نتایج جستجو برای: contingency approach
تعداد نتایج: 1298100 فیلتر نتایج به سال:
Current contingency reserve criteria ignore the likelihood of individual contingencies and, thus, their impact on system reliability and risk. This paper develops an iterative approach, inspired by current security-constrained unit commitment (SCUC) practice, enabling operators to determine risk-cognizant requirements allocation with minimal alterations SCUC practice. The proposed approach uses...
The separated electromagnetic responses RL(q, ω) and RT (q, ω) for inclusive electron scattering off nuclei are studied within a functional scheme.
Utilities use operating reserve for frequency regulation. To ensure that the operating frequency and system security are well maintained, the operating grid codes always specify that the reserve quantity and response rate should meet some prescribed levels. This paper proposes a methodology to evaluate system’s contingency reserve for an isolated power network. With the presented algorithm to e...
Analogue assessments were conducted with a common contingency (escape from tasks) that varied only by three different instructions describing the contingency. In one condition, the contingency was described as "taking a break," in another condition it was described as "time-out," and no description of the contingency was provided in a third condition. The participant was a typically developing ...
Technical Conference: Increasing Real-Time and Day-Ahead Market Efficiency through Improved Software
The California ISO has taken several measures to incorporate the uncertainty due to Wind and Solar variability into the unit commitment and dispatch algorithms used in market operations. A hybrid approach that recognizes the need to incorporate uncertainties in operation of Day-ahead and real-time markets is presented. The hybrid approach is based on leveraging different forecasting techniques ...
Purpose Contingency estimating and management are critical management functions necessary for successful delivery of construction projects. Considering its importance, academics and industry professionals proposed a wide range of methods for risk quantification and accordingly for contingency estimating1. Considerably less work was directed to contingency management including risk mitigate duri...
Contingency tables are widely used in many fields to analyze the relationship or infer the association between two or more variables. Indeed, due to their simplicity and ease, they are one of the first methods used to analyze gathered data. Typically, the construction of contingency tables from source data is considered straightforward since all data is supposed to be aggregated at a single par...
Digital signatures are by far the most prominent mechanisms to detect violations of integrity. When signing rights are delegated, the integrity protection is gradually weaker as the delegatee’s actions are not considered integrity violations. Taken to an extreme, delegating the right to undetectably change everything to everyone will achieve a property called contingency. Contingency was introd...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید