نتایج جستجو برای: power system security

تعداد نتایج: 2696271  

M. R. Aghamohammadi,

This paper proposes a novel approach for generation scheduling using sensitivitycharacteristic of a Security Analyzer Neural Network (SANN) for improving static securityof power system. In this paper, the potential overloading at the post contingency steadystateassociated with each line outage is proposed as a security index which is used forevaluation and enhancement of system static security....

ستایشنظر, مهرداد, نظام‌آبادی, حسین,

This paper addresses the bidding problem faced by a virtual power plant (VPP) in energy, spinning reserve service, and reactive power service market simultaneously. Therefore, a non-equilibrium model based on security constraints price-based unit commitment (SCPBUC), which is take into account the supply-demand balancing and security constraints of VPP, is proposed. By the presented model, VPP ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی خواجه نصیرالدین طوسی - دانشکده مهندسی برق و کامپیوتر 1391

many mobile and off-grid devices include electronics and other electrical consumers like servo drives, which need a quite low supply power. since the price for photovoltaic modules drops continuously, photovoltaic power supply is interesting in more and more applications. in solar powered systems, a battery is needed to store energy for the night and cloudy periods. the power electronics of suc...

This paper introduces a new approach for scheduling security constraint unit commitment (SCUC) including wind farms. Because of uncertainty in wind power production, we tried to develop a new method for incorporating wind power generation in power plant scheduling. For this, wind power generation modeled with unit commitment in a non-linear optimization problem and simulated by submitting diffe...

In conventional power systems, frequency and voltage deviations are chosen as indexes for characterizing conventional power system security. While  in an autonomous micro grid with Electronically Interfaced Distributed Generation (EIDG), frequency and voltage deviations  against power and loads disturbances perfectly controlled by f-P and V-Q controller. Unlike conventional power syst...

Journal: :مطالعات اوراسیای مرکزی 0
عباس مصلی نژاد استاد علوم سیاسی دانشکده حقوق و علوم سیاسی دانشگاه تهران

russia is considered the core of the former empire of the ussr. many social and structural features of the soviet :union: could be observed in the development of russia’s political power and strategic attitude. geo-political competitions between russia and the west can be traced back to the 19th century. these competitions were shaped within the framework of the balance of power system in inter...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی خواجه نصیرالدین طوسی - دانشکده برق و کامپیوتر 1391

in the area of automotive engineering there is a tendency to more electrification of power train. in this work control of an induction machine for the application of electric vehicle is investigated. through the changing operating point of the machine, adapting the rotor magnetization current seems to be useful to increase the machines efficiency. in the literature there are many approaches wh...

Journal: :international journal of smart electrical engineering 2013
reza khanzadeh mahmoud reza haghifam

as renewable energy increasingly penetrates into power grid systems, new challenges arise for system operators to keep the systems reliable under uncertain circumstances, while ensuring high utilization of renewable energy. this paper presents unit commitment (uc) which takes into account the volatility of wind power generation. the uc problem is solved with the forecasted intermittent wind pow...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه بیرجند 1388

a significant problem in multicarrier communication systems is the necessity to reduce the value of papr (peak-to-average power ratio) of transmitting signal. in this thesis we study the effect of the system parameters such as coding and modulation types on papr and ultimate ber in a mc-cdma system. in this study we consider fading channel as well as the nonlinearity of transmitter’s amplifier ...

Journal: :journal of ai and data mining 2015
h. motameni

to evaluate and predict component-based software security, a two-dimensional model of software security is proposed by stochastic petri net in this paper. in this approach, the software security is modeled by graphical presentation ability of petri nets, and the quantitative prediction is provided by the evaluation capability of stochastic petri net and the computing power of markov chain. each...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید