نتایج جستجو برای: allocation limits
تعداد نتایج: 200844 فیلتر نتایج به سال:
Recent works by Newell [13] and Coffman et al. [2] have studied a queuing or storage model which is most easily visualized as the process of parking cars in a parking lot where customers park as close as they can to some fixed point. This paper describes several space-time processes which arise as heavy-traffic limits in this model, and which seem interesting in their own right. M/M/a queue * d...
The Power Quality Centre at the University of Wollongong has been in operation since 1996 and has made progress in many areas of power quality, with power system harmonics being a major focus. The paper will discuss some important issues in harmonics still needing to be resolved, including (i) the economic case for harmonic control, (ii) the setting of appropriate voltage limits, (iii) measurem...
This paper studies a practical multi-factory job allocation and scheduling problem involving inland and maritime transport limits. A new heuristic called Due-date Based Cut-off rule (DBC) is developed to improve the computational efficiency of both exact and genetic algorithms (GA). Except the application of DBC, this proposed GA is guided by a novel fuzzy controller aimed at eliminating the dr...
This paper concerns the optimal location of Flexible AC Transmission Systems (FACTS) in multimachine power system using Genetic Algorithm. The objective is to obtain the bus voltages of the system within healthy limits. TCSC is the FACT device chosen for the proposed algorithm. The location of FACT devices and their rated values are optimized simultaneously. Simulations are done on a power syst...
A Variable Neighbourhood Search algorithm that employs new neighbourhoods is proposed for solving a task allocation problem whose main characteristics are: (i) each task requires a certain amount of resources and each processor has a capacity constraint which limits the total resource of the tasks that are assigned to it; (ii) the cost of solution includes fixed costs when using processors, tas...
This chapter provides a comprehensive state-of-the-art description of the emerging field of physical layer security. We will consider wireless security from an information theoretic view, which allows us to talk about provable secrecy and to derive ultimate secrecy limits. Our main focus is on the optimization of transmit strategies and resource allocation schemes under secrecy constraints. We ...
We consider a processor sharing storage allocation model, which has m primary holding spaces and infinitely many secondary ones, and a single processor servicing the stored items (customers). All of the spaces are numbered and ordered. An arriving customer takes the lowest available space. We define the traffic intensity ρ to be λ/μ where λ is the customers’ arrival rate and μ is the service ra...
In this paper we address control systemswith redundant actuators and characterize the concepts of weak and strong input redundancy. Based on this characterization, we propose a dynamic augmentation to a control scheme which performs the plant input allocation with the goal of employing each actuator in a suitableway, based on itsmagnitude and rate limits. The proposed theory is first developed ...
A fresh attempt has been made to develop a new algorithm for optimal power flow (OPF) using Fletcher's quadratic-programming method. The new algorithm considers two decoupled subproblems needing minimum cost of generation and minimum system-transmission losses. These have been solved sequentially to achieve optimal allocation of real and reactive power generation and transformer tap settings wi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید