期刊文献+
共找到1,958篇文章
< 1 2 98 >
每页显示 20 50 100
Edge Computing-Based Joint Client Selection and Networking Scheme for Federated Learning in Vehicular IoT 被引量:6
1
作者 Wugedele Bao Celimuge Wu +3 位作者 Siri Guleng Jiefang Zhang Kok-Lim Alvin Yau Yusheng Ji 《China Communications》 SCIE CSCD 2021年第6期39-52,共14页
In order to support advanced vehicular Internet-of-Things(IoT)applications,information exchanges among different vehicles are required to find efficient solutions for catering to different application requirements in ... In order to support advanced vehicular Internet-of-Things(IoT)applications,information exchanges among different vehicles are required to find efficient solutions for catering to different application requirements in complex and dynamic vehicular environments.Federated learning(FL),which is a type of distributed learning technology,has been attracting great interest in recent years as it performs knowledge exchange among different network entities without a violation of user privacy.However,client selection and networking scheme for enabling FL in dynamic vehicular environments,which determines the communication delay between FL clients and the central server that aggregates the models received from the clients,is still under-explored.In this paper,we propose an edge computing-based joint client selection and networking scheme for vehicular IoT.The proposed scheme assigns some vehicles as edge vehicles by employing a distributed approach,and uses the edge vehicles as FL clients to conduct the training of local models,which learns optimal behaviors based on the interaction with environments.The clients also work as forwarder nodes in information sharing among network entities.The client selection takes into account the vehicle velocity,vehicle distribution,and the wireless link connectivity between vehicles using a fuzzy logic algorithm,resulting in an efficient learning and networking architecture.We use computer simulations to evaluate the proposed scheme in terms of the communication overhead and the information covered in learning. 展开更多
关键词 vehicular IoT federated learning client selection networking scheme
在线阅读 下载PDF
Evaluation of Scheme Design of Blast Furnace Based on Artificial Neural Network 被引量:3
2
作者 TANG Hong LI Jing-min +2 位作者 YAO Bi-qiang LIAO Hong-fu YAO Jin 《Journal of Iron and Steel Research International》 SCIE EI CAS CSCD 2008年第3期1-4,36,共5页
Blast furnace scheme design is very important, since it directly affects the performance, cost and configuration of the blast furnace. An evaluation approach to furnace scheme design was brought forward based on artif... Blast furnace scheme design is very important, since it directly affects the performance, cost and configuration of the blast furnace. An evaluation approach to furnace scheme design was brought forward based on artificial neural network. Ten independent parameters which determined a scheme design were proposed. The improved threelayer BP network algorithm was used to build the evaluation model in which the 10 independent parameters were taken as input evaluation indexes and the degree to which the scheme design satisfies the requirements of the blast furnace as output. It was trained by the existing samples of the scheme design and the experts' experience, and then tested by the other samples so as to develop the evaluation model. As an example, it is found that a good scheme design of blast furnace can be chosen by using the evaluation model proposed. 展开更多
关键词 blast furnace artificial neural network scheme design
原文传递
SEMANTIC NETWORK PRESENTATION OF MECHANICAL MOTION SCHEME AND ITS MECHANISM TYPES SELECTION METHOD 被引量:2
3
作者 Ye Zhigang Zou Huijun +1 位作者 Zhang Qing Tian Yongli School of Mechanical Engineering,Shanghai Jiaotong University,Shanghai 200030, China 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2004年第2期253-256,共4页
The presentation method of the mechanical motion scheme must support thewhole process of conceptual design. To meet the requirement, a semantic network method is selectedto represent process level, action level, mecha... The presentation method of the mechanical motion scheme must support thewhole process of conceptual design. To meet the requirement, a semantic network method is selectedto represent process level, action level, mechanism level and relationships among them. Computeraided motion cycle chart exploration can be realized by the representation and revision of timecoordination of mechanism actions and their effect on the design scheme. The uncertain reasoningtechnology based on semantic network is applied in the mechanism types selection of the needledriving mechanism of industrial sewing mechanism, and the application indicated it is correct,useful and advance. 展开更多
关键词 Semantic network scheme design Closeness degree Motion cycle chart Mechanical motion scheme
在线阅读 下载PDF
CONTROL SCHEMES FOR CMAC NEURAL NETWORK-BASED VISUAL SERVOING 被引量:1
4
作者 Wang HuamingXi WenmingZhu JianyingDepartment of Mechanical andElectrical Engineering,Nanjing University of Aeronauticsand Astronautics,Nanjing 210016, China 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2003年第3期256-259,共4页
In IBVS (image based visual servoing), the error signal in image space should be transformed into the control signal in the input space quickly. To avoid the iterative adjustment and complicated inverse solution of im... In IBVS (image based visual servoing), the error signal in image space should be transformed into the control signal in the input space quickly. To avoid the iterative adjustment and complicated inverse solution of image Jacobian, CMAC (cerebellar model articulation controller) neural network is inserted into visual servo control loop to implement the nonlinear mapping. Two control schemes are used. Simulation results on two schemes are provided, which show a better tracking precision and stability can be achieved using scheme 2. 展开更多
关键词 CMAC Neural network Control scheme Visual servoing
在线阅读 下载PDF
A Transductive Scheme Based Inference Techniques for Network Forensic Analysis 被引量:1
5
作者 TIAN Zhihong JIANG Wei LI Yang 《China Communications》 SCIE CSCD 2015年第2期167-176,共10页
Network forensics is a security infrastructure,and becomes the research focus of forensic investigation.However many challenges still exist in conducting network forensics:network has produced large amounts of data;th... Network forensics is a security infrastructure,and becomes the research focus of forensic investigation.However many challenges still exist in conducting network forensics:network has produced large amounts of data;the comprehensibility of evidence extracting from collected data;the efficiency of evidence analysis methods,etc.To solve these problems,in this paper we develop a network intrusion forensics system based on transductive scheme that can detect and analyze efficiently computer crime in networked environments,and extract digital evidence automatically.At the end of the paper,we evaluate our method on a series of experiments on KDD Cup 1999 dataset.The results demonstrate that our methods are actually effective for real-time network forensics,and can provide comprehensible aid for a forensic expert. 展开更多
关键词 network forensics transductive scheme security digital evidence
在线阅读 下载PDF
Neural Network Based Multi-level Fuzzy Evaluation Model for Mechanical Kinematic Scheme
6
作者 BO Ruifeng,LI Ruiqin (Department of Mechanical Engineering,North University of China,Taiyuan 030051,China) 《武汉理工大学学报》 CAS CSCD 北大核心 2006年第S1期301-306,共6页
To implement a quantificational evaluation for mechanical kinematic scheme more effectively,a multi-level and multi-objective evaluation model is presented using neural network and fuzzy theory. Firstly,the structure ... To implement a quantificational evaluation for mechanical kinematic scheme more effectively,a multi-level and multi-objective evaluation model is presented using neural network and fuzzy theory. Firstly,the structure of evaluation model is constructed according to evaluation indicator system. Then evaluation samples are generated and provided to train this model. Thus it can reflect the relation between attributive value and evaluation result,as well as the weight of evaluation indicator. Once evaluation indicators of each candidate are fuzzily quantified and fed into the trained network model,the corresponding evaluation result is outputted and the best alternative can be selected. Under this model,expert knowledge can be effectively acquired and expressed,and the quantificational evaluation can be implemented for kinematic scheme with multi-level evaluation indicator system. Several key problems on this model are discussed and an illustration has demonstrated that this model is feasible and can be regarded as a new idea for solving kinematic scheme evaluation. 展开更多
关键词 NEURAL network mechanical KINEMATIC scheme MULTI-LEVEL evaluation model FUZZY
在线阅读 下载PDF
A Hybrid Cache Placement Scheme for Multi-Hop Wireless Service Network
7
作者 YU Xin, FENG Dan School of Computer Science and Technology/Wuhan National Laboratory for Optoelectronics, Huazhong University of Science and Technology, Wuhan 430074, Hubei, China 《Wuhan University Journal of Natural Sciences》 CAS 2010年第4期308-314,共7页
In this paper,a hybrid cache placement scheme for multihop wireless service networks is proposed. In this scheme,hot nodes in data transferring path are mined up by means of rout-ing navigation graph,and whole network... In this paper,a hybrid cache placement scheme for multihop wireless service networks is proposed. In this scheme,hot nodes in data transferring path are mined up by means of rout-ing navigation graph,and whole network is covered with network clustering scheme. A hot node has been chosen for cache place-ment in each cluster,and the nodes within a cluster access cache data with no more than two hops. The cache placement scheme reduces data access latency and workload of the server node. It also reduces the average length of data transferring,which means that fewer nodes are involved. The network system energy con-sumption decreased as involved relay nodes reduced. The per-formance analysis shows that the scheme achieves significant system performance improvement in network environment,with a large number of nodes. 展开更多
关键词 multihop wireless service network hybrid cache placement scheme association rule mining CLUSTER
原文传递
Defending Against Link Failure in Virtual Network Embedding Using a Hybrid Scheme 被引量:3
8
作者 Jianjian Ai Hongchang Chen +1 位作者 Zehua Guo Guozhen Cheng 《China Communications》 SCIE CSCD 2019年第1期129-138,共10页
Nowadays network virtualization is utterly popular.As a result,how to protect the virtual networks from attacking on the link is increasingly important.Existing schemes are mainly backup-based,which suffer from data l... Nowadays network virtualization is utterly popular.As a result,how to protect the virtual networks from attacking on the link is increasingly important.Existing schemes are mainly backup-based,which suffer from data loss and are helpless to such attacks like data tampering.To offer high security level,in this paper,we first propose a multipath and decision-making(MD) scheme which applies multipath simultaneously delivery and decision-making for protecting the virtual network.Considering different security requirement for virtual link,we devise a hybrid scheme to protect the virtual links.For the critical links,MD scheme is adopted.For the other links,we adopt the Shared Backup Scheme.Our simulation results indicate the proposed scheme can significantly increase the security level of the critical link high in the loss of less acceptance ratio. 展开更多
关键词 network VIRTUALIZATION VIRTUAL LINK security MULTIPATH and DECISION-MAKING hybrid scheme
在线阅读 下载PDF
Development of Virtual Reference Station in Kinematic Schemes of Geodetic GPS Network Using the Method of Maximum Informative Zone
9
作者 Arif Shafayat Mehdiyev Ramiz Ahmed Eminov Hikmat Hamid Asadov 《Positioning》 2013年第4期267-270,共4页
The factual data on error of positioning in VRS GPS networks have been analyzed, where the mobile receiver is provided with VRS. The method of highly informative zone is suggested for removal of initial vagueness in s... The factual data on error of positioning in VRS GPS networks have been analyzed, where the mobile receiver is provided with VRS. The method of highly informative zone is suggested for removal of initial vagueness in selection of reference stations for purposes of development of VRS on the basis of minimum GPS network, composed of three reference stations. The recommendations on use of suggested method are given. 展开更多
关键词 GPS Receiver Virtual Reference STATION KINEMATIC schemeS POSITIONING GEODETIC network
在线阅读 下载PDF
Performance Analysis of an Enhanced Load Balancing Scheme for Wireless Sensor Networks
10
作者 Adeniran Oluwaranti Dauda Ayanda 《Wireless Sensor Network》 2011年第8期275-282,共8页
Research interest in sensor networks routing largely considers minimization of energy consumption as a major performance criterion to provide maximum sensors network lifetime. When considering energy conservation, rou... Research interest in sensor networks routing largely considers minimization of energy consumption as a major performance criterion to provide maximum sensors network lifetime. When considering energy conservation, routing protocols should also be designed to achieve fault tolerance in communications. Moreover, due to dynamic topology and random deployment, incorporating reliability into protocols for WSNs is very important. Hence, we propose an improved scalable clustering-based load balancing scheme (SCLB) in this paper. In SCLB scheme, scalability is achieved by dividing the network into overlapping multihop clusters each with its own cluster head node. Simulation results show that the proposed scheme achieves longer network lifetime with desirable reliability at the initial state compare with the existing multihop load balancing approach. 展开更多
关键词 Wireless Sensor networks Energy CONSUMPTION SCALABLE Clustering-Based LOAD Balancing scheme Reliability
在线阅读 下载PDF
Incentive Schemes of Nodes for Ad Hoc and Multi-hop Cellular Networks
11
作者 Wang Kun Wu Meng 《China Communications》 SCIE CSCD 2007年第4期79-88,共10页
Nodes cooperation is a significant prerequisite for the realization of the relaying Ad Hoc.While with the development of multi-hop cellular networks, how to stimulate intermediate nodes to do the packet-forwarding des... Nodes cooperation is a significant prerequisite for the realization of the relaying Ad Hoc.While with the development of multi-hop cellular networks, how to stimulate intermediate nodes to do the packet-forwarding deserves more concerning.At present research,the incentive schemes in pure Ad Hoc and multi-hop cellular networks are analyzed and compared to classify the strengths and drawbacks of each scheme.We explain in particular what the key issues are to implement incentive schemes for cooperation. Finally,an incentive scheme based on integration of reputation and charging systems is proposed not only to block the existence of selfish nodes,but to satisfy the rational requirement of nodes. 展开更多
关键词 node cooperation INCENTIVE scheme in-depth SUMMARY MULTI-HOP cellular networks Ad HOC security
在线阅读 下载PDF
A Dual-Channel Secure Transmission Scheme for Internet-Based Networked Control Systems
12
作者 田德振 戴亚平 +1 位作者 胡敬炉 平泽宏太郎 《Journal of Beijing Institute of Technology》 EI CAS 2010年第2期183-190,共8页
Two significant issues in Internet-based networked control systems ( INCSs), transport performance of different protocols and security breach from Internet side, are investigated. First, for improving the performanc... Two significant issues in Internet-based networked control systems ( INCSs), transport performance of different protocols and security breach from Internet side, are investigated. First, for improving the performance of data transmission, user datagram protocol (UDP) is adopted as the main stand for controllers and plants using INCSs. Second, a dual-channel secure transmission scheme (DCSTS)based on data transmission characteristics of INCSs is proposed, in which a raw UDP channel and a secure TCP (transmission control protocol) connection making use of SSL/TLS (secure sockets layer/transport layer security) are included. Further, a networked control protocol (NCP) at application layer for supporting DCSTS between the controllers and plants in INCSs is designed, and it also aims at providing a universal communication mechanism for interoperability of devices among the networked control laboratories in Beijing Institute of Technology of China, Central South University of China and Tokyo University of Technology of Japan. By means of a networked single-degree-of-free- dom robot arm, an INCS under the new protocol and security environment is created. Compared with systems such as IPSec or SSL/TLS, which may cause more than 91% network throughput deduction, the new DCSTS protocol may yield results ten times better, being just 5.67%. 展开更多
关键词 Internet-based networked control system (INCS) networked control protocol(NCP) dual-channel secure transmission scheme(DCSTS)
在线阅读 下载PDF
Two-Phase Bidirectional Dual-Relay Selection Strategy for Wireless Relay Networks 被引量:1
13
作者 Samer Alabed Issam Maaz Mohammad Al-Rabayah 《Computers, Materials & Continua》 SCIE EI 2021年第10期539-553,共15页
In this article,we introduce a new bi-directional dual-relay selection strategy with its bit error rate(BER)performance analysis.During the first step of the proposed strategy,two relays out of a set of N relay-nodes ... In this article,we introduce a new bi-directional dual-relay selection strategy with its bit error rate(BER)performance analysis.During the first step of the proposed strategy,two relays out of a set of N relay-nodes are selected in a way to optimize the system performance in terms of BER,based on the suggested algorithm which checks if the selected relays using the maxmin criterion are the best ones.In the second step,the chosen relay-nodes perform an orthogonal space-time coding scheme using the two-phase relaying protocol to establish a bi-directional communication between the communicating terminals,leading to a significant improvement in the achievable coding and diversity gain.To further improve the overall system performance,the selected relay-nodes apply also a digital network coding scheme.Furthermore,this paper discusses the analytical approximation of the BER performance of the proposed strategy,where we prove that the analytical results match almost perfectly the simulated ones.Finally,our simulation results show that the proposed strategy outperforms the current state-of-the-art ones. 展开更多
关键词 Two-way wireless relay networks cooperative diversity techniques distributed space-time coding relay selection strategies network coding schemes
在线阅读 下载PDF
Attribute-Based Re-Encryption Scheme in the Standard Model 被引量:4
14
作者 GUO Shanqing ZENG Yingpei +1 位作者 WEI Juan XU Qiuliang 《Wuhan University Journal of Natural Sciences》 CAS 2008年第5期621-625,共5页
In this paper, we propose a new attribute-based proxy re-encryption scheme, where a semi-trusted proxy, with some additional information, can transform a ciphertext under a set of attributes into a new ciphertext unde... In this paper, we propose a new attribute-based proxy re-encryption scheme, where a semi-trusted proxy, with some additional information, can transform a ciphertext under a set of attributes into a new ciphertext under another set of attributes on the same message, but not vice versa, furthermore, its security was proved in the standard model based on decisional bilinear Diffie-Hellman assumption. This scheme can be used to realize fine-grained selectively sharing of encrypted data, but the general proxy rencryption scheme severely can not do it, so the proposed schemecan be thought as an improvement of general traditional proxy re-encryption scheme. 展开更多
