Dynamic Security of Interconnected Electric Power Systems - Volume 1 - El-Shimy, Mohamed
- Format: Broché Voir le descriptif
Vous en avez un à vendre ?
Vendez-le-vôtreSoyez informé(e) par e-mail dès l'arrivée de cet article
Créer une alerte prix- Payez directement sur Rakuten (CB, PayPal, 4xCB...)
- Récupérez le produit directement chez le vendeur
- Rakuten vous rembourse en cas de problème
Gratuit et sans engagement
Félicitations !
Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !
TROUVER UN MAGASIN
Retour
Avis sur Dynamic Security Of Interconnected Electric Power Systems - Volume 1 Format Broché - Livre Technologie
0 avis sur Dynamic Security Of Interconnected Electric Power Systems - Volume 1 Format Broché - Livre Technologie
Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.
Présentation Dynamic Security Of Interconnected Electric Power Systems - Volume 1 Format Broché
- Livre Technologie
Biographie:
Dr. M. EL-Shimy is currently an Assoc. Prof. in the department of Electrical Power and Machines - Ain Shams University. He is also an electromechanical specialist, and a freelance trainer. He is a technical reviewer for some major journals and conferences. He teaches several courses, published many researches, and supervised several dissertations....
Sommaire:
This book is written for engineers involved in the operation, control, and planning of electric power systems. In addition, the book provides information and tools for researchers working in the fields of power system security and stability. It consists of two volumes. The first volume provides traditional techniques for the stability analysis of large scale power systems. In addition, an overview of the main drivers and requirements for modernization of the traditional methods for online applications are discussed. The second volume provides techniques for online security assessment and corrective action studies. In addition, the impact of variable generation on the security of power systems is considered in the second volume. The first volume may be considered as a background builder while the second volume is intended for the coverage of edge techniques and methods for online dynamic security studies....