124 resultados para Static axical load


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Probing the functionality of materials locally by means of scanning probe microscopy (SPM) requires a reliable framework for identifying the target signal and separating it from the effects of surface morphology and instrument non-idealities, e.g. instrumental and topographical cross-talk. Here we develop a linear resolution theory framework in order to describe the cross-talk effects, and apply it for elucidation of frequency-dependent cross-talk mechanisms in piezoresponse force microscopy. The use of a band excitation method allows electromechanical/electrical and mechanical/topographic signals to be unambiguously separated. The applicability of a functional fit approach and multivariate statistical analysis methods for identification of data in band excitation SPM is explored.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

With the rapid expansion of the internet and the increasing demand on Web servers, many techniques were developed to overcome the servers' hardware performance limitation. Mirrored Web Servers is one of the techniques used where a number of servers carrying the same "mirrored" set of services are deployed. Client access requests are then distributed over the set of mirrored servers to even up the load. In this paper we present a generic reference software architecture for load balancing over mirrored web servers. The architecture was designed adopting the latest NaSr architectural style [1] and described using the ADLARS [2] architecture description language. With minimal effort, different tailored product architectures can be generated from the reference architecture to serve different network protocols and server operating systems. An example product system is described and a sample Java implementation is presented.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the natural world, camouflage is habitually deployed by 'vulnerable' creatures to deceive predators. Such protective strategies have been culturally, socially and technologically translated into human societies, whereby camouflage has been used to mask intentions, actions, feelings and valuable objects or spaces. Through the material presence of such techniques, everyday spaces can become inscribed as places of sanctuary. Focusing on British civil camouflage work of the 1930s and 1940s, this paper explores the historical, cultural and political connotations of camouflage and how the attainment of invisibility, as a 'weapon of the weak', can both physically and affectively protect urban populations. © 2012 Copyright Taylor and Francis Group, LLC.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Scrapers have established an important position in the earthmoving field as they are independently capable of accomplishing an earthmoving operation. Given that loading a scraper to its capacity does not entail its maximum production, optimizing the scraper’s loading time is an essential prerequisite for successful operations management. The relevant literature addresses the loading time optimization through a graphical method that is founded on the invalid assumption that the hauling time is independent of the load time. To correct this, a new algorithmic optimization method that incorporates the golden section search and the bisection algorithm is proposed. Comparison of the results derived from the proposed and the existing method demonstrates that the latter entails the systematic needless prolongation of the loading stage thus resulting in reduced hourly production and increased cost. Therefore, the proposed method achieves an improved modeling of scraper earthmoving operations and contributes toward a more efficient cost management.


Relevância:

20.00% 20.00%

Publicador:

Resumo:

While load flow conditions vary with different loads, the small-signal stability of the entire system is closely related with to the locations, capacities and models of loads. In this paper, load impacts with different capacities and models on the small-signal stability are analysed. In the real large-scale power system case, the load sensitivity which denotes the sensitivity of the eigenvalue with respect to the load active power is introduced and applied to rank the loads. The loads with high sensitivity are also considered.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper proposes a calculation method to determine power system response during small load perturbations or minor disturbances. The method establishes the initial value of active power transient using traditional reduction technique on admittance matrix, which incorporates voltage variations in the determination. The method examines active power distribution among generators when several loads simultaneously change, and verifies that the superposition principle is applicable for this scenario. The theoretical derivation provided in the paper is validated by numerical simulations using a 3-generator 9-bus benchmark model. The results indicate that the inclusion of voltage variation renders an independent and precise measure of active power response during transient conditions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Heat pumps can provide domestic heating at a cost that is competitive with oil heating in particular. If the electricity supply contains a significant amount of renewable generation, a move from fossil fuel heating to heat pumps can reduce greenhouse gas emissions. The inherent thermal storage of heat pump installations can also provide the electricity supplier with valuable flexibility. The increase in heat pump installations in the UK and Europe in the last few years poses a challenge for low-voltage networks, due to the use of induction motors to drive the pump compressors. The induction motor load tends to depress voltage, especially on starting. The paper includes experimental results, dynamic load modelling, comparison of experimental results and simulation results for various levels of heat pump deployment. The simulations are based on a generic test network designed to capture the main characteristics of UK distribution system practice. The simulations employ DIgSlILENT to facilitate dynamic simulations that focus on starting current, voltage variations, active power, reactive power and switching transients.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Endometrial cancer risk has been directly associated with glycemic load. However, few studies have investigated this link, and the etiological role of specific dietary carbohydrate components remains unclear. Our aim was to investigate associations of carbohydrate intake, glycemic index, and glycemic load with endometrial cancer risk in the US Prostate, Lung, Colorectal and Ovarian Cancer Screening Trial. Recruitment took place in 1993-2001. Over a median of 9.0 years of follow-up through 2009, 386 women developed endometrial cancer among 36,115 considered in the analysis. Dietary intakes were assessed using a 124-item diet history questionnaire. Cox proportional hazards models were applied to calculate hazard ratios and 95% confidence intervals. Significant inverse associations were detected between endometrial cancer risk and total available carbohydrate intake (hazard ratio (HR) = 0.66, 95% confidence interval (CI): 0.49, 0.90), total sugars intake (HR = 0.71, 95% CI: 0.52, 0.96), and glycemic load (HR = 0.63, 95% CI: 0.46, 0.84) when women in the highest quartile of intake were compared with those in the lowest. These inverse associations were strongest among overweight and obese women. No associations with endometrial cancer risk were observed for glycemic index or dietary fiber. Our findings contrast with previous evidence and suggest that high carbohydrate intakes and glycemic loads are protective against endometrial cancer development. Further clarification of these associations is warranted.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We address the problem of designing distributed algorithms for large scale networks that are robust to Byzantine faults. We consider a message passing, full information model: the adversary is malicious, controls a constant fraction of processors, and can view all messages in a round before sending out its own messages for that round. Furthermore, each bad processor may send an unlimited number of messages. The only constraint on the adversary is that it must choose its corrupt processors at the start, without knowledge of the processors’ private random bits.

A good quorum is a set of O(logn) processors, which contains a majority of good processors. In this paper, we give a synchronous algorithm which uses polylogarithmic time and Õ(vn) bits of communication per processor to bring all processors to agreement on a collection of n good quorums, solving Byzantine agreement as well. The collection is balanced in that no processor is in more than O(logn) quorums. This yields the first solution to Byzantine agreement which is both scalable and load-balanced in the full information model.

The technique which involves going from situation where slightly more than 1/2 fraction of processors are good and and agree on a short string with a constant fraction of random bits to a situation where all good processors agree on n good quorums can be done in a fully asynchronous model as well, providing an approach for extending the Byzantine agreement result to this model.