Buscas alternativas:
optimization algorithm » optimization algorithms (Expandir a busca)
security constrained » security constraints (Expandir a busca), security doctrine (Expandir a busca)
algorithm binary » algorithms library (Expandir a busca)
binary method » boundary method (Expandir a busca), boundary methods (Expandir a busca)
optimization algorithm » optimization algorithms (Expandir a busca)
security constrained » security constraints (Expandir a busca), security doctrine (Expandir a busca)
algorithm binary » algorithms library (Expandir a busca)
binary method » boundary method (Expandir a busca), boundary methods (Expandir a busca)
1
Assuntos:
“...[en] SECURITY-CONSTRAINED OPTIMAL POWER FLOW...”
[pt] ENSAIOS EM MODELOS DE DOIS ESTÁGIOS EM SISTEMAS DE POTÊNCIAS: CONTRIBUIÇÕES EM MODELAGEM E APLICAÇÕES DO MÉTODO DE GERAÇÃO DE LINHAS E COLUNAS
Tese