wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

gis substation

profile
Anjali Yadav
Mar 16, 2023
0 Likes
0 Discussions
99 Reads

GIS is totally capsuled, that is impervious to and distinguished from the external ambiance. This is a huge benefit from environment viewpoint such as ocean based oil rigs, particle or mist pollution sources. Nevertheless, because the gas isolated switchgear is totally capsuled, a needed visible disconnecting means cannot be directly accomplished.

he grounding and disconnect switches, needed in both air and gas insulated arrangements, will have view ports in gas isolated devices.

GIS may also be rationalized when a low profile substation is required to “hide” a substation

As a gas isolated switchgear element is isolated for servicing, it will be required to affirm the places of the grounding and disconnect switches. 


Comments ()


Sign in

Read Next

Unlocking Success: Mastering Google Ads Strategies

Blog banner

Deadlock

Blog banner

Why we should do reading

Blog banner

Sweet Mango Murabba

Blog banner

What is Internet

Blog banner

Modern operating system

Blog banner

Service Operation

Blog banner

Carrot Pickle With Raisins (lagan Nu Achar)

Blog banner

Race Condition in Operating Theatre

Blog banner

SECURITY VULNERABILITIES COUNTERMEASURES IN A SMART SHIP SYSTEM

Blog banner

Social Media.

Blog banner

Cache memory

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Modern Operating Systems

Blog banner

Cache memory

Blog banner

Real Time Scheduling

Blog banner

Dental Problems That Start Small But Should Never Be Ignored

Blog banner

Data-Driven Prediction of Virtual Item Prices in Online Games

Blog banner

Trello ( management software)

Blog banner

A BLOG ON MYSQL

Blog banner

Developments in Modern Operating Systems

Blog banner

A little bit of salt is all the hash needs!

Blog banner

10 Problems you face if you are an Otaku

Blog banner

Session Vulnerabilities

Blog banner

HR Automation : Need of the hour

Blog banner

Cyber Forensic in the Banking sector

Blog banner

LinkedIn

Blog banner

ROLE OF THE COMPUTER FORENSICS TOOLS AND TECHNIQUES

Blog banner

Service transistion under difficult conditions

Blog banner

How To Secure Operating Systems ?

Blog banner

Cycling

Blog banner

An Overivew Of Cache Memory

Blog banner

Broken Authentication Attacks

Blog banner

Street foods

Blog banner

The Secure Software Development Life Cycle (SDLC)

Blog banner

Caching windows

Blog banner

'C', 'C++' and 'Java': Head-to-Head

Blog banner

Different Types of Data

Blog banner

Artificial Intelligence (AI)

Blog banner

Explain the concept of ( MIS) Management information systems

Blog banner

How to Encrypt and Decrypt Using GNU PGP

Blog banner

MULTITHREADING:ENHANCEING PERFORMANCE AND EFFICIENCY IN COMPUTING

Blog banner