862 resultados para peak demand
Resumo:
The first essay in this thesis is on gender wage differentials among manufacturing sector white-collar workers. The wage differential is decomposed into firm, job (within-firm) and individ-ual-level components. Job-level gender segregation explains over half of the gap, while firm-level segregation is not important. After controlling for firm, job and individual characteristics, the remaining unexplained wage cap to the advantage of men is six per cent of men s mean wage. In the second essay, I study how the business cycle and gender affect the distribution of the earnings losses of displaced workers. The negative effect of displacement is large, persistent and strongest in the lowest earnings deciles. The effect is larger in a recession than in a recov-ery period, and in all periods women s earnings drop more than men s earnings. The third essay shows that the transition from steady employment to disability pension de-pends on the stringency of medical screening and the degree of experience-rating of pension costs applied to the employer. The fact that firms have to bear part of the cost of employees disability pension costs lowers both the incidence of long sick leave periods and the probabil-ity that sick leave ends in a disability pension. The fourth and fifth essays are studies on the employment, wage and profit effects of a re-gional payroll tax cut experiment conducted in northern and eastern Finland. The results show no statistically significant effect on any of the response variables.
Resumo:
Nanocrystalline metals frequently exhibit poor thermal stability, and the exothermic peak in differential scanning calorimetry is usually attributed to grain growth. We show from experiments on electrodeposited nano-Ni with varying levels of S, and tests with microcrystalline Ni and S powders, that the exothermic peak is associated with the formation of a nickel sulfide phase and concurrent grain growth. Analysis suggests that segregation plays a more important role in limiting grain growth than second-phase particles in nano-Ni. (C) 2010 Acta Materialia Inc. Published by Elsevier Ltd. All rights reserved.
Resumo:
Acoustic Emission (AE) signals, which are electrical version of acoustic emissions, are usually analysed using a set of signal parameters. The major objective of signal analysis is to study the characteristics of the sources of emissions. Peak amplitude (P-a) and rise time (R-t) are two such parameters used for source characterization. In this paper, we theoretically investigate the efficiency of P-a and R-t to classify and characterize AE sources by modelling the input stress pulse and transducer. Analytical expressions obtained for P-a and R-t clearly indicate their use and efficiency for source characterization. It is believed that these results may be of use to investigators in areas like control systems and signal processing also.
Resumo:
In this paper, a method of tracking the peak power in a wind energy conversion system (WECS) is proposed, which is independent of the turbine parameters and air density. The algorithm searches for the peak power by varying the speed in the desired direction. The generator is operated in the speed control mode with the speed reference being dynamically modified in accordance with the magnitude and direction of change of active power. The peak power points in the P-omega curve correspond to dP/domega = 0. This fact is made use of in the optimum point search algorithm. The generator considered is a wound rotor induction machine whose stator is connected directly to the grid and the rotor is fed through back-to-back pulse-width-modulation (PWM) converters. Stator flux-oriented vector control is applied to control the active and reactive current loops independently. The turbine characteristics are generated by a dc motor fed from a commercial dc drive. All of the control loops are executed by a single-chip digital signal processor (DSP) controller TMS320F240. Experimental results show that the performance of the control algorithm compares well with the conventional torque control method.
Resumo:
Scan circuit is widely practiced DFT technology. The scan testing procedure consist of state initialization, test application, response capture and observation process. During the state initialization process the scan vectors are shifted into the scan cells and simultaneously the responses captured in last cycle are shifted out. During this shift operation the transitions that arise in the scan cells are propagated to the combinational circuit, which inturn create many more toggling activities in the combinational block and hence increases the dynamic power consumption. The dynamic power consumed during scan shift operation is much more higher than that of normal mode operation.
Resumo:
In this work, an attempt has been made to evaluate the spatial variation of peak horizontal acceleration (PHA) and spectral acceleration (SA) values at rock level for south India based on the probabilistic seismic hazard analysis (PSHA). These values were estimated by considering the uncertainties involved in magnitude, hypocentral distance and attenuation of seismic waves. Different models were used for the hazard evaluation, and they were combined together using a logic tree approach. For evaluating the seismic hazard, the study area was divided into small grids of size 0.1A degrees A xA 0.1A degrees, and the hazard parameters were calculated at the centre of each of these grid cells by considering all the seismic sources within a radius of 300 km. Rock level PHA values and SA at 1 s corresponding to 10% probability of exceedance in 50 years were evaluated for all the grid points. Maps showing the spatial variation of rock level PHA values and SA at 1 s for the entire south India are presented in this paper. To compare the seismic hazard for some of the important cities, the seismic hazard curves and the uniform hazard response spectrum (UHRS) at rock level with 10% probability of exceedance in 50 years are also presented in this work.
Resumo:
With the advent of Internet, video over IP is gaining popularity. In such an environment, scalability and fault tolerance will be the key issues. Existing video on demand (VoD) service systems are usually neither scalable nor tolerant to server faults and hence fail to comply to multi-user, failure-prone networks such as the Internet. Current research areas concerning VoD often focus on increasing the throughput and reliability of single server, but rarely addresses the smooth provision of service during server as well as network failures. Reliable Server Pooling (RSerPool), being capable of providing high availability by using multiple redundant servers as single source point, can be a solution to overcome the above failures. During a possible server failure, the continuity of service is retained by another server. In order to achieve transparent failover, efficient state sharing is an important requirement. In this paper, we present an elegant, simple, efficient and scalable approach which has been developed to facilitate the transfer of state by the client itself, using extended cookie mechanism, which ensures that there is no noticeable change in disruption or the video quality.
Resumo:
A hydrological modelling framework was assembled to simulate the daily discharge of the Mandovi River on the Indian west coast. Approximately 90% of the west-coast rainfall, and therefore discharge, occurs during the summer monsoon (June-September), with a peak during July-August. The modelling framework consisted of a digital elevation model (DEM) called GLOBE, a hydrological routing algorithm, the Terrestrial Hydrological Model with Biogeochemistry (THMB), an algorithm to map the rainfall recorded by sparse rain-gauges to the model grid, and a modified Soil Conservation Service Curve Number (SCS-CN) method. A series of discharge simulations (with and without the SCS method) was carried out. The best simulation was obtained after incorporating spatio-temporal variability in the SCS parameters, which was achieved by an objective division of the season into five regimes: the lean season, monsoon onset, peak monsoon, end-monsoon, and post-monsoon. A novel attempt was made to incorporate objectively the different regimes encountered before, during and after the Indian monsoon, into a hydrological modelling framework. The strength of our method lies in the low demand it makes on hydrological data. Apart from information on the average soil type in a region, the entire parameterization is built on the basis of the rainfall that is used to force the model. That the model does not need to be calibrated separately for each river is important, because most of the Indian west-coast basins are ungauged. Hence, even though the model has been validated only for the Mandovi basin, its potential region of application is considerable. In the context of the Prediction in Ungauged Basins (PUB) framework, the potential of the proposed approach is significant, because the discharge of these (ungauged) rivers into the eastern Arabian Sea is not small, making them an important element of the local climate system.
Resumo:
Automated security is one of the major concerns of modern times. Secure and reliable authentication systems are in great demand. A biometric trait like the finger knuckle print (FKP) of a person is unique and secure. Finger knuckle print is a novel biometric trait and is not explored much for real-time implementation. In this paper, three different algorithms have been proposed based on this trait. The first approach uses Radon transform for feature extraction. Two levels of security are provided here and are based on eigenvalues and the peak points of the Radon graph. In the second approach, Gabor wavelet transform is used for extracting the features. Again, two levels of security are provided based on magnitude values of Gabor wavelet and the peak points of Gabor wavelet graph. The third approach is intended to authenticate a person even if there is a damage in finger knuckle position due to injury. The FKP image is divided into modules and module-wise feature matching is done for authentication. Performance of these algorithms was found to be much better than very few existing works. Moreover, the algorithms are designed so as to implement in real-time system with minimal changes.
Resumo:
For necessary goods like water, under supply constraints, fairness considerations lead to negative externalities. The objective of this paper is to design an infinite horizon contract or relational contract (a type of long-term contract) that ensures self-enforcing (instead of court-enforced) behaviour by the agents to mitigate the externality due to fairness issues. In this contract, the consumer is induced to consume at firm-supply level using the threat of higher fair price for future time periods. The pricing mechanism, computed in this paper, internalizes the externality and is shown to be economically efficient and provides revenue sufficiency.
Resumo:
Streaming applications demand hard bandwidth and throughput guarantees in a multiprocessor environment amidst resource competing processes. We present a Label Switching based Network-on-Chip (LS-NoC) motivated by throughput guarantees offered by bandwidth reservation. Label switching is a packet relaying technique in which individual packets carry route information in the form of labels. A centralized LS-NoC Management framework engineers traffic into Quality of Service (QoS) guaranteed routes. LS-NoC caters to the requirements of streaming applications where communication channels are fixed over the lifetime of the application. The proposed NoC framework inherently supports heterogeneous and ad hoc system-on-chips. The LS-NoC can be used in conjunction with conventional best effort NoC as a QoS guaranteed communication network or as a replacement to the conventional NoC. A multicast, broadcast capable label switched router for the LS-NoC has been designed. A 5 port, 256 bit data bus, 4 bit label router occupies 0.431 mm(2) in 130 nm and delivers peak bandwidth of 80 Gbits/s per link at 312.5 MHz. Bandwidth and latency guarantees of LS-NoC have been demonstrated on traffic from example streaming applications and on constant and variable bit rate traffic patterns. LS-NoC was found to have a competitive AreaxPower/Throughput figure of merit with state-of-the-art NoCs providing QoS. Circuit switching with link sharing abilities and support for asynchronous operation make LS-NoC a desirable choice for QoS servicing in chip multiprocessors. (C) 2013 Elsevier B.V. All rights reserved.
Resumo:
In this paper, we have proposed a novel certificate-less on-demand public key management (CLPKM) protocol for self-organized MANETs. The protocol works on flat network architecture, and distinguishes between authentication layer and routing layer of the network. We put an upper limit on the length of verification route and use the end-to-end trust value of a route to evaluate its strength. The end-to-end trust value is used by the protocol to select the most trusted verification route for accomplishing public key verification. Also, the protocol uses MAC function instead of RSA certificates to perform public key verification. By doing this, the protocol saves considerable computation power, bandwidth and storage space. The saved storage space is utilized by the protocol to keep a number of pre-established routes in the network nodes, which helps in reducing the average verification delay of the protocol. Analysis and simulation results confirm the effectiveness of the proposed protocol.