96 resultados para Waste-to-Energy


Relevância:

80.00% 80.00%

Publicador:

Resumo:

Cross sections differential with respect to energy and angle of ejected positrons and electrons for Ps(ls) fragmentation in collision with He, Ne, Ar, Kr and Xe targets are reported. For Ne, Ar, Kr and Xe, only the case where the target is not excited (target elastic collisions) is considered. For He, fragmentation with target excitation/ionization (target inelastic collisions) is also studied. The impulse approximation has been used for target elastic fragmentation, the first Born approximation for target inelastic processes. (c) 2006 Elsevier B.V. All rights reserved.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The radiation-induced bystander effect challenges the accepted paradigm of direct DNA damage in response to energy deposition driving the biological consequences of radiation exposure. With the bystander response, cells which have not been directly exposed to radiation respond to their neighbours being targeted. In our own studies we have used novel targeted microbeam approaches to specifically irradiate parts of individual cells within a population to quantify the bystander response and obtain mechanistic information. Using this approach it has become clear that energy deposited by radiation in nuclear DNA is not required to trigger the effect, with cytoplasmic irradiation required. Irradiated cells also trigger a bystander response regardless of whether they themselves live or die, suggesting that the phenotype of the targeted cell is not a determining factor. Despite this however, a range of evidence has shown that repair status is important for dealing with the consequences of a bystander signal. Importantly, repair processes involved in the processing of dsb appear to be involved suggesting that the bystander response involves the delayed or indirect production of dsb-type lesions in bystander cells. Whether these are infact true dsb or complexes of oxidised bases in combination with strand breaks and the mechanisms for their formation, remains to be elucidated.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The problem of topology control is to assign per-node transmission power such that the resulting topology is energy efficient and satisfies certain global properties such as connectivity. The conventional approach to achieve these objectives is based on the fundamental assumption that nodes are socially responsible. We examine the following question: if nodes behave in a selfish manner, how does it impact the overall connectivity and energy consumption in the resulting topologies? We pose the above problem as a noncooperative game and use game-theoretic analysis to address it. We study Nash equilibrium properties of the topology control game and evaluate the efficiency of the induced topology when nodes employ a greedy best response algorithm. We show that even when the nodes have complete information about the network, the steady-state topologies are suboptimal. We propose a modified algorithm based on a better response dynamic and show that this algorithm is guaranteed to converge to energy-efficient and connected topologies. Moreover, the node transmit power levels are more evenly distributed, and the network performance is comparable to that obtained from centralized algorithms.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The provision of security in mobile ad hoc networks is of paramount importance due to their wireless nature. However, when conducting research into security protocols for ad hoc networks it is necessary to consider these in the context of the overall system. For example, communicational delay associated with the underlying MAC layer needs to be taken into account. Nodes in mobile ad hoc networks must strictly obey the rules of the underlying MAC when transmitting security-related messages while still maintaining a certain quality of service. In this paper a novel authentication protocol, RASCAAL, is described and its performance is analysed by investigating both the communicational-related effects of the underlying IEEE 802.11 MAC and the computational-related effects of the cryptographic algorithms employed. To the best of the authors' knowledge, RASCAAL is the first authentication protocol which proposes the concept of dynamically formed short-lived random clusters with no prior knowledge of the cluster head. The performance analysis demonstrates that the communication losses outweigh the computation losses with respect to energy and delay. MAC-related communicational effects account for 99% of the total delay and total energy consumption incurred by the RASCAAL protocol. The results also show that a saving in communicational energy of up to 12.5% can be achieved by changing the status of the wireless nodes during the course of operation. Copyright (C) 2009 G. A. Safdar and M. P. O'Neill (nee McLoone).

Relevância:

80.00% 80.00%

Publicador:

Resumo:

We study the residential demand for electricity and gas, working with nationwide household-level data that cover recent years, namely 1997-2007. Our dataset is a mixed panel/multi-year cross-sections of dwellings/households in the 50 largest metropolitan areas in the United States as of 2008. We estimate static and dynamic models of electricity and gas demand. We find strong household response to energy prices, both in the short and long term. From the static models, we get estimates of the own price elasticity of electricity demand in the -0.860 to -0.667 range, while the own price elasticity of gas demand is -0.693 to -0.566. These results are robust to a variety of checks. Contrary to earlier literature (Metcalf and Hassett, 1999; Reiss and White, 2005), we find no evidence of significantly different elasticities across households with electric and gas heat. The price elasticity of electricity demand declines with income, but the magnitude of this effect is small. These results are in sharp contrast to much of the literature on residential energy consumption in the United States, and with the figures used in current government agency practice. Our results suggest that there might be greater potential for policies which affect energy price than may have been previously appreciated. (C) 2011 Elsevier B.V. All rights reserved.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This project involves the construction of a dwelling in the outskirts of Dublin City. Situated in a disused quarry, the house act as an inhabited bridge, spanning between natural and man made outcrops, service structures and a shared entrance staircase. The houses language derives from the structure necessary to achieve these spans.
The section internally is modeled to present a variety of scales of spaces. More intimate living spaces and bedrooms occur in a lower, north-facing wing. Taller living spaces address the south.

Incorporating rainwater harvesting, wood-gasifying boilers, on site wind powered electrical generation, solar thermal panels and very high levels of insulation the houses are close to energy neutral. The fact that the house is constructed in massive timber construction means that 250 tonnes of carbon are sequestered in its construction. The design includes a 25yar replanting strategy to replace the existing coniferous-forested surrounds with native species in a coppiced planting strategy to allow ongoing fuel for the house, and cash crops to be sold on.

Located in an area of outstanding natural beauty the planning and design of the house involved research into patterns of rural development, the relationship between man made interventions and the natural landscape and the technology of the vernacular. This latter research forms part of the themes being explored under the Kevin Kieran Arts Council / OPW Bursary

Aims / Objectives Questions

1 To design and construct a low energy place to dwell.
2 To investigate the relationship between man-made interventions and new construction in an area of outstanding natural beauty.
3 To derive a language of construction that is contemporary in nature but refers to precedents embedded in the vernacular.
4 To develop a low-carbon form of construction that allows the construction of the house to act to sequester carbon
5 To make a contemporary addition in sympathy with the qualities of the existing site

Relevância:

80.00% 80.00%

Publicador:

Resumo:

THE MACHINIST LANDSCAPE: AN ENTROPIC GRID OF VARIANCE
‘By drawing a diagram, a ground plan of a house, a street plan to the location of a site, or a topographic map, one draws a “logical two dimensional picture”. A “logical picture” differs from a natural or realistic picture in that it rarely looks like the thing it stands for.’
A Provisional Theory of Non-Sites, Robert Smithson (1968)

Between design and ground there are variances, deviations and gaps. These exist as physical interstices between what is conceptualised and what is realised; and they reveal moments in the design process that resist the reconciliation of people and their environment (McHarg 1963). The Machinist Landscape interrogates the significance of these variances through the contrasting processes of coppice and photovoltaic energy. It builds on the potential of these gaps, and in doing so proposes that these spaces of variance can reveal the complexity of relationships between consumption and remediation, design and nature.
Fresh Kills Park, and in particular the draft master plan (2006), offers a framework to explore this artificial construct. Central to the Machinist Landscape is the analysis of the landfill gas collection system, planned on a notional 200ft grid. Variations are revealed between this diagrammatic grid measure and that which has been constructed on the site. These variances between the abstract and the real offer the Machinist Landscape a powerful space of enquiry. Are these gaps a result of unexpected conditions below ground, topographic nuances or natural phenomena? Does this space of difference, between what is planned and what is constructed, have the potential to redefine the dynamic processes and relations with the land?
The Machinist Landscape is structured through this space of variance with an ‘entropic grid’, the under-storey of which hosts a carefully managed system of short-rotation coppice (SRC). The coppice, a medieval practice related to energy, product, and space, operates on theoretical and programmatic levels. It is planted along a structure of linear bunds, stabilized through coppice pole retaining structures and enriched with nutrients from coppice produced bio-char. Above the coppice is built an upper-storey of photovoltaic (PV); its structures fabricated from the coppiced timber and the PV produced with graphene from coppice charcoal processes.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Dual-rail encoding, return-to-spacer protocol, and hazard-free logic can be used to resist power analysis attacks by making energy consumed per clock cycle independent of processed data. Standard dual-rail logic uses a protocol with a single spacer, e.g., all-zeros, which gives rise to energy balancing problems. We address these problems by incorporating two spacers; the spacers alternate between adjacent clock cycles. This guarantees that all gates switch in every clock cycle regardless of the transmitted data values. To generate these dual-rail circuits, an automated tool has been developed. It is capable of converting synchronous netlists into dual-rail circuits and it is interfaced to industry CAD tools. Dual-rail and single-rail benchmarks based upon the advanced encryption standard (AES) have been simulated and compared in order to evaluate the method and the tool.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

