Heuristic methods for postoutage voltage magnitude calculations

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Heuristic and Computer Calculations for the Magnitude of Metric Spaces

This paper is concerned with an empirical look at the magnitude of subspaces of Euclidean space. Magnitude was introduced under the name ‘cardinality’ by Leinster in [4] as a partially defined invariant of finite metric spaces; his motivation came from enriched category theory, but the invariant had already been considered in the biological diversity literature [6]. In [5] we started to extend ...

متن کامل

islanding detection methods for microgrids

امروزه استفاده از منابع انرژی پراکنده کاربرد وسیعی یافته است . اگر چه این منابع بسیاری از مشکلات شبکه را حل می کنند اما زیاد شدن آنها مسائل فراوانی برای سیستم قدرت به همراه دارد . استفاده از میکروشبکه راه حلی است که علاوه بر استفاده از مزایای منابع انرژی پراکنده برخی از مشکلات ایجاد شده توسط آنها را نیز منتفی می کند . همچنین میکروشبکه ها کیفیت برق و قابلیت اطمینان تامین انرژی مشترکان را افزایش ...

15 صفحه اول

Under Voltage Load Shedding Scheme Using Meta-heuristic Optimization Methods

Load shedding has been extensively studied because of multiple power system failure occurrences worldwide. Reliable techniques are required to provide rapid and precise load shedding to avert voltage collapse in power networks. Meta-heuristic optimization approaches are currently the widely developed methods because of their robustness and flexibility in dealing with complex and non-linear syst...

متن کامل

Heuristic Methods for Hypertree Decomposition

The literature provides several structural decomposition methods for identifying tractable subclasses of the constraint satisfaction problem. Generalized hypertree decomposition is the most general of such decomposition methods. Although the relationship to other structural decomposition methods has been thoroughly investigated, only little research has been done on efficient algorithms for com...

متن کامل

Heuristic Methods for Security Protocols

Model checking is an automatic verification technique to verify hardware and software systems. However it suffers from state-space explosion problem. In this paper we address this problem in the context of cryptographic protocols by proposing a security property-dependent heuristic. The heuristic weights the state space by exploiting the security formulae; the weights may then be used to explor...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: TURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES

سال: 2016

ISSN: 1300-0632,1303-6203

DOI: 10.3906/elk-1301-124