Projects, Thesis, Final Year Projects, IT, MBA, Seminar
REAL TIMEPOWER SYSTEM SECURIT ASSESSMENT USING ARTIFICIAL NEURAL NETWORKS
Abstract: Contingency analysis of a power system is a major activity in power system planning and operation. In general an outage of one transmission line or transformer may lead to over loads in other branches and/or sudden system voltage rise or drop. The traditional approach of security analysis known as exhaustive security analysis involving the simulation of all conceivable contingencies by full AC load flows, becomes prohibitively costly in terms of time and computing resourcesA new approach using Artificial Neural Network s has been proposed in this paper for real-time network security assessment. Security assessment has two functions the first is violation detection in the actual system operating state. The second, much more demanding, function of security assessment is contingency analysis. In this paper, for the determination of voltage contingency ranking, a method has been suggested, which eliminates misranking and masking effects and security assessment has been determined using Radial Basis Function (RBF) neural network for the real time control of power system. The proposed paradigms are tested on IEEE 14 – bus and 30 – bus systems.
Most Popular Posts
-
A chip architecture that integrates a fingerprint sensor and an identifier in a single chip is proposed. The Fingerprint identifier i...
-
A laptop computer or simply laptop(also note book computer or book). It is small mobile computer which weighs 2-18pounds(1-6kg),dependi...
-
“United we stand, divided we fall”, is the key idea behind grid computing. Grid is a type of parallel and distributed system that enab...
-
The Internet or the global Internet is the internationally connected network of computer networks with addresses that are administrate...
-
Title: Capacity of Frozen Soil for Shallow Tunnel Pre-Support Underneath a Building Founded on Wooden Piles Department Of Civil Engineering ...
-
ABSTRACT: XML, the Extensible Markup Language, which is the best describedas means of structuring data. XML was developed by the XML workin...
-
Communications satellites play a major role in telephone transmission,television and radio program distribution,computer communicatio...
-
ABSTRACT : This paper deals with the process of automatically recognizing who is speaking on the basis of individual information included i...
-
SPREAD SPECTRUM TECHNIQUES AND THEIR APPLICATIONS TO WIRELESS COMMUNICATIONS Spread Spectrum (SS) radio communications is on the v...
-
What is WiMAX? How WiMAX Works? What Can WiMAX Do? Broadband Wireless Access (BWA) has been serving enterprises and operators for yea...
DEAR READERS: As There is problem in www.projectsworld.co.cc It is changed to
www.projectsworlds.blogspot.com
For Any Feedback and Suggestions send mail.
If There is any problem in the Document View or Download please send mail to projectsworld@live.com