this paper presents a new method for the coordination of distance zone-2 and overcurrent relays by using linear programming methods. For this purpose, a topological analysis is first carried out to identify the set of...
详细信息
ISBN:
(纸本)1860433650
this paper presents a new method for the coordination of distance zone-2 and overcurrent relays by using linear programming methods. For this purpose, a topological analysis is first carried out to identify the set of primary and back-up relays. the coordination constraints are then used in the linear programming methods, where for the zone-2 operating time is set independently for each distance relay and the results are compared withthe case where all the zone-2 time settings are the same. three linear programming methods are studied for solving the problem. the methods are tested for a typical interconected network and the results are presented and compared.
this paper presents a fuzzy logic based controller for indirect current control of shunt active power filter. Estimation of fundamental component of the line current is based on its effect on the voltage of the invert...
详细信息
ISBN:
(纸本)1860433650
this paper presents a fuzzy logic based controller for indirect current control of shunt active power filter. Estimation of fundamental component of the line current is based on its effect on the voltage of the inverter DC side capacitor. To improve the classic PI controller used in this scheme, a decaying factor is introduced to its integral part. Proportional and integral gains are constant, but the decaying factor varies according to the system condition. Since the appropriate performance of this controller is greatly dependent on the decaying factor, a fuzzy logic based system is used to determine proper value 'of this parameter, in which the decision is made on the base of the voltage error of the inverter DC side capacitor. Computer simulation of a typical power distribution system with a nonlinear load and shunt active power filter is carried out and the results are presented which imply a better dynamic performance of the proposed scheme compared to the conventional PI controller.
the basic function of power system is to supply electrical energy to both large and small customers as economically as possible, and with an acceptable degree of reliability and quality. Reliability and quality are tw...
详细信息
ISBN:
(纸本)1860433650
the basic function of power system is to supply electrical energy to both large and small customers as economically as possible, and with an acceptable degree of reliability and quality. Reliability and quality are two essential measures and important components of all power system planning and operation procedures. Reliability is one of the key design factors when designing complex, critical and expensive systems. this paper presents a fuzzy logic technique for evaluating the reliability of complex and large power system to deal withtheir imprecise variables. In the proposed technique, fuzzy set theory was used to evaluate the coefficients of different terms in reliability expression. System with hundreds of buses and tens of complex stations can be analyzed using advanced and numerically effective large-scale algorithms for reliability and quality assessment. An advance computer program for large-scale reliability and quality assessment is studied and applied to full-scale model of Saudi Arabia electricity system. the proposed algorithm is very useful to the on-line security assessment of large and complex power system. the results obtained are claimed to have far-reaching implications on various planning and operation aspects of the Saudi power system.
the logic FO(ID) extends classical first order logic with inductive definitions. this paper studies the satisifiability problem for PC(ID), its propositional fragment. We develop a framework for model generation in th...
详细信息
ISBN:
(纸本)354030553X
the logic FO(ID) extends classical first order logic with inductive definitions. this paper studies the satisifiability problem for PC(ID), its propositional fragment. We develop a framework for model generation in this logic, present an algorithm and prove its correctness. As FO(ID) is an integration of classical logic and logicprogramming, our algorithm integrates techniques from SAT and ASP. We report on a prototype system, called MIDL, experimentally validating our approach.
A new exact algorithm for computing answer sets of logic programs is presented and analyzed. the algorithm takes a logic program in Kernel normal form as an input and computes its answer sets by reducing the problem t...
详细信息
A new exact algorithm for computing answer sets of logic programs is presented and analyzed. the algorithm takes a logic program in Kernel normal form as an input and computes its answer sets by reducing the problem to a suitable version of graph colorability. Even though worst-case complexity is exponential, thanks to a straightforward formulation we can prove that the algorithm works in time O*(1.6181n), which is asymptotically better than the trivial bound O*(2n) of the brute force algorithms. We argue that this new algorithm represents a significant progress in terms of worst-case time complexity over traditional branch-and-bound algorithms.
the importance of security issues in network environments has increased greatly lately. Intrusion detection systems play an important role in network security environments. Nevertheless, nowadays, data network speed i...
详细信息
the importance of security issues in network environments has increased greatly lately. Intrusion detection systems play an important role in network security environments. Nevertheless, nowadays, data network speed is so high that performing intrusion detection tasks becomes challenging. this paper presents a software architecture that intends to exploit the parallelism available on up-to-date and future workstations to apply intrusion detection rules in high speed networks. To achieve this, a shared memory multiprocessor system has been developed. the system includes a powerful rule language that adds big flexibility to the system.
Requirements are individual statements, usually expressed in a form of natural language, specifying the behaviour and constraints of a proposed system. Due to the intrinsic value of correct requirements, it is therefo...
详细信息
Requirements are individual statements, usually expressed in a form of natural language, specifying the behaviour and constraints of a proposed system. Due to the intrinsic value of correct requirements, it is therefore essential for the process to be implemented correctly and that the requirements themselves reflect the true needs of the proposed system. the majority of developed systems introduce the concerns of privacy and security, however, traditional requirements engineering techniques have not addressed these issues appropriately. Further, the concepts of privacy, security, and the interrelated concept of trust, have not been accurately defined in terms of requirements engineering. Natural language is shown to be the most prevalent form of knowledge used to represent requirements, however, natural language introduces a number of inherent problems which can lead to ambiguity and specifications open to interpretation. When reasoning with privacy and security concerns the resulting specification should be both clear and concise in the stipulation of requirements. therefore, before attempting to model privacy and security at the requirements engineering level, it is essential to have an understanding and appreciation of the issues involved. Consideration is given to the various concerns that would effect methodology development and once assessed a possible approach to modelling privacy and security requirements is highlighted.
Elliptic curve cryptography (ECC) is based in one of the hardest arithmetic problems, the elliptic curve discrete logarithm problem, making ECC a reliable cryptographic technique. In addition to this advantage, ECC re...
详细信息
Elliptic curve cryptography (ECC) is based in one of the hardest arithmetic problems, the elliptic curve discrete logarithm problem, making ECC a reliable cryptographic technique. In addition to this advantage, ECC requires shorter keys compared to other public key algorithms, which suggests its use in low-end systems such as smart cards because of its efficiency and limited hardware requirements. Currently the leading smart card technology is Java card. though both Java 2 standard edition (J2SE) 5.0 and Java card (JC) 2.2.1 include classes and interfaces making ECC available to Java programs, they are not complete, making it necessary to use additional, non-standard packages if the programmer wants to use ECC for different operations (digital signature, data encryption and decryption, etc.). In the present work, we provide a complete review of the state of the art of ECC in J2SE and Java card, with a complete list of operations available in both standard implementations and proprietary packages.
In this paper, a fuzzy logic controller and a PID controller are used to control firing angles of TCSC using Matlab Simulink, Power System Blockset and Fuzzy logic Toolbox. the graphic interface of Simulink provides a...
详细信息
In this paper, a fuzzy logic controller and a PID controller are used to control firing angles of TCSC using Matlab Simulink, Power System Blockset and Fuzzy logic Toolbox. the graphic interface of Simulink provides a user-friendly environment where the power circuit and control system are represented in the same diagram. the design and testing of TCSC are verified using the Matlab environment. the studied power system is a simple two-bus system with distributed parameter line. the simulation results show that the fuzzy logic controller can generate better dynamic response.
the paper presents a new method for the coordination of distance zone-2 and overcurrent relays by using linear programming methods. For this purpose, a topological analysis is first carried out to identify the set of ...
详细信息
the paper presents a new method for the coordination of distance zone-2 and overcurrent relays by using linear programming methods. For this purpose, a topological analysis is first carried out to identify the set of primary and back-up relays. the coordination constraints are then used in the linear programming methods, where, for zone-2, operating time is set independently for each distance relay and the results are compared withthe case where all the zone-2 time settings are the same. three linear programming methods are studied for solving the problem. the methods are tested for a typical interconnected network and the results are presented and compared.
暂无评论