The security cost consists of the system reserve cost, the rescheduling cost and the expected system instability cost.
安全成本由备用成本、再调度成本和期望失稳损失组成。
A new method to evaluate voltage security cost is presented using the capability of fuzzy modeling method in dealing with relaxed constraints.
利用模糊建模方法处理可松弛约束的能力,提出一种估计电力系统电压安全成本的新方法。
Therefore, with the change from vertically integrated environment to power market, the estimation of security cost and pricing security become very important.
电压安全成本作为维持系统电压安全、稳定需要额外付出的经济代价,成为市场环境下成本分析与研究中的一个重要内容。
However, as you will see in later parts of this series, cloud computing also raises questions of ownership, security, and cost.
然而,正如您在本系列后面的部分看到的,云计算也带来了所有权、安全与成本方面的问题。
While this protection strategy allows higher network throughput, it does so at the cost of some network security.
这种保护策略允许更高的网络吞吐量,代价是牺牲部分网络安全性。
The problem is that the cost of managing personal or corporate data this way may be privacy and security.
问题也来了,即按照这种方式管理个人或企业数据付出的成本可能是隐私和安全。
The project is still in the planning stages with discussions over security, logistics and cost under way with Israel.
这个项目还在草拟阶段,正在同以色列进行有关安全、后勤供应以及成本方面的讨论。
The most remarkable feature of the episode may not be the breach of security, but the cost of dealing with it.
这次攻击事件让人印象深刻的或许不是安全问题,而是为了应对它所付出的代价。
SSO can also improve the productivity of network users, reduce the cost of network operations, and improve network security.
SSO还可以提高网络用户的生产力,减少网络操作的成本,增强网络安全性。
In such environments, you may find that integration with external security products reduces your cost, minimizes the complexity of your environment, and provides you with a more secure architecture.
在这种环境中,可以通过与外部安全产品集成降低成本,降低环境的复杂性,提供更安全的体系结构。
That said, with the exception of protection against internal application attacks, most of the security hardening steps suggested in this article are fairly low cost.
因此,除了保护内部应用程序免受攻击外,本文中建议的大多数安全性加强步骤的成本都相当低。
These powerful security features are essential for many types of business data exchange, but they do come with a cost in terms of added processing overhead.
这些强大的安全特性对于许多业务数据交换都至关重要,但是它们在处理开销方面会增加成本。
Given globalization, the furious pace of mergers and acquisitions, and continuous cost pressures, job security is increasingly tenuous.
鉴于当前全球化,激烈的兼并和收购和持续的成本压力,工作安全越来越空洞和脆弱。
He could be pointing out that making the Bush tax cuts for the wealthy permanent is a huge budget issue - over the next 75 years it would cost as much as the entire Social Security shortfall.
他可以指出让布什的减税政策永久化是一个严重的预算问题——在未来75年里,其成本将与整个社会保障差额一样多。
Until now, it departments have used standardization as a means of managing cost, security and the smooth running of it operations.
直至今天,IT部门都在使用标准化作为管理成本、安全以及IT平滑运营的手段。
The soaring cost of rice and other basic food in Asia has raised security concerns across many Asian countries.
大米和其他基本食品价格的飙升在很多亚洲国家都引发了安全上的关注。
The extra cost of paying for private security and backup generators can upend a business model.
为了保障个人安全的措施和后备发电机的准备花费巨大,会颠覆任何一个商业模型。
In the fourth step, you periodically reassess risk assessment program as impacted by new risks, cost-effective security controls, emerging infrastructure technologies, and new legislations.
在第四步中,定期地重新评估风险,因为新的风险、安全控制措施、基础设施技术和法律会影响安全状况。
Thus, the "cost of security breach" might include some very high indirect costs (for example, loss of investor confidence).
因此,“安全性被破坏的代价”可能包括非常高昂的间接代价(比如,失去投资者的信任)。
Thus, the "cost of security breach" may include very high indirect costs (such as, loss of investor confidence).
因此,“安全性被破坏的代价”可能包括非常高的间接代价(比如,失去投资者的信任)。
The CDS displays also provide a robust capability to meet the Navy's current and future needs for open systems, security features and cost effectiveness.
CDS显示器还可以满足海军现在和未来对开放系统的需求、安全型以及费效比。
A major part of the WS-Security performance cost comes from the wide use of asymmetric encryption.
WS - Security之所以常常伴随性能损失主要是因为大量使用了非对称加密。
WS-Security provides essential features for securing enterprise web services but often comes with a heavy performance cost.
WS-Security提供了必要的特性以保证商务Web服务的安全,但经常会付出沉重的性能代价。
The performance cost of WS-Security can be substantial, and there are times when simple SSL point-to-point encryption can be a better solution.
WS - Security的性能成本是可观的,并且简单的ssl点对点加密有时是更好的解决方案。
Of course, if you use per-user and per-instance SSH keys, then Pageant can only provide the key for the second and subsequent connections to each instance - but that's the cost of tighter security.
当然,如果对于每个用户和每个实例使用不同的ssh密钥,Pageant只能为对每个实例的第二次和后续连接提供密钥,但这是实现更高的安全性要付出的代价。
The scalability benefit of the tag comes at the cost of sidestepping the Same Origin Policy security model, introducing potential attack vulnerabilities.
标记的可伸缩性优点的获得以避开同源策略安全性模型为代价,可能导致易于收到攻击。
The scalability benefit of the tag comes at the cost of sidestepping the Same Origin Policy security model, introducing potential attack vulnerabilities.
标记的可伸缩性优点的获得以避开同源策略安全性模型为代价,可能导致易于收到攻击。
应用推荐