Buscar
Mostrando ítems 1-10 de 2465
Enumeration strategies for solving constraint satisfaction problems: A performance evaluation
(Springer Verlag, 2015)
Online control of enumeration strategies via bat-inspired optimization
(Springer Verlag, 2015)
On the effects of geographical constraints on task execution in complex
(WORLD SCIENTIFIC PUBL CO PTE LTD, 2008)
In the present work, the effects of spatial constraints on the efficiency of task execution in systems underlain by geographical complex networks are investigated, where the probability of connection decreases with the ...
Transmission network expansion planning in full open market considering security constraints
(2005-12-01)
This paper presents a mathematical model and a methodology to solve the transmission network expansion planning problem with security constraints in full competitive market, assuming that all generation programming plans ...
Transmission network expansion planning in full open market considering security constraints
(2005-12-01)
This paper presents a mathematical model and a methodology to solve the transmission network expansion planning problem with security constraints in full competitive market, assuming that all generation programming plans ...
On the effects of geographical constraints on task execution in complex
(WORLD SCIENTIFIC PUBL CO PTE LTDSingapura, 2008)
WSM tuning in autonomous search via gravitational search algorithms
(Springer Verlag, 2015)
Market-driven security-constrained transmission network expansion planning
(2011-05-31)
This paper presents a Bi-level Programming (BP) approach to solve the Transmission Network Expansion Planning (TNEP) problem. The proposed model is envisaged under a market environment and considers security constraints. ...
Market-driven security-constrained transmission network expansion planning
(2011-05-31)
This paper presents a Bi-level Programming (BP) approach to solve the Transmission Network Expansion Planning (TNEP) problem. The proposed model is envisaged under a market environment and considers security constraints. ...