852 resultados para Generation analysis
Resumo:
Over the past few years, the Midwest ISO has experienced a surge in requests to interconnect large amounts of wind generation, driven largely by a favorable political environment and an abundant wind resource in the Midwestern US. This tremendous influx of proposed generators along with a highly constrained transmission system adversely impacted interconnection queue processing, resulting in an unmanageable backlog. Under these circumstances, Midwest ISO successfully reformed the interconnection tariff to improve cycle times and provide increased certainty to interconnection customers. One of the key features of the reformed queue process is the System Planning and Analysis (SPA) phase which allows integration of the interconnection studies with regional transmission planning. This paper presents a brief background of the queue reform effort and then delves deeply in to the work performed at the Midwest ISO during the first SPA cycle - the study approach, the challenges faced in having to study over 50,000 MWs of wind generation and the effective solutions designed to complete these studies within tariff timelines.
Resumo:
TOD: - A fully planned, mixed use development equipped with good quality transit service and infrastructure for walking and cycling Hypothesis: -TOD will help to reduce urban transport congestion Method: -Comparison of a TOD with non TOD urban environments -Residents’ trip characteristics
Resumo:
Organisations are constantly seeking efficiency improvements for their business processes in terms of time and cost. Management accounting enables reporting of detailed cost of operations for decision making purpose, although significant effort is required to gather accurate operational data. Business process management is concerned with systematically documenting, managing, automating, and optimising processes. Process mining gives valuable insight into processes through analysis of events recorded by an IT system in the form of an event log with the focus on efficient utilisation of time and resources, although its primary focus is not on cost implications. In this paper, we propose a framework to support management accounting decisions on cost control by automatically incorporating cost data with historical data from event logs for monitoring, predicting and reporting process-related costs. We also illustrate how accurate, relevant and timely management accounting style cost reports can be produced on demand by extending open-source process mining framework ProM.
Resumo:
Background Human papillomavirus (HPV) is the aetiological agent for cervical cancer and genital warts. Concurrent HPV and HIV infection in the South African population is high. HIV positive (+) women are often infected with multiple, rare and undetermined HPV types. Data on HPV incidence and genotype distribution are based on commercial HPV detection kits, but these kits may not detect all HPV types in HIV + women. The objectives of this study were to (i) identify the HPV types not detected by commercial genotyping kits present in a cervical specimen from an HIV positive South African woman using next generation sequencing, and (ii) determine if these types were prevalent in a cohort of HIV-infected South African women. Methods Total DNA was isolated from 109 cervical specimens from South African HIV + women. A specimen within this cohort representing a complex multiple HPV infection, with 12 HPV genotypes detected by the Roche Linear Array HPV genotyping (LA) kit, was selected for next generation sequencing analysis. All HPV types present in this cervical specimen were identified by Illumina sequencing of the extracted DNA following rolling circle amplification. The prevalence of the HPV types identified by sequencing, but not included in the Roche LA, was then determined in the 109 HIV positive South African women by type-specific PCR. Results Illumina sequencing identified a total of 16 HPV genotypes in the selected specimen, with four genotypes (HPV-30, 74, 86 and 90) not included in the commercial kit. The prevalence's of HPV-30, 74, 86 and 90 in 109 HIV positive South African women were found to be 14.6 %, 12.8 %, 4.6 % and 8.3 % respectively. Conclusions Our results indicate that there are HPV types, with substantial prevalence, in HIV positive women not being detected in molecular epidemiology studies using commercial kits. The significance of these types in relation to cervical disease remains to be investigated.
Resumo:
This paper presents a model for generating a MAC tag by injecting the input message directly into the internal state of a nonlinear filter generator. This model generalises a similar model for unkeyed hash functions proposed by Nakano et al. We develop a matrix representation for the accumulation phase of our model and use it to analyse the security of the model against man-in-the-middle forgery attacks based on collisions in the final register contents. The results of this analysis show that some conclusions of Nakano et al regarding the security of their model are incorrect. We also use our results to comment on several recent MAC proposals which can be considered as instances of our model and specify choices of options within the model which should prevent the type of forgery discussed here. In particular, suitable initialisation of the register and active use of a secure nonlinear filter will prevent an attacker from finding a collision in the final register contents which could result in a forged MAC.
Resumo:
Introduction: Inherent and acquired cisplatin resistance reduces the effectiveness of this agent in the management of non-small cell lung cancer (NSCLC). Understanding the molecular mechanisms underlying this process may result in the development of novel agents to enhance the sensitivity of cisplatin. Methods: An isogenic model of cisplatin resistance was generated in a panel of NSCLC cell lines (A549, SKMES-1, MOR, H460). Over a period of twelve months, cisplatin resistant (CisR) cell lines were derived from original, age-matched parent cells (PT) and subsequently characterized. Proliferation (MTT) and clonogenic survival assays (crystal violet) were carried out between PT and CisR cells. Cellular response to cisplatin-induced apoptosis and cell cycle distribution were examined by FACS analysis. A panel of cancer stem cell and pluripotent markers was examined in addition to the EMT proteins, c-Met and β-catenin. Cisplatin-DNA adduct formation, DNA damage (γH2AX) and cellular platinum uptake (ICP-MS) was also assessed. Results: Characterisation studies demonstrated a decreased proliferative capacity of lung tumour cells in response to cisplatin, increased resistance to cisplatin-induced cell death, accumulation of resistant cells in the G0/G1 phase of the cell cycle and enhanced clonogenic survival ability. Moreover, resistant cells displayed a putative stem-like signature with increased expression of CD133+/CD44+cells and increased ALDH activity relative to their corresponding parental cells. The stem cell markers, Nanog, Oct-4 and SOX-2, were significantly upregulated as were the EMT markers, c-Met and β-catenin. While resistant sublines demonstrated decreased uptake of cisplatin in response to treatment, reduced cisplatin-GpG DNA adduct formation and significantly decreased γH2AX foci were observed compared to parental cell lines. Conclusion: Our results identified cisplatin resistant subpopulations of NSCLC cells with a putative stem-like signature, providing a further understanding of the cellular events associated with the cisplatin resistance phenotype in lung cancer. © 2013 Barr et al.
Resumo:
Power system operation and planning are facing increasing uncertainties especially with the deregulation process and increasing demand for power. Probabilistic power system stability assessment and probabilistic power system planning have been identified by EPRI as one of the important trends in power system operations and planning. Probabilistic small signal stability assessment studies the impact of system parameter uncertainties on system small disturbance stability characteristics. Researches in this area have covered many uncertainties factors such as controller parameter uncertainties and generation uncertainties. One of the most important factors in power system stability assessment is load dynamics. In this paper, composite load model is used to consider the uncertainties from load parameter uncertainties impact on system small signal stability characteristics. The results provide useful insight into the significant stability impact brought to the system by load dynamics. They can be used to help system operators in system operation and planning analysis.
Resumo:
This paper focuses on the super/sub-synchronous operation of the doubly fed induction generator (DFIG) system. The impact of a damping controller on the different modes of operation for the DFIG based wind generation system is investigated. The co-ordinated tuning of the damping controller to enhance the damping of the oscillatory modes using bacteria foraging (BF) technique is presented. The results from eigenvalue analysis are presented to elucidate the effectiveness of the tuned damping controller in the DFIG system. The robustness issue of the damping controller is also investigated
Resumo:
The mechanisms of force generation and transference via microfilament networks are crucial to the understandings of mechanobiology of cellular processes in living cells. However, there exists an enormous challenge for all-atom physics simulation of real size microfilament networks due to scale limitation of molecular simulation techniques. Following biophysical investigations of constitutive relations between adjacent globular actin monomers on filamentous actin, a hierarchical multiscale model was developed to investigate the biomechanical properties of microfilament networks. This model was validated by previous experimental studies of axial tension and transverse vibration of single F-actin. The biomechanics of microfilament networks can be investigated at the scale of real eukaryotic cell size (10 μm). This multiscale approach provides a powerful modeling tool which can contribute to the understandings of actin-related cellular processes in living cells.
Analysis and optimisation of the preferences of decision-makers in black-start group decision-making
Resumo:
As the first stage of power system restoration after a blackout, an optimal black-start scheme is very important for speeding up the whole restoration procedure. Up to now, much research work has been done on generating or selecting an optimal black-start scheme by a single round of decision-making. However, less attention has been paid for improving the final decision-making results through a multiple-round decision-making procedure. In the group decision-making environment, decision-making results evaluated by different black-start experts may differ significantly with each other. Thus, the consistency of black-start decision-making results could be deemed as an important indicator in assessing the black-start group decision-making results. Given this background, an intuitionistic fuzzy distance-based method is presented to analyse the consistency of black-start group decision-making results. Moreover, the weights of black-start indices as well as the weights of decision-making experts are modified in order to optimise the consistency of black-start group decision-making results. Finally, an actual example is served for demonstrating the proposed method.
Resumo:
Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality and integrity protection to messages. This approach is more efficient than applying a two-step process of providing confidentiality for a message by encrypting the message, and in a separate pass providing integrity protection by generating a Message Authentication Code (MAC). AE using symmetric ciphers can be provided by either stream ciphers with built in authentication mechanisms or block ciphers using appropriate modes of operation. However, stream ciphers have the potential for higher performance and smaller footprint in hardware and/or software than block ciphers. This property makes stream ciphers suitable for resource constrained environments, where storage and computational power are limited. There have been several recent stream cipher proposals that claim to provide AE. These ciphers can be analysed using existing techniques that consider confidentiality or integrity separately; however currently there is no existing framework for the analysis of AE stream ciphers that analyses these two properties simultaneously. This thesis introduces a novel framework for the analysis of AE using stream cipher algorithms. This thesis analyzes the mechanisms for providing confidentiality and for providing integrity in AE algorithms using stream ciphers. There is a greater emphasis on the analysis of the integrity mechanisms, as there is little in the public literature on this, in the context of authenticated encryption. The thesis has four main contributions as follows. The first contribution is the design of a framework that can be used to classify AE stream ciphers based on three characteristics. The first classification applies Bellare and Namprempre's work on the the order in which encryption and authentication processes take place. The second classification is based on the method used for accumulating the input message (either directly or indirectly) into the into the internal states of the cipher to generate a MAC. The third classification is based on whether the sequence that is used to provide encryption and authentication is generated using a single key and initial vector, or two keys and two initial vectors. The second contribution is the application of an existing algebraic method to analyse the confidentiality algorithms of two AE stream ciphers; namely SSS and ZUC. The algebraic method is based on considering the nonlinear filter (NLF) of these ciphers as a combiner with memory. This method enables us to construct equations for the NLF that relate the (inputs, outputs and memory of the combiner) to the output keystream. We show that both of these ciphers are secure from this type of algebraic attack. We conclude that using a keydependent SBox in the NLF twice, and using two different SBoxes in the NLF of ZUC, prevents this type of algebraic attack. The third contribution is a new general matrix based model for MAC generation where the input message is injected directly into the internal state. This model describes the accumulation process when the input message is injected directly into the internal state of a nonlinear filter generator. We show that three recently proposed AE stream ciphers can be considered as instances of this model; namely SSS, NLSv2 and SOBER-128. Our model is more general than a previous investigations into direct injection. Possible forgery attacks against this model are investigated. It is shown that using a nonlinear filter in the accumulation process of the input message when either the input message or the initial states of the register is unknown prevents forgery attacks based on collisions. The last contribution is a new general matrix based model for MAC generation where the input message is injected indirectly into the internal state. This model uses the input message as a controller to accumulate a keystream sequence into an accumulation register. We show that three current AE stream ciphers can be considered as instances of this model; namely ZUC, Grain-128a and Sfinks. We establish the conditions under which the model is susceptible to forgery and side-channel attacks.
Resumo:
Taka ‘i fonua mahu is a Tongan proverb, which means: "Going about or living in a fruitful land". This thesis analyses the experiences and impacts on migration on being Tongan, particularly Tongan youth in an adopted fruitful land, South East Queensland. The thesis argues that being Tongan in Tonga, has new meaning in the diaspora because of remittances, job prospects, educational opportunity, adapting to a multicultural society, and social justice. These issues are revealed by comparisons made with the experiences of the first generation Tongan migrants, and second generation Tongan migrants, as well as those in New Zealand and America. It argues that the Church, the family and kainga (extended family) impact on the anga fakatonga (Tongan way) and the essence of community as experienced by the first and second generation Tongan migrants. The framework for this analysis is a study of transnationalism, and being Tongan as it is maintained and changed in the diaspora.
Resumo:
The control paradigms of the distributed generation (DG) sources in the smart grid are realised by either utilising virtual power plant (VPP) or by employing MicroGrid structures. Both VPP and MicroGrid are presented with the problem of control of power flow between their comprising DG sources. This study depicts this issue for VPP and proposes a novel and improved universal active and reactive power flow controllers for three-phase pulse width modulated voltage source inverters (PWM-VSI) operating in the VPP environment. The proposed controller takes into account all cases of R-X relationship, thus allowing it to function in systems operating at high, medium (MV) and low-voltage (LV) levels. Also proposed control scheme for the first time in an inverter control takes into account the capacitance of the transmission line which is an important factor to accurately represent medium length transmission lines. This allows the proposed control scheme to be applied in VPP structures, where DG sources can operate at MV LV levels over a short/medium length transmission line. The authors also conducted small signal stability analysis of the proposed controller and compared it against the small signal study of the existing controllers.
Resumo:
In our laboratory we have developed a quantitative-polymerase chain reaction (Q-PCR) strategy to examine the differential expression of adenosine receptor (ADOR), A(1), A(2A), A(2B) and A(3), and estrogen receptors (ER) alpha and beta. Brain and uterine mRNA were first used to optimise specific amplification conditions prior to SYBR Green I real time analysis of receptor subtype expression. SYBR Green I provided a convenient and sensitive means of examining specific PCR amplification product in real time, and allowed the generation of standard curves from which relative receptor abundance could be determined. Real time Q-PCR analysis was then performed, to examine changes in receptor expression levels in brains of adult female Wistar rats 3-month post ovariectomy. Comparison with sham-operated age-matched control rats demonstrated both comparative and absolute-copy number changes in receptor levels. Evaluation of both analytical methods investigated 18S rRNA as an internal reference for comparative gene expression analysis in the brain. The results of this study revealed preferential repression of ADORA(2A) (>4-fold down) and consistent (>2-fold) down-regulation of ADORA(1), ADORA(3), and ER-beta, following ovariectomy. No change was found in ADORA(2B) or ER-alpha. Analysis of absolute copy number in this study revealed a correlation between receptor expression in response to ovariectomy, and relative receptor subtype abundance in the brain.
Resumo:
Electricity is the cornerstone of modern life. It is essential to economic stability and growth, jobs and improved living standards. Electricity is also the fundamental ingredient for a dignified life; it is the source of such basic human requirements as cooked food, a comfortable living temperature and essential health care. For these reasons, it is unimaginable that today's economies could function without electricity and the modern energy services that it delivers. Somewhat ironically, however, the current approach to electricity generation also contributes to two of the gravest and most persistent problems threatening the livelihood of humans. These problems are anthropogenic climate change and sustained human poverty. To address these challenges, the global electricity sector must reduce its reliance on fossil fuel sources. In this context, the object of this research is twofold. Initially it is to consider the design of the Renewable Energy (Electricity) Act 2000 (Cth) (Renewable Electricity Act), which represents Australia's primary regulatory approach to increase the production of renewable sourced electricity. This analysis is conducted by reference to the regulatory models that exist in Germany and Great Britain. Within this context, this thesis then evaluates whether the Renewable Electricity Act is designed effectively to contribute to a more sustainable and dignified electricity generation sector in Australia. On the basis of the appraisal of the Renewable Electricity Act, this thesis contends that while certain aspects of the regulatory regime have merit, ultimately its design does not represent an effective and coherent regulatory approach to increase the production of renewable sourced electricity. In this regard, this thesis proposes a number of recommendations to reform the existing regime. These recommendations are not intended to provide instantaneous or simple solutions to the current regulatory regime. Instead, the purpose of these recommendations is to establish the legal foundations for an effective regulatory regime that is designed to increase the production of renewable sourced electricity in Australia in order to contribute to a more sustainable and dignified approach to electricity production.