5 resultados para CALIFORNIA CURRENT SYSTEM

em Digital Commons - Michigan Tech


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Worldwide, rural populations are far less likely to have access to clean drinking water than are urban ones. In many developing countries, the current approach to rural water supply uses a model of demand-driven, community-managed water systems. In Suriname, South America rural populations have limited access to improved water supplies; community-managed water supply systems have been installed in several rural communities by nongovernmental organizations as part of the solution. To date, there has been no review of the performance of these water supply systems. This report presents the results of an investigation of three rural water supply systems constructed in Saramaka villages in the interior of Suriname. The investigation used a combination of qualitative and quantitative methods, coupled with ethnographic information, to construct a comprehensive overview of these water systems. This overview includes the water use of the communities, the current status of the water supply systems, histories and sustainability of the water supply projects, technical reviews, and community perceptions. From this overview, factors important to the sustainability of these water systems were identified. Community water supply systems are engineered solutions that operate through social cooperation. The results from this investigation show that technical adequacy is the first and most critical factor for long-term sustainability of a water system. It also shows that technical adequacy is dependent on the appropriateness of the engineering design for the social, cultural, and natural setting in which it takes place. The complex relationships between technical adequacy, community support, and the involvement of women play important roles in the success of water supply projects. Addressing these factors during the project process and taking advantage of alternative water resources may increase the supply of improved drinking water to rural communities.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Rising fuel prices and environmental concerns are threatening the stability of current electrical grid systems. These factors are pushing the automobile industry towards more effcient, hybrid vehicles. Current trends show petroleum is being edged out in favor of electricity as the main vehicular motive force. The proposed methods create an optimized charging control schedule for all participating Plug-in Hybrid Electric Vehicles in a distribution grid. The optimization will minimize daily operating costs, reduce system losses, and improve power quality. This requires participation from Vehicle-to-Grid capable vehicles, load forecasting, and Locational Marginal Pricing market predictions. Vehicles equipped with bidirectional chargers further improve the optimization results by lowering peak demand and improving power quality.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In the current market system, power systems are operated at higher loads for economic reasons. Power system stability becomes a genuine concern in such operating conditions. In case of failure of any larger component, the system may become stressed. These events may start cascading failures, which may lead to blackouts. One of the main reasons of the major recorded blackout events has been the unavailability of system-wide information. Synchrophasor technology has the capability to provide system-wide real time information. Phasor Measurement Units (PMUs) are the basic building block of this technology, which provide the Global Positioning System (GPS) time-stamped voltage and current phasor values along with the frequency. It is being assumed that synchrophasor data of all the buses is available and thus the whole system is fully observable. This information can be used to initiate islanding or system separation to avoid blackouts. A system separation strategy using synchrophasor data has been developed to answer the three main aspects of system separation: (1) When to separate: One class support machines (OC-SVM) is primarily used for the anomaly detection. Here OC-SVM was used to detect wide area instability. OC-SVM has been tested on different stable and unstable cases and it is found that OC-SVM has the capability to detect the wide area instability and thus is capable to answer the question of “when the system should be separated”. (2) Where to separate: The agglomerative clustering technique was used to find the groups of coherent buses. The lines connecting different groups of coherent buses form the separation surface. The rate of change of the bus voltage phase angles has been used as the input to this technique. This technique has the potential to exactly identify the lines to be tripped for the system separation. (3) What to do after separation: Load shedding was performed approximately equal to the sum of power flows along the candidate system separation lines should be initiated before tripping these lines. Therefore it is recommended that load shedding should be initiated before tripping the lines for system separation.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Microbial fuel cell (MFC) research has focused mostly on producing electricity using soluble organic and inorganic substrates. This study focused on converting solid organic waste into electricity using a two-stage MFC process. In the first stage, a hydrolysis reactor produced soluble organic substrates from solid organic waste. The soluble substrates from the hydrolysis reactor were pumped to the second stage reactor: a continuous-flow, air-cathode MFC. Maximum power output (Pmax) of the MFC was 296 mW/m3 at a current density of 25.4 mA/m2 while being fed only leachate from the first stage reactor. Addition of phosphate buffer increased Pmax to 1,470 mW/m3 (89.4 mA/m2), although this result could not be duplicated with repeated polarization testing. The minimum internal resistance achieved was 77 Omega with leachate feed and 17 Omega with phosphate buffer. The low coulombic efficiency (

Relevância:

30.00% 30.00%

Publicador:

Resumo:

File system security is fundamental to the security of UNIX and Linux systems since in these systems almost everything is in the form of a file. To protect the system files and other sensitive user files from unauthorized accesses, certain security schemes are chosen and used by different organizations in their computer systems. A file system security model provides a formal description of a protection system. Each security model is associated with specified security policies which focus on one or more of the security principles: confidentiality, integrity and availability. The security policy is not only about “who” can access an object, but also about “how” a subject can access an object. To enforce the security policies, each access request is checked against the specified policies to decide whether it is allowed or rejected. The current protection schemes in UNIX/Linux systems focus on the access control. Besides the basic access control scheme of the system itself, which includes permission bits, setuid and seteuid mechanism and the root, there are other protection models, such as Capabilities, Domain Type Enforcement (DTE) and Role-Based Access Control (RBAC), supported and used in certain organizations. These models protect the confidentiality of the data directly. The integrity of the data is protected indirectly by only allowing trusted users to operate on the objects. The access control decisions of these models depend on either the identity of the user or the attributes of the process the user can execute, and the attributes of the objects. Adoption of these sophisticated models has been slow; this is likely due to the enormous complexity of specifying controls over a large file system and the need for system administrators to learn a new paradigm for file protection. We propose a new security model: file system firewall. It is an adoption of the familiar network firewall protection model, used to control the data that flows between networked computers, toward file system protection. This model can support decisions of access control based on any system generated attributes about the access requests, e.g., time of day. The access control decisions are not on one entity, such as the account in traditional discretionary access control or the domain name in DTE. In file system firewall, the access decisions are made upon situations on multiple entities. A situation is programmable with predicates on the attributes of subject, object and the system. File system firewall specifies the appropriate actions on these situations. We implemented the prototype of file system firewall on SUSE Linux. Preliminary results of performance tests on the prototype indicate that the runtime overhead is acceptable. We compared file system firewall with TE in SELinux to show that firewall model can accommodate many other access control models. Finally, we show the ease of use of firewall model. When firewall system is restricted to specified part of the system, all the other resources are not affected. This enables a relatively smooth adoption. This fact and that it is a familiar model to system administrators will facilitate adoption and correct use. The user study we conducted on traditional UNIX access control, SELinux and file system firewall confirmed that. The beginner users found it easier to use and faster to learn then traditional UNIX access control scheme and SELinux.