Survey of knowledge-based systems in power systems: Europe
Article Abstract:
Knowledge-based systems in power systems in Europe are the result of technical breakthroughs since the 1950s, the evolution towards minicomputer and workstations and the need for better energy management systems. Research and development laboratories at several large public electric utilities have carried out experiments with electric power systems. The three main ways to study power systems is to use the top-down approach, bottom-up approach in depth and the the bottom-up approach in width. Expert systems are becoming more market-oriented and are no longer considered to be future replacements of human operators, but rather improved methods for structuring software and information. Approximately 25 percent of all knowledge-based systems cover fault diagnosis and alarm handling. Artificial intelligence and object-oriented tools provide the interface in about 60 percent of all cases.
Publication Name: Proceedings of the IEEE
Subject: Electronics
ISSN: 0018-9219
Year: 1992
User Contributions:
Comment about this article or add new information about this topic:
A survey of information authentication
Article Abstract:
Assuring that communicated information as identical to the form originally transmitted is vital to all participants, whether in private, governmental, or commercial applications. The major concern currently is authentication when the transmission of information involves no physical instrument. The ideal strategy is validation of the information on the basis of the internal structure of the information itself, but a separate, though non-secure, authentication channel is the common method. That authentication channel generally consists of the transmitter, the legitimate receiver, an arbiter, and the opponent, who it is assumed can eavesdrop. Authentication schemes are classified as computationally secure, provably secure, or unconditionally secure. Details and practice of schemes are described.
Publication Name: Proceedings of the IEEE
Subject: Electronics
ISSN: 0018-9219
Year: 1988
User Contributions:
Comment about this article or add new information about this topic:
Cryptanalysis: a survey of recent results
Article Abstract:
Most cryptosystems have been broken since the late 1970s, but there are several single-key and public-key cryptosystems for which there are no viable attack strategies. Among the single- and two-key cryptosystems that have been attacked successfully are knapsack cryptosystems, congruential generators, Ong, Schnorr, and Shamir signature schemes, and Okamoto-Shiraishi schemes; their cryptanalysis is briefly described. Systems for which there are no known attack strategies include the RSA (Rivest, Shamir, and Adleman) two-key cryptosystem, discrete exponentiation, the McEliece cryptosystem, and the full implementation of the Data Encryption Standard.
Publication Name: Proceedings of the IEEE
Subject: Electronics
ISSN: 0018-9219
Year: 1988
User Contributions:
Comment about this article or add new information about this topic:
- Abstracts: On-line power system security analysis. Knowledge-based systems as operational aids in power system restoration
- Abstracts: Automated conversion of engineering drawings to CAD form. Scanning the issue: knowledge-based systems in electric power systems
- Abstracts: Fault diagnosis of power systems. Neural network model for control of muscle force based on the size principle of motor unit
- Abstracts: Nonconvex optimization by fast simulated anealing. Optimization-based methods for operations scheduling. Security analysis and optimization
- Abstracts: Adaptive processing array systems. Robust adaptive control: a unified approach