Results 21 to 30 of about 4,573,671 (268)
Fast Searching Strategy for Critical Cascading Paths Toward Blackouts
The analysis of severe cascading blackouts is an essential issue in power grid planning and operation. As there are a tremendous number of possible cascade paths in a large power system, it is very challenging to determine the critical cascading paths ...
Zhiyuan Ma +4 more
doaj +1 more source
In order to solve the problems of soaring costs and supply fluctuation in permanent magnet materials, this paper investigates and develops a magnetless wound field synchronous motor (WFSM) drive system for electric vehicle (EV) application.
Yanhui Li +3 more
doaj +1 more source
Generating Sequences and Key Polynomials
The main goal of this paper is to study the different definitions of generating sequences appearing in the literature. We present these definitions and show that under certain situations they are equivalent. We also present an example that shows that they are not, in general, equivalent.
Barnabé, M. S., Novacoski, J.
openaire +3 more sources
With the rapid growth of grid-connected wind power penetration level, it is necessary to study the impacts of wind power on power system stability. The small-signal stability of power systems with large-scale wind power is explored using the eigenvalue ...
Nan Ding +3 more
doaj +1 more source
An innovative hybrid energy system consisting of a waste-to-energy unit and a coal-fired power unit is designed to enhance the energy recovery of waste and decrease the investment costs of waste-to-energy unit.
Yuanyuan Zhang +6 more
doaj +1 more source
Multi-dimensional key generation of ICMetrics for cloud computing [PDF]
Despite the rapid expansion and uptake of cloud based services, lack of trust in the provenance of such services represents a significant inhibiting factor in the further expansion of such service.
Haciosman, Mustafa +3 more
core +2 more sources
The Capacity Region of the Source-Type Model for Secret Key and Private Key Generation [PDF]
The problem of simultaneously generating a secret key (SK) and private key (PK) pair among three terminals via public discussion is investigated, in which each terminal observes a component of correlated sources.
Lai, Lifeng +3 more
core +1 more source
Performance Analysis of a Coal-Fired External Combustion Compressed Air Energy Storage System
Compressed air energy storage (CAES) is one of the large-scale energy storage technologies utilized to provide effective power peak load shaving. In this paper, a coal-fired external combustion CAES, which only uses coal as fuel, is proposed.
Wenyi Liu +5 more
doaj +1 more source
Secondary flow loss accounts for a large proportion of the internal flow loss in turbine stages. The use of end-wall fences can effectively reduce secondary flow loss. In this study, the White cascade was taken as the research object, and the position of
Xu Han +5 more
doaj +1 more source
Security proof of differential phase shift quantum key distribution in the noiseless case [PDF]
Differential phase shift quantum key distribution systems have a high potential for achieving high speed key generation. However, its unconditional security proof is still missing, even though it has been proposed for many years.
Fung, Chi-Hang Fred +3 more
core +2 more sources

