نتایج جستجو برای: unstable security

تعداد نتایج: 225915  

2007
M. M. OTHMAN I. MUSIRIN A. MOHAMED A. HUSSAIN Shah Alam

This paper presents the determination of power transfer between two buses that takes into account the dynamic security constraint. The dynamic security constraint based transient stability has been found to be one of the limiting factors in determining the power transfer so-called as the available transfer capability (ATC). The multimachine integral square generator angle (ISGA) index is used t...

Journal: :CoRR 2014
Scott Backhaus Russell Bent Daniel Bienstock Michael Chertkov Krishnamurthy Dvijotham

Direct methods can provide rapid screening of the dynamical security of large numbers fault and contingency scenarios by avoiding extensive time simulation. We introduce a computationally-efficient direct method based on optimization that leverages efficient cutting plane techniques. The method considers both unstable equilibrium points and the effects of additional relay tripping on dynamical ...

2012
Matthew Antognoli Marshall A. Kuypers Z. Rowan Copley Walter E. Beyeler Michael D. Mitchell Robert J. Glass

Companies, industries, and nations often consume resources supplied by unstable producers. Perturbations that affect the supplier propagate downstream to create volatility in resource prices. Consumers can invest to reduce this insecurity in two ways; invest in and impose security on the suppliers, or can invest in self-sufficiency so that shocks no longer present devastating consequences. We u...

1999
Denis Sabatier Pierre Lartigue

This document describes an industrial application of the B method in smart card applications. In smart card memory, data modification may be interrupted due to a card withdrawal or a power loss. The EEPROM memory may result in an unstable state and the values subsequently read may be erroneous. The transaction mechanism provides a secure means for modifying data located in the EEPROM. As the se...

Journal: :پژوهش های زبانی 0
وحید صادقی استادیار دانشگاه بین المللی امام خمینی (ره) نیلوفر منصوری هره دشت استادیار دانشگاه پیام نور

this paper addresses the validity of two hypotheses concerning changes of vowel quality in persian. the theory of centralization claims that there is a strong correlation between vowel duration and vowel quality. as vowel duration is shortened in unstressed contexts, the size of the vowel inventory reduces toward the center, leading to considerable overlap between different categories and a red...

2012
Ephraim W. Chirwa

This paper investigates the relationship between food security and commercialisation using data from a household survey in National Smallholder Farmer Association of Malawi (NASFAM) operated areas. NASFAM promotes commercialisation of agriculture by introducing the principle of farming as a business among its members who are largely smallholder subsistence farmers. The study finds that househol...

2001
Jill Lynn Tyler

In this paper, I explore the healthcare-information technology context as a backdrop for viewing legal issues that accompany telemedicine and teleradiology. In this age of managed care, healthcare informatics has become a burgeoning field. Computer-based technologies help automate processes such as patient data-collection. As patient records become increasingly digitized, they are more easily t...

2004
Choong Seon Hong Joon Heo

Simple Network Management Protocol (SNMP) is the most widely-used network management protocol for TCP/IP-based networks. The functionality of SNMP was enhanced with the publication of SNMPv2. However, both versions of SNMPv1 and SNMPv2 lack security features, notably authentication and privacy. The SNMPv3 solves these deficiencies but it has some inefficiency to deal with the access, service re...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید