Inequality Constraints

Network security constraints

Violation of constrains can take place subsequent to
abnormal conditions like a line outage, either
scheduled or forced, which affects the security of the
Sometimes a so called (x-1 study) is performed to
examine the reliability and security of the system
The x-1 study means that the network is studied with
outage of one branch at a time

معلومات عن التدوينة 21 فبراير 2014 عدد الزيارات: (850) عدد التعليقات: 2 الكاتب:iHussam للإبلاغ عن رابط معطوب اضغط هنا للإبلاغ عن رابط معطوب اضغط هنا جميع الحقوق محفوظة ( إتفاقية نقل ونشر المحتوى )

Post a Comment