-
201
Security technologies in 4G network for power grid
Published 2015-12-01“…4G technologies with high data rate is flexible and has matured sufficiently,it has a promising application prospect in automatic distribution systems.However,communication networks for power grid should be more security,but the security protection of 4G network for power gird is not mature.Based on the application mode of 4G network in power system,the security risk was analyzed,then the specific safety protection methods were presented,which would guide the further application of 4G network in power system.…”
Get full text
Article -
202
Systematic Framework for Reflectarray Synthesis Based on Phase Optimization
Published 2012-01-01“…A Local Multipoint Distribution System (LMDS) base station working in the 24.5–26.5 GHz frequency band has been proposed to evaluate the method. …”
Get full text
Article -
203
A Fuzzy Logic Controller to Increase Fault Ride-Through Capability of Variable Speed Wind Turbines
Published 2012-01-01“…Simulations, carried out on a real 37-bus Italian weak distribution system, confirmed that the proposed controller can enhance the FRT capability in many cases.…”
Get full text
Article -
204
Resource-Saving Technique of Hydraulic Calculation of Distributing Gas-Systems
Published 2007-08-01“…It is possible to consider a hydraulic calculation technique of distributing gas-systems as a combination of factors that influence on the cost of construction and maintenance of gas-distributing system. The paper contains proposal of a new specification of economic distribution of calculated pressure differential in the system sections; optimum initial flow distribution from the point of view of reliability and economy and taking into account linkage of system rings.The program of hydraulic calculation of low-pressure distributing gas-systems has been developed. …”
Get full text
Article -
205
Exploiting the determinant factors on the available flexibility area of ADNs at TSO‐DSO interface
Published 2024-10-01“…The determination of the active/reactive power capability of ADNs will provide useful information at the transmission and distribution systems interface. For instance, the transmission system operator (TSO) can benefit from reactive power and reserve services which are readily available by the DERs embedded within the downstream ADNs, which are managed by the distribution system operator (DSO). …”
Get full text
Article -
206
Clusters of Healthcare-Associated Legionnaires’ Disease in Two Hospitals of Central Greece
Published 2018-01-01“…After conducting an epidemiologic and environmental investigation, the water distribution systems (WDSs) were identified as the possible source of infection, as Legionella pneumophila serogroup 1 (Lp1) was isolated from both clinical and environmental samples. …”
Get full text
Article -
207
Energy Efficient Homes: The Duct System
Published 2011-09-01“…The duct, or air distribution, system used in cooling and heating your home is a collection of tubes that distributes the heated or cooled air to the different rooms. …”
Get full text
Article -
208
Countering detector manipulation attacks in quantum communication through detector self-testing
Published 2025-01-01“…In practical quantum key distribution systems, imperfect physical devices open security loopholes that challenge the core promise of this technology. …”
Get full text
Article -
209
Energy Efficient Homes: The Duct System
Published 2011-09-01“…The duct, or air distribution, system used in cooling and heating your home is a collection of tubes that distributes the heated or cooled air to the different rooms. …”
Get full text
Article -
210
State Estimation in Power Systems Under False Data Injection Attack Using Total Least Squares
Published 2025-01-01“…Signal-to-noise ratio (SNR), signal-and-attack-to-noise ratio (SANR), and phase-to-attack ratio are examples of the situational quality that can exist in the power distribution systems. These ratios are considered as the investigational aspects for comparing the performance of the proposed methods and corresponding low-rank approaches. …”
Get full text
Article -
211
Virtualization security:the good,the bad and the ugly
Published 2016-10-01“…The virtualization security has increasingly drawn widespread attention with the spread of cloud computing in recent years.Thanks to another level of indirection,virtualization can provide stronger isolation mechanisms,as well as bottom-up security services for upper-level software.On the other side,the extra indirection brings complexity and overhead as well,which poses huge challenges.A series of recent representative work done by the institute of parallel and distributed system shanghai jiaotong university,including providing security services of trusted execution environment,virtual machine monitoring,intra-domain isolation,as well as optimizing trusted computing base and cross-world calls in the virtualization environment.Finally the problems and directions in the space of virtualization security were summarized.…”
Get full text
Article -
212
CFD Simulation of Transonic Flow in High-Voltage Circuit Breaker
Published 2012-01-01“…A high-voltage circuit breaker is an indispensable piece of equipment in the electric transmission and distribution systems. Transonic flow typically occurs inside breaking chamber during the current interruption, which determines the insulating characteristics of gas. …”
Get full text
Article -
213
Proposal of an Adaptive Neurofuzzy System to Control Flow Power in Distributed Generation Systems
Published 2019-01-01“…This paper describes the implementation of an adaptive neurofuzzy system for voltage control, regarding the changes observed in the consumption within the distribution system. The proposed design employs two neurofuzzy systems, one for the plant dynamics identification and the other for control purposes. …”
Get full text
Article -
214
Design of an Unmanned Aerial Vehicle-Based Pollution-Isolating Suction Water Sampling System
Published 2024-01-01“…At present,the widely used water sampling equipment and procedures pose a risk of operators being infected with viruses,and the sampling efficiency is low in remote offshore points.In view of these problems,a new unmanned aerial vehicle (UAV) system for pollution-isolating sampling has been designed, and the design scheme of a sterile collection and power distribution system has been proposed.The designed sampling system has identified the optimal scheme through comparative testing in experiments and completed sampling tests at the Guanting reservoir and sampling stability experiment.The system works stably and reliably,effectively isolating pollution and improving efficiency.It is applicable for various purposes such as water environment research,environmental law enforcement and evidence collection,water data collection,and emergency pollution tracking.…”
Get full text
Article -
215
Improved SpaceTwist privacy protection method based on anchor optimization algorithm
Published 2017-10-01“…With location-based services worldwide used,private location data appealed easily in query process which caused serious security problems.So the introduction of SpaceTwist incremental nearest neighbor query algorithm,proposes protection of privacy method combined with improved SpaceTwist location optimization algorithm.The anchor point authentication server added to distributed system structure,user generate a k anonymous area according to their privacy preference and actual environment,using optimization algorithm to generate the anchor point.Forwarding users use the incremental nearest neighbor query throught the anchor point and accurate.Experiments in road network environment with different data sets show that the privacy protection works well in the algorithm,and own high work efficiency.…”
Get full text
Article -
216
« L'État de tous les spectateurs »
Published 2012-04-01“…In the beginning of the 1950s, the cinema is one of the spheres where the Soviet government undertakes reform projects: an economic development of production and distribution systems, but also a modernization of equipment and the levelling of the conditions of projection. …”
Get full text
Article -
217
Routing in Wireless Multimedia Sensor Networks: A Survey of Existing Protocols and Open Research Issues
Published 2016-01-01“…The development of multimedia nodes has led to the creation of another intelligent distributed system, which can transfer real-time multimedia traffic, ubiquitously. …”
Get full text
Article -
218
A Pseudo-Parallel Genetic Algorithm Integrating Simulated Annealing for Stochastic Location-Inventory-Routing Problem with Consideration of Returns in E-Commerce
Published 2015-01-01“…This paper studies a three-phase supply chain distribution system consisting of one supplier, a set of retailers, and a single type of product with continuous review (Q, r) inventory policy. …”
Get full text
Article -
219
Influence of thunderstorm cloud on the performance of satellite-to-ground quantum link and parameters simulation
Published 2017-05-01“…In order to investigate the effect of thunderstorm cloud on the performance of satellite-to-ground quantum link,according to the extinction cross section and the number concentration distribution function of the charged particle in the thunderstorm cloud,the relationships among the particle concentration,charge density and link attenuation of charged particles in atmosphere were established.The relationship between the atmospheric concentration of charged particles,the charge density on the average channel capacity,channel fidelity,channel survival function and bit error rate of quantum key distribution system were put out.The simulation results show that the thunderstorm cloud has a significant effect on the performance of the satellite-to-ground quantum link.So in order to improve the reliability of satellite-ground quantum communication,the system parameters should be adjusted according to the forecast of the thunderstorm cloud.…”
Get full text
Article -
220
A Two-Layer Architecture for Failure Prediction Based on High-Dimension Monitoring Sequences
Published 2021-01-01“…In recent years, the distributed architecture has been widely adopted by security companies with the rapid expansion of their business. A distributed system is comprised of many computing nodes of different components which are connected by high-speed communication networks. …”
Get full text
Article