Difference between revisions of "Generation Reports"
		
		
		
		
		
		
		Jump to navigation
		Jump to search
		
				
		
		
		
		
		
		
		
	
 (Table update preformed by bot)  | 
				 (Table update preformed by bot)  | 
				||
| Line 883: | Line 883: | ||
| Technology  | | Technology  | ||
<pre style="display: none">| Technology</pre>  | <pre style="display: none">| Technology</pre>  | ||
| + | |||
| + | |-  | ||
| + | | 3002024219  | ||
| + | <pre style="display: none">| 3002024219</pre>  | ||
| + | | [https://www.epri.com/research/products/000000003002024219 Evaluation of Closure Effects on Groundwater Quality: Initial Data Summary and Description of Machine Learning and Advanced Statistics Used in the Analysis]  | ||
| + | <pre style="display: none">| Technology</pre>  | ||
| + | <pre style="display: none">| Machine Learning</pre>  | ||
| + | <pre style="display: none">| AI</pre>  | ||
| + | <pre style="display: none">| Analysis</pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | |   | ||
| + | <pre style="display: none">| </pre>  | ||
| + | |||
| + | |-  | ||
| + | | 3002027417  | ||
| + | <pre style="display: none">| 3002027417</pre>  | ||
| + | | [https://www.epri.com/research/products/000000003002027417 Understanding Software Bill of Materials for Cyber Security]  | ||
| + | <pre style="display: none">| Security</pre>  | ||
| + | <pre style="display: none">| cyber security</pre>  | ||
| + | <pre style="display: none">| procurment</pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | |   | ||
| + | <pre style="display: none">| </pre>  | ||
| + | |||
| + | |-  | ||
| + | | 3002027428  | ||
| + | <pre style="display: none">| 3002027428</pre>  | ||
| + | | [ Cyber Security Risk Assessment: A Case Study in Digital Overspeed Protection Systems]  | ||
| + | <pre style="display: none">| Security</pre>  | ||
| + | <pre style="display: none">| cyber security</pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | |   | ||
| + | <pre style="display: none">| </pre>  | ||
| + | |||
| + | |-  | ||
| + | | 3002027429  | ||
| + | <pre style="display: none">| 3002027429</pre>  | ||
| + | | [ Cyber Security Procurement Topical Guide: For Control System and Operational Technology Installation and Upgrade in Power Generation Facilities]  | ||
| + | <pre style="display: none">| Security</pre>  | ||
| + | <pre style="display: none">| cyber security</pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | |   | ||
| + | <pre style="display: none">| </pre>  | ||
| + | |||
| + | |-  | ||
| + | | 3002027732  | ||
| + | <pre style="display: none">| 3002027732</pre>  | ||
| + | | [ OT Cyber Security Disaster Recovery Plan Guide]  | ||
| + | <pre style="display: none">| Security</pre>  | ||
| + | <pre style="display: none">| cyber security</pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | |   | ||
| + | <pre style="display: none">| </pre>  | ||
| + | |||
| + | |-  | ||
| + | | 3002027485  | ||
| + | <pre style="display: none">| 3002027485</pre>  | ||
| + | | [ Sensor Rationale Quick Reference Sheet]  | ||
| + | <pre style="display: none">| Technology</pre>  | ||
| + | <pre style="display: none">| sensors</pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | |   | ||
| + | <pre style="display: none">| </pre>  | ||
| + | |||
| + | |-  | ||
| + | | 3002027426  | ||
| + | <pre style="display: none">| 3002027426</pre>  | ||
| + | | [ Identity and Access Management Guideline: Generation Cyber Security]  | ||
| + | <pre style="display: none">| Security</pre>  | ||
| + | <pre style="display: none">| cyber security</pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | |   | ||
| + | <pre style="display: none">| </pre>  | ||
| + | |||
| + | |-  | ||
| + | | 3002028319  | ||
| + | <pre style="display: none">| 3002028319</pre>  | ||
| + | | [ Equipment Health Dashboard Development Insights]  | ||
| + | <pre style="display: none">| Data</pre>  | ||
| + | <pre style="display: none">| visualization</pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | |   | ||
| + | <pre style="display: none">| </pre>  | ||
| + | |||
| + | |-  | ||
| + | | 3002027488  | ||
| + | <pre style="display: none">| 3002027488</pre>  | ||
| + | | [ Data Governance for the Power Industry]  | ||
| + | <pre style="display: none">| Data</pre>  | ||
| + | <pre style="display: none">| governance</pre>  | ||
| + | <pre style="display: none">| data</pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | |   | ||
| + | <pre style="display: none">| </pre>  | ||
| + | |||
| + | |-  | ||
| + | | 3002027489  | ||
| + | <pre style="display: none">| 3002027489</pre>  | ||
| + | | [ Interim Report: Combustion Turbine Knowledge-Based Fault Signatures]  | ||
| + | <pre style="display: none">| Data</pre>  | ||
| + | <pre style="display: none">| signatures</pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | |   | ||
| + | <pre style="display: none">| </pre>  | ||
| + | |||
| + | |-  | ||
| + | | 3002027476  | ||
| + | <pre style="display: none">| 3002027476</pre>  | ||
| + | | [ Controls and Automation Guidebook: Condensed Versions of EPRI Generation Controls and Automation Related Reports]  | ||
| + | <pre style="display: none">| Data</pre>  | ||
| + | <pre style="display: none">| automation</pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | |   | ||
| + | <pre style="display: none">| </pre>  | ||
| + | |||
| + | |-  | ||
| + | | 3002028149  | ||
| + | <pre style="display: none">| 3002028149</pre>  | ||
| + | | [ Developing and Maintaining Asset Hierarchy and Master Equipment Lists of Power Plants: Power Plant Asset Hierarchies, Naming Conventions and Classifications]  | ||
| + | <pre style="display: none">| Data</pre>  | ||
| + | <pre style="display: none">| data</pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | |   | ||
| + | <pre style="display: none">| </pre>  | ||
| + | |||
| + | |-  | ||
| + | | 3002027431  | ||
| + | <pre style="display: none">| 3002027431</pre>  | ||
| + | | [ Remote Access Jump Host Hardening Field Guide]  | ||
| + | <pre style="display: none">| Security</pre>  | ||
| + | <pre style="display: none">| cyber security</pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | |   | ||
| + | <pre style="display: none">| </pre>  | ||
| + | |||
| + | |-  | ||
| + | | 3002027895  | ||
| + | <pre style="display: none">| 3002027895</pre>  | ||
| + | | [ Adaptive Predictive Expert Control Optimizer]  | ||
| + | <pre style="display: none">| Technology</pre>  | ||
| + | <pre style="display: none">| automation</pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | |   | ||
| + | <pre style="display: none">| </pre>  | ||
| + | |||
| + | |-  | ||
| + | | 3002026663  | ||
| + | <pre style="display: none">| 3002026663</pre>  | ||
| + | | [ Machine Learning Techniques for Wind Turbine Performance Assessments: Wind Wake and Yaw Misalignment Identification, Quantification and Rectification]  | ||
| + | <pre style="display: none">| Technology</pre>  | ||
| + | <pre style="display: none">| Machine Learning</pre>  | ||
| + | <pre style="display: none">| ML</pre>  | ||
| + | <pre style="display: none">| AI</pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | <pre style="display: none">| </pre>  | ||
| + | |   | ||
| + | <pre style="display: none">| </pre>  | ||
|}  | |}  | ||
Revision as of 12:20, 4 January 2024
Search Reports[edit]
Strategic Focus Area[edit]