931 resultados para key schedule


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The aim of this thesis was to study the crops currently used for biofuel production from the following aspects: 1. what should be the average yield/ ha to reach an energy balance at least 0 or positive 2. what are the shares of the primary and secondary energy flows in agriculture, transport, processing and usage, and 3. overall effects of biofuel crop cultivation, transport, processing and usage. This thesis concentrated on oilseed rape biodiesel and wheat bioethanol in the European Union, comparing them with competing biofuels, such as corn and sugarcane-based ethanol, and the second generation biofuels. The study was executed by comparing Life Cycle Assessment-studies from the EU-region and by analyzing them thoroughly from the differences viewpoint. The variables were the following: energy ratio, hectare yield (l/ha), impact on greenhouse gas emissions (particularly CO2), energy consumption in crop growing and processing one hectare of a particular crop to biofuel, distribution of energy in processing and effects of the secondary energy flows, like e.g. wheat straw. Processing was found to be the most energy consuming part in the production of biofuels. So if the raw materials will remain the same, the development will happen in processing. First generation biodiesel requires esterification, which consumes approximately one third of the process energy. Around 75% of the energy consumed in manufacturing the first generation wheat-based ethanol is spent in steam and electricity generation. No breakthroughs are in sight in the agricultural sector to achieve significantly higher energy ratios. It was found out that even in ideal conditions the energy ratio of first generation wheat-based ethanol will remain slightly under 2. For oilseed rape-based biodiesel the energy ratios are better, and energy consumption per hectare is lower compared to wheat-based ethanol. But both of these are lower compared to e.g. sugarcane-based ethanol. Also the hectare yield of wheat-based ethanol is significantly lower. Biofuels are in a key position when considering the future of the world’s transport sector. Uncertainties concerning biofuels are, however, several, like the schedule of large scale introduction to consumer markets, technologies used, raw materials and their availability and - maybe the biggest - the real production capacity in relation to the fuel consumption. First generation biofuels have not been the expected answer to environmental problems. Comparisons made show that sugarcane-based ethanol is the most prominent first generation biofuel at the moment, both from energy and environment point of view. Also palmoil-based biodiesel looks promising, although it involves environmental concerns as well. From this point of view the biofuels in this study - wheat-based ethanol and oilseed rape-based biodiesel - are not very competitive options. On the other hand, crops currently used for fuel production in different countries are selected based on several factors, not only based on thier relative general superiority. It is challenging to make long-term forecasts for the biofuel sector, but it can be said that satisfying the world's current and near future traffic fuel consumption with biofuels can only be regarded impossible. This does not mean that biofuels shoud be rejected and their positive aspects ignored, but maybe this reality helps us to put them in perspective. To achieve true environmental benefits through the usage of biofuels there must first be a significant drop both in traffic volumes and overall fuel consumption. Second generation biofuels are coming, but serious questions about their availability and production capacities remain open. Therefore nothing can be taken for granted in this issue, expect the need for development.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An enzyme which cleaves the benzene ring of 3,5-dichiorocatechol has been purified to homogeneity from Pseudomonas cepacia CSV90, grown with 2,4-dichlorophenoxyacetic acid (2,4-D) as the sole carbon source. The enzyme was a nonheme ferric dioxygenase and catalyzed the intradiol cleavage of all the examined catechol derivatives, 3,5-dichlorocatechol having the highest specificity constant of 7.3 μM−1 s−1 in an air-saturated buffer. No extradiol-cleaving activity was observed. Thus, the enzyme was designated as 3,5-dichlorocatechol 1,2-dioxygenase. The molecular weight of the native enzyme was ascertained to be 56,000 by light scattering method, while the Mr value of the enzyme denatured with 6 M guanidine-HCl or sodium dodecyl sulfate was 29,000 or 31,600, respectively, suggesting that the enzyme was a homodimer. The iron content was estimated to be 0.89 mol per mole of enzyme. The enzyme was deep red and exhibited a broad absorption spectrum with a maximum at around 425 nm, which was bleached by sodium dithionite, and shifted to 515 nm upon anaerobic 3,5-dichlorocatechol binding. The catalytic constant and the Km values for 3,5-dichlorocatechol and oxygen were 34.7 s−1 and 4.4 and 652 μM, respectively, at pH 8 and 25°C. Some heavy metal ions, chelating agents and sulfhydryl reagents inhibited the activity. The NH2-terminal sequence was determined up to 44 amino acid residues and compared with those of the other catechol dioxygenases previously reported.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We illustrate the potential of using higher order critical points in the deeper understanding of several interesting problems of condensed matter science, e.g. critical adsorption, finite size effects, morphology of critical fluctuations, reversible aggregation of colloids, dynamics of the ordering process, etc.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cysteine residues in proteins serve many important functions such as stabilizing and maintaining the three-dimensional conformation of many proteins(1), in enzyme catalysis, as a residue undergoing post-translational 2 and in the formation of DNA-binding modification domain of a class of transcriptional activators(3), It is also involved in biological redox coupling(4) and xenobiotic metabolism(5). Disulphide bonds formed by xenobiotic metabolism oxidation of cysteine residues have been used as a probe to study the structure/function relationships of proteins, Introducing novel disulphide bonds in proteins to increase their thermal stability and, therefore, the shelf life is an important goal of protein engineering(6,7), In addition, the thiol group of cysteine residue participates in a reaction termed as thiol/disulphide exchange reaction, the biological significance of this reaction being the theme of this review.