نتایج جستجو برای: security constrained unitcommitment
تعداد نتایج: 252998 فیلتر نتایج به سال:
In heterogeneous networks (HetNets), the vertical handover (VHO) is an essential process for mobile users (MUs) aiming to secure ubiquitous connectivity and maintain highest quality of service (QoS) across various types radio access technology (RAT), such as wireless fidelity (Wi-Fi), global system communication (GSM), universal telecommunications (UMTS). literature, many recent VHO research wo...
We present a threshold-based cardinality inimization formulation for the security-constrained economic dispatch problem. The model aims to minimize operating cost of system while simultaneously reducing number lines in emergency zones during contingency events. allows operator monitor duration which operate and ensure that they are within acceptable reliability standards determined by operators...
The security of a network configuration is based not just on the security of its individual components and their direct interconnections, but also on the potential for systems to interoperate indirectly across network routes. Such interoperation has been shown to provide the potential for cascading paths that violate security, in a circuitous manner, across a network. In this paper we show how ...
There is a huge demand for wireless sensors and RFID tags for remote surveillance and tracking. However, in order for such technologies to gain wide acceptance in industry, there needs to be strong security integrated into them. Traditional cryptographic schemes are infeasible due to hardware, computation, and power constraints. To that end, we introduce a new security paradigm, namely security...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید