نتایج جستجو برای: distributed generation penetration level
تعداد نتایج: 1650645 فیلتر نتایج به سال:
Cybersecurity is an ever-changing landscape. The threats of the future are hard to predict and even harder prepare for. This paper presents work designed for cybersecurity landscape tomorrow by creating a key support capability autonomous testing system. system test critical infrastructure what cyberattacks looks like. It proposes new type attack framework that provides precise granular control...
Due to the increasing need to distributed energy resources in power systems, their problems should be studied. One of the main problem of distributed energy resources is unplanned islanding. The unplanned islanding has some dangers to the power systems and the repairman which are works with the incorrect devices. In this paper, a passive local method is proposed. The proposed method is based on...
Exploitation of renewable energy sources in power networks, especially wind energy, is considered an alternative for power generation as a non-polluting source with a low environmental impact and low operational cost. Hence, renewable energy has motivated the increment of penetration of Distributed Generation (DG) in distribution networks and the development of methodologies to evaluate their e...
Due to the increasing penetration of Distributed Generation (DG) technologies, such as photovoltaics, wind turbines, μCHP, biomass, etc., energy production changes from centralized units to diverse distributed units, located at lower voltage levels. In addition, installations of renewable energy resources are promoted by receiving a fixed feed-in tariff. These trends provide new opportunities f...
The paper considers the problem of distributed key generation for shared-control RSA schemes. In particular: how can two parties generate a shared RSA key in such a way that neither party can cheat? The answer to this question would have signi cant applications to, for example, key escrow systems. Cocks has recently proposed protocols to solve this problem in the case when both parties act hone...
the aim of this study was to determine the effect of marker density, level of heritability, number of qtls, and size of training set on the genomic accuracy over three generations. thereby, a trait was simulated with heritability of 0.10, 0.25 or 0.40. for each animal, a genome with 20 chromosomes, 1 morgan each, was simulated. different marker densities (2000, 4000 and 6000 markers) and 400 an...
We consider the problem of controlling distributed storage in a distribution network with renewable distributed generation to minimize network operational cost while satisfying power quality constraints. We assume control is distributed between a global controller (GC) and local controllers (LC) located at the nodes with storage units. Each LC has access to its most recent net load data and run...
This paper presents a toolbox for the automatic generation of asynchronous circuits starting from a data flow graph description. The toolbox consists of a scheduling and code generation tool. We use traditional scheduling algorithms as for synchronous circuits, but have replaced the implied synchronous controller for an asynchronous distributed control network. The control circuit allows for tr...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید