scholarly journals Security control troubleshooting plan modeling and online identification of disposal recommendations

2021 ◽  
Vol 7 ◽  
pp. 629-636
Author(s):  
Jun Xiong ◽  
Bohan Chen ◽  
Caifeng Sun ◽  
Jianhui Gu ◽  
Jian Xu ◽  
...  
2021 ◽  
Vol 252 ◽  
pp. 01008
Author(s):  
Rui Yu ◽  
Zhen Xiang ◽  
Jun Xiong ◽  
Gu Jianhui ◽  
Fan Tang ◽  
...  

The paper analyzed the potential safety and stability control risk of the southwest power grid, presented the general online identification framework for operational risks of the second and third defense line of UHVDC sending-end power grid, elaborated the key techniques for realizing the aforementioned functions, including security control strategy/system protection strategy modelling, high frequency cutting generator strategy modelling , conflict detection for the control measures of the second and third defense line, practicability assessment method for security control strategy/system protection strategy, practicability assessment method of high frequency cutting generator strategy and other technologies. According to the actual application conditions of the southwest power grid, the system may provide dispatching users with more comprehensive Online identification for the operational risks the second and third defense line as well as discover the potential safety hazards and risks during operation of the power grid.


2016 ◽  
Vol 46 (183) ◽  
pp. 289-305
Author(s):  
Angela Schweizer

The following article is based on my fieldwork in Morocco and represents anthropological data collected amongst undocumented sub-Saharan migrants in Morocco. They want to enter Europe in search for a better life for themselves and to provide financial support for their families. Due to heavy border security control and repression, they find themselves trapped at the gates of Europe, where they are trying to survive by engaging in various economic activities in the informal sector. The article begins with an overview of the European migration politics in Africa and the geopolitical and historical context of Morocco, in light of the externalization of European border control. I will then analyze the various economic sectors, in which sub-Saharan migrations are active, as well as smuggling networks, informal camps and remittances, on which they largely depend due to the exclusion from the national job market.


2020 ◽  
Vol 5 ◽  
pp. 94-106
Author(s):  
Y.M. Iskanderov ◽  
◽  
M.D. Pautov

Aim. The use of modern information technologies makes it possible to achieve a qualitatively new level of control in supply chains. In these conditions, ensuring information security is the most important task. The article shows the possibilities of applying the spatial concepts of the actor-network theory in the interests of forming a relevant intelligent information security management system for supply chains. Materials and methods. The article discusses a new approach based on the provisions of the actor-network theory, which makes it possible to form the structure of an intelligent information security control system for supply chains, consisting of three main functional blocks: technical, psychological and administrative. The incoming information security threats and the relevant system responses generated through the interaction of the system blocks were considered as enacting the three Law’s spaces: the space of regions, the space of networks and the space of fl uids. Results. It is shown that the stability of this system in the space of networks is a necessary condition for its successful functioning in the space of regions, and its resilience in the space of fl uids gained through the dynamic knowledge formation helps overcome the adverse effects of the fl uidity. The problems of the intentional / unintentional nature of information security threats, as well as the reactivity / proactivity of the corresponding responses of the intelligent information security management system for supply chains are investigated. Conclusions. The proposed approach showed the possibility of using such an interdisciplinary tool in the fi eld of information security as the concepts of the actor-network theory. The intelligent information security control system built on its basis ensures that almost all the features of solving information security problems in supply chains are taken into account.


Sign in / Sign up

Export Citation Format

Share Document