نتایج جستجو برای: differential protection
تعداد نتایج: 462039 فیلتر نتایج به سال:
The technology of differential privacy, adding a noise drawn from the Laplace distribution, successfully overcomes a difficulty of keeping both the privacy of individual data and the utility of the statistical result simultaneously. Therefore, it is prevalent to use a rechargeable battery as the noise for achieving differential privacy in the application of smart grid. Unfortunately, to the bes...
Perturbing information, before being shared with untrusted entities, is an effective and widely proposed approach to protect users’ privacy. However, the privacy of users and the utility of the obfuscated information are at odds with each other, and increasing one results in decreasing the other. In this paper, we propose a methodology for designing protection mechanisms that optimally trade ut...
In this paper in order to ensure that protection of the system remains reliable even after introduction of DG is studied key Protection Challenges of the DN with DG and established rules for the design and coordination of protective relays in a power system. Such as Differential Protection Schemes, A Balanced Combination of Different Types of DG Units for Grid Connection, Inverter Controller De...
For bus zone protection applications, it is extremely important to have good security since an unwanted operation might have severe consequences. The unwanted operation of the bus differential relay will have the similar effect as simultaneous faults on all power system elements connected to the bus. On the other hand, the relay has to be dependable as well. Failure to operate or even slow oper...
Increasingly attention has been focused to the degree to which social programs have effectively and efficiently delivered services. Using the differential program evaluation model by Tripodi, Fellin, and Epstein (1978) and by Bielawski and Epstein (1984), this paper described the application of this model to evaluating a multidisciplinary clinical consultation practice in child protection. This...
This paper will propose a cascade of minimum description length criterion with entropy approach along with artificial neural network (ANN) as an optimal feature extraction and selection tool for a wavelet packet transform based transformer differential protection. The proposed protection method provides a reliable and computationally efficient tool for distinguishing between internal faults and...
We present a mechanism for providing differential data protection to publish/subscribe distributed systems, such as those used in peer-to-peer computing, grid environments, and others. This mechanism, termed “security overlays”, incorporates credential-based communication channel creation, subscription and extension. We describe a conceptual model of publish/subscribe services that is made conc...
Chronic calorie restriction has been known for decades to prevent or retard cancer growth, but its weight-loss effect and the potential problems associated with combining it with chemotherapy have prevented its clinical application. Based on the discovery in model organisms that short term starvation (STS or fasting) causes a rapid switch of cells to a protected mode, we described a fasting-bas...
A neuj method for digital line differential protection is presented. The protection compares the time function and the orthogonal function of the symmetrical positive-sequence component at the input and output o f a transmission line. From these values the magnitude of the differential current is evaluated. The time function is calculated according to the SD4c algorithm and the orthogonal funct...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید