guidelines for the...

2007
Varun Prakash Saxena Bhupendra Singh

Security can mean resistance to casual or prankster attacks like most viruses and security can also mean resistance to DOS attacks. But in this paper, security will mean the embedded devices’ ability to contain sensitive information and to hold down its end of a secure communication. In this paper we also are studying about various types of protocols which are used in networks security. These a...

2014
Vishwas Lakkundi Keval Singh

Security is emerging as a key area of focus in the Internet of Things. Lightweight implementations of the required security features are the need of the hour considering the resource constrained nature of the underlying nodes and networks. At the same time, it is essential to ensure that such implementations are robust, reliable and efficient. This paper addresses this need by providing a frame...

2009
Jinat Rehana

Wireless Sensor Networks (WSN) is an emerging technology and day by day it is attracting the attention of researchers with its challenging characteristics and diversified application domain. The more researchers try to develop further cost and energy efficient computing devices and algorithms for WSN, the more challenging it becomes to fit the security of WSN into that constrained environment. ...

2001
Sasha Slijepcevic Miodrag Potkonjak Vlasios Tsiatsis Scott Zimbeck Mani B. Srivastava

Networks of wireless microsensors for monitoring physical environments have emerged as an important new application area for wireless technology. Key attributes of these new types of networked systems are the severely constrained computational and energy resources, and an ad hoc operational environment. This paper is a study of the communication security aspects of these networks. Resource limi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید