Search
Now showing items 1-10 of 252
Power system security assessment with high wind penetration using the farms models based on their correlation
Year: 2018
Abstract:
Abstract: Increasing the wind energy penetration in a power system presents some technical challenges to the transmission
expansion planning (TEP). In the first stage of TEP, the transmission bottlenecks should be ...
Efficient modular multiplication algorithms for public key cryptography
Publisher: IEEE
Year: 2014
Synthesis of ESOP-based reversible logic using negative polarity reed-muller form
Publisher: IEEE
Year: 2014
LED Traffic Sign Detection Using Rectangular Hough Transform
Publisher: IEEE
Year: 2014
Reconstruction of Security region with high information content using effective attributes extraction
Year: 2016
Abstract:
Secur ity region ‐ based power system operation guides operators in a fast and relevant decision ‐ making process as to what conditions r equire operators' actions. The
key to this approach is the manne r in which ...
Modeling of a sub-THz sheet-beam traveling wave tube amplifier
Publisher: IEEE
Year: 2014