Results 21 to 30 of about 4,573,671 (268)

Fast Searching Strategy for Critical Cascading Paths Toward Blackouts

open access: yesIEEE Access, 2018
The analysis of severe cascading blackouts is an essential issue in power grid planning and operation. As there are a tremendous number of possible cascade paths in a large power system, it is very challenging to determine the critical cascading paths ...
Zhiyuan Ma   +4 more
doaj   +1 more source

Investigation and Development of the Brushless and Magnetless Wound Field Synchronous Motor Drive System for Electric Vehicle Application

open access: yesWorld Electric Vehicle Journal, 2023
In order to solve the problems of soaring costs and supply fluctuation in permanent magnet materials, this paper investigates and develops a magnetless wound field synchronous motor (WFSM) drive system for electric vehicle (EV) application.
Yanhui Li   +3 more
doaj   +1 more source

Generating Sequences and Key Polynomials

open access: yesMichigan Mathematical Journal, 2023
The main goal of this paper is to study the different definitions of generating sequences appearing in the literature. We present these definitions and show that under certain situations they are equivalent. We also present an example that shows that they are not, in general, equivalent.
Barnabé, M. S., Novacoski, J.
openaire   +3 more sources

Simplified equivalent models of large-scale wind power and their application on small-signal stability

open access: yesJournal of Modern Power Systems and Clean Energy, 2013
With the rapid growth of grid-connected wind power penetration level, it is necessary to study the impacts of wind power on power system stability. The small-signal stability of power systems with large-scale wind power is explored using the eigenvalue ...
Nan Ding   +3 more
doaj   +1 more source

Performance Analysis of a Waste-to-Energy System Integrated with the Steam–Water Cycle and Urea Hydrolysis Process of a Coal-Fired Power Unit

open access: yesApplied Sciences, 2022
An innovative hybrid energy system consisting of a waste-to-energy unit and a coal-fired power unit is designed to enhance the energy recovery of waste and decrease the investment costs of waste-to-energy unit.
Yuanyuan Zhang   +6 more
doaj   +1 more source

Multi-dimensional key generation of ICMetrics for cloud computing [PDF]

open access: yes, 2015
Despite the rapid expansion and uptake of cloud based services, lack of trust in the provenance of such services represents a significant inhibiting factor in the further expansion of such service.
Haciosman, Mustafa   +3 more
core   +2 more sources

The Capacity Region of the Source-Type Model for Secret Key and Private Key Generation [PDF]

open access: yes, 2014
The problem of simultaneously generating a secret key (SK) and private key (PK) pair among three terminals via public discussion is investigated, in which each terminal observes a component of correlated sources.
Lai, Lifeng   +3 more
core   +1 more source

Performance Analysis of a Coal-Fired External Combustion Compressed Air Energy Storage System

open access: yesEntropy, 2014
Compressed air energy storage (CAES) is one of the large-scale energy storage technologies utilized to provide effective power peak load shaving. In this paper, a coal-fired external combustion CAES, which only uses coal as fuel, is proposed.
Wenyi Liu   +5 more
doaj   +1 more source

Optimization of end-wall fence in turbine based on response surface methodology and genetic algorithm

open access: yesCase Studies in Thermal Engineering, 2023
Secondary flow loss accounts for a large proportion of the internal flow loss in turbine stages. The use of end-wall fences can effectively reduce secondary flow loss. In this study, the White cascade was taken as the research object, and the position of
Xu Han   +5 more
doaj   +1 more source

Security proof of differential phase shift quantum key distribution in the noiseless case [PDF]

open access: yes, 2008
Differential phase shift quantum key distribution systems have a high potential for achieving high speed key generation. However, its unconditional security proof is still missing, even though it has been proposed for many years.
Fung, Chi-Hang Fred   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy