助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   安全性约束 的翻译结果: 查询用时:0.334秒
图标索引 在分类学科中查询
所有学科
更多类别查询

图标索引 历史查询
 

安全性约束
相关语句
  “安全性约束”译为未确定词的双语例句
     An objective function is used that takes into account the security aspects, as well as the physical constraints, and the probabilistic nature of reactive power controllers.
     为了解决该优化问题,本论文提出了一种目标函数,可以在进行无功优化的同时,考虑电力系统中的各种运行条件约束、安全性约束、物理条件约束,以及无功控制器出力限制约束。
短句来源
     Introducing the fictitious generation variables into the model not only guarantees the solvability of the successive linearization from beginning to end, but also enables us to find out the locations and the values of optimal loadshedding if there have to be some load-sheddings to obtain N and N-i security.
     在模型中引入虚拟发电量不但使逐次线性化过程始终有解,而且当必须甩负荷才能满足N及N-1安全性约束时,可给出最优甩负荷的节点及其量值。
短句来源
     It is considered in the model that the power plant limits, voltage limits, overload limits on the line and etc.
     在模型中,考虑了发电机发电极限,电压水平,线路和设备过负荷等安全性约束条件。
短句来源
  相似匹配句对
     Security
     安全性
短句来源
     Discussion of Elctmail's Security
     电子邮件的安全性
短句来源
     Punishment to the violation of thecontract are three kinds: fine, mortgage on the loan and law restrain.
     法律约束
短句来源
     THEORY OF CONSTRAINTS
     约束理论
短句来源
     Safety process for the design and construction of the inertial confinement fusion facility
     惯性约束聚变设施设计建造中的安全性工作
短句来源
查询“安全性约束”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  security constraint
Both the depender and the dependee must agree for the fulfilment of the security constraint in order for the secure dependency to be valid.
      
In such an ITP all loop flows are internal to the ITP and the security constraint bid based dispatch assure that no constraints will be violated.
      
In this work, we have shown that an extension to secure partitioning in which program code and data are replicated to satisfy the security constraint.
      
Probably, security constraint does not facilitate e-payment, whatever the size of companies or their sectoral activity.
      
Secure goals are introduced to the system to help in the achievement of a security constraint.
      
更多          


A successive linear programming model with penalty terms for solving real-time secure economic power dispatch is presented in this paper. It maintains the advantages possessed by the linear programming model, that is, rapid calculation, reliable conver-gency and easy treatment of N and N-1 line-security constraints- At the same time, it settles quite exactly the problem of non-linear cost characteristic by incorporating the differential loss coefficients into the objective function. Introducing the fictitious...

A successive linear programming model with penalty terms for solving real-time secure economic power dispatch is presented in this paper. It maintains the advantages possessed by the linear programming model, that is, rapid calculation, reliable conver-gency and easy treatment of N and N-1 line-security constraints- At the same time, it settles quite exactly the problem of non-linear cost characteristic by incorporating the differential loss coefficients into the objective function. Introducing the fictitious generation variables into the model not only guarantees the solvability of the successive linearization from beginning to end, but also enables us to find out the locations and the values of optimal loadshedding if there have to be some load-sheddings to obtain N and N-i security. The calculation results of the IEEE 30-bus system indicates that the proposed model has the same accuracy as the non-linear models while it needs much less computing time.

本文提出了一个逐次的带有惩罚项的线性规划模型来求解N及N—1安全性实时经济调度问题。该模型保持了线性规划模型的优点,又相当精确地解决了非线性费用目标的问题。在模型中引入虚拟发电量不但使逐次线性化过程始终有解,而且当必须甩负荷才能满足N及N-1安全性约束时,可给出最优甩负荷的节点及其量值。对IEEE30节点系统的计算结果还表明,本模型与非线性模型相比,具有相同的优化精度,但所需计算时间却少得多。

This paper presents an approach to studing the economic dispatch of real power with N-1 security with the network flow programming (NFP), the N-1 line - security constraints are first introduced into the network f olw model and the problem of N-1 security economic dispatch becomes an incremental metwork flow model. Therefore, the shortage of NFP is mitigated to some extent, The solution adopted is the "out-of-kilter"algorithm(OKA), which is characterized by fast calculation and reliable convergency. The model...

This paper presents an approach to studing the economic dispatch of real power with N-1 security with the network flow programming (NFP), the N-1 line - security constraints are first introduced into the network f olw model and the problem of N-1 security economic dispatch becomes an incremental metwork flow model. Therefore, the shortage of NFP is mitigated to some extent, The solution adopted is the "out-of-kilter"algorithm(OKA), which is characterized by fast calculation and reliable convergency. The model and solution are tested on IEEE 30-bus system, and the results show that the proposed approach is feasible.

提出用网流法解算电力系统N-1安全有功经济调度问题,首次将线路N-1安全性约束引入到网流模型中,把N-1安全有功经济调度问题化为一个简单的增量网流校正模型,缓解了网流法中某些误差和缺点,文中解算方法采用的是计算快速,收敛可靠的OKA算法。通过对IEEE-30节点系统进行计算,并与有关文献结果比较表明,本文方法是可行的。

Ueli M.Maurer gives a fast prime generating method in reference .By modifying Maurer's method,we propose a prime generating scheme for the public key cryptosystem based on the discrete logarithm problem.We also discuss the security constriction to prime numbers in PKC based on the discrete logarithm

本文分析了文[1]中可证素数生成方法,探讨了离散对数密码体制对素数的安全性约束,最后对文[1]中的算法进行修改,形成一种适合离散对数密码体制的素数生成方案。

 
<< 更多相关文摘    
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关安全性约束的内容
在知识搜索中查有关安全性约束的内容
在数字搜索中查有关安全性约束的内容
在概念知识元中查有关安全性约束的内容
在学术趋势中查有关安全性约束的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社