نتایج جستجو برای: distributed generation penetration level

تعداد نتایج: 1650645  

Journal: :Computers 2022

Cybersecurity is an ever-changing landscape. The threats of the future are hard to predict and even harder prepare for. This paper presents work designed for cybersecurity landscape tomorrow by creating a key support capability autonomous testing system. system test critical infrastructure what cyberattacks looks like. It proposes new type attack framework that provides precise granular control...

Due to the increasing need to distributed energy resources in power systems, their problems should be studied. One of the main problem of distributed energy resources is unplanned islanding. The unplanned islanding has some dangers to the power systems and the repairman which are works with the incorrect devices. In this paper, a passive local method is proposed. The proposed method is based on...

2016
W. C. Briceno Vicente R. Caire N. Hadjsaid

Exploitation of renewable energy sources in power networks, especially wind energy, is considered an alternative for power generation as a non-polluting source with a low environmental impact and low operational cost. Hence, renewable energy has motivated the increment of penetration of Distributed Generation (DG) in distribution networks and the development of methodologies to evaluate their e...

2011
Göran Andersson

Due to the increasing penetration of Distributed Generation (DG) technologies, such as photovoltaics, wind turbines, μCHP, biomass, etc., energy production changes from centralized units to diverse distributed units, located at lower voltage levels. In addition, installations of renewable energy resources are promoted by receiving a fixed feed-in tariff. These trends provide new opportunities f...

1998
Simon Blackburn Simon Blake-Wilson Mike Burmester Steven Galbraith

The paper considers the problem of distributed key generation for shared-control RSA schemes. In particular: how can two parties generate a shared RSA key in such a way that neither party can cheat? The answer to this question would have signi cant applications to, for example, key escrow systems. Cocks has recently proposed protocols to solve this problem in the case when both parties act hone...

Journal: :journal of livestock science and technologies 2014
n. gorgani firozjah h. atashi m. dadpasand m. j. zamiri

the aim of this study was to determine the effect of marker density, level of heritability, number of qtls, and size of training set on the genomic accuracy over three generations. thereby, a trait was simulated with heritability of 0.10, 0.25 or 0.40. for each animal, a genome with 20 chromosomes, 1 morgan each, was simulated. different marker densities (2000, 4000 and 6000 markers) and 400 an...

2017
Kyle Anderson Ram Rajagopal

We consider the problem of controlling distributed storage in a distribution network with renewable distributed generation to minimize network operational cost while satisfying power quality constraints. We assume control is distributed between a global controller (GC) and local controllers (LC) located at the nodes with storage units. Each LC has access to its most recent net load data and run...

2011
René van Leuken Tom Van Leeuwen Huib Lincklaen Arriens

This paper presents a toolbox for the automatic generation of asynchronous circuits starting from a data flow graph description. The toolbox consists of a scheduling and code generation tool. We use traditional scheduling algorithms as for synchronous circuits, but have replaced the implied synchronous controller for an asynchronous distributed control network. The control circuit allows for tr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید