Loading...
Search for: institute-of-electrical-and-electronics-engineers
0.011 seconds

    A novel matrix based systematic approach for vulnerability assessment

    , Article COMPEL - The International Journal for Computation and Mathematics in Electrical and Electronic Engineering ; Volume 40, Issue 1 , 2021 , Pages 1-17 ; 03321649 (ISSN) Sabouhi, H ; Doroudi, A ; Fotuhi Firuzabad, M ; Bashiri, M ; Sharif University of Technology
    Emerald Group Holdings Ltd  2021
    Abstract
    Purpose: This paper aims to propose a novel matrix-based systematic approach for vulnerability assessment. Design/methodology/approach: The proposed method consists of two major steps. First, the power network is modeled as a topological combination of edges (transmission lines, transformers, etc.) and nodes (buses, substations, etc.). The second step is to use an axiomatic design-based index for topology analysis. This index is based on the systematic counting of possible routes from the start (generators) to destination (loads), considering load importance, before and after a disruption. Findings: The effectiveness of the proposed method is demonstrated through an illustrative example and... 

    Day-ahead power system scheduling considering water consumption in power plants

    , Article International Transactions on Electrical Energy Systems ; Volume 29, Issue 12 , 2019 ; 20507038 (ISSN) Badakhshan, S ; Ganjkhani, M ; Safdarian, A ; Li, L ; Sharif University of Technology
    John Wiley and Sons Ltd  2019
    Abstract
    Power generation consumes a substantial amount of water in the power industry. In order to address the impact of water consumption restriction on the power generation, this paper proposes a security-constrained unit commitment (SCUC) formulation considering water consumption impact as an additional constraint. To this end, the water consumption in power plants is formulated. Consequently, the SCUC is extended to consider the consumed water volume as a restricting factor. A procedure is introduced to investigate the most appropriate point of power generation operation to save a vital amount of water by raising reasonable generation costs. The objective of the proposed model is to minimize the... 

    LiFi grid: A machine learning approach to user-centric design

    , Article Applied Optics ; Volume 59, Issue 28 , 2020 , Pages 8895-8901 Pashazanoosi, M ; Nezamalhosseini, S. A ; Salehi, J. A ; Sharif University of Technology
    OSA - The Optical Society  2020
    Abstract
    A novel machine learning (ML) clustering algorithm, named light-fidelity (LiFi) Grid, is proposed to design amorphous cells of LiFi access points (APs) in order to maximize the minimum signal-to-interference-plus-noise ratio (SINR) from the viewpoint of user-centric (UC) network design. The algorithm consists of two phases. Explicitly, the first phase consists of finding clusters of user densities based on the mean-shift (MS) clustering algorithm. In contrast to some other clustering algorithms, such as K-means, MS does not need to know the number of clusters in advance. Furthermore, the combined transmission scheme is assumed in each cell. In the second phase, this paper proposes a novel... 

    A novel matrix based systematic approach for vulnerability assessment

    , Article COMPEL - The International Journal for Computation and Mathematics in Electrical and Electronic Engineering ; 2020 Sabouhi, H ; Doroudi, A ; Fotuhi Firuzabad, M ; Bashiri, M ; Sharif University of Technology
    Emerald Group Holdings Ltd  2020
    Abstract
    Purpose: This paper aims to propose a novel matrix-based systematic approach for vulnerability assessment. Design/methodology/approach: The proposed method consists of two major steps. First, the power network is modeled as a topological combination of edges (transmission lines, transformers, etc.) and nodes (buses, substations, etc.). The second step is to use an axiomatic design-based index for topology analysis. This index is based on the systematic counting of possible routes from the start (generators) to destination (loads), considering load importance, before and after a disruption. Findings: The effectiveness of the proposed method is demonstrated through an illustrative example and...