162 resultados para Generator matrix
Resumo:
High resolution transmission electron microscopy of the Mighei carbonaceous chondrite matrix has revealed the presence of a new mixed layer structure material. This mixed-layer material consists of an ordered arrangement of serpentine-type (S) and brucite-type (B) layers in the sequence ... SBBSBB. ... Electron diffraction and imaging techniques show that the basal periodicity is ~ 17 Å. Discrete crystals of SBB-type material are typically curved, of small size (<1 μm) and show structural variations similar to the serpentine group minerals. Mixed-layer material also occurs in association with planar serpentine. Characteristics of SBB-type material are not consistent with known terrestrial mixed-layer clay minerals. Evidence for formation by a condensation event or by subsequent alteration of preexisting material is not yet apparent. © 1982.
Resumo:
CARBONACEOUS chondrites provide valuable information as they are the least altered examples of early Solar System material1. The matrix constitutes a major proportion of carbonaceous chondrites. Despite many past attempts, unambiguous identification of the minerals in the matrix has not been totally successful2. This is mainly due to the extremely fine-grained nature of the matrix phases. Recently, progress in the characterisation of these phases has been made by electron diffraction studies3,4. We present here the direct observation, by high resolution imaging, of phases in carbonaceous chondrite matrices. We used ion-thinned sections from the Murchison C2(M) meteorite for transmission electron microscopy. The Murchison matrix contains both ordered and disordered inter-growths of serpentine-like and brucite-like layers. Such mixed-layer structures are new types of layer silicates. © 1979 Nature Publishing Group.
Resumo:
This paper presents a novel power control strategy that decouples the active and reactive power for a synchronous generator connected to a power network. The proposed control paradigm considers the capacitance of the transmission line along with its resistance and reactance as-well. Moreover the proposed controller takes into account all cases of R-X relationships, thus allowing it to function in Virtual Power Plant (VPP) structures which operate at both medium voltage (MV) and low voltage (LV) levels. The independent control of active and reactive power is achieved through rotational transformations of the terminal voltages and currents at the synchronous generator's output. This paper details the control technique by first presenting the mathematical and electrical network analysis of the methodology and then successfully implementing the control using MATLAB-SIMULINK simulation.
Resumo:
With the overwhelming increase in the amount of texts on the web, it is almost impossible for people to keep abreast of up-to-date information. Text mining is a process by which interesting information is derived from text through the discovery of patterns and trends. Text mining algorithms are used to guarantee the quality of extracted knowledge. However, the extracted patterns using text or data mining algorithms or methods leads to noisy patterns and inconsistency. Thus, different challenges arise, such as the question of how to understand these patterns, whether the model that has been used is suitable, and if all the patterns that have been extracted are relevant. Furthermore, the research raises the question of how to give a correct weight to the extracted knowledge. To address these issues, this paper presents a text post-processing method, which uses a pattern co-occurrence matrix to find the relation between extracted patterns in order to reduce noisy patterns. The main objective of this paper is not only reducing the number of closed sequential patterns, but also improving the performance of pattern mining as well. The experimental results on Reuters Corpus Volume 1 data collection and TREC filtering topics show that the proposed method is promising.
Resumo:
This paper provides a new general approach for defining coherent generators in power systems based on the coherency in low frequency inter-area modes. The disturbance is considered to be distributed in the network by applying random load changes which is the random walk representation of real loads instead of a single fault and coherent generators are obtained by spectrum analysis of the generators velocity variations. In order to find the coherent areas and their borders in the inter-connected networks, non-generating buses are assigned to each group of coherent generator using similar coherency detection techniques. The method is evaluated on two test systems and coherent generators and areas are obtained for different operating points to provide a more accurate grouping approach which is valid across a range of realistic operating points of the system.
Resumo:
The generation of a correlation matrix from a large set of long gene sequences is a common requirement in many bioinformatics problems such as phylogenetic analysis. The generation is not only computationally intensive but also requires significant memory resources as, typically, few gene sequences can be simultaneously stored in primary memory. The standard practice in such computation is to use frequent input/output (I/O) operations. Therefore, minimizing the number of these operations will yield much faster run-times. This paper develops an approach for the faster and scalable computing of large-size correlation matrices through the full use of available memory and a reduced number of I/O operations. The approach is scalable in the sense that the same algorithms can be executed on different computing platforms with different amounts of memory and can be applied to different problems with different correlation matrix sizes. The significant performance improvement of the approach over the existing approaches is demonstrated through benchmark examples.
Resumo:
Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality and integrity protection to messages. This approach is more efficient than applying a two-step process of providing confidentiality for a message by encrypting the message, and in a separate pass providing integrity protection by generating a Message Authentication Code (MAC). AE using symmetric ciphers can be provided by either stream ciphers with built in authentication mechanisms or block ciphers using appropriate modes of operation. However, stream ciphers have the potential for higher performance and smaller footprint in hardware and/or software than block ciphers. This property makes stream ciphers suitable for resource constrained environments, where storage and computational power are limited. There have been several recent stream cipher proposals that claim to provide AE. These ciphers can be analysed using existing techniques that consider confidentiality or integrity separately; however currently there is no existing framework for the analysis of AE stream ciphers that analyses these two properties simultaneously. This thesis introduces a novel framework for the analysis of AE using stream cipher algorithms. This thesis analyzes the mechanisms for providing confidentiality and for providing integrity in AE algorithms using stream ciphers. There is a greater emphasis on the analysis of the integrity mechanisms, as there is little in the public literature on this, in the context of authenticated encryption. The thesis has four main contributions as follows. The first contribution is the design of a framework that can be used to classify AE stream ciphers based on three characteristics. The first classification applies Bellare and Namprempre's work on the the order in which encryption and authentication processes take place. The second classification is based on the method used for accumulating the input message (either directly or indirectly) into the into the internal states of the cipher to generate a MAC. The third classification is based on whether the sequence that is used to provide encryption and authentication is generated using a single key and initial vector, or two keys and two initial vectors. The second contribution is the application of an existing algebraic method to analyse the confidentiality algorithms of two AE stream ciphers; namely SSS and ZUC. The algebraic method is based on considering the nonlinear filter (NLF) of these ciphers as a combiner with memory. This method enables us to construct equations for the NLF that relate the (inputs, outputs and memory of the combiner) to the output keystream. We show that both of these ciphers are secure from this type of algebraic attack. We conclude that using a keydependent SBox in the NLF twice, and using two different SBoxes in the NLF of ZUC, prevents this type of algebraic attack. The third contribution is a new general matrix based model for MAC generation where the input message is injected directly into the internal state. This model describes the accumulation process when the input message is injected directly into the internal state of a nonlinear filter generator. We show that three recently proposed AE stream ciphers can be considered as instances of this model; namely SSS, NLSv2 and SOBER-128. Our model is more general than a previous investigations into direct injection. Possible forgery attacks against this model are investigated. It is shown that using a nonlinear filter in the accumulation process of the input message when either the input message or the initial states of the register is unknown prevents forgery attacks based on collisions. The last contribution is a new general matrix based model for MAC generation where the input message is injected indirectly into the internal state. This model uses the input message as a controller to accumulate a keystream sequence into an accumulation register. We show that three current AE stream ciphers can be considered as instances of this model; namely ZUC, Grain-128a and Sfinks. We establish the conditions under which the model is susceptible to forgery and side-channel attacks.
Resumo:
Welcome to the Quality assessment matrix. This matrix is designed for highly qualified discipline experts to evaluate their course, major or unit in a systematic manner. The primary purpose of the Quality assessment matrix is to provide a tool that a group of academic staff at universities can collaboratively review the assessment within a course, major or unit annually. The annual review will result in you being read for an external curricula review at any point in time. This tool is designed for use in a workshop format with one, two or more academic staff, and will lead to an action plan for implementation.
Resumo:
This article analyzes a series of stories and artworks that were produced in a collective biography workshop. It explores Judith Butler’s concept of the heterosexual matrix combined with a Deleuzian theoretical framework. The article begins with an overview of Butler’s concept of the heterosexual matrix and her theorizations on how it might be disrupted. It then suggests how a Deleuzian framework offers other tools for analyzing these ruptures at the micro level of girls’ everyday interactions.
Resumo:
Matrix metalloproteinases (MMPs) are proteolytic enzymes important to wound healing. In non-healing wounds, it has been suggested that MMP levels become dysfunctional, hence it is of great interest to develop sensors to detect MMP biomarkers. This study presents the development of a label-free optical MMP biosensor based on a functionalised porous silicon (pSi) thin film. The biosensor is fabricated by immobilising a peptidomimetic MMP inhibitor in the porous layer using hydrosilylation followed by amide coupling. The binding of MMP to the immobilised inhibitor translates into a change of effective optical thickness (EOT) over the time. We investigate the effect of surface functionalisation on the stability of pSi surface and evaluate the sensing performance. We successfully demonstrate MMP detection in buffer solution and human wound fluid at physiologically relevant concentrations. This biosensor may find application as a point-of-care device that is prognostic of the healing trajectory of chronic wounds.
Resumo:
This project addresses the viability of lightweight, low power consumption, flexible, large format LED screens. The investigation encompasses all aspects of the electrical and mechanical design, individually and as a system, and achieves a successful full scale prototype. The prototype implements novel techniques to achieve large displacement colour aliasing, a purely passive thermal management solution, a rapid deployment system, individual seven bit LED current control with two way display communication, auto-configuration and complete signal redundancy, all of which are in direct response to industry needs.
Resumo:
Utilising archival human breast cancer biopsy material we examined the stromal/epithelial interactions of several matrix metalloproteinases (MMPs) using in situ-RT-PCR (IS-RT-PCR). In breast cancer, the stromal/epithelial interactions that occur, and the site of production of these proteases, are central to understanding their role in invasive and metastatic processes. We examined MT1-MMP (MMP-14, membrane type-1-MMP), MMP-1 (interstitial collagenase) and MMP-3 (stromelysin-1) for their localisation profile in progressive breast cancer biopsy material (poorly differentiated invasive breast carcinoma (PDIBC), invasive breast carcinomas (IBC) and lymph node metastases (LNM)). Expression of MT1-MMP, MMP-1 and MMP-3 was observed in both the tumour epithelial and surrounding stromal cells in most tissue sections examined. MT1-MMP expression was predominantly localised to the tumour component in the pre-invasive lesions. MMP-1 gene expression was relatively well distributed between both tissue compartments, while MMP-3 demonstrated highest expression levels in the stromal tissue surrounding the epithelial tumour cells. The results demonstrate the ability to distinguish compartmental gene expression profiles using IS-RT-PCR. Further, we suggest a role for MT1-MMP in early tumour progression, expression of MMP-1 during metastasis and focal expression pattern of MMP-3 in areas of expansion. These expression profiles may provide markers for early breast cancer diagnoses and present potential therapeutic targets.
Resumo:
With increasing interest shown by Universities in workplace learning, especially in STEM disciplines, an issue has arisen amongst educators and industry partners regarding authentic assessment tasks for work integrated learning (WIL) subjects. This paper describes the use of a matrix, which is also available as a decision-tree, based on the features of the WIL experience, in order to facilitate the selection of appropriate assessment strategies. The matrix divides the WIL experiences into seven categories, based on such factors as: the extent to which the experience is compulsory, required for membership of a professional body or elective; whether the student is undertaking a project, or embedding in a professional culture; and other key aspects of the WIL experience. One important variable is linked to the fundamental purpose of the assessment. This question revolves around the focus of the assessment: whether on the person (student development); the process (professional conduct/language); or the product (project, assignment, literature review, report, software). The matrix has been trialed at QUT in the Faculty of Science and Technology, and also at the University of Surrey, UK, and has proven to have good applicability in both universities.
Resumo:
Problem-solving courts appear to achieve outcomes that are not common in mainstream courts. There are increasing calls for the adoption of more therapeutic and problem-solving practices by mainstream judges in civil and criminal courts in a number of jurisdictions, most notably in the United States and Australia. Currently, a judge who sets out to exercise a significant therapeutic function is likely to be doing so in a specialist court or jurisdiction, outside the mainstream court system, and arguably, outside the adversarial paradigm itself. To some extent, this work is tolerated but marginalised. However, do therapeutic and problem-solving functions have the potential to help define, rather than simply complement, the role of judicial officers? The core question addressed in this thesis is whether the judicial role could evolve to be not just less adversarial, but fundamentally non-adversarial. In other words, could we see—or are we seeing—a juristic paradigm shift not just in the colloquial, casual sense of the word, but in the strong, worldview changing sense meant by Thomas Kuhn? This thesis examines the current relationship between adversarialism and therapeutic jurisprudence in the context of Kuhn’s conception of the transition from periods of ‘normal science’, through periods of anomaly and disciplinary crises to paradigm shifts. It considers whether therapeutic jurisprudence and adversarialism are incommensurable in the Kuhnian sense, and if so, what this means for the relationship between the two, and for the agenda to mainstream therapeutic jurisprudence. The thesis asserts that Kuhnian incommensurability is, in fact, a characteristic of the relationship between adversarialism and therapeutic jurisprudence, but that the possibility of a therapeutic paradigm shift in law can be reconciled with many adversarial and due process principles by relating this incommensurability to a broader disciplinary matrix.
Resumo:
INTRODUCTION: Our recent study indicated that subchondral bone pathogenesis in osteoarthritis (OA) is associated with osteocyte morphology and phenotypic abnormalities. However, the mechanism underlying this abnormality needs to be identified. In this study we investigated the effect of extracellular matrix (ECM) produced from normal and OA bone on osteocytic cells function. METHODS: De-cellularized matrices, resembling the bone provisional ECM secreted from primary human subchondral bone osteoblasts (SBOs) of normal and OA patients were used as a model to study the effect on osteocytic cells. Osteocytic cells (MLOY4 osteocyte cell line) cultured on normal and OA derived ECMs were analyzed by confocal microscopy, scanning electron microscopy (SEM), cell attachment assays, zymography, apoptosis assays, qRT-PCR and western blotting. The role of integrinβ1 and focal adhesion kinase (FAK) signaling pathways during these interactions were monitored using appropriate blocking antibodies. RESULTS: The ECM produced by OA SBOs contained less mineral content, showed altered organization of matrix proteins and matrix structure compared with the matrices produced by normal SBOs. Culture of osteocytic cells on these defective OA ECM resulted in a decrease of integrinβ1 expression and the de-activation of FAK cell signaling pathway, which subsequently affected the initial osteocytic cell's attachment and functions including morphological abnormalities of cytoskeletal structures, focal adhesions, increased apoptosis, altered osteocyte specific gene expression and increased Matrix metalloproteinases (MMP-2) and -9 expression. CONCLUSION: This study provides new insights in understanding how altered OA bone matrix can lead to the abnormal osteocyte phenotypic changes, which is typical in OA pathogenesis.