Search Results - "Golob, R."
-
1
The Security of Electricity Supply: The Economic Downturn's Influence in Slovenia
Published in Energy sources. Part B, Economics, planning and policy (02-10-2014)“…In every country, one of the most important performance criteria for the electricity sector is the security of the electricity supply. In this article, the…”
Get full text
Journal Article -
2
Enhanced Artificial Neural Network Inflow Forecasting Algorithm for Run-of-River Hydropower Plants
Published in Journal of water resources planning and management (01-11-2002)“…An improved artificial neural network-based algorithm for short-term water inflow forecasting (STWIF) into run-of-river hydropower plants is presented…”
Get full text
Journal Article -
3
Neural-network-based water inflow forecasting
Published in Control engineering practice (01-05-1998)“…Water inflow forecasting is usually based on precipitation data collected by the ombrometer stations in the river basin. Solution of this problem is rather…”
Get full text
Journal Article -
4
Beyond the Policy Frontier: Canada, Mexico, and the Ideological Origins of NAFTA
Published in World politics (01-04-2003)“…Why are certain foreign policy options considered taboo or simply kept off the agenda as necessarily unthinkable or self-destructive? And under what conditions…”
Get full text
Journal Article -
5
Intelligent coordinative voltage and reactive power control
Published in International journal of electrical power & energy systems (01-05-2001)“…A novel local voltage control is proposed where each voltage controller of a generating unit is equipped with additional coordinative voltage controller (CVC),…”
Get full text
Journal Article -
6
Improved adjoint network algorithm for online contingency analyses
Published in Electric power systems research (01-08-1996)“…An improved adjoint network based algorithm is proposed for static security assessment. The main feature of the algorithm is the calculation of postcontingency…”
Get full text
Journal Article -
7
Fast contingency evaluation by means of the improved adjoint network method
Published in International journal of electrical power & energy systems (1996)“…In this paper, an improvement of the adjoint network (AN) method based on the Tellegen theorem for calculation of power system variables following various…”
Get full text
Journal Article -
8
'Forced to Be Free': Globalized Justice, Pacted Democracy, and the Pinochet Case
Published in Democratization (01-07-2002)“…The attempt to prosecute former Chilean President Augusto Pinochet has been primarily viewed through the lens of 'globalized justice', the erosion of…”
Get full text
Journal Article -
9
Price and volume risk management for power producers
Published in 2004 International Conference on Probabilistic Methods Applied to Power Systems (2004)“…This paper presents a methodology for mid-term risk management of a power portfolio, which includes generation assets and energy contracts. Compared to some…”
Get full text
Conference Proceeding -
10
Application of neural networks for hydro power plant water inflow forecasting
Published in Proceedings of the 5th Seminar on Neural Network Applications in Electrical Engineering. NEUREL 2000 (IEEE Cat. No.00EX287) (2000)“…Water inflow forecasting is usually based on precipitation data collected by the ombrometer stations in the river basin. The solution to this problem is rather…”
Get full text
Conference Proceeding -
11
Power system's security improvement through ANN-based decentralized secondary voltage control
Published in Proceedings of the 5th Seminar on Neural Network Applications in Electrical Engineering. NEUREL 2000 (IEEE Cat. No.00EX287) (2000)“…In the paper, issues of electrical power system (EPS) security are investigated. The EPS equipped with a decentralized modular secondary voltage and reactive…”
Get full text
Conference Proceeding -
12
Geisinger gets the gold
Published in Healthcare informatics (01-10-1996)Get more information
Magazine Article -
13
America's best networked healthcare organizations
Published in Healthcare informatics (01-11-1994)Get more information
Magazine Article -
14
Securing a bridge to the CPR: clinical data repositories
Published in Healthcare informatics (01-02-1994)Get more information
Magazine Article -
15
The 10 best networked healthcare facilities in America
Published in Healthcare informatics (01-11-1993)Get more information
Magazine Article -
16
Real-time scheduling of hydro cascaded system using evolutionary computation
Published in MELECON '98. 9th Mediterranean Electrotechnical Conference. Proceedings (Cat. No.98CH36056) (1998)“…In Slovenia, there are three hydro cascaded systems (HCS) accounting for some 35% of the total Slovenian power generation and playing an important role in…”
Get full text
Conference Proceeding -
17
Short and mid term hydro power plant reservoir inflow forecasting
Published in PowerCon 2000. 2000 International Conference on Power System Technology. Proceedings (Cat. No.00EX409) (2000)“…In order to improve water management for hydro cascade systems, a new artificial neural network (ANN) approach to forecasting water inflow into the hydro power…”
Get full text
Conference Proceeding -
18
Power system contingency analysis-an improved technique based on Tellegen theorem
Published in 1996 IEEE International Symposium on Circuits and Systems (ISCAS) (1996)“…In the paper, an improved algorithm based on Tellegen theorem is proposed for power system contingency analysis. The main feature of the improved algorithm is…”
Get full text
Conference Proceeding -
19
Improvements to the water management of a run-of-river HPP reservoir: methodology and case study
Published in Control engineering practice (01-04-2004)“…The operational planning for run-of-river hydroelectric power plants with small storage capacities is directly linked to the natural inflow of the reservoir…”
Get full text
Journal Article -
20
Power system voltage contingency assessment by adjoint network
Published in [1991 Proceedings] 6th Mediterranean Electrotechnical Conference (1991)“…The adjoint network method used for the security analyses encounters difficulties in calculating postcontingency voltage due to linear approximation of the…”
Get full text
Conference Proceeding