نتایج جستجو برای: security constrained unitcommitment

تعداد نتایج: 252998  

2014
Anass Rghioui Anass Khannous Said Bouchkaren Mohammed Bouhorma K. Su J. Li N. Kushalnagar G. Montenegro D. E. Culler C. P. P. Schumacher J. A. Gutierrez M. Naeve E. Callaway M. Bourgeois

Excessive demand and the urgent need for the development of smart cities, evoke the need to provide the capacity for more low-resource devices to communicate and collaborate at a distance, in order to make the concept of the internet more real and practical. For this, IETF "IPv6 over Networks of Resource-constrained Nodes" (6lo) workgroup works on equipment of all resource constrained...

2003
S. H. Goh Z. Y. Dong T. K. Saha

Till now, many transfer capability techniques are performed in a simplified manner, with limited consideration of security constraints. This is unacceptable as the risks for not evaluating security impacts are high. There have been doubts on whether current techniques could provide secure transfer capability assessment and thus introducing a new challenge. This paper presents an optimal power f...

2014
Ludwig Seitz Shahid Raza Göran Selander

The new generation of Wireless Sensor Networks, that is known as the Internet of Things enables the direct connection of physical objects to the Internet using microcontrollers. In most cases these microcontrollers have very limited computational resources. The global connectivity provides great opportunities for data collection and analysis as well as for interaction of objects that cannot be ...

To prevent an exploit, the security analyst must implement a suitable countermeasure. In this paper, we consider cost-sensitive attack graphs (CAGs) for network vulnerability analysis. In these attack graphs, a weight is assigned to each countermeasure to represent the cost of its implementation. There may be multiple countermeasures with different weights for preventing a single exploit. Also,...

2014
Jiye Park Namhi Kang

Internet of Things (IoT) has attracted attention in various fields where small devices such as sensors and actuators are intended to be connected with each other by using TCP/IP protocols. To build value-added services in such fields, security is one of the most important considerations. The IETF standard group has proposed to use the DTLS protocol to provide security services with constrained ...

M. R. Aghamohammadi,

This paper proposes a novel approach for generation scheduling using sensitivitycharacteristic of a Security Analyzer Neural Network (SANN) for improving static securityof power system. In this paper, the potential overloading at the post contingency steadystateassociated with each line outage is proposed as a security index which is used forevaluation and enhancement of system static security....

2008
Jackie Phahlamohlaka

The national security issues most impacted upon by globalisation are generally found to fall into three categories: the nature of security threats in a globalised world, the effects of the phenomenon of globalisation on the pursuit of national security, and the erosion of the exclusivity of the state as a provider of national security. In this chapter I examine the security risks associated wit...

2007
Limin Ao Wei Zhou Xiaodong Zhu

A temporarily-spatially constrained model based on TRBAC (Task-Role Based Access Control) is proposed in workflow system. Temporary and spatial Constraint is that user is not only constrained by temporality, but also constrained by spatiality when user executes the task. The model suggests that a property of security level should be increased in task. The newly increased property can make the w...

2012
Chien-Ning Chen Nisha Jacob Sebastian Kutzner San Ling Axel Poschmann Sirote Saetang

In this work, we implement all three digital signature schemes specified in Digital Signature Standard (FIPS 186-3), including DSA and RSA (based on modular exponentiation) as well as ECDSA (based on elliptic curve point multiplication), on an ultra-constrained 4-bit MCU of the EPSON S1C63 family. Myriads of 4-bit MCUs are widely deployed in legacy devices, and some in security applications due...

Wind generation with an uncertain nature poses many challenges in grid integration and secure operation of power system. One of these operation problems is the unit commitment. Demand Response (DR) can be defined as the changes in electric usage by end-use customers from their normal consumption patterns in response to the changes in the price of electricity over time. Further, DR can be also d...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید