نتایج جستجو برای: security constrained unitcommitment

تعداد نتایج: 252998  

Journal: :Applied sciences 2023

In heterogeneous networks (HetNets), the vertical handover (VHO) is an essential process for mobile users (MUs) aiming to secure ubiquitous connectivity and maintain highest quality of service (QoS) across various types radio access technology (RAT), such as wireless fidelity (Wi-Fi), global system communication (GSM), universal telecommunications (UMTS). literature, many recent VHO research wo...

Journal: :International Journal of Fuzzy Logic and Intelligent System 2022

Journal: :International Journal for Research in Applied Science and Engineering Technology 2017

Journal: :Journal of Modern Power Systems and Clean Energy 2013

Journal: :IEEE Transactions on Power Systems 2022

We present a threshold-based cardinality inimization formulation for the security-constrained economic dispatch problem. The model aims to minimize operating cost of system while simultaneously reducing number lines in emergency zones during contingency events. allows operator monitor duration which operate and ensure that they are within acceptable reliability standards determined by operators...

Journal: :Journal of Computer Security 2005
Stefano Bistarelli Simon N. Foley Barry O'Sullivan

The security of a network configuration is based not just on the security of its individual components and their direct interconnections, but also on the potential for systems to interoperate indirectly across network routes. Such interoperation has been shown to provide the potential for cascading paths that violate security, in a circuitous manner, across a network. In this paper we show how ...

2011
Suku Nair Subil Abraham Omar Al-Ibrahim

There is a huge demand for wireless sensors and RFID tags for remote surveillance and tracking. However, in order for such technologies to gain wide acceptance in industry, there needs to be strong security integrated into them. Traditional cryptographic schemes are infeasible due to hardware, computation, and power constraints. To that end, we introduce a new security paradigm, namely security...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید