Reliability Considerations in Cyber-Power Dependent Systems
|
|
- Bruce Nelson
- 5 years ago
- Views:
Transcription
1 Reliability Considerations in Cyber-Power Dependent Systems Visvakumar Aravinthan Wichita State University PSERC Webinar April 17,
2 Acknowledgement This work was part of PSERC project T-53 Reliability Assessment and Modeling of Cyber Enabled Power Systems with Renewable Sources and Energy Storage Collaborative work between Texas A&M & Wichita State The following students contributed to this work Mohammad Heidari Mojtaba Sepehry Thanatheepan Balachandran Suvagata Chakraborty 2
3 Presentation Outline Background and Motivation Monitoring & Preventive Maintenance Effect of Communication Cyber System Failure Modeling Scenario 1: Cyber unavailability Scenario 2: Cyber attack Dependent System Modeling Tools: A Need Final Remarks and Future Needs 3
4 Presentation Outline Background and Motivation Monitoring & Preventive Maintenance Effect of Communication Cyber System Failure Modeling Scenario 1: Cyber unavailability Scenario 2: Cyber attack Dependent System Modeling Tools: A Need Final Remarks and Future Needs 4
5 Background & Motivation 5
6 Background & Motivation A simple example of cyber-power system Automated fault isolation as the example This process depends on Communication Automatic decision 6
7 Background & Motivation The cyber-power system can be modeled as A three layer system 7
8 Background & Motivation Three layer system 8
9 Presentation Outline Background and Motivation Monitoring & Preventive Maintenance Effect of Communication Cyber System Failure Modeling Scenario 1: Cyber unavailability Scenario 2: Cyber attack Dependent System Modeling Tools: A Need Final Remarks and Future Needs 9
10 Monitoring & Preventive Maintenance A simple example for motivation Improved monitoring Traditional equipment failure management t 2 Corrective Action Improve Detection Isolation Restoration Repair rate (µ) M. Heidari and V. Aravinthan, Component Reliability Evaluation in the Presence of Smart Monitoring, in Proc North American Power Symposium 10
11 Monitoring & Preventive Maintenance A simple example for motivation Improved monitoring Preventive equipment failure management Preventive Action t 2 Corrective Action Improve Monitoring Failure rate (λ) Improve Detection Isolation Restoration Repair rate (µ) M. Heidari and V. Aravinthan, Component Reliability Evaluation in the Presence of Smart Monitoring, in Proc North American Power Symposium 11
12 Monitoring & Preventive Maintenance A simple example for motivation Improved monitoring Smart component: Combination of electrical & monitoring Electrical equipment Normal Preventive action Failure Scheduled maintenance Monitoring Normal Failure Scheduled maintenance M. Heidari and V. Aravinthan, Component Reliability Evaluation in the Presence of Smart Monitoring, in Proc North American Power Symposium 12
13 Monitoring & Preventive Maintenance A simple example for motivation Improved monitoring Smart component: State transition model for reliability evaluation Up μμ λλ Down M. Heidari and V. Aravinthan, Component Reliability Evaluation in the Presence of Smart Monitoring, in Proc North American Power Symposium 13
14 Monitoring & Preventive Maintenance A simple example for motivation Improved monitoring Smart component: Failure rate of the smart component (Markov Model) State transition State 0: pp 0 θθ ssss + λλ ssss + λλ pppp = pp 2 μμ pppp + pp 3 μμ ssss + PP 5 μμ 0 State 1: pp 1 θθ pppp = pp 0 (λλ pppp ) State 2: pp 2 λλ dd + μμ pppp = pp 1 θθ pppp State 3: pp 3 λλ cc + μμ ssss = pp 0 θθ ssss + pp 4 θθ ssss State 4: pp 4 λλ cc + θθ ssss = pp 0 λλ ssss State 5: pp 5 μμ 0 = pp λλ dd + pp 3 λλ cc + pp 4 (λλ cc ) Smart component failure rate λλ ssssss = λλ dd pp 2 + λλ cc pp 3 + λλ cc pp 4 Can be shown that iiii pp 0 > 0 λλ ssssss < λλ cc Failure rate decreases M. Heidari and V. Aravinthan, Component Reliability Evaluation in the Presence of Smart Monitoring, in Proc North American Power Symposium 14
15 Presentation Outline Background and Motivation Monitoring & Preventive Maintenance Effect of Communication Cyber System Failure Modeling Scenario 1: Cyber unavailability Scenario 2: Cyber attack Dependent System Modeling Tools: A Need Final Remarks and Future Needs 15
16 Effect of Communication Communication network Successful data received rate 16
17 Effect of Communication Communication network Failure data: Data Availability Missing Data Rate Recovery Rate failures per day second 17
18 Effect of Communication Communication network How communication failure affects power system: Example: Event driven communication Application: Automatic switches Critical to understand the dependency M. Heidari and V. Aravinthan, Component Reliability Evaluation in the Presence of Smart Monitoring, in Proc North American Power Symposium 18
19 Effect of Communication Communication network How communication failure affects power system: Example: Event driven communication Application: Automatic switches Communication enabled switches Time sequential Monte-Carlo simulation Unavailability based approach M. Heidari and V. Aravinthan, Component Reliability Evaluation in the Presence of Smart Monitoring, in Proc North American Power Symposium 19
20 Presentation Outline Background and Motivation Monitoring & Preventive Maintenance Effect of Communication Cyber System Failure Modeling Scenario 1: Cyber unavailability Scenario 2: Cyber attack Dependent System Modeling Tools: A Need Final Remarks and Future Needs 20
21 Cyber System Failure Modeling Failure of cyber system Scenario 1: Data unavailability Decision is made based on the information received from fault indicators Communication failure can be modeled based on the network behavior M. Heidari, M. Sepehry, and V. Aravinthan, Fault Detector and Switch Placement in Cyber-Enabled Power Distribution Network, IEEE Trans. Smart Grids, Vol: 9, Iss: 2, March
22 Cyber System Failure Modeling Failure of cyber system Scenario 1: Data unavailability Fault detector Remote controlled switch si ii PP ffii = PP ffff i cf ii + 1 PP ffff i cf i sw ii PP ffff i cf i sw P = P + ( 1 P ) P + (1 P )(1 P ) P i ak M. Heidari, M. Sepehry, and V. Aravinthan, Fault Detector and Switch Placement in Cyber-Enabled Power Distribution Network, IEEE Trans. Smart Grids, Vol: 9, Iss: 2, March
23 Cyber System Failure Modeling Network availability modeling Cyber network with single path Graph r 0 =S r 1 r 2 r h 2 r h 1 r h = D Probability of transmitted data from S received at D PP ss = PP ss rr 0 rr 1 PP ss rr 1 rr 2 PP ss rr h 1 rr h S. Chakraborty, B. Thanatheepan, and V. Aravinthan, Worst-Case Reliability Modeling and Evaluation in Cyber-Enabled Power Distribution Systems, 2017 North American Power Symposium 23
24 Cyber System Failure Modeling Network availability modeling Physical network model with multiple paths Graph of the above model S. Chakraborty, B. Thanatheepan, and V. Aravinthan, Worst-Case Reliability Modeling and Evaluation in Cyber-Enabled Power Distribution Systems, 2017 North American Power Symposium 24
25 Cyber System Failure Modeling Network availability modeling Reliability computation for multipath network Multiple paths between source and destination AA CC EE AA BB FF HH AA BB DD AA CC GG HH AA BB FF GG EE Successful data transmission PP ss = PP AA CC EE PP AA BB FF HH PP AA BB DD PP AA CC GG HH PP AA BB FF GG EE S. Chakraborty, B. Thanatheepan, and V. Aravinthan, Worst-Case Reliability Modeling and Evaluation in Cyber-Enabled Power Distribution Systems, 2017 North American Power Symposium 25
26 Cyber System Failure Modeling Reliability computation R(A) = 0.9 R(B) = 0.6 R(C) = 0.8 R(C) = 0.7 Series parallel approach: RR ss = 1 1 RR AA RR BB 1 RR CC RR DD = Simple approach but limited to either series or parallel combinations. Concern: Cyber network more complicated S. Chakraborty, B. Thanatheepan, and V. Aravinthan, Worst-Case Reliability Modeling and Evaluation in Cyber-Enabled Power Distribution Systems, 2017 North American Power Symposium 26
27 Cyber System Failure Modeling Reliability computation R(A) = 0.9 R(B) = 0.6 R(C) = 0.8 R(C) = 0.7 Minimal cut set approach: Minimal cut sets: AAAA AAAA BBBB BBBB System structure function: ψψ XX AA, XX BB, XX CC, XX DD = 1 1 XX AA 1 XX CC 1 1 XX AA 1 XX DD 1 1 XX BB 1 XX CC 1 1 XX BB 1 XX DD = XX AA + XX cc XX AA XX CC XX AA + XX DD XX AA XX DD XX BB + XX CC XX BB XX CC XX BB + XX DD XX BB XX DD = XX AA XX BB + XX CC XX DD XX AA XX BB XX CC XX DD Reliability of the network RR ss = EE ψψ XX AA, XX BB, XX CC, XX DD = EE[XX AA XX BB ] + EE[XX CC XX DD ] EE[XX AA XX BB XX CC XX DD ] = RR AA RR BB + RR CC RR DD RR AA RR BB RR CC RR DD = S. Chakraborty, B. Thanatheepan, and V. Aravinthan, Worst-Case Reliability Modeling and Evaluation in Cyber-Enabled Power Distribution Systems, 2017 North American Power Symposium 27
28 Cyber System Failure Modeling Network availability modeling For the given simple network Minimal cut sets CCCCCC AAAAAA BBBBBB {BBBBBB} CCCCCC, AAAAAA Structure function is given by ψψ (3,4) = 1 [ 1 1 XX BB 1 XX DD 1 XX EE 1 1 XX CC 1 XX DD 1 XX FF 1 1 XX BB 1 XX DD 1 XX FF 1 1 XX CC 1 XX DD 1 XX EE 1 1 XX AA 1 XX DD 1 XX FF { 1 XX AA 1 XX DD 1 XX E } Calculations becomes tedious as network gets larger S. Chakraborty, B. Thanatheepan, and V. Aravinthan, Worst-Case Reliability Modeling and Evaluation in Cyber-Enabled Power Distribution Systems, 2017 North American Power Symposium 28
29 Cyber System Failure Modeling Network availability modeling For effective computation Lower bound for the link reliability can be determined Reasonable lower bound Place minimal cut-sets in series Total number of cut sets RR LLLL llllllll cc = ii=1 1 kkεεss ii 1 RR kk Reliability of element i Set of elements in cut set i S. Chakraborty, B. Thanatheepan, and V. Aravinthan, Worst-Case Reliability Modeling and Evaluation in Cyber-Enabled Power Distribution Systems, 2017 North American Power Symposium 29
30 Cyber System Failure Modeling Network availability modeling Example: Communication links can be: Decisions can be: centralized or decentralized Simple network: S. Chakraborty, B. Thanatheepan, and V. Aravinthan, Worst-Case Reliability Modeling and Evaluation in Cyber-Enabled Power Distribution Systems, 2017 North American Power Symposium 30
31 Cyber System Failure Modeling Network availability modeling Example: Worst case Expected Energy Not Served (WEENS): DR level 1: Partial load curtailment DR level 2: Complete load curtailment S. Chakraborty, B. Thanatheepan, and V. Aravinthan, Worst-Case Reliability Modeling and Evaluation in Cyber-Enabled Power Distribution Systems, 2017 North American Power Symposium 31
32 Presentation Outline Background and Motivation Monitoring & Preventive Maintenance Effect of Communication Cyber System Failure Modeling Scenario 1: Cyber unavailability Scenario 2: Cyber attack Dependent System Modeling Tools: A Need Final Remarks and Future Needs 32
33 Cyber System Failure Modeling Failure of cyber system Scenario 2: Information manipulation Any of the following can be compromised Control Center network Corporate network Substation network Device level network M. Heidari, M. Sepehry, and V. Aravinthan, Fault Detector and Switch Placement in Cyber-Enabled Power Distribution Network, IEEE Trans. Smart Grids, Vol: 9, Iss: 2, March
34 Cyber System Failure Modeling Failure of cyber system Scenario 2: Information manipulation Compromise of any one network will result in all the associated networks being compromised For reliability analysis series connected elements (if no firewall) Control Center Network Substation Network Device Network M. Heidari, M. Sepehry, and V. Aravinthan, Fault Detector and Switch Placement in Cyber-Enabled Power Distribution Network, IEEE Trans. Smart Grids, Vol: 9, Iss: 2, March
35 Cyber System Failure Modeling Failure of cyber system Scenario 2: Effect of cyber attack Challenge: Attack and recovery model Needs human behavior based modeling If known then could be modeled using common mode failure approach M. Heidari, M. Sepehry, and V. Aravinthan, Fault Detector and Switch Placement in Cyber-Enabled Power Distribution Network, IEEE Trans. Smart Grids, Vol: 9, Iss: 2, March
36 Cyber System Failure Modeling Failure of cyber system Scenario 2: Effect of cyber attack Automatic switch operation time Manual switching time Time to recover from cyber attack Based on availability of alternative path time for reconfiguration Fault detectors Manual switch Automated switch M. Heidari, M. Sepehry, and V. Aravinthan, Fault Detector and Switch Placement in Cyber-Enabled Power Distribution Network, IEEE Trans. Smart Grids, Vol: 9, Iss: 2, March
37 Cyber System Failure Modeling Failure of cyber system A single effect (attack) can affect multiple parts (network) Common cause failure (CCF) model: A group of components fail due to a shared cause The reason behind the failure (root cause) Which parts are affected and why (coupling factor) An event that causes a set of components to fail is known as common cause event (CCE). Components that could fail for the same cause(s) are grouped together; common cause component group (CCCG) M. Heidari, M. Sepehry, and V. Aravinthan, Fault Detector and Switch Placement in Cyber-Enabled Power Distribution Network, IEEE Trans. Smart Grids, Vol: 9, Iss: 2, March
38 Cyber System Failure Modeling Failure of cyber system Common cause failure (CCF) model: Example: Switching Operation in one frequency Sensors in another frequency M. Heidari, M. Sepehry, and V. Aravinthan, Fault Detector and Switch Placement in Cyber-Enabled Power Distribution Network, IEEE Trans. Smart Grids, Vol: 9, Iss: 2, March
39 Dependent failures Step 1: Determine the common cause component group (CCCG) Step 2: Determine basic event probabilities All possible ways αα kk = Cyber System Failure Modeling For example alpha factor method can be used A component can fail due to mm kk mm jj=1 Independent failure of the given component Dependent failure due to k out of m components Assume equal probability of occurrence mm jj PP kk PP jj Probability Dependent failure probability PP kk (mm) = kk mm 1 kk 1 Total failure probability of component k αα kk mm jj=1 jjαα jj PP tt(kk) M. Heidari, M. Sepehry, and V. Aravinthan, Fault Detector and Switch Placement in Cyber-Enabled Power Distribution Network, IEEE Trans. Smart Grids, Vol: 9, Iss: 2, March
40 Cyber System Failure Modeling Fault detector & automatic switch placement based on the cost Objective: minimize Investment cost (switch and fault detectors) Expected interruption cost for customers M. Heidari, M. Sepehry, and V. Aravinthan, Fault Detector and Switch Placement in Cyber-Enabled Power Distribution Network, IEEE Trans. Smart Grids, Vol: 9, Iss: 2, March
41 Presentation Outline Background and Motivation Monitoring & Preventive Maintenance Effect of Communication Cyber System Failure Modeling Scenario 1: Cyber unavailability Scenario 2: Cyber attack Dependent System Modeling Tools: A Need Final Remarks and Future Needs 41
42 Dependent System Modeling Tools: A Need Required approach Power System Failures (Random) Cyber Component Failure (Random) Message failure Message delay Cyber attack Interdependent System Reliability Evaluation Cyber Failure Impact on Power System Direct impact - Power component failure Indirect impact - Failure may impact - Not operate in safe state 42
43 Dependent System Modeling Tools: A Need Failure modes Power component Communication and coupling Decision 43
44 Presentation Outline Background and Motivation Monitoring & Preventive Maintenance Effect of Communication Cyber System Failure Modeling Scenario 1: Cyber unavailability Scenario 2: Cyber attack Dependent System Modeling Tools: A Need Final Remarks and Future Needs 44
45 Final Remarks Cyber system benefits are correlated with power system operational needs A three layer approach can be utilized by separating Power components Communication and coupling components Decision components Dependent system based modeling increases possible states of operations Adjustments to reliability analysis is required with Understanding of communication link failure Understanding cyber attack 45
46 Future Needs A unified analytical framework for cyber-power system needs to be better established. Effective modeling of cyber-unavailability and cyber-manipulation is a prerequisite. A human behavior based modeling for cyber attack can provide better insight Propagation of cyber failure on power system application (similar to cascading failure) needs to be further studied. 46
47 Final-Final Remarks Cyber solutions become more effective if: Power system applications are more identified Dependent effects of cyber and power systems are better understood Solutions utilize the properties of both cyber & power An appropriate performance evaluation tool is used to assess the benefits against the cost and adaptability. 47
48 Questions? Visvakumar Aravinthan 48
49 Presentation Outline Background and Motivation Monitoring & Preventive Maintenance Effect of Communication Cyber System Failure Modeling Scenario 1: Cyber unavailability Scenario 2: Cyber attack Dependent System Modeling Tools: A Need Final Remarks and Future Needs System Properties Based Communication 49
50 System Properties Based Communication Cyber infrastructure can improve reliability How to enhance the benefits One of the options Distributed Sensor Network at feeder level. Event driven communication protocol for distribution Communicate upon an event Not communicate periodically One application Use power system properties in communication protocol in anomaly detection applications. M. Heidari, M. Sepehry, and V. Aravinthan, Fault Detector and Switch Placement in Cyber-Enabled Power Distribution Network, IEEE Trans. Smart Grids, Vol: 9, Iss: 2, March
51 System Properties Based Communication Distributed sensor network Hierarchical communication architecture. Lower level - WiMax, Upper Level Wired. Use mesh network architecture between the control centers and the substation level communication M. Heidari, T. Balachandran, V. Aravinthan, V. Namboodiri, and G. Chen, ALARM: Average Low-Latency Medium Access Control Communication Protocol for Smart Feeders, IET Generation, Transmission & Distribution, Vol: 10, Iss.: 11, Aug
52 System Properties Based Communication Communication Delay lost packets Identify a protocol that will prioritize time sensitive data M. Heidari, T. Balachandran, V. Aravinthan, V. Namboodiri, and G. Chen, ALARM: Average Low-Latency Medium Access Control Communication Protocol for Smart Feeders, IET Generation, Transmission & Distribution, Vol: 10, Iss.: 11, Aug
53 System Properties Based Communication Communication Delay lost packets Allocate the first slot for time sensitive data Problem: Solution: M. Heidari, T. Balachandran, V. Aravinthan, V. Namboodiri, and G. Chen, ALARM: Average Low-Latency Medium Access Control Communication Protocol for Smart Feeders, IET Generation, Transmission & Distribution, Vol: 10, Iss.: 11, Aug
54 System Properties Based Communication Communication Delay lost packets Allocate based on the location Or incorporate power system properties Z line,1 Z line,2 Z line,i Fault Substation Z load,1 Z load,2 Z load,i-1 Z load,i Z fault = 0 M. Heidari, T. Balachandran, V. Aravinthan, V. Namboodiri, and G. Chen, ALARM: Average Low-Latency Medium Access Control Communication Protocol for Smart Feeders, IET Generation, Transmission & Distribution, Vol: 10, Iss.: 11, Aug
55 System Properties Based Communication Communication Delay lost packets Specific node communicating 100% of the time Latency M. Heidari, T. Balachandran, V. Aravinthan, V. Namboodiri, and G. Chen, ALARM: Average Low-Latency Medium Access Control Communication Protocol for Smart Feeders, IET Generation, Transmission & Distribution, Vol: 10, Iss.: 11, Aug
Reliability Assessment and Modeling of Cyber Enabled Power Systems with Renewable Sources and Energy Storage
Reliability Assessment and Modeling of Cyber Enabled Power Systems with Renewable Sources and Energy Storage Final Project Report T-53 Power Systems Engineering Research Center Empowering Minds to Engineer
More informationChanan Singh Texas A&M University PSERC Webinar November 22, 2016
Chanan Singh Texas A&M University (singh@ece.tamu.edu) PSERC Webinar November 22, 2016 1 Modern power systems: integration of current carrying components (for power delivery), monitoring, computing, communication
More informationLesson 12: Angles Associated with Parallel Lines
Lesson 12 Lesson 12: Angles Associated with Parallel Lines Classwork Exploratory Challenge 1 In the figure below, LL 1 is not parallel to LL 2, and mm is a transversal. Use a protractor to measure angles
More informationAMI: Communications and Integration Options
AMI: Communications and Integration Options Vinod Namboodiri Wichita State University Additional Team Members: Ward Jewell, Visvakumar Aravinthan Wichita State University PSERC Future Grid Initiative Webinar
More informationSimilar Polygons Date: Per:
Math 2 Unit 6 Worksheet 1 Name: Similar Polygons Date: Per: [1-2] List the pairs of congruent angles and the extended proportion that relates the corresponding sides for the similar polygons. 1. AA BB
More informationStacks & Queues. Kuan-Yu Chen ( 陳冠宇 ) TR-212, NTUST
Stacks & Queues Kuan-Yu Chen ( 陳冠宇 ) 2018/10/01 @ TR-212, NTUST Review Stack Stack Permutation Expression Infix Prefix Postfix 2 Stacks. A stack is an ordered list in which insertions and deletions are
More informationEureka Math. Grade 7, Module 6. Student File_A. Contains copy-ready classwork and homework
A Story of Ratios Eureka Math Grade 7, Module 6 Student File_A Contains copy-ready classwork and homework Published by the non-profit Great Minds. Copyright 2015 Great Minds. No part of this work may be
More informationA Low Latency Data Transmission Scheme for Smart Grid Condition Monitoring Applications 28/05/2012
1 A Low Latency Data Transmission Scheme for Smart Grid Condition Monitoring Applications I R F A N S. A L - A N B A G I, M E L I K E E R O L - K A N T A R C I, H U S S E I N T. M O U F T A H U N I V E
More informationImportance of Interoperability in High Speed Seamless Redundancy (HSR) Communication Networks
Importance of Interoperability in High Speed Seamless Redundancy (HSR) Communication Networks Richard Harada Product Manager RuggedCom Inc. Introduction Reliable and fault tolerant high speed communication
More informationResilient Smart Grids
Resilient Smart Grids André Teixeira Kaveh Paridari, Henrik Sandberg KTH Royal Institute of Technology, Sweden SPARKS 2nd Stakeholder Workshop Cork, Ireland March 25th, 2015 Legacy Distribution Grids Main
More informationVisit MathNation.com or search "Math Nation" in your phone or tablet's app store to watch the videos that go along with this workbook!
Topic 1: Introduction to Angles - Part 1... 47 Topic 2: Introduction to Angles Part 2... 50 Topic 3: Angle Pairs Part 1... 53 Topic 4: Angle Pairs Part 2... 56 Topic 5: Special Types of Angle Pairs Formed
More information6.2 OPTIONAL SECURITY SERVICES
6.2 OPTIONAL SECURITY SERVICES This section presents Qwest s proposed optional services for the Networx program. In our selection of optional services we applied two criteria: Does the Qwest Team have
More informationFINAL EXAM REVIEW CH Determine the most precise name for each quadrilateral.
FINAL EXAM REVIEW CH 6 1. Determine the most precise name for each quadrilateral. 2. Find the measures of the numbered angle for the following parallelogram a. A(-5,7), B(2,6), C(-4,0), D(5,-3) 1 3 2 35
More informationMulti-view object segmentation in space and time. Abdelaziz Djelouah, Jean Sebastien Franco, Edmond Boyer
Multi-view object segmentation in space and time Abdelaziz Djelouah, Jean Sebastien Franco, Edmond Boyer Outline Addressed problem Method Results and Conclusion Outline Addressed problem Method Results
More informationSection 6: Triangles Part 1
Section 6: Triangles Part 1 Topic 1: Introduction to Triangles Part 1... 125 Topic 2: Introduction to Triangles Part 2... 127 Topic 3: rea and Perimeter in the Coordinate Plane Part 1... 130 Topic 4: rea
More informationQueues. Kuan-Yu Chen ( 陳冠宇 ) TR-212, NTUST
Queues Kuan-Yu Chen ( 陳冠宇 ) 2018/10/03 @ TR-212, NTUST Review Stack FILO Algorithms to covert Infix to Postfix Infix to Prefix Queue FIFO 2 Homeork1: Expression Convertor. Given a infix expression, please
More informationCopy Material. Geometry Unit 1. Congruence, Proof, and Constructions. Eureka Math. Eureka Math
Copy Material Geometry Unit 1 Congruence, Proof, and Constructions Eureka Math Eureka Math Lesson 1 Lesson 1: Construct an Equilateral Triangle We saw two different scenarios where we used the construction
More informationLesson 21: Surface Area
Student Outcomes Students find the surface area of three-dimensional objects whose surface area is composed of triangles and quadrilaterals. They use polyhedron nets to understand that surface area is
More informationCS246: Mining Massive Datasets Jure Leskovec, Stanford University
CS246: Mining Massive Datasets Jure Leskovec, Stanford University http://cs246.stanford.edu Web advertising We discussed how to match advertisers to queries in real-time But we did not discuss how to estimate
More informationMath 96--Radicals #1-- Simplify; Combine--page 1
Simplify; Combine--page 1 Part A Number Systems a. Whole Numbers = {0, 1, 2, 3,...} b. Integers = whole numbers and their opposites = {..., 3, 2, 1, 0, 1, 2, 3,...} c. Rational Numbers = quotient of integers
More informationT.4 Applications of Right Angle Trigonometry
22 T.4 Applications of Right Angle Trigonometry Solving Right Triangles Geometry of right triangles has many applications in the real world. It is often used by carpenters, surveyors, engineers, navigators,
More information"Charting the Course... MOC A Planning, Deploying and Managing Microsoft Forefront TMG Course Summary
Description Course Summary The goal of this three-day instructor-led course is to provide students with the knowledge and skills necessary to effectively plan, deploy and manage Microsoft Forefront Threat
More informationSolano Community College Academic Senate CURRICULUM COMMITTEE AGENDA Tuesday, May 1, :30 p.m., Room 503
Tuesday, 1:30 p.m., Room 503 1. ROLL CALL Robin Arie-Donch, Debra Berrett, Curtiss Brown, Joe Conrad (Chair), Lynn Denham-Martin, Erin Duane, Erin Farmer, Marianne Flatland, Betsy Julian, Margherita Molnar,
More informationTitle. Author(s)Nguyen, Thi Xuan My; Saivichit, Chaiyachet; Miyanaga. Issue Date Doc URL. Type. Note. File Information
Title Performance Analysis for Total Delay and Total Packe Author(s)Nguyen, Thi Xuan My; Saivichit, Chaiyachet; Miyanaga Proceedings : APSIPA ASC 2009 : Asia-Pacific Signal Citationand Conference: 791-796
More informationQUALITY OF SERVICE INDICATORS UNDER CYBER ATTACKS BY RAO SIMULATOR
QUALITY OF SERVICE INDICATORS UNDER CYBER ATTACKS BY RAO SIMULATOR Multitel (S.Iassinovski) Multitel Research Center Parc Initialis, rue Pierre et Marie Curie n 2 B-7000 Mons, Belgium iassinovski@multitel.be
More informationLecture 3.3 Robust estimation with RANSAC. Thomas Opsahl
Lecture 3.3 Robust estimation with RANSAC Thomas Opsahl Motivation If two perspective cameras captures an image of a planar scene, their images are related by a homography HH 2 Motivation If two perspective
More informationA Joint Congestion Control, Routing, and Scheduling Algorithm in Multihop Wireless Networks with Heterogeneous Flows
1 A Joint Congestion Control, Routing, and Scheduling Algorithm in Multihop Wireless Networks with Heterogeneous Flows Phuong Luu Vo, Nguyen H. Tran, Choong Seon Hong, *KiJoon Chae Kyung H University,
More informationA Hybrid Communication Architecture for Internet of Things (IOT) Application in Smart Grid
A Hybrid Communication Architecture for Internet of Things (IOT) Application in Smart Grid Yijia Cao Hunan University, China 2014-10 10-21 OUTLINE 1 IOT Application in Smart Grid 2 3 Requirements for Communication
More informationEureka Math. Geometry, Module 4. Student File_B. Contains Exit Ticket, and Assessment Materials
A Story of Functions Eureka Math Geometry, Module 4 Student File_B Contains Exit Ticket, and Assessment Materials Published by the non-profit Great Minds. Copyright 2015 Great Minds. No part of this work
More informationDevelopment of an Intelligent Fault Indicator for Smart Grids
2011 International Conference on Information and Electronics Engineering IPCSIT vol.6 (2011) (2011) IACSIT Press, Singapore Development of an Intelligent Fault Indicator for Smart Grids Shang-Wen Luan
More informationEureka Math. Grade 7, Module 6. Student File_B Contains Exit Tickets, and Assessment Materials
A Story of Units Eureka Math Grade 7, Module 6 Student File_B Contains s, and Assessment Materials Published by the non-profit Great Minds. Copyright 2015 Great Minds. All rights reserved. No part of this
More informationrecruitment Logo Typography Colourways Mechanism Usage Pip Recruitment Brand Toolkit
Logo Typography Colourways Mechanism Usage Primary; Secondary; Silhouette; Favicon; Additional Notes; Where possible, use the logo with the striped mechanism behind. Only when it is required to be stripped
More informationAutomation of Distribution Grid with FLISR using ZigBee Communication
Automation of Distribution Grid with FLISR using ZigBee Communication 1 Ajinkya Shirdhankar, 2 Digambar Ahire, 3 B. S. Kunure, 4 Asmita Bote Department of Electrical Engineering, ZCOER, Pune, India Abstract
More informationNovember 25, Mr. Paul Kaspar, PE City Engineer City of Bryan Post Office Box 1000 Bryan, Texas 77802
November 25, 213 Mr. Paul Kaspar, PE City Engineer City of Bryan Post Office Box 1 Bryan, Texas 7782 Re: Greenbrier Phase 9 Oversize Participation Request Dear Paul: On behalf of the owner, Carter-Arden
More informationSurvivability Architectures for Service Independent Access Points to Multiwavelength Optical Wide Area Networks
Survivability Architectures for Service Independent Access Points to Multiwavelength Optical Wide Area Networks Master s Thesis Defense Ananth Nagarajan EECS Department, University of Kansas 10/13/98 Outline
More informationApril Oracle Spatial User Conference
April 29, 2010 Hyatt Regency Phoenix Phoenix, Arizona USA Parag Parikh Dan Kuklov CURRENT Group Kerry D. McBee Xcel Energy Unified Real-Time Network Topology Management Using Xcel Energy SmartGridCity
More informationBRAND BOOK. Copyright 2016 WashU Student Union Student Union Brand Guidebook 1
BRAND BOOK 2019 2016 Copyright 2016 WashU Student Union Student Union Brand Guidebook 1 WHY THIS MATTERS While it is easy for the student body to see the hundreds of group events that take place every
More informationThe Application Analysis and Network Design of wireless VPN for power grid. Wang Yirong,Tong Dali,Deng Wei
Applied Mechanics and Materials Online: 2013-09-27 ISSN: 1662-7482, Vols. 427-429, pp 2130-2133 doi:10.4028/www.scientific.net/amm.427-429.2130 2013 Trans Tech Publications, Switzerland The Application
More informationPerformance Analysis of the Different Null Steering Techniques in the Field of Adaptive Beamforming
Research Journal of Applied Sciences, Engineering and Technology 5(15): 4612, 213 ISSN: 24-7459; e-issn: 24-7467 Maxwell Scientific Organization, 213 Submitted: November 27,212 Accepted: January 14, 213
More informationWhy Security Fails in Federated Systems
Why Security Fails in Federated Systems Dr. Clifford Neuman, Director USC Center for Computer Systems Security Information Sciences Institute University of Southern California CSSE Research Review University
More informationIntroduction to Deep Learning
ENEE698A : Machine Learning Seminar Introduction to Deep Learning Raviteja Vemulapalli Image credit: [LeCun 1998] Resources Unsupervised feature learning and deep learning (UFLDL) tutorial (http://ufldl.stanford.edu/wiki/index.php/ufldl_tutorial)
More informationSection 1: Introduction to Geometry Points, Lines, and Planes
Section 1: Introduction to Geometry Points, Lines, and Planes Topic 1: Basics of Geometry - Part 1... 3 Topic 2: Basics of Geometry Part 2... 5 Topic 3: Midpoint and Distance in the Coordinate Plane Part
More informationWisconsin Retirement Testing Preparation
Wisconsin Retirement Testing Preparation The Wisconsin Retirement System (WRS) is changing its reporting requirements from annual to every pay period starting January 1, 2018. With that, there are many
More informationSyntax Analysis Top Down Parsing
Syntax Analysis Top Down Parsing CMPSC 470 Lecture 05 Topics: Overview Recursive-descent parser First and Follow A. Overview Top-down parsing constructs parse tree for input string from root and creating
More informationOPTIMAL DESIGN OF A STEPPER-DRIVEN PLANAR LINKAGE USING ENTROPY METHODS
Optimal Design of A Stepper-Driven Planar Linkage Using Entropy Methods OPTIMAL DESIGN OF A STEPPER-DRIVEN PLANAR LINKAGE USING ENTROPY METHODS J. C. Musto 1* 1 Mechanical Engineering Department, Milwaukee
More informationCOMPUTER GRAPHICS COURSE. LuxRender. Light Transport Foundations
COMPUTER GRAPHICS COURSE LuxRender Light Transport Foundations Georgios Papaioannou - 2015 Light Transport Light is emitted at the light sources and scattered around a 3D environment in a practically infinite
More informationEureka Math. Geometry, Module 5. Student File_A. Contains copy-ready classwork and homework
A Story of Functions Eureka Math Geometry, Module 5 Student File_A Contains copy-ready classwork and homework Published by the non-profit Great Minds. Copyright 2015 Great Minds. No part of this work may
More informationThe TiGL Geometry Library and its Current Mathematical Challenges
The TiGL Geometry Library and its Current Mathematical Challenges Workshop DLR / Cologne University 06.10.2017 Dr. Martin Siggel Merlin Pelz Konstantin Rusch Dr. Jan Kleinert Simulation and Software Technology
More informationTransform Extreme Point Multi-Objective Linear Programming Problem to Extreme Point Single Objective Linear Programming Problem by Using Harmonic Mean
Applied Mathematics 2016, 6(5): 95-99 DOI: 10.5923/j.am.20160605.01 Transform Extreme Point Multi-Objective Linear Programming Problem to Extreme Point Single Objective Linear Programming Problem by Using
More informationFailure Diagnosis and Cyber Intrusion Detection in Transmission Protection System Assets Using Synchrophasor Data
Failure Diagnosis and Cyber Intrusion Detection in Transmission Protection System Assets Using Synchrophasor Data Anurag Srivastava, Bo Cui, P. Banerjee Washington State University NASPI March 2017 Outline
More informationFor more information, visit: 3M Cold Shrink QS-III Splice a one-piece joint with wide range and geometric stress control
for Medium Voltage Grid Automation Visibility inreal Time An effective solution for monitoring your underground distribution system 3M is a global technology company, manufacturing over 50,000 products
More informationCONTENTS 05 DYNICS BRAND 06 LOGO 08 SOFTWARE 12 PRODUCT BRANDS 16 ICONS 17 TYPEFACE 19 E SQUAD 20 CONTACT INFORMATION COPYRIGHT NOTICE
BRANDING GUIDE CONTENTS 05 DYNICS BRAND 06 LOGO 08 SOFTWARE 12 PRODUCT BRANDS 16 ICONS 17 TYPEFACE 19 E SQUAD 20 CONTACT INFORMATION COPYRIGHT NOTICE 2018 DYNICS, Inc. All Rights Reserved No part of this
More informationProgress Report No. 15. Shared Segments Protection
NEXT GENERATION NETWORK (NGN) AVAILABILITY & RESILIENCE RESEARCH Progress Report No. 15 Shared Segments Protection The University of Canterbury Team 18 April 2006 Abstract As a complement to the Canterbury
More informationCybersecurity Test and Evaluation Facilities at Texas A&M
Cybersecurity Test and Evaluation Facilities at Texas A&M Dr. Karen L. Butler-Purry, Bo Chen Department of Electrical and Computer Engineering Nishant Pattanaik Department of Computer Science Dr. Ana Goulart
More informationGrowing Our Own Through Collaboration
NWI INITIATIVE NUCLEAR WORKFORCE Growing Our Own Through Collaboration BRAND STANDARDS reference guide Brand Standards 2011 SRS Community Reuse Organization. All rights reserved. Version 1.0-02.10.2011
More informationThe ABC s of Web Site Evaluation
Aa Bb Cc Dd Ee Ff Gg Hh Ii Jj Kk Ll Mm Nn Oo Pp Qq Rr Ss Tt Uu Vv Ww Xx Yy Zz The ABC s of Web Site Evaluation by Kathy Schrock Digital Literacy by Paul Gilster Digital literacy is the ability to understand
More informationCryptography CS 555. Topic 8: Modes of Encryption, The Penguin and CCA security
Cryptography CS 555 Topic 8: Modes of Encryption, The Penguin and CCA security 1 Reminder: Homework 1 Due on Friday at the beginning of class Please typeset your solutions 2 Recap Pseudorandom Functions
More information"Charting the Course... VMware vsphere 6.5 Optimize, Upgrade, Troubleshoot. Course Summary
Course Summary Description This powerful 5-day class provides an in-depth look at vsphere 6.5. In this course, cover how to deploy vsphere 6.5, how to optimize it including VMs, ESXi hosts, vcenter Server
More informationPerformance Analysis of Mobile Ad Hoc Network in the Presence of Wormhole Attack
Performance Analysis of Mobile Ad Hoc Network in the Presence of Wormhole Attack F. Anne Jenefer & D. Vydeki E-mail : annejenefer@gmail.com, vydeki.d@srmeaswari.ac.in Abstract Mobile Ad-Hoc Network (MANET)
More informationPEERLESS JAMMING ATTACKS AND NETWORK FORTIFICATION POLICIES IN WIRELESS SENSOR NETWORKS
Volume 2, Issue 7, PP:, SEPTEMBER 2014. PEERLESS JAMMING ATTACKS AND NETWORK FORTIFICATION POLICIES IN WIRELESS SENSOR NETWORKS TALLURI BEENA JOSEPHINE 1*, K.RAVICHAND 2* 1. II.M.Tech, Dept of CSE, AM
More informationDmitry Ishchenko/Reynaldo Nuqui/Steve Kunsman, September 21, 2016 Collaborative Defense of Transmission and Distribution Protection & Control Devices
Dmitry Ishchenko/Reynaldo Nuqui/Steve Kunsman, September 21, 2016 Collaborative Defense of Transmission and Distribution Protection & Control Devices Against Cyber Attacks (CODEF) Cyber Security of the
More informationCS3600 SYSTEMS AND NETWORKS
CS3600 SYSTEMS AND NETWORKS NORTHEASTERN UNIVERSITY Lecture 15: Networking overview Prof. (amislove@ccs.neu.edu) What is a network? 2 What is a network? Wikipedia: A telecommunications network is a network
More informationBRAND STANDARD GUIDELINES 2014
BRAND STANDARD GUIDELINES 2014 LOGO USAGE & TYPEFACES Logo Usage The Lackawanna College School of Petroleum & Natural Gas logo utilizes typography, two simple rule lines and the Lackawanna College graphic
More informationBitty Rover. Recommended Age: 12 and up Difficulty Level: 3/5 (Soldering Required, programming, connecting wires, small parts choking hazard)
Bitty Rover Bitty Rover V2.3 Assembly Instructions Recommended Age: 12 and up Difficulty Level: 3/5 (Soldering Required, programming, connecting wires, small parts choking hazard) www.rabbitrobots.com
More informationDan Murray, Siemens Energy Management Division
Design and Implementation of a Communication Network to Support Real-time Distribution Feeder Automation, SCADA Integration and Backhaul of Substation and Metering Data Dan Murray, Siemens Energy Management
More informationReminder: Homework 4. Due: Friday at the beginning of class
Reminder: Homework 4 Due: Friday at the beginning of class 1 Cryptography CS 555 Topic 33: Digital Signatures Part 2 2 Recap El-Gamal/RSA-OAEP Digital Signatures Similarities and differences with MACs
More information"Charting the Course... CA-View Administration. Course Summary
Course Summary Description This course is designed to teach all administrator functions of CA View from the system initialization parameters to integration with CA Deliver. Students will learn implementation
More informationModel NM512. TS1 Conflict Monitor Standard 12 Channel Unit. Naztec Operations Manual. For. Published by
Naztec Operations Manual For Model NM512 TS1 Conflict Monitor Standard 12 Channel Unit Published by Naztec, Inc. 820 Park Two Dr. Sugar Land, Texas 77478 Phone: (281) 2407233 Fax: (281) 240-7238 Copyright
More informationT.5 The Law of Sines and Cosines and Its Applications
1 T.5 The Law of Sines and Cosines and Its Applications The concepts of solving triangles developed in section T4 can be extended to all triangles. A triangle that is not right-angled is called an oblique
More informationInternational Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: Issue 2, Volume 2 (February 2015)
FAULT TOLERANCE IN WIRELESS SENSOR NETWORKS C.Ahila Jerlin #1 Anand Institute of Higher Technology, Department of ME Embedded System Technologies, Kazhipattur, Chennai-603103 N.Rajkamal #2 Anand Institute
More informationHIGH LEVEL REQUIREMENTS OF FAST SIMULATION AND MODELLING SUITE OF TOOLS FOR FUTURE SELF-HEALING DISTRIBUTION POWER SYSTEM
HIGH LEVEL REQUIREMENTS OF FAST SIMULATION AND MODELLING SUITE OF TOOLS FOR FUTURE SELF-HEALING DISTRIBUTION POWER SYSTEM A. Valenti* I Bel ** S. Lee *EDF **EPRI E2I ConEdison France USA USA arnaud.valenti@edf.fr
More information"Dynamic Distribution System, a new Architecture for the Integrated Grid"
1 "Dynamic Distribution System, a new Architecture for the Integrated Grid" Bruce Beihoff Tom Jahns Bob Lasseter University of Wisconsin Madison IEEE PES 2015 - Panel July 29,2015 2 Panel Presentation
More informationIndustrial Control. 50 to 5,000 VA. Applications. Specifications. Standards. Options and Accessories. Features, Functions, Benefits.
Industrial Control 6 50 to 5,000 VA Applications n For commercial and industrial control applications including; control panels, conveyor systems, machine tool equipment, pump systems, and commercial air
More informationIndustrial Control. 50 to 5,000 VA. Applications. Specifications. Standards. Options and Accessories. Features, Functions, Benefits.
Industrial Control 6 50 to 5,000 VA Applications n For commercial and industrial control applications including; control panels, conveyor systems, machine tool equipment, pump systems, and commercial air
More informationOptimization Frameworks for Wireless Network Coding Under Multi-hop Node Interference
Optimization Frameworks for Wireless Network Coding Under Multi-hop Node Interference Chengyu Xiong and Xiaohua Li Department of Electrical and Computer Engineering State University of New York at Binghamton
More informationInternational Journal of Industrial Engineering Computations
International Journal of Industrial Engineering Computations 7 (2016) 295 308 Contents lists available at GrowingScience International Journal of Industrial Engineering Computations homepage: www.growingscience.com/ijiec
More informationCyber Security of Power Grids
Cyber Security of Power Grids Chen-Ching Liu Boeing Distinguished Professor Director, Energy Systems Innovation Center Washington State University In Collaboration with M. Govindarasu, Iowa State University
More informationAnalysis of End-to-End Delay Characteristics among Various Packet Sizes in Modern Substation Communication Systems based on IEC 61850
Analysis of End-to-End Delay Characteristics among Various Packet Sizes in Modern Substation Communication Systems based on IEC 6185 Narottam Das, Senior Member, IEEE, Tze Jia Wong, and Syed Islam, Senior
More informationConnection Guide (RS-232C)
Machine Automation Controller NJ-series General-purpose Seriarl Connection Guide (RS-232C) OMRON Corporation G9SP Safety Controller P545-E1-01 About Intellectual Property Rights and Trademarks Microsoft
More informationLesson 1: Construct an Equilateral Triangle
Lesson 1 Lesson 1: Construct an Equilateral Triangle Classwork Opening Exercise Joe and Marty are in the park playing catch Tony joins them, and the boys want to stand so that the distance between any
More informationTRIGONOMETRY. T.1 Angles and Degree Measure
1 TRIGONOMETRY Trigonometry is the branch of mathematics that studies the relations between the sides and angles of triangles. The word trigonometry comes from the Greek trigōnon (triangle) and metron
More informationDigital Transformation of Power Delivery
Digital Transformation of Power Delivery Keynote Speech Professor Saifur Rahman, PhD Virginia Tech, USA IEEMA Engineer Infinite Conference, Delhi NCR, India, 14 March 2018 Traditional Electricity Delivery
More informationEnabling Smart Energy as a Service via 5G Mobile Network advances
NR 5 Enabling Smart Energy as a Service via 5G Mobile Network advances 5G-PPP Phase 2 at EuCNC Oulu Fiorentino Giampaolo giampaolo.fiorentino@eng.it SCOPE MOTIVATION NR 5 Insights behind... The state of
More informationT&D Technology Research Stem
T&D Technology Research Stem Highlights of T&D Stem Activity (2000-2005) Mladen Kezunovic Former Stem Leader IAB Meeting Madison, June 1, 2006 1 Outline History Research Areas Projects Survey Initiatives
More informationSecuring the Smart Grid. Understanding the BIG Picture 11/1/2011. Proprietary Information of Corporate Risk Solutions, Inc. 1.
Securing the Smart Grid Understanding the BIG Picture The Power Grid The electric power system is the most capital-intensive infrastructure in North America. The system is undergoing tremendous change
More informationChapter 8: Smart Grid Communication and Networking
Chapter 8: Smart Grid Communication and Networking Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Outline 1. The framework of smart grid 2. Network
More informationAutomated Threat Management - in Real Time. Vectra Networks
Automated Threat Management - in Real Time Security investment has traditionally been in two areas Prevention Phase Active Phase Clean-up Phase Initial Infection Key assets found in the wild $$$$ $$$ $$
More informationCommunications in the Utility Industry Trends and Examples
Communications in the Utility Industry Trends and Examples Matt Wakefield Director, Information, Communication & Cyber Security NARUC Winter Meeting: Spectrum, Spectrum Everywhere, Who Needs it and Why?
More informationGraphs and Linear Functions
Graphs and Linear Functions A -dimensional graph is a visual representation of a relationship between two variables given by an equation or an inequality. Graphs help us solve algebraic problems by analysing
More informationHave students complete the summary table, and then share as a class to make sure students understand concepts.
Closing (5 minutes) Have students complete the summary table, and then share as a class to make sure students understand concepts. Lesson Summary: We have just developed proofs for an entire family of
More informationTechnical Spotlight DEMO6-S6
Technical Spotlight DEMO6-S6 Spotlight on BPL communication implemented in DEMO6 This project has received funding from the European Union s Seventh Framework Programme for research, technological development
More informationCyber Physical System Security
S2ERC Industry Outreach Workshop Cyber Physical System Security Manimaran Govindarasu Dept. of Electrical and Computer Engineering Iowa State University gmani@iastate.edu Outline Background CPS Security
More informationHow to Register for Summer Camp. A Tutorial
How to Register for Summer Camp A Tutorial 1. Upon arriving at our website (https://flightcamp.ou.edu/), the very first step is logging in. Please click the Login link in the top left corner of the page
More informationAerodynamic optimization of low pressure axial fans with OpenFOAM
Aerodynamic optimization of low pressure axial fans with OpenFOAM 1, Max Hasenzahl 1, Prof. Dr.-Ing. Jens Friedrichs 2 1 Volkswagen AG (Cooling Development) 2 Institute of Jet Propulsion and Turbomachinery,
More informationTexture Mapping. Michael Kazhdan ( /467) HB Ch. 14.8,14.9 FvDFH Ch. 16.3, , 16.6
Texture Mapping Michael Kazhdan (61.457/467) HB Ch. 14.8,14.9 FvDFH Ch. 16.3, 16.4.5, 16.6 Textures We know how to go from this to this J. Birn Textures But what about this to this? J. Birn Textures How
More informationTeacher Assignment and Transfer Program (TATP) On-line Teacher Application Quick Sheets
Teacher Assignment and Transfer Program (TATP) On-line Teacher Application Quick Sheets February 2018 On-line Teacher Application Process Teachers interested in applying for any advertised vacancies in
More informationVirtualization And Self-organization For Utility Computing
University of Central Florida Electronic Theses and Dissertations Masters Thesis (Open Access) Virtualization And Self-organization For Utility Computing 2011 Mehdi Saleh University of Central Florida
More informationSecure Mission-Centric Operations in Cloud Computing
Secure Mission-Centric Operations in Cloud Computing Massimiliano Albanese, Sushil Jajodia, Ravi Jhawar, Vincenzo Piuri George Mason University, USA Università degli Studi di Milano, Italy ARO Workshop
More informationDependability Modeling Based on AADL Description (Architecture Analysis and Design Language)
Dependability Modeling Based on AADL Description (Architecture Analysis and Design Language) Ana Rugina, Karama Kanoun and Mohamed Kaâniche {rugina, kanoun, kaaniche}@laas.fr European Integrated Project
More informationProbabilistic Formal Verification of Communication Network-based Fault Detection, Isolation and Service Restoration System in Smart Grid
Probabilistic Formal Verification of Communication Network-based Fault Detection, Isolation and Service Restoration System in Smart Grid Syed Atif Naseem Izmir University of Economics, Izmir, Turkey. syedatifnaseem@gmail.com
More information