Results 231 to 240 of about 1,764,419 (291)
Strengthening disaster preparedness and health security in Niger state, Nigeria through a WHO STAR-based multi-hazard risk assessment. [PDF]
Awoyale OD +14 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
1988., IEEE International Symposium on Circuits and Systems, 2003
The authors discuss aspect-operator-test graphs, a method for representing and evaluating engineering tasks, and apply them to power system security assessment. The result indicates where research is most needed. An analysis of existing practices for short-term security assessment shows that their greatest weakness is their complete lack of clearly ...
S.N. Talukdar, R.D. Christie
openaire +1 more source
The authors discuss aspect-operator-test graphs, a method for representing and evaluating engineering tasks, and apply them to power system security assessment. The result indicates where research is most needed. An analysis of existing practices for short-term security assessment shows that their greatest weakness is their complete lack of clearly ...
S.N. Talukdar, R.D. Christie
openaire +1 more source
Proceedings of the Institution of Electrical Engineers, 1975
The analysis of security assessment has evolved from load-flow techniques to evaluate system response for credible outages of transmission and generating plant or loss of loads. The a.c. security assessment described, based on a decoupled load flow, provides a better insight into the state of the system than does the conventional d.c.
F.G. Vervloet, A. Brameller
openaire +1 more source
The analysis of security assessment has evolved from load-flow techniques to evaluate system response for credible outages of transmission and generating plant or loss of loads. The a.c. security assessment described, based on a decoupled load flow, provides a better insight into the state of the system than does the conventional d.c.
F.G. Vervloet, A. Brameller
openaire +1 more source
Metric Based Security Assessment
2004This chapter introduces the Metrics Based Security Assessment (MBSA) as a means of measuring an organization’s information security maturity. It argues that the historical (i.e., first through third generations) approaches used to assess/ensure system security are not effective and thereby combines the strengths of two industry proven information ...
James E. Goldman, Vaughn R. Christie
openaire +1 more source
Secure Blockchain: Assessing Specific Security Threats
2021Blockchain technology originates from the Bitcoin system, and due to its great success it can draw awareness to other fields because of its global acceptable features like decentralization, anonymity, and audibility. Other than finance, blockchain technology has evolved in various applications like legal, supply chain, health care, etc.
Ganguly Ananya +3 more
openaire +1 more source
Climate change impacts on plant pathogens, food security and paths forward
Nature Reviews Microbiology, 2023Brajesh K Singh +2 more
exaly
The rumen microbiome: balancing food security and environmental impacts
Nature Reviews Microbiology, 2021Itzhak Mizrahi, Robert Wallace
exaly
Abstract Chapter 2 discusses the application of a national security standard in merger review. It argues that even if this concept is not well-defined, it is commonly used to shape regulations seeking to address concerns arising from foreign investment.
openaire +1 more source
openaire +1 more source

