Methodologies and Techniques for Network Transmission with Security and Corrective Control
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2014, Vol 2, Issue 2
Abstract
Remedial checks operation techniques can be used to raise the flexibility, to maximize the integration of new generators and to reduce the overall cost. As far as the uncertainties considered, the transmission network should be flexible and economically vigorous. The efficient levels of investment in network reinforcement can be determined by the growth in application of corrective actions to modify the network usage will require a probabilistic treatment of network. A new algorithm is proposed within the developed benders decomposition based investment model which can identify outages and filter out those outages which do not contribute to finding the optimum operating solution. A novel filtering technique is use for efficient elimination of redundant outages , presented and successfully tested. The same technique is used for selecting relevant contingencies.. In numerical examples we compare efficiency of network reinforcement propositions under both deterministic and probabilistic frameworks, while optimizing available preventive and corrective control actions, and in particular focusing on the application of generation reserve in combination with special protection schemes (SPS) for network congestion management purposes. We spotlight the deficiency of the deterministic approach with respect to its inherent inability to maximize correctly the portfolio of pre-fault post-fault actions since the impact of right actions (in the form of SPS, demand response) and occurrence of "non-credible" events require explicit consideration of the feasibility of various outages
Authors and Affiliations
Sharyu S. Kankapure, Antara Bhattacharya, Prof. S. J. Karale
Smart Crop-Field Monitoring and Irrigation System Based On IoT
Agriculture is critical to the growth of agrarian countries like India. Agriculture-related issues have long been a roadblock to the country's growth. Smart agriculture, which involves updating existing agricultural tech...
NFC Based Attendance Monitoring System with Facial Authorization
In today’s world, speed and efficiency is what needed to reduce the time of work and performance of an individual or a system. There are alternatives available to speed up the process but it’s too costly to be purchased...
Major Challenges of Recommender System and Related Solutions
Recommender system is a very young area of machine learning & Deep Learning research. The basic goal of the recommender system is to create a relationship between items and consumers. The relationship provides recommenda...
Analysis of Cyber Security Threats Using Machine Learning Techniques
Nowadays malware detection is a problem that researchers have tried to solve for so many years by using enormous type of methods. The behaviors of two given malware variants remain similar, although their signatures coul...
Encryption and Decryption Techniques in Cloud Computing
While big data applications in cloud computing are rapidly growing in popularity, privacy issues have increased dramatically. Encrypting data in real time is one of the most important issues during data processing and tr...