3 resultados para Physical-Mathematical Modes of Perception
em Universidade do Minho
Resumo:
This paper presents an on-board bidirectional battery charger for Electric Vehicles (EVs), which operates in three different modes: Grid-to- Vehicle (G2V), Vehicle-to-Grid (V2G), and Vehicle-to-Home (V2H). Through these three operation modes, using bidirectional communications based on Information and Communication Technologies (ICT), it will be possible to exchange data between the EV driver and the future smart grids. This collaboration with the smart grids will strengthen the collective awareness systems, contributing to solve and organize issues related with energy resources and power grids. This paper presents the preliminary studies that results from a PhD work related with bidirectional battery chargers for EVs. Thus, in this paper is described the topology of the on-board bidirectional battery charger and the control algorithms for the three operation modes. To validate the topology it was developed a laboratory prototype, and were obtained experimental results for the three operation modes.
Resumo:
Tese de Doutoramento em Engenharia de Tecidos, Medicina Regenerativa e Células Estaminais.
Resumo:
Information security is concerned with the protection of information, which can be stored, processed or transmitted within critical information systems of the organizations, against loss of confidentiality, integrity or availability. Protection measures to prevent these problems result through the implementation of controls at several dimensions: technical, administrative or physical. A vital objective for military organizations is to ensure superiority in contexts of information warfare and competitive intelligence. Therefore, the problem of information security in military organizations has been a topic of intensive work at both national and transnational levels, and extensive conceptual and standardization work is being produced. A current effort is therefore to develop automated decision support systems to assist military decision makers, at different levels in the command chain, to provide suitable control measures that can effectively deal with potential attacks and, at the same time, prevent, detect and contain vulnerabilities targeted at their information systems. The concept and processes of the Case-Based Reasoning (CBR) methodology outstandingly resembles classical military processes and doctrine, in particular the analysis of “lessons learned” and definition of “modes of action”. Therefore, the present paper addresses the modeling and design of a CBR system with two key objectives: to support an effective response in context of information security for military organizations; to allow for scenario planning and analysis for training and auditing processes.