关键词 ATTRIBUTE-BASED re-encryption scheme standard model network storage
在线阅读 下载PDF
Protection Strategies against Cascading Failure for Power Systems of Ring Network 被引量:1
15
作者 Arun Kumar Hnin Yu Shwe Peter Han Joo Chong 《Communications and Network》 2016年第2期67-78,共12页
Power grid vulnerability is a key issue with large blackouts, causing power disruption for millions of people. The complexity of power grid, together with excessive number of components, makes it difficult to be model... Power grid vulnerability is a key issue with large blackouts, causing power disruption for millions of people. The complexity of power grid, together with excessive number of components, makes it difficult to be modeled. Currently, researchers use complex networks to model and study the performance of power grids. In fact, power grids can be modeled into a complex network by making use of ring network topology, with substations and transmission lines denoted as nodes and edges, respectively. In this paper, three protection schemes are proposed and their effectiveness in protecting the power network under high and low-load attacks is studied. The proposed schemes, namely, Cascaded Load Cut-off (CLC), Cascaded Load Overflow (CLO) and Adaptive-Cascaded Load Overflow (A-CLO), improve the robustness of the power grids, i.e., decrease the value of critical tolerance. Simulation results show that CLC and CLO protection schemes are more effective in improving the robustness of networks than the A-CLO protection scheme. However, the CLC protection scheme is effective only at the expense that certain percentage of the network will have no power supply. Thus, results show that the CLO protection scheme dominates the other protection schemes, CLC and A-CLO, in terms of the robustness of the network, improved with the precise amount of load cut-off determined. 展开更多
关键词 Electric Power Grid Cascading Failure Protection schemes networkS
在线阅读 下载PDF
A Comprehensive Review of Protection Schemes for Distributed Generation 被引量:1
16
作者 Umair Shahzad Sohrab Asgarpoor 《Energy and Power Engineering》 2017年第8期430-463,共34页
Due to the increasing demand of energy and the need for nonconventional energy sources, distributed generation (DG) has come into play. The trend of unidirectional power flow has been gradually shifting. With new tech... Due to the increasing demand of energy and the need for nonconventional energy sources, distributed generation (DG) has come into play. The trend of unidirectional power flow has been gradually shifting. With new technology comes new challenges, the introduction of DG into the conventional power system brings various challenges;one of the major challenges is system protection under DG sources. These sources pose a significant challenge due to bidirectional flows from DGs as well as lower fault current contribution from inverter interfaced DGs. This paper reviews existing protection schemes that have been suggested for active distribution networks. Most of these protection strategies apply only to smaller distribution systems implying that they may need to be extended to larger systems with a much higher penetration of distributed generation. In the end, a potential protection scheme has also been recommended as a future work. 展开更多
关键词 Distributed Generation (DG) Energy PROTECTION schemeS ACTIVE DISTRIBUTION networks
暂未订购
A Beamforming Technique Using Rotman Lens Antenna for Wireless Relay Networks
17
作者 Samer Alabed Mohammad Al-Rabayah Wael Hosny Fouad Aly 《Computers, Materials & Continua》 SCIE EI 2022年第12期5641-5653,共13页
Rotman lens,which is a radio frequency beam-former that consists of multiple input and multiple output beam ports,can be used in industrial,scientific,and medical applications as a beam steering device.The input ports... Rotman lens,which is a radio frequency beam-former that consists of multiple input and multiple output beam ports,can be used in industrial,scientific,and medical applications as a beam steering device.The input ports collect the signals to be propagated through the lens cavity toward the output ports before being transmitted by the antenna arrays to the destination in order to enhance the error performance by optimizing the overall signal to noise ratio(SNR).In this article,a low-cost Rotman lens antenna is designed and deployed to enhance the overall performance of the conventional cooperative communication systems without needing any additional power,extra time or frequency slots.In the suggested system,the smart Rotman lens antennas generate a beam steering in the direction of the destination to maximize the received SNR at the destination by applying the proposed optimal beamforming technique.The suggested optimal beamforming technique enjoys high diversity,as well as,low encoding and decoding complexity.Furthermore,we proved the advantages of our suggested strategy through both theoretical results and simulations using Monte Carlo runs.The Monte Carlo simulations show that the suggested strategy enjoys better error performance compared to the current state-of-the-art distributed multiantenna strategies.In addition,the bit error rate(BER)curves drawn from the analytical results are closely matching to those drawn from our conducted Monte Carlo simulations. 展开更多
