Search
نمایش تعداد 1-10 از 45
Static Security Assessment Using Radial Basis Function Neural Networks Based On Growing And Pruning Method
Power system security is one of the major concerns in recent years due to the deregulation of power systems which are forced to operate under stressed operating conditions. This paper presents a novel method based on growing ...
New sequential approach based on graph traversal algorithm to investigate cascading outages considering correlated wind farms
Abstract: One of the effective methods to reduce the risk of load shedding and its subsequent blackout is to evaluate the risk of
cascading outages and detection of key links in a power system. This risk assessment ...
Fast Voltage and Power Flow Contingency Ranking Using Enhanced Radial Basis Function Neural Network
Deregulation of power system in recent years has changed static security assessment to the major concerns for which fast and accurate evaluation methodology is needed. Contingencies related to voltage violations and power line overloading have been...
On-line Voltage and Power Flow Contingencies Rankings Using Enhanced Radial Basis Function Neural Network and Kernel Principal Compnent Analysis
choose optimal centers and radii. The proposed radial basis function neural network based security assessment algorithm has very small training time and space in comparison with multi-layer perceptron neural networks, support vector machines, and other...
Fast Voltage and Power Flow Contingencies Ranking using Enhanced Radial Basis Function Neural Network
Deregulation of power system in recent years has changed static security
assessment to the major concerns for which fast and accurate evaluation methodology is
needed. Contingencies related to voltage ...
On-line Voltage and Power Flow Contingencies Rankings Using Enhanced Radial Basis Function Neural Network and Kernel Principal Component Analysis
the advantage of being
able to automatically choose optimal centers and radii. The proposed radial basis
function neural network based security assessment algorithm has very small training
time and space in comparison with multi...