The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a simple analytical method for obtaining optimal sizing of Distributed Generator (DG) units considering reduction of power loss and improvement of voltage profile in distribution system. Sensitivity analysis is used to find out the best location of DG placement. The optimum power penetration by DGs operating at unity power factor and lagging power factor is carried out using analytical...
Contingency analysis is an integral part of modern energy management system. Traditionally, contingencies are analyzed to check a predefined, deterministic set of limit violations. Contingencies are then ranked according to the severity of the violations. However, this approach treats all contingency events equally likely; as far as the probability of occurrence is concerned. This paper describes...
The application of Complex Networks have significantly advanced in the last decade and brought about valuable insights to properties of real world systems by evaluating their structure, topology and construction. Similarly here an electric power network is considered as a complex network where its buses are the nodes and edges are the links of a complex network graph respectively. Power grid Vulnerability...
In a deregulated market environment, the calculation of market power is one of the top priorities of the bodies involved in the market. The bodies generally involved such as the Generation companies (GENCOs), Distribution companies (DISCOs) look towards maximizing profit whereas the RTO/ISOs look to attain a zero market power environment. In this paper, Must Run Share and Nodal Must Run Share (NMRS)...
Among the power system corrective controls, defensive islanding is considered as the last resort to secure the system from severe cascading contingencies. The primary motive of defensive islanding is to limit the affected areas as soon as possible to maintain the stability of the resulting subsystems and to reduce the total loss of load in the system. The design of the defensive islanding must address...
Scientific and reasonable black-start scheme is significant to restoration of a power system from a complete blackout. On the basis of the IAHP (standing for improved analytic hierarchy process) and the fuzzy comprehensive evaluation, a new method to assess back-start scheme is proposed in this paper. First of all, the IAHP is used to determine the index weight. After that, trapezoidal membership...
Splitting control is the last defence of power system emergency control against severe disturbance. With system-level and real-time decision mode, active splitting control shows advantages over traditional splitting control. Unfortunately, searching for splitting section is a NP hard problem. In this paper, a novel active splitting strategy search method inspired by modularity-based network partition...
In this study, as a new index of facilities, business continuity capability on occasion of an energetically isolated operation, was defined and evaluated for the facility with a rich amount of resources such as private generators, a battery energy storage system and a PV generation system. A methodology was proposed to evaluate a duration during which the facility is self- sustaining regarding energy...
With huge penetration of distributed generators (DGs), distribution systems become more and more active and flexible. To accommodate DGs in a much more optimal way, cooperation between transmission networks and distribution networks, even distribution networks and distribution networks, should be further strengthened. A cooperative sequential reconfiguration method is proposed in this paper, which...
This paper presents a method for optimal location, sizing and types of Distributed Generator (DG) used in distribution systems by assessing the reliability and efficiency of system through the SAIDI and SAIFI for measuring. In this paper, DG systems are assumed to be connected to distribution systems at all buses of the IEEE 34 bus test systems. The system reliability is evaluated by using future...
This study assesses the potential impact of high renewable generation on the spot electricity prices, generator revenue and profits in an energy-only electricity market. In particular, it presents modelling outcomes for the Australian National Electricity Market (NEM) with a range of possible renewable penetrations in 2030. It is assumed that the current reliability standard is maintained and participants...
An approach for distribution network planning considering distributed generators(DGs) is proposed in this paper. It determines the optimal placement and capacity of distributed generators in power distribution network without considering the feeder changes and substation upgrades. The corresponding planning model is built and the particle swarm optimization with inertia weight (PSO-w) is used to solve...
Nowadays energy and water are some of the most important issues facing mining industry. Many mines are located in desert areas and they need to pump water from isolated wells or from the ocean. To satisfy the water demand many high power water pump stations are required. The operation of these systems is expensive due to the high-energy cost. This paper presents a case of study of a solar system to...
In this paper, a new method for blind recognition of BCH code from an intercepted sequence of noise affected codewords is proposed. The proposed method recovers the parameters of a BCH code by finding the roots of it's generator polynomial. Firstly, the Galois Field Fourier Transform (GFFT) operation is carried out for each sequence of an estimated length. Then, find the positions of common zero spectral...
Construction of polar code via puncturing and shortening is studied. We propose a reduced full search for finding optimal puncturing pattern of short polar codes.
Aggregate signcryption could verify the multiple messages via a single operation. Most of the identity-based aggregate signcryption are based on random oracle. To exploit the advantage of multilinear maps and erase the key escrow problem, a new Identity-based certificate less aggregate signcryption scheme is proposed. The new scheme is proved to be confidential and unforgeable under the assumption...
Previously we have introduced an inference-based framework for decentralized decision-making, where inferencing over the ambiguities of the self and the others is used to issue decisions. In this setting, we previously introduced the notion of N-inference V-diagnosability to characterize the existence of a disjunctive decentralized diagnosis scheme so that any fault can be detected within bounded...
REST has become a very popular architectural style for service-oriented systems, primarily due to its ease of use and flexibility. However, the lightweight nature of its syntax does not necessitate the use of systematic methods and tools. In this work, we argue that such tools can greatly facilitate complex engineering tasks, including service discovery and evolution. We present the WSDarwin set of...
The seasonal flow distribution into a hydroelectric system is analyzed, without considering reservoirs, in terms of time series for lateral energy inflows and internal flows at generating facilities. Key concepts, such as regulated and unregulated flow are defined and illustrated, in addition to peak shaving energy inputs based on station installed capacities. Therefore spilled energy is compared...
A combinatorial condition called well distributedoccurrences, or WELLDOC for short, has been introducedrecently. The proofs that WELLDOC property holds for thefamily of Sturmian words, and more generally, for Arnoux-Rauzy words are given in two papers by Balkova et al. The WELLDOC property for bounded bi-ideals is analysed inthis paper. The existence of a 1-bounded bi-ideal over thefinite alphabet...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.