نتایج جستجو برای: planning production wind farm imperialist competitive algorithm responding load request

تعداد نتایج: 1861391  

2012
Fatemeh Ramezani Shahriar Lotfi Mohammad Amin Soltani-Sarvestani

This paper proposes a new approach by combining the Evolutionary Algorithm and Imperialist Competitive Algorithm. This approach tries to capture several people involved in community development characteristic. People live in different type of communities: Monarchy, Republic and Autocracy. People dominion is different in each community. Research work has been undertaken to deal with curse of dim...

Journal: :JNW 2013
Yinghui Qiu Chao Liu

Wind power is sustainable, renewable and clean energy. There are abundant wind resources in Yunnan province, China. In recent years, wind power integration has developed rapidly in Yunnan province. With the first batch of the wind farm being built and a part of them going into production in Yunnan, the wind power resources will be large-scale developed and utilized in the future. Based on the w...

Journal: :Applied Mathematics and Computation 2013
Rasul Enayatifar Moslem Yousefi Abdul Hanan Abdullah Amer Nordin Darus

A novel multi-objective evolutionary algorithm (MOEA) is developed based on Imperialist Competitive Algorithm (ICA), a newly introduced evolutionary algorithm (EA). Fast non-dominated sorting and the Sigma method are employed for ranking the solutions. The algorithm is tested on six well-known test functions each of them incorporate a particular feature that may cause difficulty to MOEAs. The n...

2013
M. Ghaffari

This paper presents a computational intelligence approach for coping with bullwhip effect in supply chains (SCs). An imperialist competitive algorithm (ICA) is employed to decrease the bullwhip effect and cost (inventory, ordering and production) in the MIT beer distribution game. The ICA is used to determine the optimal ordering policy for members of the SC. The results shows the ability of th...

Journal: :international journal of information, security and systems management 2015
farhad rad seyed reza hosseinpour hamid parvin

faults in computer networks may result in millions of dollars in cost. faults in a network need to be localized and repaired to keep the health of the network. fault management systems are used to keep today’s complex networks running without significant cost, either by using active techniques or passive techniques. in this paper, we propose a novel approach based on imperialist competitive alg...

2012
Anuradha S deshpande

Abstract Presented work has made an attempt to establish details of connectivity of Wind Farms with isolated installations. Paper has shown ACDC-AC connectivity of wind farm through Rectifier inverter to an AC load. Mat Lab simulation results of wind farm connectivity to an AC load of lumped type is done. Developed work has focussed on necessity of energy storage during high wind situations so ...

Faults in computer networks may result in millions of dollars in cost. Faults in a network need to be localized and repaired to keep the health of the network. Fault management systems are used to keep today’s complex networks running without significant cost, either by using active techniques or passive techniques. In this paper, we propose a novel approach based on imperialist competitive alg...

Journal: :journal of artificial intelligence in electrical engineering 2012
saeid jalilzade mehdi mardani

measurement of magnitude and frequency of the voltage flicker is very important for monitoring andcontrolling voltage flicker efficiently to improve the network power quality. this paper presents twonew methods for measurement of flicker signal parameters using shuffled frog leaping algorithm(sfla) and imperialist competitive algorithm (ica). this paper estimates fundamental voltage andflicker ...

In this study, a novel approach which uses combination of steganography and cryptography for hiding information into digital images as host media is proposed. In the process, secret data is first encrypted using the mono-alphabetic substitution cipher method and then the encrypted secret data is embedded inside an image using an algorithm which combines the random patterns based on Space Fillin...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید