enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Counter-IED efforts - Wikipedia

    en.wikipedia.org/wiki/Counter-IED_efforts

    Counter-IED efforts involve conducting specialized analysis to identify vulnerabilities, inter-dependencies, and cascading effects of the IED threat network Nodal Activity Model. These vulnerability assessments are the foundation of a risk-based implementation of protective programs designed to prevent, deter, and mitigate the risk of an IED ...

  3. Counter-IED equipment - Wikipedia

    en.wikipedia.org/wiki/Counter-IED_equipment

    IED Countermeasure Equipment (ICE): In the fall of 2004, the Army Research Laboratory (ARL) at White Sands Missile Range in New Mexico and New Mexico State University's Physical Science Laboratory developed a jamming system that uses low-power radio frequency energy to block the radio signals that detonate enemy IEDs.

  4. Comtrade - Wikipedia

    en.wikipedia.org/wiki/Comtrade

    Viewer/analysis functionality varies. Free COMTRADE viewers and analysis software include advanced functionality (e.g. protection relay behavior analysis (line/transformer differential/impedance protection, fault/harmonic analysis, user-defined mathematical expressions, analysis and plots, COMTRADE file editing and creation, etc..

  5. Improvised explosive device - Wikipedia

    en.wikipedia.org/wiki/Improvised_explosive_device

    An IED has five components: a switch (activator), an initiator (fuse), container (body), charge (explosive), and a power source (battery). An IED designed for use against armoured targets such as personnel carriers or tanks will be designed for armour penetration, by using a shaped charge that creates an explosively formed penetrator. IEDs are ...

  6. Substation Configuration Language - Wikipedia

    en.wikipedia.org/wiki/Substation_Configuration...

    It can be considered as an SCD file stripped down to what the concerned IED need to know and contains a mandatory communication section of the addressed IED. Instantiated IED Description (IID) file: It defines the configuration of one IED for a project and is used as data exchange format from the IED configurator to the system configurator.

  7. Intelligent electronic device - Wikipedia

    en.wikipedia.org/wiki/Intelligent_electronic_device

    Protective relay is an example of an intelligent electronic device. In the electric power industry, an intelligent electronic device (IED) is an integrated microprocessor-based controller of power system equipment, such as circuit breakers, transformers and capacitor banks. [1]

  8. IEC 61850 - Wikipedia

    en.wikipedia.org/wiki/IEC_61850

    IEC 61850 is an international standard defining communication protocols for intelligent electronic devices at electrical substations.It is a part of the International Electrotechnical Commission's (IEC) Technical Committee 57 reference architecture for electric power systems. [1]

  9. Program evaluation and review technique - Wikipedia

    en.wikipedia.org/wiki/Program_Evaluation_and...

    It can be understood as representing the time, effort, and resources required to move from one event to another. A PERT activity cannot be performed until the predecessor event has occurred. PERT sub-activity: a PERT activity can be further decomposed into a set of sub-activities. For example, activity A1 can be decomposed into A1.1, A1.2 and A1.3.