نتایج جستجو برای: unstable security
تعداد نتایج: 225915 فیلتر نتایج به سال:
This paper presents the determination of power transfer between two buses that takes into account the dynamic security constraint. The dynamic security constraint based transient stability has been found to be one of the limiting factors in determining the power transfer so-called as the available transfer capability (ATC). The multimachine integral square generator angle (ISGA) index is used t...
Direct methods can provide rapid screening of the dynamical security of large numbers fault and contingency scenarios by avoiding extensive time simulation. We introduce a computationally-efficient direct method based on optimization that leverages efficient cutting plane techniques. The method considers both unstable equilibrium points and the effects of additional relay tripping on dynamical ...
Companies, industries, and nations often consume resources supplied by unstable producers. Perturbations that affect the supplier propagate downstream to create volatility in resource prices. Consumers can invest to reduce this insecurity in two ways; invest in and impose security on the suppliers, or can invest in self-sufficiency so that shocks no longer present devastating consequences. We u...
This document describes an industrial application of the B method in smart card applications. In smart card memory, data modification may be interrupted due to a card withdrawal or a power loss. The EEPROM memory may result in an unstable state and the values subsequently read may be erroneous. The transaction mechanism provides a secure means for modifying data located in the EEPROM. As the se...
this paper addresses the validity of two hypotheses concerning changes of vowel quality in persian. the theory of centralization claims that there is a strong correlation between vowel duration and vowel quality. as vowel duration is shortened in unstressed contexts, the size of the vowel inventory reduces toward the center, leading to considerable overlap between different categories and a red...
This paper investigates the relationship between food security and commercialisation using data from a household survey in National Smallholder Farmer Association of Malawi (NASFAM) operated areas. NASFAM promotes commercialisation of agriculture by introducing the principle of farming as a business among its members who are largely smallholder subsistence farmers. The study finds that househol...
In this paper, I explore the healthcare-information technology context as a backdrop for viewing legal issues that accompany telemedicine and teleradiology. In this age of managed care, healthcare informatics has become a burgeoning field. Computer-based technologies help automate processes such as patient data-collection. As patient records become increasingly digitized, they are more easily t...
Simple Network Management Protocol (SNMP) is the most widely-used network management protocol for TCP/IP-based networks. The functionality of SNMP was enhanced with the publication of SNMPv2. However, both versions of SNMPv1 and SNMPv2 lack security features, notably authentication and privacy. The SNMPv3 solves these deficiencies but it has some inefficiency to deal with the access, service re...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید