166 resultados para Asbestos in building
Resumo:
This thesis is about the derivation of the addition law on an arbitrary elliptic curve and efficiently adding points on this elliptic curve using the derived addition law. The outcomes of this research guarantee practical speedups in higher level operations which depend on point additions. In particular, the contributions immediately find applications in cryptology. Mastered by the 19th century mathematicians, the study of the theory of elliptic curves has been active for decades. Elliptic curves over finite fields made their way into public key cryptography in late 1980’s with independent proposals by Miller [Mil86] and Koblitz [Kob87]. Elliptic Curve Cryptography (ECC), following Miller’s and Koblitz’s proposals, employs the group of rational points on an elliptic curve in building discrete logarithm based public key cryptosystems. Starting from late 1990’s, the emergence of the ECC market has boosted the research in computational aspects of elliptic curves. This thesis falls into this same area of research where the main aim is to speed up the additions of rational points on an arbitrary elliptic curve (over a field of large characteristic). The outcomes of this work can be used to speed up applications which are based on elliptic curves, including cryptographic applications in ECC. The aforementioned goals of this thesis are achieved in five main steps. As the first step, this thesis brings together several algebraic tools in order to derive the unique group law of an elliptic curve. This step also includes an investigation of recent computer algebra packages relating to their capabilities. Although the group law is unique, its evaluation can be performed using abundant (in fact infinitely many) formulae. As the second step, this thesis progresses the finding of the best formulae for efficient addition of points. In the third step, the group law is stated explicitly by handling all possible summands. The fourth step presents the algorithms to be used for efficient point additions. In the fifth and final step, optimized software implementations of the proposed algorithms are presented in order to show that theoretical speedups of step four can be practically obtained. In each of the five steps, this thesis focuses on five forms of elliptic curves over finite fields of large characteristic. A list of these forms and their defining equations are given as follows: (a) Short Weierstrass form, y2 = x3 + ax + b, (b) Extended Jacobi quartic form, y2 = dx4 + 2ax2 + 1, (c) Twisted Hessian form, ax3 + y3 + 1 = dxy, (d) Twisted Edwards form, ax2 + y2 = 1 + dx2y2, (e) Twisted Jacobi intersection form, bs2 + c2 = 1, as2 + d2 = 1, These forms are the most promising candidates for efficient computations and thus considered in this work. Nevertheless, the methods employed in this thesis are capable of handling arbitrary elliptic curves. From a high level point of view, the following outcomes are achieved in this thesis. - Related literature results are brought together and further revisited. For most of the cases several missed formulae, algorithms, and efficient point representations are discovered. - Analogies are made among all studied forms. For instance, it is shown that two sets of affine addition formulae are sufficient to cover all possible affine inputs as long as the output is also an affine point in any of these forms. In the literature, many special cases, especially interactions with points at infinity were omitted from discussion. This thesis handles all of the possibilities. - Several new point doubling/addition formulae and algorithms are introduced, which are more efficient than the existing alternatives in the literature. Most notably, the speed of extended Jacobi quartic, twisted Edwards, and Jacobi intersection forms are improved. New unified addition formulae are proposed for short Weierstrass form. New coordinate systems are studied for the first time. - An optimized implementation is developed using a combination of generic x86-64 assembly instructions and the plain C language. The practical advantages of the proposed algorithms are supported by computer experiments. - All formulae, presented in the body of this thesis, are checked for correctness using computer algebra scripts together with details on register allocations.
Resumo:
Stream ciphers are encryption algorithms used for ensuring the privacy of digital telecommunications. They have been widely used for encrypting military communications, satellite communications, pay TV encryption and for voice encryption of both fixed lined and wireless networks. The current multi year European project eSTREAM, which aims to select stream ciphers suitable for widespread adoptation, reflects the importance of this area of research. Stream ciphers consist of a keystream generator and an output function. Keystream generators produce a sequence that appears to be random, which is combined with the plaintext message using the output function. Most commonly, the output function is binary addition modulo two. Cryptanalysis of these ciphers focuses largely on analysis of the keystream generators and of relationships between the generator and the keystream it produces. Linear feedback shift registers are widely used components in building keystream generators, as the sequences they produce are well understood. Many types of attack have been proposed for breaking various LFSR based stream ciphers. A recent attack type is known as an algebraic attack. Algebraic attacks transform the problem of recovering the key into a problem of solving multivariate system of equations, which eventually recover the internal state bits or the key bits. This type of attack has been shown to be effective on a number of regularly clocked LFSR based stream ciphers. In this thesis, algebraic attacks are extended to a number of well known stream ciphers where at least one LFSR in the system is irregularly clocked. Applying algebriac attacks to these ciphers has only been discussed previously in the open literature for LILI-128. In this thesis, algebraic attacks are first applied to keystream generators using stop-and go clocking. Four ciphers belonging to this group are investigated: the Beth-Piper stop-and-go generator, the alternating step generator, the Gollmann cascade generator and the eSTREAM candidate: the Pomaranch cipher. It is shown that algebraic attacks are very effective on the first three of these ciphers. Although no effective algebraic attack was found for Pomaranch, the algebraic analysis lead to some interesting findings including weaknesses that may be exploited in future attacks. Algebraic attacks are then applied to keystream generators using (p; q) clocking. Two well known examples of such ciphers, the step1/step2 generator and the self decimated generator are investigated. Algebraic attacks are shown to be very powerful attack in recovering the internal state of these generators. A more complex clocking mechanism than either stop-and-go or the (p; q) clocking keystream generators is known as mutual clock control. In mutual clock control generators, the LFSRs control the clocking of each other. Four well known stream ciphers belonging to this group are investigated with respect to algebraic attacks: the Bilateral-stop-and-go generator, A5/1 stream cipher, Alpha 1 stream cipher, and the more recent eSTREAM proposal, the MICKEY stream ciphers. Some theoretical results with regards to the complexity of algebraic attacks on these ciphers are presented. The algebraic analysis of these ciphers showed that generally, it is hard to generate the system of equations required for an algebraic attack on these ciphers. As the algebraic attack could not be applied directly on these ciphers, a different approach was used, namely guessing some bits of the internal state, in order to reduce the degree of the equations. Finally, an algebraic attack on Alpha 1 that requires only 128 bits of keystream to recover the 128 internal state bits is presented. An essential process associated with stream cipher proposals is key initialization. Many recently proposed stream ciphers use an algorithm to initialize the large internal state with a smaller key and possibly publicly known initialization vectors. The effect of key initialization on the performance of algebraic attacks is also investigated in this thesis. The relationships between the two have not been investigated before in the open literature. The investigation is conducted on Trivium and Grain-128, two eSTREAM ciphers. It is shown that the key initialization process has an effect on the success of algebraic attacks, unlike other conventional attacks. In particular, the key initialization process allows an attacker to firstly generate a small number of equations of low degree and then perform an algebraic attack using multiple keystreams. The effect of the number of iterations performed during key initialization is investigated. It is shown that both the number of iterations and the maximum number of initialization vectors to be used with one key should be carefully chosen. Some experimental results on Trivium and Grain-128 are then presented. Finally, the security with respect to algebraic attacks of the well known LILI family of stream ciphers, including the unbroken LILI-II, is investigated. These are irregularly clock- controlled nonlinear filtered generators. While the structure is defined for the LILI family, a particular paramater choice defines a specific instance. Two well known such instances are LILI-128 and LILI-II. The security of these and other instances is investigated to identify which instances are vulnerable to algebraic attacks. The feasibility of recovering the key bits using algebraic attacks is then investigated for both LILI- 128 and LILI-II. Algebraic attacks which recover the internal state with less effort than exhaustive key search are possible for LILI-128 but not for LILI-II. Given the internal state at some point in time, the feasibility of recovering the key bits is also investigated, showing that the parameters used in the key initialization process, if poorly chosen, can lead to a key recovery using algebraic attacks.
