نتایج جستجو برای: distance protection

تعداد نتایج: 415174  

Journal: :Journal of modern power systems and clean energy 2023

The distributed capacitance of the line becomes larger as scale wind farms, transmission voltage level, and distance increase. Hence, error traditional time-domain protection scheme based on R-L model, which ignores line, unacceptable. Therefore, fault location method especially maximum range, is theoretically analyzed in this paper. On basis, a novel Bergeron models proposed. Then, fast design...

vspace{0.2cm}In this paper, we design a data structure for the following problem. Let $pi$ be an $x$-monotone trajectory with $n$ vertices in the plane and $epsilon >0$. We show how to preprocess $pi$ and $epsilon$ into a data structure such that for any horizontal query segment $Q$ in the plane, one can quickly determine the minimal continuous fraction of $pi$ whose Fr{'e}chet and Hausdo...

     The landslides impose serious damages to the economy, environment and human throughout the world. Identification of areas susceptible to landslides is necessary to avoid risks. In This research for Landslide hazard zonation in sarkhoon karoon watershed have been used Shannon’s Entropy Index and Information Value Methods. For this purpose, at first, landslide locations were identified using...

ملکیان, منصوره , مومنی, مسلم , همامی , محمودرضا ,

Persian wild ass, Equus hemionus onager, is a rare subspecies of Asiatic wild ass endemic to Iran, which was historically widespread in arid and semi-arid steppes of central and southeastern Iran. Today only two natural populations have remained. This subspecies is listed as Critically Endangered in the Red List of the International :::union::: for the Conservation of Nature and Natural Resourc...

2018
Angus C. Chu Guido Cozzi Shiyuan Pan Mengbo Zhang

This study explores the effects of patent protection in a distance-to-frontier R&D-based growth model with financial frictions. We find that whether stronger patent protection stimulates or stifles innovation depends on credit constraints faced by R&D entrepreneurs. When credit constraints are non-binding (binding), strengthening patent protection stimulates (stifles) R&D. The overall effect of...

Journal: :The Journal of Supercomputing 2022

Abstract Aiming at the problem of user’s task offloading in mobile edge computing and potential leakage location privacy during process, a privacy-preserving scheme based on whale optimization algorithm is proposed. Using differential technology to obfuscate user's information, user can make decisions according obfuscated distance. Considering delay, energy consumption, their weighted sum, mode...

Journal: :Journal of electrotechnology, electrical engineering and management 2023

This paper explores the relay protection of power grid with large-scale wind access across globe. First, amplitude and attenuation characteristics short circuit current in different types turbines are analyzed, as well contributing factors to short-circuit farms. Second, fault corresponding strategies collector plant discussed. Then, view adaptability HVDC access, performance zero-sequence prot...

2015
Serge Vaudenay

Public-key distance bounding schemes are needed to defeat relay attacks in payment systems. So far, only five such schemes exist, but fail to fully protect against malicious provers. In this paper, we solve this problem. We provide a full formalism to define the proof of proximity of knowledge (PoPoK). Protocols should succeed if and only if a prover holding a secret is within the proximity of ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید