56 resultados para Telephone help lines
Resumo:
This paper presents comparative evaluation of the distance relay characteristics for UHV and EHV transmission lines. Distance protection relay characteristics for the EHV and UHV systems are developed using Electromagnetic Transients (EMT) program. The variation of ideal trip boundaries for both the systems are presented. Unlike the conventional distance protection relay which uses a lumped parameter model, this paper uses the distributed parameter model. The effect of larger shunt susceptance on the trip boundaries is highlighted. Performance of distance relay with ideal trip boundaries for EHV and UHV lines have been tested for various fault locations and fault resistances. Electromagnetic Transients (EMT) program has been developed considering distributed parameter line model for simulating the test systems. The voltage and current phasors are computed from the signals using an improved full cycle DFT algorithm taking 20 samples per cycle. Two practical transmission systems of Indian power grid, namely 765 kV UHV transmission line and SREB 24-bus 400kV EHV system are used to test the performance of the proposed approach.
Resumo:
This paper deals with line protection challenges experienced in system having substantial wind generation penetration. Two types of WTGU: Doubly Fed (DFIG) and Squirrel Cage (SCIG) Induction Generators are simulated and connected to grid with single circuit transmission line. The paper summarizes analytical investigations carried out on the impedance seen by distance relays by varying fault resistances and grid short circuit MVA, for the protection of such transmission lines during faults. The results are also compared with systems having conventional synchronous machine connected to the grid.
Resumo:
Closed-form expressions for the propagation characteristics of coupled microstrip lines with a symmetrical aperture in the ground plane are derived. Expressions for the regular microstrip coupled lines have been modified using physical insights to incorporate the effect of the aperture. The accuracy of these expressions has been verified by full-wave simulations and compared with conformal mapping analysis. These expressions are accurate within 5% for a substrate whose thickness varies from 0.2 to 1.6mm and permittivity in the range of 210. Designing a broadband filter based on planar multi-conductor coupled lines with aperture in the ground plane is demonstrated in this paper using the proposed expressions for its practical use.
Resumo:
Regular vaccinations with potent vaccine, in endemic countries and vaccination to live in non-endemic countries are the methods available to control foot-and-mouth disease. Selection of candidate vaccine strain is not only cumbersome but the candidate should grow well for high potency vaccine preparation. Alternative strategy is to generate an infectious cDNA of a cell culture-adapted virus and use the replicon for development of tailor-made vaccines. We produced a chimeric `O' virus in the backbone of Asia 1 and studied its characteristics. The chimeric virus showed high infectivity titre (>10(10)) in BHK 21 cell lines, revealed small plague morphology and there was no cross reactivity with antiserum against Asia I. The virus multiplies rapidly and reaches peak at 12 h post infection. The vaccine prepared with this virus elicited high antibody titres.
Resumo:
We say a family of geometric objects C has (l;k)-property if every subfamily C0C of cardinality at most lisk- piercable. In this paper we investigate the existence of g(k;d)such that if any family of objects C in Rd has the (g(k;d);k)-property, then C is k-piercable. Danzer and Gr̈ unbaum showed that g(k;d)is infinite for fami-lies of boxes and translates of centrally symmetric convex hexagons. In this paper we show that any family of pseudo-lines(lines) with (k2+k+ 1;k)-property is k-piercable and extend this result to certain families of objects with discrete intersections. This is the first positive result for arbitrary k for a general family of objects. We also pose a relaxed ver-sion of the above question and show that any family of boxes in Rd with (k2d;k)-property is 2dk- piercable.
Resumo:
Software transactional memory(STM) is a promising programming paradigm for shared memory multithreaded programs. While STM offers the promise of being less error-prone and more programmer friendly compared to traditional lock-based synchronization, it also needs to be competitive in performance in order for it to be adopted in mainstream software. A major source of performance overheads in STM is transactional aborts. Conflict resolution and aborting a transaction typically happens at the transaction level which has the advantage that it is automatic and application agnostic. However it has a substantial disadvantage in that STM declares the entire transaction as conflicting and hence aborts it and re-executes it fully, instead of partially re-executing only those part(s) of the transaction, which have been affected due to the conflict. This "Re-execute Everything" approach has a significant adverse impact on STM performance. In order to mitigate the abort overheads, we propose a compiler aided Selective Reconciliation STM (SR-STM) scheme, wherein certain transactional conflicts can be reconciled by performing partial re-execution of the transaction. Ours is a selective hybrid approach which uses compiler analysis to identify those data accesses which are legal and profitable candidates for reconciliation and applies partial re-execution only to these candidates selectively while other conflicting data accesses are handled by the default STM approach of abort and full re-execution. We describe the compiler analysis and code transformations required for supporting selective reconciliation. We find that SR-STM is effective in reducing the transactional abort overheads by improving the performance for a set of five STAMP benchmarks by 12.58% on an average and up to 22.34%.
Resumo:
The influence of the flow rule on the bearing capacity of strip foundations placed on sand was investigated using a new kinematic approach of upper-bound limit analysis. The method of stress characteristics was first used to find the mechanism of the failure and to compute the stress field by using the Mohr-Coulomb yield criterion. Once the failure mechanism had been established, the kinematics of the plastic deformation was established, based on the requirements of the upper-bound limit theorem. Both associated and nonassociated plastic flows were considered, and the bearing capacity was obtained by equating the rate of external plastic work to the rate of the internal energy dissipation for both smooth and rough base foundations. The results obtained from the analysis were compared with those available from the literature. (C) 2014 American Society of Civil Engineers.
Resumo:
Intake of fruits rich in antioxidants in daily diet is suggested to be cancer preventive. Sapota is a tropical fruit grown and consumed extensively in several countries including India and Mexico. Here we show that methanolic extracts of Sapota fruit (MESF) induces cytotoxicity in a dose-dependent manner in cancer cell lines. Cell cycle analysis suggested activation of apoptosis, without arresting cell cycle progression. Annexin V-propidium iodide double-staining demonstrated that Sapota fruit extracts potentiate apoptosis rather than necrosis in cancer cells. Loss of mitochondrial membrane potential, upregulation of proapoptotic proteins, activation of MCL-1, PARP-1, and Caspase 9 suggest that MESF treatment leads to activation of mitochondrial pathway of apoptosis. More importantly, we show that MESF treatment leads to significant inhibition of tumor growth and a 3-fold increase in the life span of tumor bearing animals compared to untreated tumor mice.
Resumo:
Mode I fracture experiments were conducted on brittle bulk metallic glass (BMG) samples and the fracture surface features were analyzed in detail to understand the underlying physical processes. Wollner lines, which result from the interaction between the propagating crack front and shear waves emanating from a secondary source, were observed on the fracture surface and geometric analysis of them indicates that the maximum crack velocity is similar to 800 m s(-1), which corresponds to similar to 0.32 times the shear wave speed. Fractography reveals that the sharp crack nucleation at the notch tip occurs at the mid-section of the specimens with the observation of flat and half-penny-shaped cracks. On this basis, we conclude that the crack initiation in brittle BMGs is stress-controlled and occurs through hydrostatic stress-assisted cavity nucleation ahead of the notch tip. High magnification scanning electron and atomic force microscopies of the dynamic crack growth regions reveal highly organized, nanoscale periodic patterns with a spacing of similar to 79 nm. Juxtaposition of the crack velocity with this spacing suggests that the crack takes similar to 10(-10) s for peak-to-peak propagation. This, and the estimated adiabatic temperature rise ahead of the propagating crack tip that suggests local softening, is utilized to critically discuss possible causes for the nanocorrugation formation. Taylor's fluid meniscus instability is unequivocally ruled out. Then, two other possible mechanisms, viz. (a) crack tip blunting and resharpening through nanovoid nucleation and growth ahead of the crack tip and eventual coalescence, and (b) dynamic oscillation of the crack in a thin slab of softened zone ahead of the crack-tip, are critically discussed. (C) 2014 Acta Materialia Inc. Published by Elsevier Ltd. All rights reserved.
Resumo:
Productive infection of human endothelial cells with Japanese encephalitis virus (JEV), a single stranded RNA virus induces shedding of sHLA-E. We show here that sHLA-E that is released upon infection with this flavivirus can inhibit IL-2 and PMA mediated ERK 1/2 phosphorylation in two NK cell lines, Nishi and NKL. Virus infected or IFN-gamma treated cell culture supernatants containing sHLA-E were found to partially inhibit IL-2 mediated induction of CD25 molecules on NKL cells. It was also found that sHLA-E could inhibit IL-2 induced H-3]-thymidine incorporation suggesting that, similar to cell surface expressed HLA-E, sHLA-E could also inhibit NK cell responses. Hence JEV-induced shedding of sHLA-E needs further investigation to better understand immune responses in JEV infections since it may have a role in viral evasion of NK cell responses. (C) 2014 Elsevier B.V. All rights reserved.