794 resultados para Design protection


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper describes protection and control of a microgrid with converter interfaced micro sources. The proposed protection and control scheme consider both grid connected and autonomous operation of the microgrid. A protection scheme, capable of detecting faults effectively in both grid connected and islanded operations is proposed. The main challenge of the protection, due to current limiting state of the converters is overcome by using admittance relays. The relays operate according to the inverse time characteristic based on measured admittance of the line. The proposed scheme isolates the fault from both sides, while downstream side of the microgrid operates in islanding condition. Moreover faults can be detected in autonomous operation. In grid connected mode distributed generators (DG) supply the rated power while in absence of the grid, DGs share the entire power requirement proportional to rating based on output voltage angle droop control. The protection scheme ensures minimum load shedding with isolating the faulted network and DG control provides a smooth islanding and resynchronization operation. The efficacy of coordinated control and protection scheme has been validated through simulation for various operating conditions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This research reports on a project concerned with the relationship between the person and the environment in the context of achieving a contemplative or existential state – a state which can be experienced either consciously or subconsciously. The need for such a study originated with the desire to contribute to the design of multicultural spaces which could be used for a range of activities within the public and the personal arena, activities including contemplation, meditation and prayer. The concept of ‘sacred’ is explored in the literature review and in primary interviews with the participants of this study. Given that the word ‘sacred’ is highly value-laden and potentially alienating for some people, it was decided to use the more accessible term ‘contemplative’. The outcomes of the study inform the practice of interior design and architecture which tends currently to neglect the potential for all spaces to be existentially meaningful. Informed by phenomenological methodology, data were collected from a diverse group of people, using photo-elicitation and interviews. The technique of photo-elicitation proved to be highly effective in helping people reveal their everyday lived experience of contemplative spaces. Reflective analysis (Van Manen 2000) was used to explore the data collected. The initial stage of analysis produced three categories of data: varying conceptions of contemplation, aspects of the person involved in the contemplation, and aspects of environment involved in contemplation. From this, it was found that achieving a state of contemplation involves both the person and the environment in a dialectic process of unfolding. The unfolding has various physical, psycho-social, and existential dimensions or qualities which operate sequentially and simultaneously. Two concepts emerged as being central to unfolding: ‘Cleansing’ and ‘Nothingness’. Unfolding is found to comprise the Core; Distinction; Manifestation; Cleansing; Creation; and Sharing. This has a parallel with Mircea Eliade’s (1959) definition of sacred as something that manifests itself as different from the profane. The power of design, re-contextualization through utility and purpose, and the existential engagements between the person and environment are used as a basis for establishing the potential contribution of the study to interior design. In this way, the study makes a contribution to our understanding of how space and its elements inspire, support and sustain person environment interaction – particularly at the existential level – as well as to our understanding of the multi-dimensional and holistic nature of this interaction. In addition, it points to the need for a phenomenological re-conceptualisation of the design/client relationship. In summary, the contributions of this research are: the exploration of contemplative experience as sacred experience; an understanding of the design of space as creating engagement between person and environment; a rationale for the introduction of a phenomenological approach to the relationship between designer and clients; and raising awareness of the spiritual in a holistic approach to design.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As user involvement becomes a necessary part of the product development process, various ways of accessing users' latent needs have been developed and studied. Reviews of literatures in user involvement and product development have revealed that accessing users' latent needs and transferring them into design process could be facilitated by effectively implementing user-designer collaboration during the early stage of the design process. In this paper, various types of user-designer collaboration were observed and then distinct characteristics of user-designer collaboration were classified into three categories. 1) Passive objectivity, 2) workplace democratisation, and 3) shared contexts were observed as strategies for better user-designer collaboration, which have been employed in the area of user-centred design, user participatory design and design for experiencing. Based on the literature review, this paper proposed a basic collaboration mechanism between the users and the designers during the early stage of the design process and then discussed how its mechanism will help to describe the interactions between the users and the designers during the user involvement sessions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The new cold-formed LiteSteel beam (LSB) sections have found increasing popularity in residential, industrial and commercial buildings due to their lightweight and cost-effectiveness. They have the beneficial characteristics of including torsionally rigid rectangular flanges combined with economical fabrication processes. Currently there is significant interest in using LSB sections as flexural members in floor joist systems. When used as floor joists, the LSB sections require holes in the web to provide access for inspection and various services. But there are no design methods that provide accurate predictions of the moment capacities of LSBs with web holes. In this study, the buckling and ultimate strength behaviour of LSB flexural members with web holes was investigated in detail by using a detailed parametric study based on finite element analyses with an aim to develop appropriate design rules and recommendations for the safe design of LSB floor joists. Moment capacity curves were obtained using finite element analyses including all the significant behavioural effects affecting their ultimate member capacity. The parametric study produced the required moment capacity curves of LSB section with a range of web hole combinations and spans. A suitable design method for predicting the ultimate moment capacity of LSB with web holes was finally developed. This paper presents the details of this investigation and the results

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Exposure of the skin to sunlight can cause skin cancer and is also necessary for cutaneous vitamin D production. Media reports have highlighted the purported health benefits of vitamin D. Our aim was to examine attitudes and behaviours related to sun protection and vitamin D. A cross-sectional study of 2,001 residents in Queensland, Australia aged 20-70 years was undertaken. Information collected included: skin cancer risk factors; perceptions about levels of sun exposure required to maintain vitamin D; belief that sun protection increases risk of vitamin D deficiency; intention, and actual change in sun protection practices for adults and children. Multivariate models examined predictors of attitudinal and behavioural change. One-third (32%) believed a fair-skinned adult, and 31% thought a child required at least 30 minutes per day in summer sun to maintain vitamin D levels. Reductions in sun protection were reported by 21% of adults and 14% of children. Factors associated with belief that sun protection may result in not obtaining enough vitamin D included aged ≥ 60 years (OR=1.35, 95% CI 1.09-1.66) and having skin that tanned easily (OR=1.96, 95% CI 1.38-2.78). Participants from low income households, and those who frequently used sun protective clothing were more likely to have reduced sun protection practices (OR=1.33, 95% CI 1.10-1.73 and OR=1.73, 95% CI 1.36-2.20, respectively). This study provides evidence of reductions in sun protection practices in a population living in a high UV environment. There is an urgent need to re-focus messages regarding sun exposure and for continued sun protection practices.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We describe the design and evaluation of a platform for networks of cameras in low-bandwidth, low-power sensor networks. In our work to date we have investigated two different DSP hardware/software platforms for undertaking the tasks of compression and object detection and tracking. We compare the relative merits of each of the hardware and software platforms in terms of both performance and energy consumption. Finally we discuss what we believe are the ongoing research questions for image processing in WSNs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Dragon is a word-based stream cipher. It was submitted to the eSTREAM project in 2005 and has advanced to Phase 3 of the software profile. This paper discusses the Dragon cipher from three perspectives: design, security analysis and implementation. The design of the cipher incorporates a single word-based non-linear feedback shift register and a non-linear filter function with memory. This state is initialized with 128- or 256-bit key-IV pairs. Each clock of the stream cipher produces 64 bits of keystream, using simple operations on 32-bit words. This provides the cipher with a high degree of efficiency in a wide variety of environments, making it highly competitive relative to other symmetric ciphers. The components of Dragon were designed to resist all known attacks. Although the design has been open to public scrutiny for several years, the only published attacks to date are distinguishing attacks which require keystream lengths greatly exceeding the stated 264 bit maximum permitted keystream length for a single key-IV pair.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Small element spacing in compact arrays results in strong mutual coupling between the array elements. A decoupling network consisting of reactive cross-coupling elements can alleviate problems associated with the coupling. Closed-form design equations for the decoupling networks of symmetrical arrays with two or three elements are presented.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Protection of “critical infrastructure” has become a major issue for govern- ments worldwide. Yet in Australia, as in many other countries, including the United States, an estimated 90% of critical infrastructure is privately owned or operated commercially – in other words, critical infrastructure protection is not the exclusive domain of government. As a result, information sharing between government and the private sector has become a vitally important component of effective risk management. However, establishing effective arrangements of this kind between the public and private sector needs to take account of existing regimes of access and public disclosure which relate to government-held documents; in particular, that which is established by freedom of information (FOI) legislation. This article examines the extent to which the current Commonwealth FOI regime is likely to act as an impediment to the private sector operators of critical infrastructure participat- ing in government-operated information sharing arrangements. By examining developments in other jurisdictions, principally the United States, the article considers whether amendments to the current Australian FOI regime are necessary to ensure effective participation, consistent with the underlying object and purpose of FOI.