In this paper, we propose a design paradigm for energy efficient and variation-aware operation of next-generation multicore heterogeneous platforms. The main idea behind the proposed approach lies on the observation that not all operations are equally important in shaping the output quality of various applications and of the overall system. Based on such an observation, we suggest that all levels of the software design stack, including the programming model, compiler, operating system (OS) and run-time system should identify the critical tasks and ensure correct operation of such tasks by assigning them to dynamically adjusted reliable cores/units. Specifically, based on error rates and operating conditions identified by a sense-and-adapt (SeA) unit, the OS selects and sets the right mode of operation of the overall system. The run-time system identifies the critical/less-critical tasks based on special directives and schedules them to the appropriate units that are dynamically adjusted for highly-accurate/approximate operation by tuning their voltage/frequency. Units that execute less significant operations can operate at voltages less than what is required for correct operation and consume less power, if required, since such tasks do not need to be always exact as opposed to the critical ones. Such scheme can lead to energy efficient and reliable operation, while reducing the design cost and overheads of conventional circuit/micro-architecture level techniques.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

One of the core properties of Software Defined Networking (SDN) is the ability for third parties to develop network applications. This introduces increased potential for innovation in networking from performance-enhanced to energy-efficient designs. In SDN, the application connects with the network via the SDN controller. A specific concern relating to this communication channel is whether an application can be trusted or not. For example, what information about the network state is gathered by the application? Is this information necessary for the application to execute or is it gathered for malicious intent? In this paper we present an approach to secure the northbound interface by introducing a permissions system that ensures that controller operations are available to trusted applications only. Implementation of this permissions system with our Operation Checkpoint adds negligible overhead and illustrates successful defense against unauthorized control function access attempts.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Experiences from smart grid cyber-security incidents in the past decade have raised questions on the applicability and effectiveness of security measures and protection mechanisms applied to the grid. In this chapter we focus on the security measures applied under real circumstances in today’s smart grid systems. Beginning from real world example implementations, we first review cyber-security facts that affected the electrical grid, from US blackout incidents, to the Dragonfly cyber-espionage campaign currently focusing on US and European energy firms. Provided a real world setting, we give information related to energy management of a smart grid looking also in the optimization techniques that power control engineers perform into the grid components. We examine the application of various security tools in smart grid systems, such as intrusion detection systems, smart meter authentication and key management using Physical Unclonable Functions, security analytics and resilient control algorithms. Furthermore we present evaluation use cases of security tools applied on smart grid infrastructure test-beds that could be proved important prior to their application in the real grid, describing a smart grid intrusion detection system application and security analytics results. Anticipated experimental results from the use-cases and conclusions about the successful transitions of security measures to real world smart grid operations will be presented at the end of this chapter.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Mitochondrial complex I is a large, membrane-bound enzyme central to energy metabolism, and its dysfunction is implicated in cardiovascular and neurodegenerative diseases. An interesting feature of mammalian complex I is the so-called A/D transition, when the idle enzyme spontaneously converts from the active (A) to the de-active, dormant (D) form. The A/D transition plays an important role in tissue response to ischemia and rate of the conversion can be a crucial factor determining outcome of ischemia/reperfusion. Here, we describe the effects of alkali cations on the rate of the D-to-A transition to define whether A/D conversion may be regulated by sodium.At neutral pH (7–7.5) sodium resulted in a clear increase of rates of activation (D-to-A conversion) while other cations had minor effects. The stimulating effect of sodium in this pH range was not caused by an increase in ionic strength. EIPA, an inhibitor of Na+/H+antiporters, decreased the rate of D-to-A conversion and sodium partially eliminated this effect of EIPA. At higher pH (> 8.0), acceleration of the D-to-A conversion by sodium was abolished, and all tested cations decreased the rate of activation, probably due to the effect of ionic strength.The implications of this finding for the mechanism of complex I energy transduction and possible physiological importance of sodium stimulation of the D-to-A conversion at pathophysiological conditions in vivo are discussed.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Electrochemical water splitting used for generating hydrogen has attracted increasingly attention due to energy and environmental issues. It is a major challenge to design an efficient, robust and inexpensive electrocatalyst to achieve preferable catalytic performance. Herein, a novel three-dimensional (3D) electrocatalyst was prepared by decorating nanostructured biological material-derived carbon nanofibers with in situ generated cobalt-based nanospheres (denoted as CNF@Co) through a facile approach. The interconnected porous 3D networks of the resulting CNF@Co catalyst provide abundant channels and interfaces, which remarkably favor both mass transfer and oxygen evolution. The as-prepared CNF@Co shows excellent electrocatalytic activity towards the oxygen evolution reactions with an onset potential of about 0.445 V vs. Ag/AgCl. It only needs a low overpotential of 314 mV to achieve a current density of 10 mA/cm<sup>2</sup> in 1.0 M KOH. Furthermore, the CNF@Co catalyst exhibits excellent stability towards water oxidation, even outperforming commercial IrO<inf>2</inf> and RuO<inf>2</inf> catalysts.