Resumo:
This paper explores the interplay between individual values, espoused organisational values and the values of the organisational culture in practice in light of a recent Royal Commission in Queensland, Australia, which highlighted systematic failures in patient care. The lack of congruence among values at these levels impacts upon the ethical decision making of health managers. The presence of institutional ethics regimes such as the Public Sector Ethics Act 1994 (Qld) and agency codes of conduct are not sufficient to counteract the negative influence of informal codes of practice that undermine espoused organisational values and community standards. The ethical decision-making capacity of health care managers remains at the front line in the battle against unethical and unprofessional practice. What is known about the topic? Value congruence theory focusses on the conflicts between individual and organisational values. Congruence between individual values, espoused values and values expressed in everyday practice can only be achieved by ensuring that such shared values are an ever-present factor in managerial decision making. What does this paper add? The importance of value congruence in building and sustaining a healthy organisational culture is confirmed by the evidence presented in the Bundaberg Hospital Inquiry. The presence of strong individual values among staff and strong espoused values in line with community expectations and backed up by legislation and ethics regimes were not, in themselves, sufficient to ensure a healthy organisational culture and prevent unethical, and possibly illegal, behaviour. What are the implications for practitioners? Managers must incorporate ethics in decision making to establish and maintain the nexus between individual and organisational values that is a vital component of a healthy organisational culture.
Resumo:
Rapid prototyping (RP) is a common name for several techniques, which read in data from computer-aided design (CAD) drawings and manufacture automatically threedimensional objects layer-by-layer according to the virtual design. The utilization of RP in tissue engineering enables the production of three-dimensional scaffolds with complex geometries and very fine structures. Adding micro- and nanometer details into the scaffolds improves the mechanical properties of the scaffold and ensures better cell adhesion to the scaffold surface. Thus, tissue engineering constructs can be customized according to the data acquired from the medical scans to match the each patient’s individual needs. In addition RP enables the control of the scaffold porosity making it possible to fabricate applications with desired structural integrity. Unfortunately, every RP process has its own unique disadvantages in building tissue engineering scaffolds. Hence, the future research should be focused into the development of RP machines designed specifically for fabrication of tissue engineering scaffolds, although RP methods already can serve as a link between tissue and engineering.
Resumo:
This book (256 pages, written in Korean) is a critical essay that reviews, questions, and criticises Korean and Eastern immigrants’ thinking and behaviour styles in Australia from their cultural perspectives, and discuss and proposes a creative cultural dimension for their better life in a multicultural context. Multiculturalism is not supportive of Eastern cultures because of individualistic collection of cultures, while transculturalism facilitates nurture of their culture in a community-oriented way within multicultural circumstances. Korean and Eastern immigrants, sharing oriental cultural systems and values, should approach to the Australian multicultural context with transculturalism which allows creating new cultural values in collaboration with and by participation into local communities. ------------------------------------------------------------ Many Eastern immigrants live in their own ethnic communities without or less interacting with Australian (communities). The author defines this phenomenon as “reverse immigration”. Reverse immigration refers to re-immigrating to their ethnic community in Australia or to their birth country despite they did not anticipate that this would happen to them before immigration to Australia. The author argues that Easterners’ collectivistic culture often devalues individuality and vice versa. Cultural clash between West and East often forces the immigrants to choose reverse immigration because of their lack of understanding of Western culture and their cultural characteristics such as low individuality, high power distance, and high uncertainty avoidance. For example, a vague boundary between individualist and collectivist in a collectivistic context (within their ethnic group) often leads to maladjustment to local communities and enhancement of cultural conservatism. The author proposes that the cultural clash can be overcome by cross-cultural activities named “transculturalism”. To Eastern immigrants, transculturalism can be achieved by acculturation of their two predominant cultures, the third-person perspective and generalised others. In a multicultural context, the former refers to the ability to share another person's feelings and emotions as if they were your own, and the latter does the ability to manage community and public expectations. When both cultural values are used for quality interactions between East and West, they allow Eastern immigrants to be more creative and critical and Australian to be more socially inclusive and culturally tolerant. With these discussions, the author discusses cultural differences throughout the book with four topics (chapters) and proposes transculturalism as a solution to the reverse immigration. ------------------------------------------------------------ Chapter 1 criticises Koreans’ attitudes and methods towards learning English that is less pragmatic and practical, but more likely to be a scholarly study. The author explains that Koreans’ non-pragmatic towards learning English has been firmly built based on their traditional systems and values that Koreans view English as a discipline and an aim of academic achievements rather than a means of communication. Within their cultural context, English can be perceived as more than a language, but something like vastly superior to their language and culture. Their collectivistic culture regards English as an unreachable and heterogeneous one that may threaten their cultural identity, so that “scholarly studying” is only the way to achieve (not learn) it. This discourages the immigrants to engage and involve in daily dialogues by “using” English as a second language. The author further advises the readers to be aware of Eastern collectivistic culture in communication and interaction that sometimes completely reverses private and public topics in a Western context. This leads them to feel that they have no content to talk to natives. ------------------------------------------------------------ Chapter 2 compares between Korea and Australia in terms of their educational systems and values, and proposes how Eastern overseas students can achieve critical and creative thinking within a Western educational setting. Interestingly, this chapter includes an explanation of why Eastern overseas students easily fail assessments including essay writing, oral presentations and discussions. One of the reasons the author explains is that Eastern students are not familiar to criticise others and think creatively, especially when they recognise that their words and ideas may harm the collectivistic harmony. Western educational systems focuses on enhancement of individuality such as self-confidence, self-esteem, and self-expression, while Eastern educational systems foster group-oriented values such as interpersonal relationship, and strong moral and spiritual values. Yet, the author argues that the collectivistic approach to criticism and creativity is often more critical and creative than Western individuals when they know what they are supposed to do for a group (or a community). Therefore, Eastern students need to think their cultural merits and demerits by using an individual perspective rather than generalised others’ perspective. The latter often discourages individual participation in a community, and the generalised others in a Western culture is weaker than Eastern. Furthermore, Western educational systems do not educate students to transform (loose) their individuality to fit into a group or a community. Rather they cultivate individuality for community prosperity. ------------------------------------------------------------ Chapter 3 introduces various cases of reverse immigration in workplaces that many immigrants return to their country or their ethnic community after many trials for acculturation. Reverse immigration is unexpected and not planned before immigration, so that its emotional embarrassment increases such severe social loneliness. Most Eastern immigrant workers have tried to adjust themselves in this new cultural environment at the early stages of immigration. However, their cultural features of collectivism, high power distance, high uncertainty avoidance, and long-term oriented cultures suppress individual initiative and eliminate the space for experiments in ways of acculturation. The author argues that returning to their ethnic community (physically and psychologically) leads to two significant problems: their distorted parenting and becoming more conservatives. The former leads the first generation of immigrants to pressure their children to pursue extrinsic or materialist values, such as financial success, fame and physical appearance, rather than on intrinsic values, while the latter refers to their isolated conservative characters because of their remoteness from the changes of their own country. The author also warns that their ethnic and religious groups actively strengthens immigrants’ social loneliness and systematically discourages immigrants’ interests and desire to be involving into local communities. The ethnic communities and leaders have not been interacting with Australian local communities and, as a result, are eager to conserve outdated cultural systems values. Even they have a tendency to weed out those people who wish to settle down within Australian local communities. They believe that those people can threaten their community’s survival and continuity. ------------------------------------------------------------ Chapter 4 titled multiculturalism argues that Korean and Eastern immigrants should more precisely understand Australia as a multicultural society in a way of collaboratively creating new cultural values. The author introduces multiculturalism with its definitions and history in Australia and argues the limitations of multiculturalism from an Easterner’s perspective. With well known tragedies of the second generations of U.S. immigrants, Cho Seung-Hui, a university student, massacred 32 people on the Virginia Tech before committing suicide and Hidal Hassan, an Army psychiatrist, killed 13 people at Fort Hood and the responses of ethnic community, the author explains that their mental illness may be derived from their parents’ (or ethnic group) culturally isolated attitude and socially static viewpoint of U.S. (Western system and values). The author insists that multiculturalism may restrict Eastern immigrants’ engagement and involvement in local communities. Multiculturalism has been systematically and historically developed based on Western systems and cultural values. In other words, multiculturalism requires high self-confidence and self-esteem that Eastern immigrants less prioritise them. It has been generally known that Easterners put more weight on human relationship than Westerners, but the author claims that this is not true. Within an individualistic culture, Westerners are more interested in building person-to-person connections and relationships. While Easterners are more interested in how individuals can achieve a sense of belonging within a group and a community. Therefore, multiculturalism is an ideology which forces Eastern immigrants to discard their strong desire to be part of a group and does not give a sense of belonging. In a consequence, the author advises that Eastern immigrants should aim towards “transculturalism” which allows them to actively participate in and contribute to their multicultural community. Transculturalism does not ask Easterners to discard their cultural values, but enables them to be a collectivistic individualist (a community leader) who is capable of developing new cultural values in a more creative and productive way. Furthermore, transculturalism encourages Western Australians in a multicultural context to collaborate with ethnic minorities to build a better community.
Resumo:
The purpose of this book is to show why we should be concerned about virtual communities for people with physical, or more particularly mobility, impairments. The well-being model through a virtual community introduced here goes towards advancing the work begun by others, by adding for example a socio-political component. The model presented here provides practical insights into how strategic community investment can support people with disabilities and their families. Virtual communities are about engagement, quality of life and support, not just about information. The role of information technology in building and raising community capacity and social capital in socially and economically disadvantaged communities is also examined. Practical insights are offered into community support for people with chronic illness.
Resumo:
This paper presents a preliminary crash avoidance framework for heavy equipment control systems. Safe equipment operation is a major concern on construction sites since fatal on-site injuries are an industry-wide problem. The proposed framework has potential for effecting active safety for equipment operation. The framework contains algorithms for spatial modeling, object tracking, and path planning. Beyond generating spatial models in fractions of seconds, these algorithms can successfully track objects in an environment and produce a collision-free 3D motion trajectory for equipment.
Resumo:
The Acton Peninsula project alliance is the first project alliance in building construction in the world. The project alliance is set out to achieve the best possible outcome for the project with all participants in the alliance sharing both risks and rewards. The construction of the National Museum of Australia and the Australian Institute of Aboriginal and Torres Strait Islander Studies, on Acton Peninsula in Canberra, will be a significant Australian architectural and construction achievement. The design and construction project team is committed to achieve outstanding results in all aspects of the design, construction and delivery of this significant national project. Innovation and creativity are valued, and outstanding performance will be rewarded.
Resumo:
Column elements at a certain level in building are subjected to loads from different tributary areas. Consequently, differential axial deformation among these elements occurs. Adverse effects of differential axial deformation increase with building height and geometric complexity. Vibrating wire, electronic strain and external mechanical strain gauges are used to measure the axial deformations to take adequate provisions to mitigate the adverse effects. These gauges require deploying in or on the elements during their construction in order to acquire necessary measurements continuously. The use of these gauges is therefore inconvenient and uneconomical. This highlights the need for a method to quantify the axial deformation using ambient measurements. This paper proposes a comprehensive vibration based method. The unique capabilities of the proposed method present through an illustrative example.
Resumo:
YEAR: 2010 ROLE: Artist FORMAT: Miniature 3D Sculpture produced in resin using 3D printing technologies. WITH: International Touring Show ‘Inside Out’ WHAT: A miniature sculpture that contributes towards my ongoing explorations into how our collective ability to sustain (the future) is as much a cultural problematic as it is an economic or technological one. OVERVIEW: The curatorial brief was for each curated artist was to design a piece in CAD suitable for 3D resin printing - The object should be entirely generated through 3D visualisation and modelling tools and should be machined and shipped within the dimensions of 6cm x 6cm x 6cm. My design for this brief was influenced by recent research I had conducted in Mildura in the Sunraysia irrigated region of NW Victoria. Each name set within the work is an Australian soldier/settler – who, on returning from the ‘Great War’ was duly awarded a ‘block’ in Australia’s new inland irrigated settlements - with the explicit task of clearing it to plant and reap. Through their concerted and well-intentioned efforts, these workers began to profoundly re-shape Australia’s marginal country - inadvertently presaging the bleak future faced today by many of Australia’s inland lands and river systems. Furthermore, through that time's predominant colonial conception of ‘terra nullius’ (this land is unoccupied and therefore free to be claimed) they each played a small but formative part in building the profound cultural divide between land and peoples that still haunts Australia today. THE EXHIBITION: Inside Out is a compelling international touring exhibition featuring forty-six miniature sculptures produced in resin using 3D printing technologies. Developments in virtual computer visualisation and integrated digital technologies are giving contemporary makers new insight and opportunities to create objects and forms which were previously impossible to produce or difficult to envisage. The exhibition is the result of collaboration between the Art Technology Coalition, the University of Technology Sydney and RMIT University in Australia along with De Montfort University, Manchester Metropolitan University and Dartington College of Arts at University College Falmouth in the United Kingdom.
Resumo:
The uncertain and dynamic nature of International Construction Joint Venture (ICJV) performance is evolved with many critical factors which lead to make partner relationships more complex in respect of making decisions to maintain a cohesive environment. Addressing to the fact, a generic system dynamics performance model for ICJV is developed by integrating a number variables as to get an overall impact on performance of ICJV and to make effective decisions based on that. In order to formulate and validate the model both structurally and behaviourally, both qualitative and quantitative data are gathered by conducting intensive interviews from two ICJVs in Thailand. After conducting intensive simulations of model, three major problems are identified related to negative value gap, low productivity in construction and high rate of ineffective information sharing of both ICJVs. Several policies are suggested and integrated application of these policies provides a maximum improvement to performance of the ICJV.
Resumo:
A general mistrust within the contactor and subcontractor companies has identified one of the significant barriers to derive benefits from true downstream supply chain integration. Using the general theory of trust in inter-organizational relations and conducting interviews, this research discusses factors that influence development of trust and cooperation in contractor– subcontractor relationships in construction projects. System dynamics is the simulation method is selected in this theory-building effort, based on qualitative data collected from two projects of a construction company in Thailand. Performance, permeability and system based trust are found to make significant contributions toward parties’ trust level. Three strategic policies such as best value contracting, management of subcontractors as internal team and semi project partnering approach are recommended to stimulate the trust factors as well as cooperative long term relationship.
Resumo:
Introduction Buildings, which account for approximately half of all annual energy and greenhouse gas emissions, are an important target area for any strategy addressing climate change. Whilst new commercial buildings increasingly address sustainability considerations, incorporating green technology in the refurbishment process of older buildings is technically, financially and socially challenging. This research explores the expectations and experiences of commercial office building tenants, whose building was under-going green refurbishment. Methodology Semi-structured in-depth interviews with seven residents and neighbours of a large case-study building under-going green refurbishment in Melbourne, Australia. Built in 1979, the 7,008m² ‘B’ grade building consists of 11 upper levels of office accommodation, ground floor retail, and a basement area leased as a licensed restaurant. After refurbishment, which included the installation of chilled water pumps, solar water heating, waterless urinals, insulation, disabled toilets, and automatic dimming lights, it was expected that the environmental performance of the building would move from a non-existent zero ABGR (Australian Building Greenhouse Rating) star rating to 3.5 stars, with a 40% reduction in water consumption and 20% reduction in energy consumption. Interviews were transcribed, with responses analysed using a thematic approach, identifying categories, themes and patterns. Results Commercial property tenants are on a journey to sustainability - they are interested and willing to engage in discussions about sustainability initiatives, but the process, costs and benefits need to be clear. Critically, whilst sustainability was an essential and non-negotiable criterion in building selection for government and larger corporate tenants, sustainability was not yet a core business value for smaller organisations – whilst they could see it as an emerging issue, they wanted detailed cost-benefit analyses, pay-back calculations of proposed technologies and, ideally, wished they could trial the technology first-hand in some way. Although extremely interested in learning more, most participants reported relatively minimal knowledge of specific sustainability features, designs or products. In discussions about different sustainable technologies (e.g., waterless urinals, green-rated carpets), participants frequently commented that they knew little about the technology, had not heard of it or were not sure exactly how it worked. Whilst participants viewed sustainable commercial buildings as the future, they had varied expectations about the fate of existing older buildings – most felt that they would have to be retrofitted at some point to meet market expectations and predicted the emergence of a ‘non-sustainability discount’ for residing in a building without sustainable features. Discussion This research offers a beginning point for understanding the difficulty of integrating green technology in older commercial buildings. Tenants currently have limited understandings of technology and potential building performance outcomes, which ultimately could impede the implementation of sustainable initiatives in older buildings. Whilst the commercial property market is interested in learning about sustainability in the built environment, the findings highlight the importance of developing a strong business case, communication and transition plan for implementing sustainability retrofits in existing commercial buildings.
Resumo:
The Queensland University of Technology (QUT) allows the presentation of a thesis for the Degree of Doctor of Philosophy in the format of published or submitted papers, where such papers have been published, accepted or submitted during the period of candidature. This thesis is composed of seven published/submitted papers, of which one has been published, three accepted for publication and the other three are under review. This project is financially supported by an Australian Research Council (ARC) Discovery Grant with the aim of proposing strategies for the performance control of Distributed Generation (DG) system with digital estimation of power system signal parameters. Distributed Generation (DG) has been recently introduced as a new concept for the generation of power and the enhancement of conventionally produced electricity. Global warming issue calls for renewable energy resources in electricity production. Distributed generation based on solar energy (photovoltaic and solar thermal), wind, biomass, mini-hydro along with use of fuel cell and micro turbine will gain substantial momentum in the near future. Technically, DG can be a viable solution for the issue of the integration of renewable or non-conventional energy resources. Basically, DG sources can be connected to local power system through power electronic devices, i.e. inverters or ac-ac converters. The interconnection of DG systems to power system as a compensator or a power source with high quality performance is the main aim of this study. Source and load unbalance, load non-linearity, interharmonic distortion, supply voltage distortion, distortion at the point of common coupling in weak source cases, source current power factor, and synchronism of generated currents or voltages are the issues of concern. The interconnection of DG sources shall be carried out by using power electronics switching devices that inject high frequency components rather than the desired current. Also, noise and harmonic distortions can impact the performance of the control strategies. To be able to mitigate the negative effect of high frequency and harmonic as well as noise distortion to achieve satisfactory performance of DG systems, new methods of signal parameter estimation have been proposed in this thesis. These methods are based on processing the digital samples of power system signals. Thus, proposing advanced techniques for the digital estimation of signal parameters and methods for the generation of DG reference currents using the estimates provided is the targeted scope of this thesis. An introduction to this research – including a description of the research problem, the literature review and an account of the research progress linking the research papers – is presented in Chapter 1. One of the main parameters of a power system signal is its frequency. Phasor Measurement (PM) technique is one of the renowned and advanced techniques used for the estimation of power system frequency. Chapter 2 focuses on an in-depth analysis conducted on the PM technique to reveal its strengths and drawbacks. The analysis will be followed by a new technique proposed to enhance the speed of the PM technique while the input signal is free of even-order harmonics. The other techniques proposed in this thesis as the novel ones will be compared with the PM technique comprehensively studied in Chapter 2. An algorithm based on the concept of Kalman filtering is proposed in Chapter 3. The algorithm is intended to estimate signal parameters like amplitude, frequency and phase angle in the online mode. The Kalman filter is modified to operate on the output signal of a Finite Impulse Response (FIR) filter designed by a plain summation. The frequency estimation unit is independent from the Kalman filter and uses the samples refined by the FIR filter. The frequency estimated is given to the Kalman filter to be used in building the transition matrices. The initial settings for the modified Kalman filter are obtained through a trial and error exercise. Another algorithm again based on the concept of Kalman filtering is proposed in Chapter 4 for the estimation of signal parameters. The Kalman filter is also modified to operate on the output signal of the same FIR filter explained above. Nevertheless, the frequency estimation unit, unlike the one proposed in Chapter 3, is not segregated and it interacts with the Kalman filter. The frequency estimated is given to the Kalman filter and other parameters such as the amplitudes and phase angles estimated by the Kalman filter is taken to the frequency estimation unit. Chapter 5 proposes another algorithm based on the concept of Kalman filtering. This time, the state parameters are obtained through matrix arrangements where the noise level is reduced on the sample vector. The purified state vector is used to obtain a new measurement vector for a basic Kalman filter applied. The Kalman filter used has similar structure to a basic Kalman filter except the initial settings are computed through an extensive math-work with regards to the matrix arrangement utilized. Chapter 6 proposes another algorithm based on the concept of Kalman filtering similar to that of Chapter 3. However, this time the initial settings required for the better performance of the modified Kalman filter are calculated instead of being guessed by trial and error exercises. The simulations results for the parameters of signal estimated are enhanced due to the correct settings applied. Moreover, an enhanced Least Error Square (LES) technique is proposed to take on the estimation when a critical transient is detected in the input signal. In fact, some large, sudden changes in the parameters of the signal at these critical transients are not very well tracked by Kalman filtering. However, the proposed LES technique is found to be much faster in tracking these changes. Therefore, an appropriate combination of the LES and modified Kalman filtering is proposed in Chapter 6. Also, this time the ability of the proposed algorithm is verified on the real data obtained from a prototype test object. Chapter 7 proposes the other algorithm based on the concept of Kalman filtering similar to those of Chapter 3 and 6. However, this time an optimal digital filter is designed instead of the simple summation FIR filter. New initial settings for the modified Kalman filter are calculated based on the coefficients of the digital filter applied. Also, the ability of the proposed algorithm is verified on the real data obtained from a prototype test object. Chapter 8 uses the estimation algorithm proposed in Chapter 7 for the interconnection scheme of a DG to power network. Robust estimates of the signal amplitudes and phase angles obtained by the estimation approach are used in the reference generation of the compensation scheme. Several simulation tests provided in this chapter show that the proposed scheme can very well handle the source and load unbalance, load non-linearity, interharmonic distortion, supply voltage distortion, and synchronism of generated currents or voltages. The purposed compensation scheme also prevents distortion in voltage at the point of common coupling in weak source cases, balances the source currents, and makes the supply side power factor a desired value.
Resumo:
Abstract: The LiteSteel Beam (LSB) is a new cold-formed hollow flange channel section produced using dual electric resistance welding and automated continuous roll-forming technologies. The innovative LSB sections have many beneficial characteristics and are commonly used as flexural members in building construction. However, limited research has been undertaken on the shear behaviour of LSBs. Therefore a detailed investigation including both numerical and experimental studies was undertaken to investigate the shear behaviour of LSBs. Finite element models of LSBs in shear were developed to simulate the nonlinear ultimate strength behaviour of LSBs including their elastic buckling characteristics, and were validated by comparing their results with experimental test results. Validated finite element models were then used in a detailed parametric study into the shear behaviour of LSBs. The parametric study results showed that the current design rules in cold-formed steel structures design codes are very conservative for the shear design of LSBs. Significant improvements to web shear buckling occurred due to the presence of torsionally rigid rectangular hollow flanges while considerable post-buckling strength was also observed. This paper therefore proposes improved shear strength design rules for LSBs within the current cold-formed steel code guidelines. It presents the details of the parametric study and the new shear strength equations. The new equations were also developed based on the direct strength method. The proposed shear strength equations have the potential to be used with other conventional cold-formed steel sections such as lipped channel sections.