نتایج جستجو برای: defense power
تعداد نتایج: 560627 فیلتر نتایج به سال:
This paper describes the experiences, new requirements and prospects of security defense schemes for power systems in China. Adaptive optimal control schemes have served well for 2-3 years to periodically refresh the decision table for preventive control and emergency control to track operating conditions. These schemes are supported by EEAC that is a quantitative method for stability analysis,...
Mass media as a means to disseminate news has independence in publication regarding the company's target that depends on latest developments or trending topics. Total defense requires structuring strategy needs involvement delivering public part of element forming an opinion. This study aims provide overview critical role participation supporting government various activities disseminating info...
Vigilantism, commonly glossed as “taking the law into one’s own hands,” has been analyzed differently in studies of comparative politics, ethnography, history, and legal theory, but attracted little attention from philosophers. What can hands” amount to? How does vigilantism relate to mobs, protests, self-defense? I distinguish between several categories vigilantism, identify questions they are...
Humans are an integral part of power plants, ranging from construction to routine maintenance. Analysis of the presence and performance of the human factor can play an effective role in reducing and/or optimizing the use of energy resources. Therefore, in this research the investigation of the plant operator's presence direction in order to control a type of accident with the implementation of ...
The cultural defense is an informal term that describes the use of cultural information to mitigate criminal responsibility, often used in conjunction with traditional defense strategies such as provocation or insanity. Arguments for the cultural defense include respecting cultural practices under the liberal narrative that frames the United States as a multicultural and pluralistic society. Ad...
The large deployment of Information and Communication Technology (ICT) exposes the power grid to a large number of coordinated cyber-attacks. Thus, it is necessary to design new security policies that allow an efficient and reliable operation in such conflicted cyber-space. The detection of cyberattacks is known to be a challenging problem, however, through the coordinated effort of defense-in-...
In general, narrowband systems require more complex terminals which require more space and power and are more costly than wideband terminals. Conversely, in general, wideband systems require more costly transmission facilities. Most Defense tactical users require wideband facilities at the present time due to weight, size, and power constraints. Nontactical users generally are located in an ofk...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید