Search results
Results from the WOW.Com Content Network
Counter-IED efforts involve conducting specialized analysis to identify vulnerabilities, inter-dependencies, and cascading effects of the IED threat network Nodal Activity Model. These vulnerability assessments are the foundation of a risk-based implementation of protective programs designed to prevent, deter, and mitigate the risk of an IED ...
Viewer/analysis functionality varies. Free COMTRADE viewers and analysis software include advanced functionality (e.g. protection relay behavior analysis (line/transformer differential/impedance protection, fault/harmonic analysis, user-defined mathematical expressions, analysis and plots, COMTRADE file editing and creation, etc..
Joint IED Neutralizer (JIN): In 2005, Ionatron attempted to develop an anti IED device that would "zap" IEDs from a distance by using lasers to ionize the air and allow man-made lightning to shoot towards the devices detonating them at a safe distance. By using femtosecond lasers light pulses that last less than a ten-trillionth of a second JIN ...
Protective relay is an example of an intelligent electronic device. In the electric power industry, an intelligent electronic device (IED) is an integrated microprocessor-based controller of power system equipment, such as circuit breakers, transformers and capacitor banks. [1]
Both free and paid versions are available. It can handle Microsoft Excel .xls and .xlsx files, and also produce other file formats such as .et, .txt, .csv, .pdf, and .dbf. It supports multiple tabs, VBA macro and PDF converting. [10] Lotus SmartSuite Lotus 123 – for MS Windows. In its MS-DOS (character cell) version, widely considered to be ...
It can be understood as representing the time, effort, and resources required to move from one event to another. A PERT activity cannot be performed until the predecessor event has occurred. PERT sub-activity: a PERT activity can be further decomposed into a set of sub-activities. For example, activity A1 can be decomposed into A1.1, A1.2 and A1.3.
Activity diagrams [1] are graphical representations of workflows of stepwise activities and actions [2] with support for choice, iteration, and concurrency. In the Unified Modeling Language, activity diagrams are intended to model both computational and organizational processes (i.e., workflows), as well as the data flows intersecting with the related activities.
An IED has five components: a switch (activator), an initiator (fuse), container (body), charge (explosive), and a power source (battery). An IED designed for use against armoured targets such as personnel carriers or tanks will be designed for armour penetration, by using a shaped charge that creates an explosively formed penetrator. IEDs are ...