نتایج جستجو برای: static security assessment

تعداد نتایج: 833814  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس 1389

abstract: country’s fiber optic network, as one of the most important communication infrastructures, is of high importance; therefore, ensuring security of the network and its data is essential. no remarkable research has been done on assessing security of the country’s fiber optic network. besides, according to an official statistics released by ertebatat zirsakht company, unwanted disconnec...

پایان نامه :موسسه آموزش عالی غیر دولتی و غیرانتفاعی علامه محدث نوری (ره) - پژوهشکده اقتصاد 1393

dynamic assessment according to vygotskys sociocultural theory, states that instruction and assessment are interrelated. using static forms of assessment with second and foreign language students could do more harm than good. many teachers neglect to take account of the complexity involved in learning a second or foreign language and often wonder why learning of a language take so long. thi...

Journal: :the modares journal of electrical engineering 2016
mustafa gholami gvrvg gharehpetian mohammad mohammadi

due to the high penetration of wind farms in the networks, they can have a significant role in the control of power systems. in this paper, wind farms (wfs) are used to improve the static security margins of the power system. generation rescheduling is one of the remedies to improve the static security margins of the power system. in this paper, the generation rescheduling is presented based on...

Journal: :International Transactions on Electrical Energy Systems 2020

Journal: :International Journal of Engineering, Science and Technology 2018

Journal: :IET Cyber-Physical Systems: Theory & Applications 2019

2010
S. Kalyani K. S. Swarup

Security assessment is an important concern in planning and operation studies of an electric power system. Conventional method of security evaluation is performed by simulation consisting of load flow program and transient stability analysis, consuming long computer time and generating voluminous results. This paper presents a practical Pattern Recognition (PR) approach for security assessment ...

2017
Luis Muñoz-González Emil C. Lupu

Attack graphs offer a powerful framework for security risk assessment. They provide a compact representation of the attack paths that an attacker can follow to compromise network resources from the analysis of the network topology and vulnerabilities. The uncertainty about the attacker’s behaviour makes Bayesian networks suitable to model attack graphs to perform static and dynamic security ris...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید