enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Counter-IED efforts - Wikipedia

    en.wikipedia.org/wiki/Counter-IED_efforts

    Counter-IED efforts involve conducting specialized analysis to identify vulnerabilities, inter-dependencies, and cascading effects of the IED threat network Nodal Activity Model. These vulnerability assessments are the foundation of a risk-based implementation of protective programs designed to prevent, deter, and mitigate the risk of an IED ...

  3. Comtrade - Wikipedia

    en.wikipedia.org/wiki/Comtrade

    Viewer/analysis functionality varies. Free COMTRADE viewers and analysis software include advanced functionality (e.g. protection relay behavior analysis (line/transformer differential/impedance protection, fault/harmonic analysis, user-defined mathematical expressions, analysis and plots, COMTRADE file editing and creation, etc..

  4. Counter-IED equipment - Wikipedia

    en.wikipedia.org/wiki/Counter-IED_equipment

    Joint IED Neutralizer (JIN): In 2005, Ionatron attempted to develop an anti IED device that would "zap" IEDs from a distance by using lasers to ionize the air and allow man-made lightning to shoot towards the devices detonating them at a safe distance. By using femtosecond lasers light pulses that last less than a ten-trillionth of a second JIN ...

  5. Intelligent electronic device - Wikipedia

    en.wikipedia.org/wiki/Intelligent_electronic_device

    Protective relay is an example of an intelligent electronic device. In the electric power industry, an intelligent electronic device (IED) is an integrated microprocessor-based controller of power system equipment, such as circuit breakers, transformers and capacitor banks. [1]

  6. List of spreadsheet software - Wikipedia

    en.wikipedia.org/wiki/List_of_spreadsheet_software

    Both free and paid versions are available. It can handle Microsoft Excel .xls and .xlsx files, and also produce other file formats such as .et, .txt, .csv, .pdf, and .dbf. It supports multiple tabs, VBA macro and PDF converting. [10] Lotus SmartSuite Lotus 123 – for MS Windows. In its MS-DOS (character cell) version, widely considered to be ...

  7. Program evaluation and review technique - Wikipedia

    en.wikipedia.org/wiki/Program_Evaluation_and...

    It can be understood as representing the time, effort, and resources required to move from one event to another. A PERT activity cannot be performed until the predecessor event has occurred. PERT sub-activity: a PERT activity can be further decomposed into a set of sub-activities. For example, activity A1 can be decomposed into A1.1, A1.2 and A1.3.

  8. Activity diagram - Wikipedia

    en.wikipedia.org/wiki/Activity_diagram

    Activity diagrams [1] are graphical representations of workflows of stepwise activities and actions [2] with support for choice, iteration, and concurrency. In the Unified Modeling Language, activity diagrams are intended to model both computational and organizational processes (i.e., workflows), as well as the data flows intersecting with the related activities.

  9. Improvised explosive device - Wikipedia

    en.wikipedia.org/wiki/Improvised_explosive_device

    An IED has five components: a switch (activator), an initiator (fuse), container (body), charge (explosive), and a power source (battery). An IED designed for use against armoured targets such as personnel carriers or tanks will be designed for armour penetration, by using a shaped charge that creates an explosively formed penetrator. IEDs are ...