38 resultados para simulated security

em Indian Institute of Science - Bangalore - Índia


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Electric power systems are exposed to various contingencies. Network contingencies often contribute to over-loading of network branches, unsatisfactory voltages and also leading to problems of stability/voltage collapse. To maintain security of the systems, it is desirable to estimate the effect of contingencies and plan suitable measures to improve system security/stability. This paper presents an approach for selection of unified power flow controller (UPFC) suitable locations considering normal and network contingencies after evaluating the degree of severity of the contingencies. The ranking is evaluated using composite criteria based fuzzy logic for eliminating masking effect. The fuzzy approach, in addition to real power loadings and bus voltage violations, voltage stability indices at the load buses also used as the post-contingent quantities to evaluate the network contingency ranking. The selection of UPFC suitable locations uses the criteria on the basis of improved system security/stability. The proposed approach for selection of UPFC suitable locations has been tested under simulated conditions on a few power systems and the results for a 24-node real-life equivalent EHV power network and 39-node New England (modified) test system are presented for illustration purposes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The power system network is assumed to be in steady-state even during low frequency transients. However, depending on generator dynamics, and toad and control characteristics, the system model and the nature of power flow equations can vary The nature of power flow equations describing the system during a contingency is investigated in detail. It is shown that under some mild assumptions on load-voltage characteristics, the power flow equations can be decoupled in an exact manner. When the generator dynamics are considered, the solutions for the load voltages are exact if load nodes are not directly connected to each other

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Increasing concentrations of atmospheric CO2 decrease stomatal conductance of plants and thus suppress canopy transpiration. The climate response to this CO2-physiological forcing is investigated using the Community Atmosphere Model version 3.1 coupled to Community Land Model version 3.0. In response to the physiological effect of doubling CO2, simulations show a decrease in canopy transpiration of 8%, a mean warming of 0.1K over the land surface, and negligible changes in the hydrological cycle. These climate responses are much smaller than what were found in previous modeling studies. This is largely a result of unrealistic partitioning of evapotranspiration in our model control simulation with a greatly underestimated contribution from canopy transpiration and overestimated contributions from canopy and soil evaporation. This study highlights the importance of a realistic simulation of the hydrological cycle, especially the individual components of evapotranspiration, in reducing the uncertainty in our estimation of climatic response to CO2-physiological forcing. Citation: Cao, L., G. Bala, K. Caldeira, R. Nemani, and G.Ban-Weiss (2009), Climate response to physiological forcing of carbon dioxide simulated by the coupled Community Atmosphere Model (CAM3.1) and Community Land Model (CLM3.0).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this study, reduction and desorption of oxides of nitrogen (NOx) were conducted using an electrical discharge plasma technique. The study was carried out using a simulated gas mixture to explore the possibility of re-generation of used adsorbents by a nonthermal plasma desorption technique. Three different types of corona electrodes, namely, pipe, helical wire, and straight wire, were used for analyzing their effectiveness in NOx reduction/desorption. The pipe-type corona electrode exhibited a nitric oxide (NO) conversion of 50%, which is 1.5 times that of the straight-wire-type electrode at an energy density of 175J/L. The helical-wire-type corona electrode exhibited a NOx desorption efficiency almost 4 times that of the pipe-type electrode,indicating the possibility that corona-generated species play a crucial role in desorption.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An experimental system was developed for assessing the role ofhetgenes in heterokaryon formation inNeurosporain nature. Burned sugar cane segments planted in soil were infected using a mixture of mutant ascospores of two genotypes.Neurosporaramified in the cane and erupted as distinct pustules of conidia. When ascospores carried identicalhetalleles, the (macro) conidial pustules which formed were heterokaryotic. On the other hand, when ascospores carried dissimilarhetalleles, the pustules were homokaryotic. These results showed that stable heterokaryons between compatible strains can form in nature. When two strains are growing together on a natural substrate, heterozygosity athetloci serves to maintain their individuality.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The main objective of on-line dynamic security assessment is to take preventive action if required or decide remedial action if a contingency actually occurs. Stability limits are obtained for different contingencies. The mode of instability is one of the outputs of dynamic security analysis. When a power system becomes unstable, it splits initially into two groups of generators, and there is a unique cutset in the transmission network known as critical cutset across which the angles become unbounded. The knowledge of critical cutset is additional information obtained from dynamic security assessment, which can be used for initiating preventive control actions, deciding emergency control actions, and adaptive out-of-step relaying. In this article, an analytical technique for the fast prediction of the critical cutset by system simulation for a short duration is presented. Case studies on the New England ten-generator system are presented. The article also suggests the applications of the identification of critical cutsets.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Security in a mobile communication environment is always a matter for concern, even after deploying many security techniques at device, network, and application levels. The end-to-end security for mobile applications can be made robust by developing dynamic schemes at application level which makes use of the existing security techniques varying in terms of space, time, and attacks complexities. In this paper we present a security techniques selection scheme for mobile transactions, called the Transactions-Based Security Scheme (TBSS). The TBSS uses intelligence to study, and analyzes the security implications of transactions under execution based on certain criterion such as user behaviors, transaction sensitivity levels, and credibility factors computed over the previous transactions by the users, network vulnerability, and device characteristics. The TBSS identifies a suitable level of security techniques from the repository, which consists of symmetric, and asymmetric types of security algorithms arranged in three complexity levels, covering various encryption/decryption techniques, digital signature schemes, andhashing techniques. From this identified level, one of the techniques is deployed randomly. The results shows that, there is a considerable reduction in security cost compared to static schemes, which employ pre-fixed security techniques to secure the transactions data.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We develop extensions of the Simulated Annealing with Multiplicative Weights (SAMW) algorithm that proposed a method of solution of Finite-Horizon Markov Decision Processes (FH-MDPs). The extensions developed are in three directions: a) Use of the dynamic programming principle in the policy update step of SAMW b) A two-timescale actor-critic algorithm that uses simulated transitions alone, and c) Extending the algorithm to the infinite-horizon discounted-reward scenario. In particular, a) reduces the storage required from exponential to linear in the number of actions per stage-state pair. On the faster timescale, a 'critic' recursion performs policy evaluation while on the slower timescale an 'actor' recursion performs policy improvement using SAMW. We give a proof outlining convergence w.p. 1 and show experimental results on two settings: semiconductor fabrication and flow control in communication networks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Changes in MAPK activities were examined in the corpus luteum (CL) during luteolysis and pregnancy, employing GnRH antagonist (Cetrorelix)-induced luteolysis, stages of CL, and hCG treatment to mimic early pregnancy as model systems in the bonnet monkey. We hypothesized that MAPKs could serve to phosphorylate critical phosphoproteins to regulate luteal function. Analysis of several indices for structural (caspase-3 activity and DNA fragmentation) and functional (progesterone and steroidogenic acute regulatory protein expression) changes in the CL revealed that the decreased luteal function observed during Cetrorelix treatment and late luteal phase was associated with increased caspase-3 activity and DNA fragmentation. As expected, human chorionic gonadotropin treatment dramatically increased luteal function, but the indices for structural changes were only partially attenuated. All three MAPKs appeared to be constitutively active in the mid-luteal-phase CL, and activities of ERK-1/2 and p38-MAPK (p38), but not Jun N-terminal kinase (JNK)-1/2, decreased significantly (P < 0.05) within 12 - 24 h after Cetrorelix treatment. During the late luteal phase, in contrast to decreased ERK-1/2 and p38 activities, JNK-1/2 activities increased significantly (P < 0.05). Although human chorionic gonadotropin treatment increased ERK-1/2 and p38 activities, it decreased JNK-1/2 activities. The activation status of p38 was correlated with the phosphorylation status of an upstream activator, MAPK kinase-3/6 and the expression of MAPK activated protein kinase-3, a downstream target. Intraluteal administration of p38 kinase inhibitor (SB203580), but not MAPK kinase-1/2 inhibitor (PD98059), decreased the luteal function. Together, these data suggest an important role for p38 in the regulation of CL function in primates.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An application of direct methods to dynamic security assessment of power systems using structure-preserving energy functions (SPEF) is presented. The transient energy margin (TEM) is used as an index for checking the stability of the system as well as ranking the contigencies based on their severity. The computation of the TEM requires the evaluation of the critical energy and the energy at fault clearing. Usually this is done by simulating the faulted trajectory, which is time-consuming. In this paper, a new algorithm which eliminates the faulted trajectory estimation is presented to calculate the TEM. The system equations and the SPEF are developed using the centre-of-inertia (COI) formulation and the loads are modelled as arbitrary functions of the respective bus voltages. The critical energy is evaluated using the potential energy boundary surface (PEBS) method. The method is illustrated by considering two realistic power system examples.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The paper describes the sensitivity of the simulated precipitation to changes in convective relaxation time scale (TAU) of Zhang and McFarlane (ZM) cumulus parameterization, in NCAR-Community Atmosphere Model version 3 (CAM3). In the default configuration of the model, the prescribed value of TAU, a characteristic time scale with which convective available potential energy (CAPE) is removed at an exponential rate by convection, is assumed to be 1 h. However, some recent observational findings suggest that, it is larger by around one order of magnitude. In order to explore the sensitivity of the model simulation to TAU, two model frameworks have been used, namely, aqua-planet and actual-planet configurations. Numerical integrations have been carried out by using different values of TAU, and its effect on simulated precipitation has been analyzed. The aqua-planet simulations reveal that when TAU increases, rate of deep convective precipitation (DCP) decreases and this leads to an accumulation of convective instability in the atmosphere. Consequently, the moisture content in the lower-and mid-troposphere increases. On the other hand, the shallow convective precipitation (SCP) and large-scale precipitation (LSP) intensify, predominantly the SCP, and thus capping the accumulation of convective instability in the atmosphere. The total precipitation (TP) remains approximately constant, but the proportion of the three components changes significantly, which in turn alters the vertical distribution of total precipitation production. The vertical structure of moist heating changes from a vertically extended profile to a bottom heavy profile, with the increase of TAU. Altitude of the maximum vertical velocity shifts from upper troposphere to lower troposphere. Similar response was seen in the actual-planet simulations. With an increase in TAU from 1 h to 8 h, there was a significant improvement in the simulation of the seasonal mean precipitation. The fraction of deep convective precipitation was in much better agreement with satellite observations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents an efficient Simulated Annealing with valid solution mechanism for finding an optimum conflict-free transmission schedule for a broadcast radio network. This is known as a Broadcast Scheduling Problem (BSP) and shown as an NP-complete problem, in earlier studies. Because of this NP-complete nature, earlier studies used genetic algorithms, mean field annealing, neural networks, factor graph and sum product algorithm, and sequential vertex coloring algorithm to obtain the solution. In our study, a valid solution mechanism is included in simulated annealing. Because of this inclusion, we are able to achieve better results even for networks with 100 nodes and 300 links. The results obtained using our methodology is compared with all the other earlier solution methods.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents a general methodology for the synthesis of the external boundary of the workspaces of a planar manipulator with arbitrary topology. Both the desired workspace and the manipulator workspaces are identified by their boundaries and are treated as simple closed polygons. The paper introduces the concept of best match configuration and shows that the corresponding transformation can be obtained by using the concept of shape normalization available in image processing literature. Introduction of the concept of shape in workspace synthesis allows highly accurate synthesis with fewer numbers of design variables. This paper uses a new global property based vector representation for the shape of the workspaces which is computationally efficient because six out of the seven elements of this vector are obtained as a by-product of the shape normalization procedure. The synthesis of workspaces is formulated as an optimization problem where the distance between the shape vector of the desired workspace and that of the workspace of the manipulator at hand are minimized by changing the dimensional parameters of the manipulator. In view of the irregular nature of the error manifold, the statistical optimization procedure of simulated annealing has been used. A number of worked-out examples illustrate the generality and efficiency of the present method. (C) 1998 Elsevier Science Ltd. All rights reserved.