245 resultados para Zero sequence components
Resumo:
A new control method for battery storage to maintain acceptable voltage profile in autonomous microgrids is proposed in this article. The proposed battery control ensures that the bus voltages in the microgrid are maintained during disturbances such as load change, loss of micro-sources, or distributed generations hitting power limit. Unlike the conventional storage control based on local measurements, the proposed method is based on an advanced control technique, where the reference power is determined based on the voltage drop profile at the battery bus. An artificial neural network based controller is used to determine the reference power needed for the battery to hold the microgrid voltage within regulation limits. The pattern of drop in the local bus voltage during power imbalance is used to train the controller off-line. During normal operation, the battery floats with the local bus voltage without any power injection. The battery is charged or discharged during the transients with a high gain feedback loop. Depending on the rate of voltage fall, it is switched to power control mode to inject the reference power determined by the proposed controller. After a defined time period, the battery power injection is reduced to zero using slow reverse-droop characteristics, ensuring a slow rate of increase in power demand from the other distributed generations. The proposed control method is simulated for various operating conditions in a microgrid with both inertial and converter interfaced sources. The proposed battery control provides a quick load pick up and smooth load sharing with the other micro-sources in a disturbance. With various disturbances, maximum voltage drop over 8% with conventional energy storage is reduced within 2.5% with the proposed control method.
Resumo:
A complex attack is a sequence of temporally and spatially separated legal and illegal actions each of which can be detected by various IDS but as a whole they constitute a powerful attack. IDS fall short of detecting and modeling complex attacks therefore new methods are required. This paper presents a formal methodology for modeling and detection of complex attacks in three phases: (1) we extend basic attack tree (AT) approach to capture temporal dependencies between components and expiration of an attack, (2) using enhanced AT we build a tree automaton which accepts a sequence of actions from input message streams from various sources if there is a traversal of an AT from leaves to root, and (3) we show how to construct an enhanced parallel automaton that has each tree automaton as a subroutine. We use simulation to test our methods, and provide a case study of representing attacks in WLANs.
Resumo:
School connectedness is an important protective factor for adolescent risk-taking behaviour. This study examined a pilot version of the Skills for Preventing Injury in Youth (SPIY) programme, combining teacher professional development for increasing school connectedness (connectedness component) with a risk and injury prevention curriculum for early adolescents (curriculum component). A process evaluation was conducted on the connectedness component, involving assessments of programme reach, participant receptiveness and initial use, and a preliminary impact evaluation was conducted on the combined connectedness and curriculum programme. The connectedness component was well received by teacher participants, who saw benefits for both themselves and their students. Classroom observation also showed that teachers who received professional development made use of the programme strategies. Grade 8 students who participated in the SPIY programme were less likely to report violent behaviour at six-month follow-up than were control students, and trends also suggested reduced transport injuries. The results of this research support the use of the combined SPIY connectedness and curriculum components in a large-scale effectiveness trial to assess the impact of the programme on students’ connectedness, risk-taking and associated injuries.
Resumo:
This paper presents a formal methodology for attack modeling and detection for networks. Our approach has three phases. First, we extend the basic attack tree approach 1 to capture (i) the temporal dependencies between components, and (ii) the expiration of an attack. Second, using the enhanced attack trees (EAT) we build a tree automaton that accepts a sequence of actions from input stream if there is a traverse of an attack tree from leaves to the root node. Finally, we show how to construct an enhanced parallel automaton (EPA) that has each tree automaton as a subroutine and can process the input stream by considering multiple trees simultaneously. As a case study, we show how to represent the attacks in IEEE 802.11 and construct an EPA for it.
Resumo:
The carousel wind tunnel (CWT) can be a significant tool for the determination of the nature and magnitude of interparticlar forces at threshold of motion. By altering particle and drum surface electrical properties and/or by applying electric potential difference across the inner and outer drums, it should be possible to separate electrostatic effects from other forces of cohesion. Besides particle trajectory and bedform analyses, suggestions for research include particle aggregation in zero and sub-gravity environments, effect of suspension-saltation ratio on soil abrasion, and the effects of shear and shear free turbulence on particle aggregation as applied to evolution of solar nebula.
Resumo:
Many software applications extend their functionality by dynamically loading executable components into their allocated address space. Such components, exemplified by browser plugins and other software add-ons, not only enable reusability, but also promote programming simplicity, as they reside in the same address space as their host application, supporting easy sharing of complex data structures and pointers. However, such components are also often of unknown provenance and quality and may be riddled with accidental bugs or, in some cases, deliberately malicious code. Statistics show that such component failures account for a high percentage of software crashes and vulnerabilities. Enabling isolation of such fine-grained components is therefore necessary to increase the stability, security and resilience of computer programs. This thesis addresses this issue by showing how host applications can create isolation domains for individual components, while preserving the benefits of a single address space, via a new architecture for software isolation called LibVM. Towards this end, we define a specification which outlines the functional requirements for LibVM, identify the conditions under which these functional requirements can be met, define an abstract Application Programming Interface (API) that encompasses the general problem of isolating shared libraries, thus separating policy from mechanism, and prove its practicality with two concrete implementations based on hardware virtualization and system call interpositioning, respectively. The results demonstrate that hardware isolation minimises the difficulties encountered with software based approaches, while also reducing the size of the trusted computing base, thus increasing confidence in the solution’s correctness. This thesis concludes that, not only is it feasible to create such isolation domains for individual components, but that it should also be a fundamental operating system supported abstraction, which would lead to more stable and secure applications.
Resumo:
Odours emitted by flowers are complex blends of volatile compounds. These odours are learnt by flower-visiting insect species, improving their recognition of rewarding flowers and thus foraging efficiency. We investigated the flexibility of floral odour learning by testing whether adult moths recognize single compounds common to flowers on which they forage. Dual choice preference tests on Helicoverpa armigera moths allowed free flying moths to forage on one of three flower species; Argyranthemum frutescens (federation daisy), Cajanus cajan (pigeonpea) or Nicotiana tabacum (tobacco). Results showed that, (i) a benzenoid (phenylacetaldehyde) and a monoterpene (linalool) were subsequently recognized after visits to flowers that emitted these volatile constituents, (ii) in a preference test, other monoterpenes in the flowers' odour did not affect the moths' ability to recognize the monoterpene linalool and (iii) relative preferences for two volatiles changed after foraging experience on a single flower species that emitted both volatiles. The importance of using free flying insects and real flowers to understand the mechanisms involved in floral odour learning in nature are discussed in the context of our findings.
Resumo:
In this study x-ray CT has been used to produce a 3D image of an irradiated PAGAT gel sample, with noise-reduction achieved using the ‘zero-scan’ method. The gel was repeatedly CT scanned and a linear fit to the varying Hounsfield unit of each pixel in the 3D volume was evaluated across the repeated scans, allowing a zero-scan extrapolation of the image to be obtained. To minimise heating of the CT scanner’s x-ray tube, this study used a large slice thickness (1 cm), to provide image slices across the irradiated region of the gel, and a relatively small number of CT scans (63), to extrapolate the zero-scan image. The resulting set of transverse images shows reduced noise compared to images from the initial CT scan of the gel, without being degraded by the additional radiation dose delivered to the gel during the repeated scanning. The full, 3D image of the gel has a low spatial resolution in the longitudinal direction, due to the selected scan parameters. Nonetheless, important features of the dose distribution are apparent in the 3D x-ray CT scan of the gel. The results of this study demonstrate that the zero-scan extrapolation method can be applied to the reconstruction of multiple x-ray CT slices, to provide useful 2D and 3D images of irradiated dosimetry gels.
Resumo:
Originally developed in bioinformatics, sequence analysis is being increasingly used in social sciences for the study of life-course processes. The methodology generally employed consists in computing dissimilarities between the trajectories and, if typologies are sought, in clustering the trajectories according to their similarities or dissemblances. The choice of an appropriate dissimilarity measure is a major issue when dealing with sequence analysis for life sequences. Several dissimilarities are available in the literature, but neither of them succeeds to become indisputable. In this paper, instead of deciding upon one dissimilarity measure, we propose to use an optimal convex combination of different dissimilarities. The optimality is automatically determined by the clustering procedure and is defined with respect to the within-class variance.
Resumo:
Modern trains with different axle configurations, speeds and loads are used in railway networks. As a result, one of the most important questions of the mangers involved in bridge managements systems (BMS) is how these changes affect the structural behavior of the critical components of the railway bridges. Although researchers have conducted, many investigations on the dynamic effects of the moving loads on bridges, the influence of the changes in the speed of the train on the demand by capacity ratios of the different critical components of the bridge have not yet been properly studied. This study is important, because different components with different capacities and roles for carrying loads in the structure may be affected differently. To investigate the above phenomenon in this research, a structural model of a simply supported bridge is developed. It will be verified that the dynamic behavior of this bridge is similar to a group of railway bridges in Australia. Demand by capacity ratios of the critical components of the bridge, when it is subjected to a train load with different speeds will be calculated. The results show that the effect of increase or decrease of speed should not be underestimated. The outcome is very significant as it is contrary to what is currently expected, i.e. by reducing the speed of the train, the demand by capacity ratio of components may increase and make the bridge unsafe for carrying live load.
Resumo:
Sequences with optimal correlation properties are much sought after for applications in communication systems. In 1980, Alltop (\emph{IEEE Trans. Inf. Theory} 26(3):350-354, 1980) described a set of sequences based on a cubic function and showed that these sequences were optimal with respect to the known bounds on auto and crosscorrelation. Subsequently these sequences were used to construct mutually unbiased bases (MUBs), a structure of importance in quantum information theory. The key feature of this cubic function is that its difference function is a planar function. Functions with planar difference functions have been called \emph{Alltop functions}. This paper provides a new family of Alltop functions and establishes the use of Alltop functions for construction of sequence sets and MUBs.
Resumo:
We employed a Hidden-Markov-Model (HMM) algorithm in loss of heterozygosity (LOH) analysis of high-density single nucleotide polymorphism (SNP) array data from Non-Hodgkin’s lymphoma (NHL) entities, follicular lymphoma (FL), and diffuse large B-cell lymphoma (DLBCL). This revealed a high frequency of LOH over the chromosomal region 11p11.2, containing the gene encoding the protein tyrosine phosphatase receptor type J (PTPRJ). Although PTPRJ regulates components of key survival pathways in B-cells (i.e., BCR, MAPK, and PI3K signaling), its role in B-cell development is poorly understood. LOH of PTPRJ has been described in several types of cancer but not in any hematological malignancy. Interestingly, FL cases with LOH exhibited down-regulation of PTPRJ, in contrast no significant variation of expression was shown in DLBCLs. In addition, sequence screening in Exons 5 and 13 of PTPRJ identified the G973A (rs2270993), T1054C (rs2270992), A1182C (rs1566734), and G2971C (rs4752904) coding SNPs (cSNPs). The A1182 allele was significantly more frequent in FLs and in NHLs with LOH. Significant over-representation of the C1054 (rs2270992) and the C2971 (rs4752904) alleles were also observed in LOH cases. A haplotype analysis also revealed a significant lower frequency of haplotype GTCG in NHL cases, but it was only detected in cases with retention. Conversely, haplotype GCAC was over-representated in cases with LOH. Altogether, these results indicate that the inactivation of PTPRJ may be a common lymphomagenic mechanism in these NHL subtypes and that haplotypes in PTPRJ gene may play a role in susceptibility to NHL, by affecting activation of PTPRJ in these B-cell lymphomas.
Resumo:
Highway infrastructure development typically requires major capital input. Unless planned properly, such requirements can cause serious financial constraints for investors. The push for sustainability adds a new dimension to the complexity of evaluating highway projects. Finding environmentally and socially responsible solutions for highway construction will improve its potential for acceptance by the society and in many instances the infrastructure's life span. Even so, the prediction and determination of a project's long-term financial viability can be a precarious exercise. Existing studies in this area have not indicated details of how to identify and deal with costs incurred in pursuing sustainability measures in highway infrastructure. This paper provides insights into the major challenges of implementing sustainability in highway project development in terms of financial concerns and obligations. It discusses the results from recent research through a literature study and a questionnaire survey of key industry stakeholders involved in highway infrastructure development. The research identified critical cost components relating to sustainability measures based on perspectives of industry stakeholders. All stakeholders believe sustainability related costs are an integral part of the decision making. However, the importance rating of these costs is relative to each stakeholder's core business objectives. This will influence the way these cost components are dealt with during the evaluation of highway investment alternatives and financial implications. This research encourages positive thinking among the highway infrastructure practitioners about sustainability. It calls for the construction industry to maximise sustainability deliverables while ensuring financial viability over the life cycle of highway infrastructure projects.
Resumo:
Identifying outstanding performers or ‘stars’ is a critical component of managing talent. However, organizational effectiveness in this area is limited by the current lack of guidance about the behaviour and characteristics of stars. We address this gap by combining a conceptual analysis with an empirical study involving 174 managers. Conceptually we examine the alignment of managers’ perceptions of outstanding performance with the well established task and contextual performance model and find this framework accounts for a core element in managers’ judgments about outstanding performers. However, a second, more qualitative approach finds that other dimensions including being self-directed, and a willingness to lead are also important. Our findings are consistent with a long-term trend toward identifying work effectiveness with highly discretionary, psychological and behavioural elements, and we consider the implications of this for the study and management of high level, individual effectiveness.
Resumo:
Electrochemical processes in mesoporous TiO2-Nafion thin films deposited on indium tin oxide (ITO) electrodes are inherently complex and affected by capacitance, Ohmic iR-drop, RC-time constant phenomena, and by potential and pH-dependent conductivity. In this study, large-amplitude sinusoidally modulated voltammetry (LASMV) is employed to provide access to almost purely Faradaic-based current data from second harmonic components, as well as capacitance and potential domain information from the fundamental harmonic for mesoporous TiO2-Nafion film electrodes. The LASMV response has been investigated with and without an immobilized one-electron redox system, ferrocenylmethyltrimethylammonium+. Results clearly demonstrate that the electron transfer associated with the immobilized ferrocene derivative follows two independent pathways i) electron hopping within the Nafion network and ii) conduction through the TiO2 backbone. The pH effect on the voltammetric response for the TiO2 reduction pathway (ii) can be clearly identified in the 2nd harmonic LASMV response with the diffusion controlled ferrocene response (i) acting as a pH independent reference. Application of second harmonic data derived from LASMV measurement, because of the minimal contribution from capacitance currents, may lead to reference-free pH sensing with systems like that found for ferrocene derivatives.