freepeople性欧美熟妇, 色戒完整版无删减158分钟hd, 无码精品国产vα在线观看DVD, 丰满少妇伦精品无码专区在线观看,艾栗栗与纹身男宾馆3p50分钟,国产AV片在线观看,黑人与美女高潮,18岁女RAPPERDISSSUBS,国产手机在机看影片

正文內(nèi)容

信息檢索綜合作業(yè)-全文預(yù)覽

  

【正文】 events[J].Electric Power SystemsResearch,2007,77(8):11321142.【Abstract】This paper introduces a new analysis method for early detection and prevention of power system cascading events. It uses the vulnerability index (VI) and margin index (MI) to evaluate the vulnerability and security of the individual system parts, as well as the whole system during an operating state. It identifies the vulnerable parts of the power system using the topology processing and operation index methods. For a given disturbance, it calculates the power flow, evaluates the vulnerability and security, identifies the vulnerable part, finds the transmission line overload and bus voltage problems, and predicts the possible successive events. The approach defines the control means using the following methods for early detection and prevention of cascading events: network contribution factor (NCF), generator distribution factor (GDF), load distribution factor (LDF), and selected minimum load shedding (SMLS). This approach has been tested using the IEEE RTS96 24bus system and promising results have been obtained. The proposed approach allows the power system operator to detect initial stages of cascading events and assert actions that will prevent such events from unfolding.【2】Sanjay Rawat,Ashutosh security code analysis: a step towards software assurance[J].International journal of information and puter security,2009,3(1):86110.【Abstract】The last few years have witnessed a rapid growth in cyber attacks, with daily new vulnerabilities being discovered in puter applications. Various securityrelated technologies, ., antivirus programs, Intrusion Detection Systems (IDSs)/Intrusion Prevention Systems (IPSs), firewalls, etc., are deployed to minimise the number of atta
點(diǎn)擊復(fù)制文檔內(nèi)容
規(guī)章制度相關(guān)推薦
文庫(kù)吧 www.dybbs8.com
備案圖鄂ICP備17016276號(hào)-1