44 resultados para differential protection
Resumo:
This master’s thesis is focused on power supply network disturbances and their effects on the frequency converter – one of the components of modern process crane electrical system. The most critical disturbance types, their causes and the effect they bring to crane electrical system was determined in this work. Variety of protective devices used for mitigation of disturbances is investigated. Device protection solutions for the frequency converter used in crane applications are presented. Analyses of the power supply requirements for frequency converter and various components of crane electrical system were carried out and as a result the crane power supply requirements list that guarantees normal crane operation was built. This list is to be included in crane projects for troubleshooting purposes in order to determine potentially dangerous network.
Resumo:
Bakgrunden och inspirationen till föreliggande studie är tidigare forskning i tillämpningar på randidentifiering i metallindustrin. Effektiv randidentifiering möjliggör mindre säkerhetsmarginaler och längre serviceintervall för apparaturen i industriella högtemperaturprocesser, utan ökad risk för materielhaverier. I idealfallet vore en metod för randidentifiering baserad på uppföljning av någon indirekt variabel som kan mätas rutinmässigt eller till en ringa kostnad. En dylik variabel för smältugnar är temperaturen i olika positioner i väggen. Denna kan utnyttjas som insignal till en randidentifieringsmetod för att övervaka ugnens väggtjocklek. Vi ger en bakgrund och motivering till valet av den geometriskt endimensionella dynamiska modellen för randidentifiering, som diskuteras i arbetets senare del, framom en flerdimensionell geometrisk beskrivning. I de aktuella industriella tillämpningarna är dynamiken samt fördelarna med en enkel modellstruktur viktigare än exakt geometrisk beskrivning. Lösningsmetoder för den s.k. sidledes värmeledningsekvationen har många saker gemensamt med randidentifiering. Därför studerar vi egenskaper hos lösningarna till denna ekvation, inverkan av mätfel och något som brukar kallas förorening av mätbrus, regularisering och allmännare följder av icke-välställdheten hos sidledes värmeledningsekvationen. Vi studerar en uppsättning av tre olika metoder för randidentifiering, av vilka de två första är utvecklade från en strikt matematisk och den tredje från en mera tillämpad utgångspunkt. Metoderna har olika egenskaper med specifika fördelar och nackdelar. De rent matematiskt baserade metoderna karakteriseras av god noggrannhet och låg numerisk kostnad, dock till priset av låg flexibilitet i formuleringen av den modellbeskrivande partiella differentialekvationen. Den tredje, mera tillämpade, metoden kännetecknas av en sämre noggrannhet förorsakad av en högre grad av icke-välställdhet hos den mera flexibla modellen. För denna gjordes även en ansats till feluppskattning, som senare kunde observeras överensstämma med praktiska beräkningar med metoden. Studien kan anses vara en god startpunkt och matematisk bas för utveckling av industriella tillämpningar av randidentifiering, speciellt mot hantering av olinjära och diskontinuerliga materialegenskaper och plötsliga förändringar orsakade av “nedfallande” väggmaterial. Med de behandlade metoderna förefaller det möjligt att uppnå en robust, snabb och tillräckligt noggrann metod av begränsad komplexitet för randidentifiering.
Resumo:
The most important knowledge in firms is mostly tacit and embedded in individuals within the organization. This background knowledge that firms possess is used for creation of new knowledge and innovations. As firms today greatly concentrate on their core competencies, they need external knowledge from various collaboration partners. Thus, collaborative relationship governance, as well as control (use of appropriability mechanisms) over background (the input from each firm in innovative activities) and foreground knowledge (the output of collaboration activities) is needed in order to successfully create and capture value from innovative activities without losing core knowledge and competitiveness. Even though research has concentrated on knowledge protection and knowledge sharing, studies that combine both of these views and examine the effects of sharing and protection on value creation and capture have been rather limited. Studies have mainly focused on the protection of the output of innovation while forgetting the protection of the input of innovation. On the other hand, as the research concentrating on the output of innovation tends to favor formal mechanisms, informal mechanisms have remained more unknown to researchers as well as managers. This research aims to combine the perspectives of knowledge sharing and knowledge protection and their relationship with value creation and value capture. The sharing and protection are viewed from two points of view: the use of appropriability mechanisms, as well as governance of the collaborative relationship. The study consists of two parts. The first part introduces the research topic and discusses the overall results. The second part comprises six complementary research publications. Both qualitative and quantitative research methods are used in the study. In terms of results, the findings enhance understanding of the combined use of formal and informal mechanisms for knowledge protection and sharing. Informal mechanisms appear to be emphasized in the protection of background knowledge, and thus are prerequisites for innovation, whereas formal mechanisms are relied on more for protecting the results of innovative activities. However, the simultaneous use of the formal and informal mechanisms that are relevant to the particular industry and innovation context is recommendedthroughout the collaborative innovation process. Further, the study adds to the current knowledge on HRM as an appropriability mechanism: on the firm level its uses include assessing and hedging against employee-related risks such as knowledge leaking and knowledge leaving. A further contribution is to the research on HRM protection and its interrelations with other appropriability mechanisms, its constituents, and its potential use in the area of knowledge protection.
Resumo:
Thesis talks about relay protection for microgrids. Microgrid operation sets more challenges than traditional utility grid protection because of lower fault current levels. Solutions for these challenges are discussed in this paper. Thesis also studies available relay protection solutions and figures out how they would fit for microgrid protection.
Resumo:
The objective of this thesis work is to develop and study the Differential Evolution Algorithm for multi-objective optimization with constraints. Differential Evolution is an evolutionary algorithm that has gained in popularity because of its simplicity and good observed performance. Multi-objective evolutionary algorithms have become popular since they are able to produce a set of compromise solutions during the search process to approximate the Pareto-optimal front. The starting point for this thesis was an idea how Differential Evolution, with simple changes, could be extended for optimization with multiple constraints and objectives. This approach is implemented, experimentally studied, and further developed in the work. Development and study concentrates on the multi-objective optimization aspect. The main outcomes of the work are versions of a method called Generalized Differential Evolution. The versions aim to improve the performance of the method in multi-objective optimization. A diversity preservation technique that is effective and efficient compared to previous diversity preservation techniques is developed. The thesis also studies the influence of control parameters of Differential Evolution in multi-objective optimization. Proposals for initial control parameter value selection are given. Overall, the work contributes to the diversity preservation of solutions in multi-objective optimization.
Resumo:
Parameter estimation still remains a challenge in many important applications. There is a need to develop methods that utilize achievements in modern computational systems with growing capabilities. Owing to this fact different kinds of Evolutionary Algorithms are becoming an especially perspective field of research. The main aim of this thesis is to explore theoretical aspects of a specific type of Evolutionary Algorithms class, the Differential Evolution (DE) method, and implement this algorithm as codes capable to solve a large range of problems. Matlab, a numerical computing environment provided by MathWorks inc., has been utilized for this purpose. Our implementation empirically demonstrates the benefits of a stochastic optimizers with respect to deterministic optimizers in case of stochastic and chaotic problems. Furthermore, the advanced features of Differential Evolution are discussed as well as taken into account in the Matlab realization. Test "toycase" examples are presented in order to show advantages and disadvantages caused by additional aspects involved in extensions of the basic algorithm. Another aim of this paper is to apply the DE approach to the parameter estimation problem of the system exhibiting chaotic behavior, where the well-known Lorenz system with specific set of parameter values is taken as an example. Finally, the DE approach for estimation of chaotic dynamics is compared to the Ensemble prediction and parameter estimation system (EPPES) approach which was recently proposed as a possible solution for similar problems.
Resumo:
14 x 23 cm
Resumo:
14 x 22 cm
Resumo:
14 x 22 cm
Resumo:
14 x 22 cm
Resumo:
The intellectual property (IP) environment in China is still very immature. There are several problems in legal, political, economic, social-cultural, competitive and labor environment which have hindered IP legal enforcement. Under such circumstances, IP misappropriation is a major concern especially for foreign small and medium-sized enterprises (SMEs) doing business in China. These circumstances require foreign companies, no matter whether they are multinational corporations (MNCs) or SMEs and have own manufacturing in China or not, to take strong IP actions. Therefore, the purpose of this study is to discuss how IP can be protected in China in the case of outsourcing and in the case of own manufacturing. The comparison will consider the process of outsourcing and own manufacturing consisting two stages: preparation stage and operation stage. In order to clarify the conceptual arguments, two illustrative case studies were studied. The case data bases on two semi-structured interviews of the managing directors, field notes and archival data. The findings propose that attention in IP protection should be given to following issues: integrating IP strategy into the company’s business strategy, protecting the most critical knowledge, regarding IP steps as a whole in the protection mechanism and making IP strategy as proactive as possible. The major difference between outsourcing and own manufacturing in IP protection is in the operation stage. Besides, the findings also provide managerial advice on IP protection, e.g. foreign managers should be prepared for IP risks in China, they should establish an own IP protection mechanism which matches the company’s situation and they should consider IP protection as an on-going process.
Resumo:
Denna avhandling tar sin utgångspunkt i ett ifrågasättande av effektiviteten i EU:s konditionalitetspolitik avseende minoritetsrättigheter. Baserat på den rationalistiska teoretiska modellen, External Incentives Model of Governance, syftar denna hypotesprövande avhandling till att förklara om tidsavståndet på det potentiella EU medlemskapet påverkar lagstiftningsnivån avseende minoritetsspråksrättigheter. Mätningen av nivån på lagstiftningen avseende minoritetsspråksrättigheter begränsas till att omfatta icke-diskriminering, användning av minoritetsspråk i officiella sammanhang samt minoriteters språkliga rättigheter i utbildningen. Metodologiskt används ett jämförande angreppssätt både avseende tidsramen för studien, som sträcker sig mellan 2003 och 2010, men även avseende urvalet av stater. På basis av det \"mest lika systemet\" kategoriseras staterna i tre grupper efter deras olika tidsavstånd från det potentiella EU medlemskapet. Hypotesen som prövas är följande: ju kortare tidsavstånd till det potentiella EU medlemskapet desto större sannolikhet att staternas lagstiftningsnivå inom de tre områden som studeras har utvecklats till en hög nivå. Studien visar att hypotesen endast bekräftas delvis. Resultaten avseende icke-diskriminering visar att sambandet mellan tidsavståndet och nivån på lagstiftningen har ökat markant under den undersökta tidsperioden. Detta samband har endast stärkts mellan kategorin av stater som ligger tidsmässigt längst bort ett potentiellt EU medlemskap och de två kategorier som ligger närmare respektive närmast ett potentiellt EU medlemskap. Resultaten avseende användning av minoritetsspråk i officiella sammanhang och minoriteters språkliga rättigheter i utbildningen visar inget respektive nästan inget samband mellan tidsavståndet och utvecklingen på lagstiftningen mellan 2003 och 2010.
Resumo:
Bullying can be viewed as goal-oriented behavior in the strive for dominance and prestige in the peer group (Salmivalli, 2010). To ensure the effectiveness of their power demonstrations, bullies often choose targets from among their vulnerable peers (Salmivalli, 2010; Veenstra et al., 2007). A large number of studies have also shown that victimization has severe consequences for the victims’ psychosocial adjustment (Reijntjes, Kamphuis, Prinzie, & Telch, 2010; Ttofi, Farrington, Lösel, & Loeber, 2011). In this thesis I investigate – based on three empirical studies – whether similar dynamics on the risk factors and consequences apply to same- and other-sex victimization. In the empirical studies, we used the data from the randomized control trial of the KiVa antibullying program for the elementary school grades 4–6 (2007–2008), and for the middle school grades 7–9 (2008–2009). We measured same- and other-sex victimization, and victims’ defending relationships by dyadic questions: “By which classmates are you victimized?” and “By which classmates are you supported, comforted, or defended?” In addition, we used self-reports and peer reports to measure adjustment and social status. The findings imply that other-sex victimization may be challenging for antibullying work. First, although targets of bullying seemed to be selected from among vulnerable peers for the most part, perceived popularity increased the risks of other-sex victimization. Popularity of these victims may falsely lead to an impression that the victims are doing well. Second, the consequences considering victims’ later psychosocial adjustment were alarming concerning girls bullied by boys. Thus, despite the fact that the targets may be perceived as popular, other-sex victimization can have even more severe consequences than same-sex victimization. Third, we found that defending relationships were mostly same-sex relationships, and consequently, we may ask whether defending is effective against other-sex bullies. Finally, the KiVa antibullying program was less effective against other-sex victimization in the adolescent sample. The findings altogether emphasize the importance of taking into account the sex composition of the bully-victim dyad, both considering future research on bullying and in the antibullying work with children and adolescents.
Resumo:
Tässä diplomityössä tutkittiin vaihtoehtoja tehoelektroniikkalaitteiden kotelointiluokan kehittämiseksi. Haasteena paremman suojauksen suunnittelussa on laitteiden tuottama suuri määrä lämpöä, joka vaatii tehokkaan jäähdytyksen. Työn tuloksena saatu prototyyppi IP33 luokkaa varten täyttää standardissa SFS-EN 60529+A1 asetetut vaatimukset kyseiselle kotelointiluokalle. Rakenteessa ja valmistettavuudessa havaittiin muutama ongelma, jotka ovat korjattavissa pienillä muutoksilla. Korkeampia suojausluokkia varten testattiin IP54-luokiteltujen filtterituulettimien vaikutusta laitteen jäähdytykseen. Testien perusteella jäähdytysteho on riittävä ja filtterituulettimet todettiin toimivaksi ratkaisuksi korkeammille suojausluokille. Työn perusteella voidaan todeta, että nykyiset laitteet voidaan muokata vastaamaan IP33 luokan vaatimuksia kohtuullisen pienillä muutoksilla. Tätä korkeammat suojausluokat vaatisivat niin suuria muutoksia designiin, että todennäköisesti täysin uuden laitteen suunnittelu olis kannattavin vaihtoehto.