A parallel approach to security assessment and to real power rescheduling on vector computers