Maintenance System in Power Information Packet Network (DX Network)
نویسندگان
چکیده
منابع مشابه
analysis of power in the network society
اندیشمندان و صاحب نظران علوم اجتماعی بر این باورند که مرحله تازه ای در تاریخ جوامع بشری اغاز شده است. ویژگیهای این جامعه نو را می توان پدیده هایی از جمله اقتصاد اطلاعاتی جهانی ، هندسه متغیر شبکه ای، فرهنگ مجاز واقعی ، توسعه حیرت انگیز فناوری های دیجیتال، خدمات پیوسته و نیز فشردگی زمان و مکان برشمرد. از سوی دیگر قدرت به عنوان موضوع اصلی علم سیاست جایگاه مهمی در روابط انسانی دارد، قدرت و بازتولید...
15 صفحه اولnetwork formulation for power system analysis
this paper presents as a brief introduction , the basic principles of matrix algebra for an alysing the power system problems with digital computers. the material contained in the text are as follows: primitive network, topology of electrical network, transformation of coordinates, bus admittance and bus impedance matrix.
متن کاملTHE STUDY OF PACKET LOSS EFFECT ON NETWORK CONTROL SYSTEM ERROR FUNCTION MODEL
Modern control systems widely use network to decrease the implementation cost and also increase the performance. Although they have several advantages, they suffer from some limitations and deficiencies. Packet loss is one of the main limitations which affect the control system in different conditions and finally can lead to system instability. To prevent such problems it is important to model ...
متن کاملNetwork-based Truth Maintenance System
1 Charles River Analytics, Inc., 625 Mount Auburn St., Cambridge, MA 02138, USA. Email: {sdas, dlawless}@cra.com Abstract We present a Network-based Truth Maintenance System (NTMS) for problem solvers based on Bayesian belief network (BN) technology. BN technology has been proven to be effective in various domains, e.g. assessing battlefield situations, such as the enemy’s likely point of inter...
متن کاملNew High Secure Network Steganography Method Based on Packet Length
In network steganography methods based on packet length, the length of the packets is used as a carrier for exchanging secret messages. Existing methods in this area are vulnerable against detections due to abnormal network traffic behaviors. The main goal of this paper is to propose a method which has great resistance to network traffic detections. In the first proposed method, the sender embe...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEJ Transactions on Electronics, Information and Systems
سال: 1989
ISSN: 0385-4221,1348-8155
DOI: 10.1541/ieejeiss1987.109.1_27