Standaard Boekhandel gebruikt cookies en gelijkaardige technologieën om de website goed te laten werken en je een betere surfervaring te bezorgen.
Hieronder kan je kiezen welke cookies je wilt inschakelen:
Technische en functionele cookies
Deze cookies zijn essentieel om de website goed te laten functioneren, en laten je toe om bijvoorbeeld in te loggen. Je kan deze cookies niet uitschakelen.
Analytische cookies
Deze cookies verzamelen anonieme informatie over het gebruik van onze website. Op die manier kunnen we de website beter afstemmen op de behoeften van de gebruikers.
Marketingcookies
Deze cookies delen je gedrag op onze website met externe partijen, zodat je op externe platformen relevantere advertenties van Standaard Boekhandel te zien krijgt.
Je kan maximaal 250 producten tegelijk aan je winkelmandje toevoegen. Verwijdere enkele producten uit je winkelmandje, of splits je bestelling op in meerdere bestellingen.
Power systems security assessment and enhancement is of utmost importance as a result of power systems expansions and operation near their security limits. In this book, the assessment of power system static and transient securities is presented. Different IEEE test systems are subjected to static and transient security classification when prone to different contingencies using novel artificial intelligence techniques based on artificial neural networks and gene expression programming. Results show the superiority of the gene expression programming based algorithm as well as the probabilistic neural network based classifier algorithm in comparison with back-propagation and radial basis function neural network based classifiers. The system static security is enhanced using thyristor controlled series capacitors (TCSC s) installed in series with the lines. A developed approach for placement and sizing of TCSC s is presented based on ranking method together with the simulated annealing optimization technique. The book provides extensive survey of security assessment and enhancement techniques as well as a step by step application guide to assessing and enhancing system security.