关键词 Performance analysis smart antenna Rotman lens antenna multiantenna systems wireless relay networks cooperative diversity schemes digital network coding relay selection schemes
在线阅读 下载PDF
Distributed Adaptive Synchronization of Complex Dynamical Network with Unknown Time-varying Weights 被引量:1
18
作者 Hui-Na Feng Jun-Min Li 《International Journal of Automation and computing》 EI CSCD 2015年第3期323-329,共7页
A new approach of adaptive distributed control is proposed for a class of networks with unknown time-varying coupling weights. The proposed approach ensures that the complex dynamical networks achieve asymptotical syn... A new approach of adaptive distributed control is proposed for a class of networks with unknown time-varying coupling weights. The proposed approach ensures that the complex dynamical networks achieve asymptotical synchronization and all the closed-loop signals are bounded. Furthermore, the coupling matrix is not assumed to be symmetric or irreducible and asymptotical synchronization can be achieved even when the graph of network is not connected. Finally, a simulation example shows the feasibility and effectiveness of the approach. 展开更多
关键词 Complex dynamical network SYNCHRONIZATION distributed control adaptive scheme unknown time-varying parameters.
原文传递
Synchronization of impulsively coupled complex networks
19
作者 孙文 陈忠 陈士华 《Chinese Physics B》 SCIE EI CAS CSCD 2012年第5期126-132,共7页
We investigate the synchronization of complex networks,which are impulsively coupled only at discrete instants.Based on the comparison theory of impulsive differential systems,a distributed impulsive control scheme is... We investigate the synchronization of complex networks,which are impulsively coupled only at discrete instants.Based on the comparison theory of impulsive differential systems,a distributed impulsive control scheme is proposed for complex dynamical networks to achieve synchronization.The proposed scheme not only takes into account the influence of all nodes to network synchronization,which depends on the weight of each node in the network,but also provides us with a flexible method to select the synchronized state of the network.In addition,it is unnecessary for the impulsive coupling matrix to be symmetrical.Finally,the proposed control scheme is applied to a chaotic Lorenz network and Chua's circuit network.Numerical simulations are used to illustrate the validity of this control scheme. 展开更多
关键词 complex network impulsive control scheme SYNCHRONIZATION
原文传递
Determination of Effective Load Shedding Schemes in Electric Power Plants 被引量:1
20
作者 Godwin Effiong Priye Kenneth Ainah Jackson Karniliyus 《Energy and Power Engineering》 2020年第10期555-567,共13页
The ability of power system to survive the transition from preloading state to the gradual increase in load and thereafter reach an acceptable operational condition is an indication of transient stability of the syste... The ability of power system to survive the transition from preloading state to the gradual increase in load and thereafter reach an acceptable operational condition is an indication of transient stability of the system. The study analyzed load shedding scheme through the use of empirical measurement tools and load-flow simulation techniques. It was geared towards determining effective load shedding strategies to reduce unnecessary overload in order to achieve dynamic stability of the electric power network in the Export Free Trade Zone, Calabar, Nigeria. From the tests and the measurements taken, it was observed that the real and reactive powers from the generator and the mechanical power from the turbine engine were stable when the load shedding controller was switched on, as compared to when it was off. The engine speed, the bus-bar frequency and the output voltage of the generator stabilized within a shorter time (about 8 seconds) when the controller was switched on than when it was on the off condition. Also, there were noticeable fluctuations in the speed of the remaining two generators. It became stable at about 12 seconds after the loss. The variations were 0.3 per cent of the nominal speed value. The excitation voltage fluctuated from 1.2 (pu) to 4.5 (pu) when the bus voltage dipped as a result of additional load. It then came down and stabilized at 1.8 (pu) after few swings. This confirmed that the stability of power system is much enhanced when load shedding controllers are effectively configured on the network. 展开更多
关键词 Power System Transient Stability Load Shedding scheme Electric Power network
在线阅读 下载PDF
上一页 1 2 98 下一页 到第
使用帮助 返回顶部