Search results
Results from the WOW.Com Content Network
Viewer/analysis functionality varies. Free COMTRADE viewers and analysis software include advanced functionality (e.g. protection relay behavior analysis (line/transformer differential/impedance protection, fault/harmonic analysis, user-defined mathematical expressions, analysis and plots, COMTRADE file editing and creation, etc..
Counter-IED efforts involve conducting specialized analysis to identify vulnerabilities, inter-dependencies, and cascading effects of the IED threat network Nodal Activity Model. These vulnerability assessments are the foundation of a risk-based implementation of protective programs designed to prevent, deter, and mitigate the risk of an IED ...
This file contains only the data for the IED being configured: one IED section, the communication section with the IED's communication parameters, the IED's data type templates, and, optionally, a substation section with the binding of functions (LNodes) to the single line diagram.
Protective relay is an example of an intelligent electronic device. In the electric power industry, an intelligent electronic device (IED) is an integrated microprocessor-based controller of power system equipment, such as circuit breakers, transformers and capacitor banks. [1]
A variety of technologies are used to detect landmines, improvised explosive devices (IED) and unexploded ordnance (UXO), including acoustic sensors, animals and biologically-based detection systems (bees, dogs, pigs, rats), chemical sensors, electromagnetic sensors and hyperspectral sensor analysis, generalized radar techniques, ground ...
IEC 61850 is an international standard defining communication protocols for intelligent electronic devices at electrical substations.It is a part of the International Electrotechnical Commission's (IEC) Technical Committee 57 reference architecture for electric power systems. [1]
Activity diagrams [1] are graphical representations of workflows of stepwise activities and actions [2] with support for choice, iteration, and concurrency. In the Unified Modeling Language, activity diagrams are intended to model both computational and organizational processes (i.e., workflows), as well as the data flows intersecting with the related activities.
It can be understood as representing the time, effort, and resources required to move from one event to another. A PERT activity cannot be performed until the predecessor event has occurred. PERT sub-activity: a PERT activity can be further decomposed into a set of sub-activities. For example, activity A1 can be decomposed into A1.1, A1.2 and A1.3.