Adaptive artificial neural network for power system security assessment and control action
The mission of the power system operator has become more difficult than before due to the increasing of load demand which cause power systems to operate closer to its security limits. In addition, the control actions depend on the operating status of the power system whether it is operating in secu...
| Main Author: | Al-Masri, Ahmed Naufal A. |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2012
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/38606/ http://psasir.upm.edu.my/id/eprint/38606/1/FK%202012%2064R.pdf |
Similar Items
Simulation of an adaptive artificial neural network for power system security enhancement including control action
by: Al-Masri, Ahmed Naufal A., et al.
Published: (2015)
by: Al-Masri, Ahmed Naufal A., et al.
Published: (2015)
Control action based on steady-state security assessment using an artificial neural network
by: Al-Masri, Ahmed Naufal A., et al.
Published: (2010)
by: Al-Masri, Ahmed Naufal A., et al.
Published: (2010)
Network security situation awareness based on indicators extracted
by: Xie, Zeqiang
Published: (2016)
by: Xie, Zeqiang
Published: (2016)
Electronic Book of Network Security: Introduction to Network Security
by: Hoo, Cheong Yee
Published: (2003)
by: Hoo, Cheong Yee
Published: (2003)
An improved user authentication model for mobile application systems
by: Mohamed, Kartini
Published: (2017)
by: Mohamed, Kartini
Published: (2017)
A novel implementation for generator rotor angle stability prediction using an adaptive artificial neural network application for dynamic security assessment
by: Al-Masri, Ahmed Naufal A., et al.
Published: (2013)
by: Al-Masri, Ahmed Naufal A., et al.
Published: (2013)
Security Improvement of Unicast Management Frames In Ieee 802.11 Mac Layer
by: Malekzadeh, Mina
Published: (2007)
by: Malekzadeh, Mina
Published: (2007)
Risk awareness model for security and privacy in social networking sites from the users’ perspective
by: Abiodun, Balogun Kamoru
Published: (2021)
by: Abiodun, Balogun Kamoru
Published: (2021)
Differences in job security satisfaction between native and migrant workers in Australia: Exploring gender dimensions
by: Shah, S., et al.
Published: (2011)
by: Shah, S., et al.
Published: (2011)
Proof-Carrying Code for Verifying Confidentiality of Mobile Code through Secure Information Flow Analysis
by: Abdu Muthana, Abdulrahman Ahmad
Published: (2008)
by: Abdu Muthana, Abdulrahman Ahmad
Published: (2008)
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
by: H. Belgassem, Seddeq
Published: (2004)
by: H. Belgassem, Seddeq
Published: (2004)
Information security policy compliance model for government agency
by: Ramli, Muhamad Amirnazmi
Published: (2018)
by: Ramli, Muhamad Amirnazmi
Published: (2018)
Energy trust system for detecting sybil attacks in clustered wireless sensor network
by: Hussein, Noor Sabeeh
Published: (2016)
by: Hussein, Noor Sabeeh
Published: (2016)
Secure lightweight client for cloud-based E-Health Model
by: Zhang, Xiaowei
Published: (2023)
by: Zhang, Xiaowei
Published: (2023)
An efficient anomaly intrusion detection method with evolutionary neural network
by: Sarvari, Samira
Published: (2020)
by: Sarvari, Samira
Published: (2020)
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
by: Hydara, Isatou
Published: (2024)
by: Hydara, Isatou
Published: (2024)
Security framework based multi agent system architecture to facilitate data fetching from cloud data storage
by: Mohamed, Amir Mohamed Talib
Published: (2012)
by: Mohamed, Amir Mohamed Talib
Published: (2012)
A new security framework to prevent denial of service and replay attacks for IEEE 802.11 wireless networks
by: Malekzadeh, Mina
Published: (2011)
by: Malekzadeh, Mina
Published: (2011)
An efficient crime group of secured data sharing scheme in cloud
by: Rashid, Mustafa Noori
Published: (2018)
by: Rashid, Mustafa Noori
Published: (2018)
Static power system security assessment via artificial neural network.
by: Jasni, Jasronita, et al.
Published: (2011)
by: Jasni, Jasronita, et al.
Published: (2011)
Static security assessment on power system using artificial neural network
by: Rahmat, Mohd. Fadli
Published: (2005)
by: Rahmat, Mohd. Fadli
Published: (2005)
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
by: Hadi, Ahmed Adnan
Published: (2022)
by: Hadi, Ahmed Adnan
Published: (2022)
Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector
by: Abdulkader, Zaid A.
Published: (2018)
by: Abdulkader, Zaid A.
Published: (2018)
An experimental evaluation of DoS attack and its impact on throughput of IEEE 802.11 wireless networks
by: Malekzadeh, Mina, et al.
Published: (2008)
by: Malekzadeh, Mina, et al.
Published: (2008)
Security Enhancement of Route Optimization in Mobile IPv6 Networks
by: Zare Anari, Abbas Mehdizadeh
Published: (2008)
by: Zare Anari, Abbas Mehdizadeh
Published: (2008)
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
Globalisation and the labour market: an analysis of job stability and job security in Britain
by: Prajapati, Bina
Published: (2011)
by: Prajapati, Bina
Published: (2011)
Secure authentication for sensitive digital systems in mobile devices
by: Hussein, Khalid Waleed
Published: (2016)
by: Hussein, Khalid Waleed
Published: (2016)
A machine learning-based anomaly detection framework for connected and autonomous vehicles cyber security
by: He, Qiyi
Published: (2021)
by: He, Qiyi
Published: (2021)
Design of a lightweight virtual honeynet based on linux container virtualization
by: Memari, Nogol
Published: (2014)
by: Memari, Nogol
Published: (2014)
Fake review annotation model and classification through reviewers' writing style
by: Shojaee, Somayeh
Published: (2019)
by: Shojaee, Somayeh
Published: (2019)
Transient security assessment for power system stability: a review on artificial intelligence approach
by: Al-Masri, Ahmed Naufal A., et al.
Published: (2009)
by: Al-Masri, Ahmed Naufal A., et al.
Published: (2009)
Job security satisfaction in Australia: do migrant characteristics and gender matter?
by: Ong, Rachel, et al.
Published: (2012)
by: Ong, Rachel, et al.
Published: (2012)
Scientific forensic framework for smartphones
by: Shahpasand, Maryam
Published: (2015)
by: Shahpasand, Maryam
Published: (2015)
Hybrid cryptography algorithm to improve security cloud storage
by: Abd Almohsen, Inam Razzaq
Published: (2017)
by: Abd Almohsen, Inam Razzaq
Published: (2017)
"They can't take a trade off you" - varying perceptions of job security over 50 years at the Midland Government Railway Workshops
by: Oliver, Bobbie
Published: (2007)
by: Oliver, Bobbie
Published: (2007)
Java - based Sony Ericsson phone book manager using bluetooth / Farahani Che Khosni
by: Che Khosni, Farahani
Published: (2005)
by: Che Khosni, Farahani
Published: (2005)
Announcement system using wap over bluetooth / Azhan Ezra Abdul Aziz
by: Abdul Aziz, Azhan Ezra
Published: (2006)
by: Abdul Aziz, Azhan Ezra
Published: (2006)
Detecting coordinated distributed attacks using mobile agents with associated managers architecture
by: Javan, Ali
Published: (2011)
by: Javan, Ali
Published: (2011)
The influence of usable security on security culture
by: Fallatah, Wesam
Published: (2025)
by: Fallatah, Wesam
Published: (2025)
Similar Items
-
Simulation of an adaptive artificial neural network for power system security enhancement including control action
by: Al-Masri, Ahmed Naufal A., et al.
Published: (2015) -
Control action based on steady-state security assessment using an artificial neural network
by: Al-Masri, Ahmed Naufal A., et al.
Published: (2010) -
Network security situation awareness based on indicators extracted
by: Xie, Zeqiang
Published: (2016) -
Electronic Book of Network Security: Introduction to Network Security
by: Hoo, Cheong Yee
Published: (2003) -
An improved user authentication model for mobile application systems
by: Mohamed, Kartini
Published: (2017)