Heuristic methods for postoutage voltage magnitude calculations
نویسندگان
چکیده
منابع مشابه
Heuristic and Computer Calculations for the Magnitude of Metric Spaces
This paper is concerned with an empirical look at the magnitude of subspaces of Euclidean space. Magnitude was introduced under the name ‘cardinality’ by Leinster in [4] as a partially defined invariant of finite metric spaces; his motivation came from enriched category theory, but the invariant had already been considered in the biological diversity literature [6]. In [5] we started to extend ...
متن کاملislanding detection methods for microgrids
امروزه استفاده از منابع انرژی پراکنده کاربرد وسیعی یافته است . اگر چه این منابع بسیاری از مشکلات شبکه را حل می کنند اما زیاد شدن آنها مسائل فراوانی برای سیستم قدرت به همراه دارد . استفاده از میکروشبکه راه حلی است که علاوه بر استفاده از مزایای منابع انرژی پراکنده برخی از مشکلات ایجاد شده توسط آنها را نیز منتفی می کند . همچنین میکروشبکه ها کیفیت برق و قابلیت اطمینان تامین انرژی مشترکان را افزایش ...
15 صفحه اولUnder Voltage Load Shedding Scheme Using Meta-heuristic Optimization Methods
Load shedding has been extensively studied because of multiple power system failure occurrences worldwide. Reliable techniques are required to provide rapid and precise load shedding to avert voltage collapse in power networks. Meta-heuristic optimization approaches are currently the widely developed methods because of their robustness and flexibility in dealing with complex and non-linear syst...
متن کاملHeuristic Methods for Hypertree Decomposition
The literature provides several structural decomposition methods for identifying tractable subclasses of the constraint satisfaction problem. Generalized hypertree decomposition is the most general of such decomposition methods. Although the relationship to other structural decomposition methods has been thoroughly investigated, only little research has been done on efficient algorithms for com...
متن کاملHeuristic Methods for Security Protocols
Model checking is an automatic verification technique to verify hardware and software systems. However it suffers from state-space explosion problem. In this paper we address this problem in the context of cryptographic protocols by proposing a security property-dependent heuristic. The heuristic weights the state space by exploiting the security formulae; the weights may then be used to explor...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: TURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES
سال: 2016
ISSN: 1300-0632,1303-6203
DOI: 10.3906/elk-1301-124