نتایج جستجو برای: intelligent protection
تعداد نتایج: 254231 فیلتر نتایج به سال:
Summary Intelligent automated industrial process control, enabled by IR 4.0 technology, requires increased system integration and connectedness. With such development comes a heightened risk of cyberattack for operational technology (OT) systems, including control systems (ICS) automation (IACS), historically shielded from cyberspace. Cyberattacks on OT can also impact the physical world. The r...
Abstract As the rapid advancement of information security company is developing quickly and technology including big information, computer, large cloud, artificial intelligence are being widely used, network has entered a new era. While ushering in huge development opportunities, it also faces severe tests. Network major issue related to comprehensive realization well-off society national secur...
High penetration of distributed generation and more frequent changes in network topology are considered as new transmission system operation regimes which could introduce new challenges in maintaining security and dependability of the system protection. This study investigates the impacts of these new operation regimes on the dynamic behavior of the transmission system and protection coordinati...
The conventional passive lightning protection mode depending on fixed lightning rods, overhead grounded wires, arresters and SPDs couldn’t fit for the demand in practice gradually. Therefore, it is necessary to explore an available and optional way that could enhance and improve them. Based on Intelligent Control Technology and combined with lightning detection, the Active Lightning Protection ...
Crop diseases, pest infestations, water shortages, weed and other issues affect the agriculture sector. Due to existing agricultural techniques, these result in significant crop loss, economic severe environmental hazards. Because is such a dynamic industry, robotics cannot solve all of its difficulties; instead, single solution specific complex problem supplied. To assist with provide better a...
Phishing is an instance of social engineering techniques used to deceive users into giving their sensitive information using an illegitimate website that looks and feels exactly like the target organization website. Most phishing detection approaches utilizes Uniform Resource Locator (URL) blacklists or phishing website features combined with machine learning techniques to combat phishing. Desp...
The IP+GMPLS over DWDM model has been considered a trend for the evolution of optical networks. However, a challenge that has been investigated in this model is how to achieve fast rerouting in case of DWDM failure. Artificial Neural Networks (ANNs) can be used to generate proactive intelligent agents, which are able to detect failure trends in optical network links early and to approximate opt...
This paper introduces the basic structure of multi-agent based protection system for distribution system with DGs. The entire system consists of intelligent agents and communication system. Intelligent agents can be divided into three layers, the bottom layer, the middle layer and the upper layer. The design of the agent in different layer is analyzed in detail. Communication system is the brid...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید