نتایج جستجو برای: security constraint unit commitment

تعداد نتایج: 676031  

Journal: :IJITPM 2011
Ioannis V. Koskosas Nikolaos Sariannidis

This research investigates the role of project commitment in the context of information systems security. In doing so, the research adopts a psychological point of view by exploring and discussing the concept of project commitment in setting information security goals. Information security can be viewed as the efficient control of uncertainty arising from malicious acts intended to exploit valu...

Journal: :IACR Cryptology ePrint Archive 2017
Brandon Broadnax Valerie Fetzer Jörn Müller-Quade Andy Rupp

In this work, we settle the relations among a variety of security notions related to non-malleability and CCA-security that have been proposed for commitment schemes in the literature. Interestingly, all our separations follow from two generic transformations. Given two appropriate security notions X and Y from the class of security notions we compare, these transformations take a commitment sc...

2009
S. Prabhakar D. P. Kothari

An algorithm to solve security constrained unit commitment problem (UCP) with both operational and power flow constraints (PFC) have been proposed to plan a secure and economical hourly generation schedule. This proposed algorithm introduces an efficient unit commitment (UC) approach with PFC that obtains the minimum system operating cost satisfying both unit and network constraints when contin...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده ادبیات و علوم انسانی 1391

peace and national security protection and ironic solving of international conflicts become the preliminary foundation of the united nations charter and had been considered as the main responsibilities of the security council, after world war ii and the establishment of united nations organization. therefore, the security council enables to analyze every kind of conflicts and challenges which ...

2014
M. Shafie-khah M. K. Sheikh-El-Eslami

This paper presents a novel hybrid method for solving the security constrained unit commitment (SCUC) problem. The proposed formulation requires much less computation time in comparison with other methods while assuring the accuracy of the results. Furthermore, the framework provided here allows including an accurate description of warmth-dependent startup costs, valve point effects, multiple f...

Journal: :IACR Cryptology ePrint Archive 1998
Hoi Fung Chau Hoi-Kwong Lo

The desire to obtain an unconditionally secure bit commitment protocol in quantum cryptography was expressed for the rst time thirteen years ago. Bit commitment is suucient in quantum cryptography to realize a variety of applications with unconditional security. In 1993, a quantum bit commitment protocol was proposed together with a security proof. However, a basic aw in the protocol was discov...

2000
Frédéric Légaré

The results presented in the thesis show how to convert a statistically binding but computationally concealing quantum bit commitment scheme into a computationally binding but statistically concealing scheme. For a security parameter n, the construction of the statistically concealing scheme requires O(n) executions of the statistically binding scheme. As a consequence of the reduction, statist...

Journal: :IEEE Transactions on Power Systems 2020

Journal: :Electronic Colloquium on Computational Complexity (ECCC) 2006
Takeshi Koshiba Yoshiharu Seri

We explicitly show the upper bound on the round complexity for perfectly concealing bit commitment schemes based on the general computational assumption. The best known scheme in the literature is the one-way permutation based scheme due to Naor, Ostrovsky, Venkatesan and Yung and its round complexity is O(n). We consider a naive parallel version of their scheme of the multiplicity logn and obt...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید