• No results found

A model-based approach for automatic validation of protection settings

N/A
N/A
Protected

Academic year: 2019

Share "A model-based approach for automatic validation of protection settings"

Copied!
8
0
0

Loading.... (view fulltext now)

Full text

Loading

Figure

Fig. 1. The principle of MBR [12]
Fig. 4. Example equivalent network model used for validation of differential protection scheme
Fig. 6. The process for protection settings validation using MBST
Fig. 7. The use of MBST prototype for the validation of protection settings

References

Related documents

The Eligible Services List specifically identifies network management and monitoring functionality as ineligible as a Basic Maintenance service, and makes no statement on the

Of these, 125 were intraosseous cystic lesions of the jaws of which, 81 (64.8%) were developmental in origin, 42 (33.6%) were inflammatory in origin and the rest of the

Surgical Site Infection Reduction Through Nasal Decolonization Prior to Surgery..

In order to obtain androgen-dependent prostate can- cer cell-specific antibody fragments, seven rounds of screening and enrichment were completed with a yeast- displayed scFv

ECHAM5 Fortran 90 BLAS, LAPACK, NetCDF MPI/OpenMP read at start, write periodically. NEMO Fortran 90 NetCDF MPI read at start,

Evaluation of Dermal Exposure to Polycyclic Aromatic Hydrocarbons Using DREAM Method in Production of Bituminous Waterproofing.. Archives of