Abstracts - faqs.org

Abstracts

Electronics

Search abstracts:
Abstracts » Electronics

Survey of knowledge-based systems in power systems: Europe

Article Abstract:

Knowledge-based systems in power systems in Europe are the result of technical breakthroughs since the 1950s, the evolution towards minicomputer and workstations and the need for better energy management systems. Research and development laboratories at several large public electric utilities have carried out experiments with electric power systems. The three main ways to study power systems is to use the top-down approach, bottom-up approach in depth and the the bottom-up approach in width. Expert systems are becoming more market-oriented and are no longer considered to be future replacements of human operators, but rather improved methods for structuring software and information. Approximately 25 percent of all knowledge-based systems cover fault diagnosis and alarm handling. Artificial intelligence and object-oriented tools provide the interface in about 60 percent of all cases.

Author: Germond, Alain J., Niebur, Dagmar
Publisher: Institute of Electrical and Electronics Engineers, Inc.
Publication Name: Proceedings of the IEEE
Subject: Electronics
ISSN: 0018-9219
Year: 1992
Electronic computers, Europe, Expert systems, Knowledge-based systems, Electric power plants, Control systems, Power Systems, Knowledge-Based System, Power Plants, Alarms, Diagnostics

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


A survey of information authentication

Article Abstract:

Assuring that communicated information as identical to the form originally transmitted is vital to all participants, whether in private, governmental, or commercial applications. The major concern currently is authentication when the transmission of information involves no physical instrument. The ideal strategy is validation of the information on the basis of the internal structure of the information itself, but a separate, though non-secure, authentication channel is the common method. That authentication channel generally consists of the transmitter, the legitimate receiver, an arbiter, and the opponent, who it is assumed can eavesdrop. Authentication schemes are classified as computationally secure, provably secure, or unconditionally secure. Details and practice of schemes are described.

Author: Simmons, Gustavus J.
Publisher: Institute of Electrical and Electronics Engineers, Inc.
Publication Name: Proceedings of the IEEE
Subject: Electronics
ISSN: 0018-9219
Year: 1988
Data security, Trends, Validation, Algorithm Analysis

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


Cryptanalysis: a survey of recent results

Article Abstract:

Most cryptosystems have been broken since the late 1970s, but there are several single-key and public-key cryptosystems for which there are no viable attack strategies. Among the single- and two-key cryptosystems that have been attacked successfully are knapsack cryptosystems, congruential generators, Ong, Schnorr, and Shamir signature schemes, and Okamoto-Shiraishi schemes; their cryptanalysis is briefly described. Systems for which there are no known attack strategies include the RSA (Rivest, Shamir, and Adleman) two-key cryptosystem, discrete exponentiation, the McEliece cryptosystem, and the full implementation of the Data Encryption Standard.

Author: Brickell, Ernest F., Odlyzko, Andrew M.
Publisher: Institute of Electrical and Electronics Engineers, Inc.
Publication Name: Proceedings of the IEEE
Subject: Electronics
ISSN: 0018-9219
Year: 1988
Encryption, Data encryption, Technology, Product introduction, Implementation, New Technique, Public Key Cryptosystems

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


Subjects list: Industrial research, Cryptography, Research and Development, Survey, Methods, technical
Similar abstracts:
  • Abstracts: On-line power system security analysis. Knowledge-based systems as operational aids in power system restoration
  • Abstracts: Automated conversion of engineering drawings to CAD form. Scanning the issue: knowledge-based systems in electric power systems
  • Abstracts: Fault diagnosis of power systems. Neural network model for control of muscle force based on the size principle of motor unit
  • Abstracts: Nonconvex optimization by fast simulated anealing. Optimization-based methods for operations scheduling. Security analysis and optimization
  • Abstracts: Adaptive processing array systems. Robust adaptive control: a unified approach
This website is not affiliated with document authors or copyright owners. This page is provided for informational purposes only. Unintentional errors are possible.
Some parts © 2025 Advameg, Inc.