Spelling suggestions: "subject:"alectric power systems."" "subject:"delectric power systems.""
41 |
A semi-analytical method for steady-state solution in HVDC analysis /Menemenlis, Nickie. January 1980 (has links)
No description available.
|
42 |
Short-term coordination and fast-recoordination of hydrothermal systems : a new approach using the continuation methodCalderon Giron, L. Rodolfo (Luis Rodolfo) January 1985 (has links)
No description available.
|
43 |
Power system control and stability evaluation using a separation surface techniqueNourmoussavi Nassab, Miraboutaleb. January 1980 (has links)
No description available.
|
44 |
Online energy generation scheduling for microgrids with intermittent energy sources and co-generation. / CUHK electronic theses & dissertations collectionJanuary 2013 (has links)
Lu, Lian. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2013. / Includes bibliographical references (leaves 91-95). / Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web.
|
45 |
Centralised automatic control of power system in emergency state.Poon, Kwok-lim, Steven, January 1977 (has links)
Thesis--M. Phil., University of Hong Kong, 1978.
|
46 |
Eigenvalue sensitivites and their applications to power system voltage stabilityKhan, Atif Zaman 08 1900 (has links)
No description available.
|
47 |
A hybrid approach to power system voltage security assessmentCheng, Carol Shaoyu 12 1900 (has links)
No description available.
|
48 |
Secure operation and planning of electric power systems by pattern recognition by Danny Sik-Kwan Fok.Fok, Danny Sik-Kwan January 1986 (has links)
Electric power systems are characterized by their immense complexity. The assessment of their security on-line has always been a challenging task. Many possibilities were investigated in the past in an attempt to characterize the secure operating region of a power system. Pattern recognition is thus far the only tool that can take various degrees of network complexity into consideration. / In the present study, an efficient algorithm which learns adaptively the secure operating region is proposed. At each iteration, training operating points are generated sequentially on a piecewise linearly approximated separation surface computed by the one-nearest-neighbor (1-NN) rule. The separation surface so estimated approaches the true one as the number of training points increases. The algorithm not only provides a consistent technique in learning an unknown region, it generates a highly efficient training set. It is found to be effective in reducing the size of the training set without adverse effect to the classifier. / Once the secure region of a power system is available, the task of on-line security monitoring reduces to one of determining whether the current operating point resides in the secure region. As demonstrated in the thesis, both the security status and the security margin of the operating point can be assessed very efficiently. By using the piecewise linearly approximated secure region, the thesis proceeds to give efficient ways of moving an insecure operating point into the secure region. This comprises the problem of security enhancement. / The regionwise methodology via the Voronoi diagram developed in the thesis is also applied to a wide range of problems, such as network planning, coordinating tuning of machine parameters and automatic contingency selection. The major merit is that the dynamics and the nonlinearity of the system no longer present a limitation to solving these problems.
|
49 |
Optimal expansion strategy for a developing power system under the conditions of market economy and environmental constraint case of Armenia /Avetisyan, Misak G. January 2006 (has links)
Thesis (M.S.)--Ohio University, August, 2006. / Title from PDF t.p. Includes bibliographical references.
|
50 |
Least action principle for real-time mitigation of angle instability in power systemsSherwood, Michael, January 2007 (has links) (PDF)
Thesis (M.S. in electrical engineering)--Washington State University, December 2007. / Includes bibliographical references (p. 61-62).
|
Page generated in 0.086 seconds