Extended Flow-Based Security Assessment for Real-Sized Transmission Network Planning

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Transmission expansion planning based on merchandizing surplus of transmission lines

This paper proposes an optimal transmission expansion planning (TEP) which is based on determining share of each line in merchandizing surplus (MS) of system, determining by Independent System Operator (ISO). The more share of a line in MS of system denotes the priority of a line for expansion. The procedure of determining MS of each line in a power system is based on determining the MS share o...

متن کامل

RINSE: The Real-Time Immersive Network Simulation Environment for Network Security Exercises (Extended Version)

The RINSE simulator is being developed to support large-scale network security preparedness and training exercises, involving hundreds of players and a modeled network composed of hundreds of LANs. The simulator must be able to present a realistic rendering of network behavior as attacks are launched and players diagnose events and try counter measures to keep network services operating. We des...

متن کامل

DCGA Based-Transmission Network Expansion Planning Considering Network Adequacy

Transmission network expansion planning (TNEP) is an important component of power system planning that its task is to minimize the network construction and operational cost while satisfying the demand increasing, imposed technical and economic conditions. Up till now, various methods have been presented to solve the static transmission network expansion planning (STNEP) problem. But in all of t...

متن کامل

Information Flow-Based Security Levels Assessment for Access Control Systems

Access control systems are designed to allow or deny access to data according to organizational policies. In many organizations, the access rights of subjects to data objects are determined in consideration of clearance levels of subjects and classification levels of objects. In most formally-defined traditional access control systems, levels are predetermined and policies are rigid. However, i...

متن کامل

Network Information Security Situation Assessment Based on Bayesian Network

The situation of information security is difficult to be precise, autonomous and controllable. In this situation, the situation of the system is based on Fuzzy Dynamic Bayesian network. The model of situation awareness and situation estimation is constructed. The simulation results are compared with that of static Bayesian network model. The experimental results show that this method can better...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Energies

سال: 2020

ISSN: 1996-1073

DOI: 10.3390/en13133363