Buscar
Mostrando ítems 1-10 de 42
W-RBAC - A workflow security model incorporating controlled overriding of constraints
(World Scientific Publ Co Pte LtdSingaporeSingapura, 2003)
A constructive heuristic algorithm for multi-stage transmission expansion planning under N-1 security constraints
(2015-04-01)
The transmission expansion planning (TEP) problem in modern power systems is a large-scale, mixed-integer, non-linear, and non-convex problem. The problem becomes even more complicated when the security constraints are ...
Unit Commitment Scheduling Including Transmission Constraints: a MILP Formulation
(Elsevier B.V., 2016-06)
The benefits of good scheduling of electrical units are widely known (De la Torre et al, 2008). In this paper, a new approach to account for the Security-Constrained Unit Commitment (SCUC) is presented. A model is developed ...
Transmission network expansion planning with security constraints
(Institute of Electrical and Electronics Engineers (IEEE), 2005-11-01)
A mathematical model and a methodology to solve the transmission network expansion planning problem with security constraints are presented. The methodology allows one to find an optimal and reliable transmission network ...
Throughput maximization in multi-hop wireless networks under a secrecy constraint
(2016-11-09)
This paper analyzes the achievable throughput of multi-hop sensor networks for industrial applications under a secrecy constraint and malicious jamming. The evaluation scenario comprises sensors that measure some relevant ...
Transmission network expansion planning with security constraints
(Iee-inst Elec EngHertfordInglaterra, 2005)
Milp Branch Flow Model For Concurrent Ac Multistage Transmission Expansion And Reactive Power Planning With Security Constraints
(Inst Engineering Technology-IETHertford, 2016)
Identifying the implied: Findings from three differentiated replications on the use of security requirements templates
(2017)
Identifying security requirements early on can lay the foundation for secure software development. Security requirements are often implied by existing functional requirements but are mostly left unspecified. The Security ...
Security-constrained Optimal Energy Management System For Three-phase Residential Microgrids
(Elsevier Science SALausanne, 2017)
Impact of Self-Energy Recycling and Cooperative Jamming on SWIPT-Based FD Relay Networks with Secrecy Constraints
(2022-01-01)
This paper investigates the secrecy performance of a power splitting-based simultaneous wireless information and power transfer cooperative relay network in the presence of an eavesdropper. The relay is considered to operate ...