1982
DOI: 10.1109/tpas.1982.317108
|View full text |Cite
|
Sign up to set email alerts
|

An On-Line Method for Transmission Ampacity Evaluation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

1996
1996
2020
2020

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(2 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…This allows DTR releasing the unused capacities of power equipment in contrast to precalculated ratings. Later, DTR features were implemented in different online-monitoring systems for transformers [41][42][43][44][45][46][47] and their relay protection [17,[48][49][50][51][52][53][54]. After more than twenty years followed first publication on DTR, Douglass and al.…”
Section: Literature Review On Transformer Limitsmentioning
confidence: 99%
“…This allows DTR releasing the unused capacities of power equipment in contrast to precalculated ratings. Later, DTR features were implemented in different online-monitoring systems for transformers [41][42][43][44][45][46][47] and their relay protection [17,[48][49][50][51][52][53][54]. After more than twenty years followed first publication on DTR, Douglass and al.…”
Section: Literature Review On Transformer Limitsmentioning
confidence: 99%
“…"China has built the world's largest video surveillance network, with more than 20 million video cameras," CCTV's documentary "Glorious China" reported. But on the other hand, the invasion, hijacking and legal information sales of cameras once constituted an industrial chain, and their impact was not limited to privacy leakage, but is also spreading to criminal cases and even to some areas such as national defense security information, financial trading information, commercial office secrets [1], etc.During the outbreak of blackmail virus in May 2017, more than 120, 000 network cameras around the world were hacked as springboards for virus transmission and attacks [2].On July 26, 2018, the Science, Technology and Information Technology Bureau of the Ministry of Public Security informed the Ningdu County Public Security Bureau that on July 24, a video private network and a dual network card server in public security network of the Traffic Control Brigade of the Ningdu County Public Security Bureau scanned a large number of servers of the national public security network servers [3].After the initial investigation by Ningdu County Public Security Bureau, it was found that the server was illegally invaded.Someone used hacker technology to invade the computers of public security network and install the Monroe coin mining software [4,5].…”
Section: Introductionmentioning
confidence: 99%