نتایج جستجو برای: security constrained unitcommitment
تعداد نتایج: 252998 فیلتر نتایج به سال:
This paper reviews the existing developments in Security Constrained Optimal Power Flow (SCOPF) from 1960‟s to till date. Diverse schemes and approaches on Single Area/Multiarea, Algorithms, Contingency Selection, Steady and Dynamic SCOPF, Artificial Intelligence based SCOPF, Real time and SCOPF using Parallel/Distributed Processing, Economic Dispatch with Security Constraints, Decentralized SC...
As a part of the day-ahead market clearing process, Midcontinent Independent System Operator (MISO) solves one of the largest and most challenging Security Constrained Unit Commitment (SCUC) models. Better computational performance of SCUC models not only improves the market efficiency but also facilitates future market developments. This paper introduces recent developments in SCUC formulation...
Internet of Things (IoT) and Wireless Sensor Networks (WSN) are composed of devices capable of sensing/actuation, communication and processing. They are valuable technology for the development of applications in several areas, such as environmental, industrial and urban monitoring and processes controlling. Given the challenges of different protocols and technologies used for communication, res...
Low-power secure applications such as Radio Frequency IDentification (RFID) and smart cards represent extremely constrained environments in terms of power consumption and die area. This paper investigates the power, delay and security performances of the dynamic differential swing limited logic (DDSLL). A complete analysis of an advanced encryption standard (AES) S-box is conducted using a low-...
The Wireless Sensor Networks (WSNs) consist of the sensor nodes those are severely resource constrained. Hence, the protocols devised for the WSNs employ every possible means of optimizing the associated overhead.The WSNs typically, employ in-network processing that is largely based on the data aggregation operations that aggregate the data into a compact representation for further transmission...
The resource-constrained sensors in mission-critical applications are subject to both random failures and intentional compromise by the adversary, which poses severe security threats in wireless sensor networks (WSNs). The different types of security threats have been identified and addressed in an individual manner in the past. And most solutions are cryptography based. In this paper, we argue...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید