Results 81 to 90 of about 1,316,650 (313)

Quantifying cyber risk: A model for evaluating safety impacts of cyber threats on NPPs

open access: yesNuclear Engineering and Technology
The quantitative cyber risk assessment approach presented in this paper is specifically tailored to meet the operational and safety needs of Nuclear Power Plants (NPPs).
Kwang-Seop Son   +3 more
doaj   +1 more source

Unique Performance Considerations for Printable Organic Semiconductor and Perovskite Radiation Detectors: Toward Consensus on Best Practice Evaluation

open access: yesAdvanced Functional Materials, EarlyView.
A lack of standard approaches for testing and reporting the performance of metal halide perovskites and organic semiconductor radiation detectors has resulted in inconsistent interpretation of performance parameters, impeding progress in the field. This Perspective recommends key metrics and experimental details, which are suggested for reporting in ...
Jessie A. Posar   +8 more
wiley   +1 more source

Pilot Protection for Converter-interconnected Lines Based on Multi-stage Mutation of Fault Current

open access: yesZhongguo dianli
The introduction of power electronic converters has altered the fault characteristics of the traditional power grids. Traditional differential protection is inadequate to meet protection requirements when AC lines experience faults, leading to reduced ...
Zhaoyi SHA   +4 more
doaj   +1 more source

Research on Short-Term Load Prediction Based on Seq2seq Model

open access: yesEnergies, 2019
Electricity load prediction is the primary basis on which power-related departments to make logical and effective generation plans and scientific scheduling plans for the most effective power utilization.
Gangjun Gong   +5 more
doaj   +1 more source

Technological Solutions for Energy Security and Sustainability [PDF]

open access: yes, 2008
This paper addresses the question: how can we minimize the expected time between now and the time when we achieve three measures of sustainability and security together -- independence from oil in cars and trucks, very deep reductions in greenhouse gas ...
Paul J. Werbos
core   +1 more source

Towards a Secure Smart Grid Storage Communications Gateway

open access: yes, 2017
This research in progress paper describes the role of cyber security measures undertaken in an ICT system for integrating electric storage technologies into the grid.
Marksteiner, Stefan, Vallant, Heribert
core   +1 more source

Stable and Dendrite‐Free Zinc Metal Anodes Via Interface Nanoarchitectonics for Aqueous Zinc‐Ion Batteries

open access: yesAdvanced Functional Materials, EarlyView.
This review explores Zn anode challenges in aqueous ZIBs, including dendrites, corrosion, and side reactions, and discusses strategies for improvement through Zn anode, electrolyte, and separator modifications to enhance stability and efficiency. Abstract Aqueous rechargeable zinc‐ion batteries (ZIBs) are emerging as promising candidates for next ...
Pragati A. Shinde   +5 more
wiley   +1 more source

Malicious Attack Correlation Analysis Method of Source-Grid-Load System under Specific Attack Scenarios

open access: yesZhongguo dianli, 2019
The key for the power grid to deal with cyber security threats is to make full use of cyber and electrical information to improve the self-adaptation ability and automation for identification of malicious attack event.
Rui ZHANG   +5 more
doaj   +1 more source

A review of technology assessment of green gasoline processing

open access: yesEnergy Reports, 2020
Bio-based energy has become one of the most desired energy sources before oil discovery for its efficient combustion and low price. However, the extensive use of fossil fuel and the depletion of oil reserves creating a more increasing level and ...
Khoirun Naimah   +4 more
doaj   +1 more source

Green Security Plugin for Pervasive Computing using the HADAS toolkit [PDF]

open access: yes, 2017
Energy is a critical resource in pervasive computing devices. However, information about energy consumption is not directly accessible through software development environments, making it difficult to reuse the knowledge provided by existing energy ...
Fuentes, Lidia   +3 more
core  

Home - About - Disclaimer - Privacy