20 results on '"security parameters"'
Search Results
2. Automated setup system security configuration of network equipment.
- Author
-
Kapiton, А. M., Skakalina, О. V., Tyshсhenko, D. O., and Franchuk, Т. M.
- Subjects
COMPUTER security ,COMMUNICATION ,INTERNET security ,INFORMATION technology ,DEPLOYMENT (Military strategy) - Abstract
A model of the system for automated setting of network equipment security configuration is proposed. In order to improve the security configuration of network equipment, a set of existing security threats in modern information and communication networks was analyzed. It was determined that with the increase in the level of introduction of information technologies in the life of the individual, society and the state, the level of danger in the cyber space increases. The general trends of ensuring cyber security at all levels are considered. The types of threats to users are systematized and their properties are considered. Based on the results of the study, it was determined that the cloud approach is the most appropriate for infrastructure deployment. Cloud services are considered and approaches to the automation of infrastructure deployment are defined, which provide an opportunity to minimize errors in the configuration of the architecture. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
3. Image Encryption Using Chaotic Maps: A Survey
- Author
-
Sharma, Madhu, Ranjan, Ranjeet Kumar, Bharti, Vishal, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Kumar, Rajesh, editor, Ahn, Chang Wook, editor, Sharma, Tarun K., editor, Verma, Om Prakash, editor, and Agarwal, Anand, editor
- Published
- 2022
- Full Text
- View/download PDF
4. Construction of Membership Functions for Fuzzy Management of Security Information and Events
- Author
-
Kotenko, Igor, Parashchuk, Igor, Kacprzyk, Janusz, Series Editor, Kravets, Alla G., editor, Bolshakov, Alexander A., editor, and Shcherbakov, Maxim, editor
- Published
- 2022
- Full Text
- View/download PDF
5. Security Assessment of SAODV Protocols in Mobile Ad hoc Networks
- Author
-
Soni, Megha, Joshi, Brijendra Kumar, Xhafa, Fatos, Series Editor, Mishra, Durgesh Kumar, editor, Yang, Xin-She, editor, and Unal, Aynur, editor
- Published
- 2019
- Full Text
- View/download PDF
6. Linear Complementary Codes: Novel Hardware Trojan Prevention and Detection Approach
- Author
-
Ngo, Xuan Thuy, Guilley, Sylvain, Danger, Jean-Luc, Bossuet, Lilian, editor, and Torres, Lionel, editor
- Published
- 2017
- Full Text
- View/download PDF
7. DNA Based Steganography: Survey and Analysis for Parameters Optimization
- Author
-
Hamed, Ghada, Marey, Mohammed, El-Sayed, Safaa, Tolba, Fahmy, Kacprzyk, Janusz, Series editor, Jain, Lakhmi C., Series editor, Hassanien, Aboul-Ella, editor, Grosan, Crina, editor, and Fahmy Tolba, Mohamed, editor
- Published
- 2016
- Full Text
- View/download PDF
8. Classification Mechanism for IoT Devices towards Creating a Security Framework
- Author
-
Jincy, V. J., Sundararajan, Sudharsan, Kacprzyk, Janusz, Series editor, Buyya, Rajkumar, editor, and Thampi, Sabu M., editor
- Published
- 2015
- Full Text
- View/download PDF
9. Full Duplex OTP Cryptosystem Based on DNA Key for Text Transmissions
- Author
-
Balanici, Dumitru, Tomsa, Vlad, Borda, Monica, Malutan, Raul, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, Bica, Ion, editor, Naccache, David, editor, and Simion, Emil, editor
- Published
- 2015
- Full Text
- View/download PDF
10. Security parameters of the innovative ecosystem
- Author
-
Yuliia Bocharova, Oksana Chernega, Oleksandr Ishchenko, and Yuliia Lyzhnyk
- Subjects
innovative infrastructure ,security parameters ,National security ,innovative development ,innovative ecosystem ,national innovative system - Abstract
It is substantiated that at the present stage of development there is a significant scientific and practical interest in the development of innovative ecosystems, which is due to the importance and role of innovative ecosystems in ensuring the further socio-economic development of countries, their competitiveness and national security. The author's approaches to understanding the essence of the concept of "innovative ecosystem" are analyzed. Two main approaches to understanding the concept of "innovative ecosystem" that have developed in the scientific literature are identified. The links between the concepts of "innovative ecosystem", "innovative infrastructure" and "national innovative system" are analyzed, their common and distinctive features are determined. The author's approach to understanding the essence of the concept of "innovative ecosystem" is proposed. Existing approaches to understanding the life cycle, components and varieties of innovative ecosystems are analyzed and systematized. Approaches to determining the characteristics of security, markers of the effectiveness of innovative ecosystems are analyzed and summarized. A more representative indicator of the development of innovative ecosystems has been identified. A comparative analysis of the characteristics of the functioning and development of innovative ecosystems of the states-leaders of innovative development (top 15 states) was carried out: Switzerland, Sweden, the United Arab Emirates, Great Britain, the Republic of Korea, the Netherlands, Finland, Singapore, Denmark, Germany, France, China, Japan, Hong Kong, Israel. The markers of the effectiveness of innovative ecosystems and their security parameters are determined.
- Published
- 2022
11. TD-ERCS map-based confusion and diffusion of autocorrelated data.
- Author
-
Khan, Jan, Ahmad, Jawad, and Khan, Muazzam
- Abstract
In this article, we proposed a new scheme to encrypt highly autocorrelated image pixel data. In existing literature, single substitution was used to break autocorrelation in images. To get better results, instead of single substitution box, some researchers are minimizing the autocorrelation via utilizing multiple substitution boxes. However, we found that multiple substitution boxes cannot solve the problem of autocorrelation independently. Therefore, we added chaotic confusion and diffusion to the existing substitution scheme in order to remove the correlation completely. Initially, we break the autocorrelation of data by permuting the pixels via TD-ERCS chaotic map. Bitwise XOR is carried out for diffusion using logistic map followed by the existing substitution scheme. Experimental analysis shows that the proposed scheme has greater resistance to brute force attack and statistical attack. Further analyses such as statistical analysis, peak signal-to-noise ratio, contrast analysis, key space analysis, entropy analysis, correlation analysis, key sensitivity analysis, and encryption quality analysis proved the high robustness of the proposed scheme. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
12. Criterial approaches to the oil and gas industry security activities assessment
- Subjects
безпека енергетична ,security economic ,security parameters ,безпека екологічна ,концепція безпекової діяльності ,безпека інформаційна ,security environmental ,security energy ,безпека економічна ,security informational ,безпекові параметри ,security activity concept - Abstract
Актуалізовано сучасну концепцію безпекової діяльності економічних систем, яка полягає у формуванні безпекової стратегії суб’єкта господарювання, яка б не порушила ті безпекові параметри, що диктує зовнішнє середовище. Підкреслено, що рівень захищеності енергопостачання держави характеризується певною вразливістю до загроз і доведено, що стійкість загрозам притаманна підприємствам, так як можливість виконувати свої функції з енергозабезпечення для інших підприємств формує явище забезпечення енергетичної безпеки залежних суб’єктів господарювання. В процесі дослідження запропоновано використовувати такі безпекові параметри як економічний, енергетичний, екологічний та інформаційний і здійснено обґрунтування їх вибору та критеріїв їх оцінювання. Для кожного із виокремлених безпекових параметрів визначено ключові загрози з урахуванням галузевої специфіки. Безпеку підприємства розглянуто в контексті виокремлених параметрів. Відображено взаємодію безпеки суб’єкта господарювання та державної безпеки. Узагальнено основні заходи та напрями, які дозволять забезпечити ключові параметри безпечної діяльності нафтогазової галузі. Запропоновано на основі отриманих теоретичних напрацювань сформувати методику оцінювання рівня безпеки підприємств нафтогазової галузі. The modern concept of economic systems security activity has been updated, which consists in the formation of a business entity security strategy that would not violate the security parameters dictated by the external environment. It is emphasized that the level of the state's energy supply security is characterized by a certain vulnerability to threats, and it is proved that the resistance to threats is inherent in enterprises, since the ability to perform their functions of energy supply for other enterprises forms the phenomenon of ensuring the energy security of dependent economic entities. In the process of research, it is proposed to use such security parameters as economic, energy, ecological and informational, and the justification of their choice and their evaluation criteria is carried out. For each of the selected security parameters, key threats are defined taking into account the specifics of the industry. Enterprise security is considered in the context of selected parameters. The interaction of the security of the business entity and state security is reflected. The main measures and directions that will enable the key parameters of security operation in the oil and gas industry are summarized. It is proposed to form a methodology for assessing the level of security of oil and gas enterprises based on the obtained theoretical studies.
- Published
- 2022
13. Provides a New Way to Enhance Security in the Linux Operating System
- Author
-
Kiarash Aghakhani and Hamid Reza Ganji
- Subjects
Multidisciplinary ,Linux Operating System ,Exploit ,SIMPLE (military communications protocol) ,Computer science ,Attacks on the Operating System ,computer.software_genre ,Security in the Operating System ,Security Parameters ,lcsh:Technology (General) ,Operating system ,System level ,lcsh:T1-995 ,lcsh:H1-99 ,Dynamism ,lcsh:Social sciences (General) ,computer ,Computer Security - Abstract
The security of the configuration of files in the Linux operating system depends on many factors that can be referenced to the system level and the applicable level. The most important thing about the security of Linux operating systems is its dynamism, for example, when you secure your Linux system, it will not stay safe forever, because applications and cyber criminals through new threats and/or new exploits that are packaged Systems or applications that cause the operating system to become unsafe, for this reason, we need a secure operating system. The main purpose of this article is to provide a new way to enhance the security of the Linux operating system. For this purpose, how can simple, continuous, and practical Linux environment be secured, solutions are presented, also based on performance analysis of the proposed method and evaluation parameters for existing systems against the proposed system, the superiority of this method is introduced.
- Published
- 2018
14. On incorporating security parameters in service level agreements
- Author
-
Causevic, Aida, Lisova, Elena, Ashjaei, Seyed Mohammad Hossein, Ashgar, Syed Usman, Causevic, Aida, Lisova, Elena, Ashjaei, Seyed Mohammad Hossein, and Ashgar, Syed Usman
- Abstract
With development of cloud computing new ways for easy, on-demand, Internet-based access to computing resources have emerged. In such context a Service Level Agreement (SLA) enables contractual agreements between service providers and users. Given an SLA, service users are able to establish trust in that the service outcome corresponds to what they have demanded during the service negotiation process. However, an SLA provides a limited support outside of basic Quality of Service (QoS) parameters, especially when it comes to security. We find security as an important factor to be included in adjusting an SLA according to user defined objectives. Incorporating it in an SLA is challenging due to difficulty to provide complete and quantifiable metrics, thus we propose to focus on a systematic way of addressing security using the security process. In this paper we investigate ways in which security might be incorporated already in the service negotiation process and captured in an SLA. We propose a corresponding process to develop and maintain an SLA that considers both design-, and run-time. To demonstrate the approach we built upon the existing SLAC language and extend its syntax to support security. An example of a service being provided with security guarantees illustrates the concept., Conference code: 148430; Export Date: 11 July 2019; Conference Paper
- Published
- 2019
- Full Text
- View/download PDF
15. Experimental security estimation of multimedia digital data transmission systems based on SHDSL technologies
- Author
-
I. V. Shynkarenko and O. I. Tsopa
- Subjects
Structure (mathematical logic) ,Multimedia ,Wiretap channels ,Computer science ,Digital data ,Experimental data ,Transmission system ,Communications system ,computer.software_genre ,Single-pair high-speed digital subscriber line ,Telecommunications engineering ,wiretap channel ,communication channel ,multimedia information ,technical information security ,information security ,digital technologies ,channel security ,security parameters ,measuring complex ,channel hiding ,channel noise immunity ,energy security ,Electrical and Electronic Engineering ,computer - Abstract
The paper presents a structure of the hardware-software complex for investigating the wiretap channels of wire segments of local communication systems. In addition, it also presents new experimental data on the estimation of hiding and noise immunity of multimedia digital data transmission systems based on SHDSL technologies.
- Published
- 2011
16. On the impossibility of cryptography with tamperable randomness
- Author
-
Austrin, Per, Chung, K. -M, Mahmoody, M., Pass, R., Seth, K., Austrin, Per, Chung, K. -M, Mahmoody, M., Pass, R., and Seth, K.
- Abstract
We initiate a study of the security of cryptographic primitives in the presence of efficient tampering attacks to the randomness of honest parties. More precisely, we consider p-tampering attackers that may efficiently tamper with each bit of the honest parties' random tape with probability p, but have to do so in an "online" fashion. Our main result is a strong negative result: We show that any secure encryption scheme, bit commitment scheme, or zero-knowledge protocol can be "broken" with probability p by a p-tampering attacker.The core of this result is a new Fourier analytic technique for biasing the output of bounded-value functions, which may be of independent interest. We also show that this result cannot be extended to primitives such as signature schemes and identification protocols: assuming the existence of one-way functions, such primitives can be made resilient to (1/poly(n))- tampering attacks where n is the security parameter., QC 20150615
- Published
- 2014
- Full Text
- View/download PDF
17. Caracterização genotípica e fenotípica de Lactobacillus gasseri isolatedos de recém nascidos
- Author
-
Cunha, Luciana Rodrigues da, Pinto, Cláudia Lúcia de Oliveira, Stringheta, Paulo César, Ferreira, Célia Lúcia de Luces Fortes, Neumann, Elisabeth, and Alvarenga, Marcelo Bonnet
- Subjects
Probiotics ,Bifid bacteria ,Probióticos ,CIENCIAS AGRARIAS::CIENCIA E TECNOLOGIA DE ALIMENTOS::CIENCIA DE ALIMENTOS [CNPQ] ,Security parameters ,Bactérias bífidas ,Parâmetros de segurança - Abstract
Universidade Federal de Ouro Preto O objetivo deste estudo foi caracterizar novas estirpes de Lactobacillus gasseri isoladas de recém-nascidos saudáveis para potencial uso como probiótico em bancos de leite humano no Brasil. Este estudo foi dividido em três fases. Na primeira, realizou-se a caracterização genotípica das estirpes com a identificação dos isolados ao nivel de espécie e avaliação da diversidade genética entre eles). Caracterização fenotípica também foi realizada considerando os aspectos funcionais e de segurança recomendados pela FAO/OMS para a validação de novas culturas probióticas. Avaliou-se trinta estirpes isoladas de fezes de recém-nascidos quanto à resistência a antibióticos, atividade hemolítica, tolerância a sais biliares, presença de plasmídeos e antagonismo a patógenos Gram-positivos e Gram-negativos. Com base na diversidade genética (PFGE), resistência a antibióticos e perfil plasmidial, três estirpes (NCK2140, 2141 e 2142) foram selecionadas e avaliadas quanto à resistência ao suco gástrico e pancreático, capacidade de adesão à mucina, fibronectina, e às linhagens de células intestinais humanas, Caco-2 e HT-29. Na segunda fase, os quatro plasmídeos identificados na estirpe NCK2141 foram sequenciados pela técnica de shotgun, anotados por meio do GAMOLA® software e os genes resultantes foram identificados por meio do software Artemis®. Posteriormente, análises BLAST foram realizadas para confirmar as anotações in silico. Na terceira fase, avaliou-se a capacidade das estirpes selecionadas aderirem à fibronectina imobilizada e a influência dessa proteina sobre as caracteristicas probióticas da célula como, resposta ao estresse digestivo e habilidade de adesão. Os trinta isolados foram identificados como Lactobacillus gasseri por meio do sequenciamento do 16S rDNA, e vinte nove deles foram idênticos pela técnica de Eletroforese em Campo Pulsado (PFGE) utilizando-se as enzimas de restrição Sma I e Apa I. O isolado NCK2142 apresentou-se estritamente relacionado aos outros, diferindo-se apenas por uma única banda no gel. Todas as 30 estirpes não apresentaram atividade hemolítica e carreavam três plasmídeos, exceto a estirpe NCK2141, que apresentou um quarto plasmídeo, codificando um sistema de transporte que confere resistência à múltiplas drogas (lmrB). Essa mesma estirpe mostrou maior tolerância a bile (0.5%) e resistência a eritromicina, cefalotina e oxacilina. Todas as estirpes apresentaram antagonismo frente aos patógenos avaliados sendo a inibição assossiada apenas à produção de ácidos orgânicos. Os três isolados selecionados NCK2140, 2141 e 2142 foram resistentes ao suco gástrico e ao suco pancreático e apresentaram boa capacidade de adesão in vitro a mucina, fibronectina e às linhagens de células humanas do câncer de cólon, Caco-2 e HT-29. Os quatro plasmídeos identificados, pTRK1023, 1024, 1025 e 1026 apresentaram morfologia circular, replicação por mecanismo teta e 36, 7, 20 e 46 open reading frames (ORF), respectivamente. Os conteúdos de G+C foram consistentes com aqueles encontrados em outras estirpes de Lactobacillus (37 - 40%), exceto o pTRK1025 que foi de 44,57%. Algumas propriedades funcionais como, proteínas de ligação ao colágeno (pTRK1026), biossíntese de lantibióticos (pTRK1023) e transporte de carboidratos (pTRK1023 e pTRK1026) foram identificados nos plasmídeos, as quais podem promover vantagens competitivas para as células hospedeiras. Mecanismo de manutenção celular como, Sistema de Separação e Toxina-Antitoxina também foi observado, explicando a dificuldade de cura dos plasmídeos. O gene lmrB identificado no pTRK1024, é associado à resistência a alguns antibióticos, no entanto, o experimento de clonagem não confirmou a relação do mesmo com a maior resistencia à eritromicina, cefalotina e oxacilina apresentada pelo isolado NCK2141 carreador desse plasmideo. Por questões de segurança, essa estirpe não pode ser utilizada como um probiótico. Maior adesão in vitro foi observada à fibronectina quando as estirpes NCK2140, 2141 e 2142 foram cultivadas em ágar MRS e incubadas em condições de anaerobiose. Observou-se também que os mutantes fbp (NCK2147 e NCK2148) tiveram menor aderência à fibronectina imobilizada e à linhagem celular humana HT-29. A inativação do gene fbp não influenciou a susceptibilidade das estirpes recombinates ao suco gástrico. The objective of this study was to characterize Lactobacillus gasseri strains isolated from a healthy newborn infant for potential use as a probiotic in human milk banks in Brazil. This study was divided into three phases. The first examines the genotypic (identification at the species level and evaluation of genetic diversity among the isolates) and phenotypic characterization of the strains with regard to safety and functional properties currently recommended by FAO/WHO for validation of new probiotic strains. Thirty strains were isolated from breast fed newborn stools and were evaluated for resistance to antibiotics, hemolytic activity, bile tolerance, antagonism toward selected Gram-positive and Gram-negative pathogens and presence of plasmids. Based on the results from PFGE, antibiotic resistance and plasmid profiles, three strains (NCK2140, 2141 and 2142) were selected and evaluated for resistance to small intestine and gastric juices, ability to adhere to mucin, fibronectin, Caco-2 and HT-29 cell lines. In the second phase, the four plasmids identified in the strain NCK2141 were sequenced by the shotgun sequencing technique and were annotated by GAMOLA® software. The resulting genes and CDS designations were viewed using Artemis® software. BLAST was carried out for each designated gene to confirm and to refine the in silico annotations. In the third phase, the ability of the selected strains to adhere to fibronectin binding protein and the effect of growth conditions on the adhesion were examined. It was also investigated the functional role of this protein in the adhesion and stress response of the cell. In this study, all thirty isolates were identified as Lactobacillus gasseri through 16S rDNA sequencing. Pulsed-Field Gel Electrophoresis (PFGE) using restriction enzymes Sma I and Apa I revealed that 29 of the L. gasseri were identical; one isolate (NCK2142) was closely related, but exhibited a distinctive DNA fingerprint. All 30 strains harbored 3 plasmids, with one strain (NCK2141) that showed strong tolerance to 0.5% of bile and harbored a unique fourth plasmid encoding a putative multidrug resistance transporter protein (lmrB). No hemolytic activity or antagonism, beyond acid inhibition was observed. The three selected strains NCK2140, 2141 and 2142 showed strong resistance to small intestinal and gastric juices, and adhered in vitro to mucin, fibronectin and two intestinal epithelial cell lines, Caco-2 and HT-29. The complete nucleotide sequence of the plasmids (pTRK1023, 1024, 1025, and 1026) revealed that they are circular and contain 36, 7, 20 and 46 open reading frames, respectively. All four plasmids are predicted to replicate by the theta mechanism, and have G+C contents consistent with those found in other lactobacilli strains (37-40%), with the exception of pTRK1025 (44.57%). The plasmids appear to encode functional properties, such as collagen binding (pTRK1026), lantibiotic biosynthesis (pTRK1023) and carbohydrate transport (pTRK1023 and pTRK1026) that may provide competitive advantages to the plasmid- carrying cells. Cell maintenance mechanisms (partitioning and TA system) were also observed, thus explaining the failure to cure these plasmids. Plasmid pTRK1024 harbored a putative lmrB gene, an ATP-binding cassette-type multidrug resistance transporter protein, which has been associated with clindamycin and lincomycin resistance. Cloning experiments did not correlate the erythromycin, cephalothin and oxacillin resistance of NCK2141 to LmrB. However, for safety reasons, strain NCK2141 should not be used as a probiotic. Significantly higher adherence to fibronectin was observed when the strains NCK2140, 2141 and 2142 were grown on MRS agar under anaerobic condition. It was also observed a reduction of in vitro adherence of fbp mutants (NCK2147 and NCK2148) to immobilized fibronectin and HT-29 intestinal epithelial cells. The inactivation of the fbp locus did not influence the gastric juice susceptibility of the mutant strains.
- Published
- 2011
18. A mix-net from any CCA2 secure cryptosystem
- Author
-
Khazaei, Shahram, Moran, T., Wikström, Douglas, Khazaei, Shahram, Moran, T., and Wikström, Douglas
- Abstract
We construct a provably secure mix-net from any CCA2 secure cryptosystem. The mix-net is secure against active adversaries that statically corrupt less than λ out of k mix-servers, where λ is a threshold parameter, and it is robust provided that at most min(λ - 1, k - λ) mix-servers are corrupted. The main component of our construction is a mix-net that outputs the correct result if all mix-servers behaved honestly, and aborts with probability 1 - O(H-(t-1)) otherwise (without disclosing anything about the inputs), where t is an auxiliary security parameter and H is the number of honest parties. The running time of this protocol for long messages is roughly 3tc, where c is the running time of Chaum's mix-net (1981)., QC 20130128Conference ISBN 978-364234960-7
- Published
- 2012
- Full Text
- View/download PDF
19. Experimental security estimation of multimedia digital data transmission systems based on SHDSL technologies
- Author
-
Shynkarenko, I. V.; Kharkiv National University of Radioelectronics, Tsopa, O. I.; Kharkiv National University of Radioelectronics, Shynkarenko, I. V.; Kharkiv National University of Radioelectronics, and Tsopa, O. I.; Kharkiv National University of Radioelectronics
- Abstract
The paper presents a structure of the hardware-software complex for investigating the wiretap channels of wire segments of local communication systems. In addition, it also presents new experimental data on the estimation of hiding and noise immunity of multimedia digital data transmission systems based on SHDSL technologies.
- Published
- 2011
20. Elektros įrenginių saugos parametrų tyrimas
- Author
-
Kneižys, Nerijus, Šimkevičius, Teodoras, Buivis, Leonardas, Turauskas, Zigmantas, Vrubliauskas, Rimantas, Nevardauskas, Enrikas, Lapė, Romanas Jonas, Geleževičius, Vilius, and Siauliai University
- Subjects
Electrical equipment ,Electronics and Electrical Engineering ,Saugos parametrai ,Elektros įrenginiai ,Security parameters ,Įžeminimas ,Electrical ground - Abstract
In the present study, there was performed a research of safety parameters of electrical devices, there were performed various measurements and calculations, comparisons of received results, considered problems, associated with these parameters. There was considered condition of equipment before and after repairs.. Proposed suggestions regarding installation of unconventional devices as well as calculating during the process of design, there was described a research of dependence of resistances of grounders on deepening in earth, performing measurements. Also, upon selection of calculation methodology, there were performed calculations of grounded resistances. The results of calculations were compared with the measured ones. There was touched on a subject of solution of some problems of grounder installation - i.e. installation of unconventional grounder. There was provided the method of installation of such grounder, peculiarities of its equipment. There were analysed results of measurement of screws, they were compared with the results of conventional grounders. There was developed the methodology of calculations of grounders and there was provided data of calculations as well as comparison with the measured ones. There was described application of this method as well as its benefit and advantages. There were considered peculiarities of results of measurement of resistances of transitive contacts, positioned in chemically aggressive environment. There was analysed the... [to full text]
- Published
- 2006
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.