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, power management algorithms for energy harvesting sensors (EHS) that operate purely based on energy harvested from the environment are proposed. To maintain energy neutrality, EHS nodes schedule their utilization of the harvested power so as to save/draw energy into/from an inefficient battery during peak/low energy harvesting periods, respectively. Under this constraint, one of the key system design goals is to transmit as much data as possible given the energy harvesting profile. For implementational simplicity, it is assumed that the EHS transmits at a constant data rate with power control, when the channel is sufficiently good. By converting the data rate maximization problem into a convex optimization problem, the optimal load scheduling (power management) algorithm that maximizes the average data rate subject to energy neutrality is derived. Also, the energy storage requirements on the battery for implementing the proposed algorithm are calculated. Further, robust schemes that account for the insufficiency of battery storage capacity, or errors in the prediction of the harvested power are proposed. The superior performance of the proposed algorithms over conventional scheduling schemes are demonstrated through computations using numerical data from solar energy harvesting databases.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Large-grain synchronous dataflow graphs or multi-rate graphs have the distinct feature that the nodes of the dataflow graph fire at different rates. Such multi-rate large-grain dataflow graphs have been widely regarded as a powerful programming model for DSP applications. In this paper we propose a method to minimize buffer storage requirement in constructing rate-optimal compile-time (MBRO) schedules for multi-rate dataflow graphs. We demonstrate that the constraints to minimize buffer storage while executing at the optimal computation rate (i.e. the maximum possible computation rate without storage constraints) can be formulated as a unified linear programming problem in our framework. A novel feature of our method is that in constructing the rate-optimal schedule, it directly minimizes the memory requirement by choosing the schedule time of nodes appropriately. Lastly, a new circular-arc interval graph coloring algorithm has been proposed to further reduce the memory requirement by allowing buffer sharing among the arcs of the multi-rate dataflow graph. We have constructed an experimental testbed which implements our MBRO scheduling algorithm as well as (i) the widely used periodic admissible parallel schedules (also known as block schedules) proposed by Lee and Messerschmitt (IEEE Transactions on Computers, vol. 36, no. 1, 1987, pp. 24-35), (ii) the optimal scheduling buffer allocation (OSBA) algorithm of Ning and Gao (Conference Record of the Twentieth Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, Charleston, SC, Jan. 10-13, 1993, pp. 29-42), and (iii) the multi-rate software pipelining (MRSP) algorithm (Govindarajan and Gao, in Proceedings of the 1993 International Conference on Application Specific Array Processors, Venice, Italy, Oct. 25-27, 1993, pp. 77-88). Schedules generated for a number of random dataflow graphs and for a set of DSP application programs using the different scheduling methods are compared. The experimental results have demonstrated a significant improvement (10-20%) in buffer requirements for the MBRO schedules compared to the schedules generated by the other three methods, without sacrificing the computation rate. The MBRO method also gives a 20% average improvement in computation rate compared to Lee's Block scheduling method.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Two new statistics, namely Delta(chi 2) and Delta(chi), based on the extreme value theory, were derived by Gupta et al. We use these statistics to study the direction dependence in the HST Key Project data, which provides one of the most precise measurements of the Hubble constant. We also study the non-Gaussianity in this data set using these statistics. Our results for Delta(chi 2) show that the significance of direction-dependent systematics is restricted to well below the 1 sigma confidence limit; however, the presence of non-Gaussian features is subtle. On the other hand, the Delta(chi). statistic, which is more sensitive to direction dependence, shows direction dependence systematics to be at a slightly higher confidence level, and the presence of non-Gaussian features at a level similar to the Delta(chi 2) statistic.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Ad hoc networks are being used in applications ranging from disaster recovery to distributed collaborative entertainment applications. Ad hoc networks have become one of the most attractive solution for rapid deployment of interconnecting large number of mobile personal devices. The user community of mobile personal devices are demanding a variety of value added multimedia entertainment services. The popularity of peer group is increasing and one or some members of the peer group need to send data to some or all members of the peer group. The increasing demand for group oriented value added services is driving for efficient multicast service over ad hoc networks. Access control mechanisms need to be deployed to provide guarantee that the unauthorized users cannot access the multicast content. In this paper, we present a topology aware key management and distribution scheme for secure overlay multicast over MANET to address node mobility related issues for multicast key management. We use overlay approach for key distribution and our objective is to keep communication overhead low for key management and distribution. We also incorporate reliability using explicit acknowledgments with the key distribution scheme. Through simulations we show that the proposed key management scheme has low communication overhead for rekeying and improves the reliability of key distribution.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Three algorithms for reactive power optimization are proposed in this paper with three different objective functions. The objectives in the proposed algorithm are to minimize the sum of the squares of the voltage deviations of the load buses, minimization of sum of squares of voltage stability L-indices of load buses (:3L2) algorithm, and also the objective of system real power loss (Ploss) minimization. The approach adopted is an iterative scheme with successive power flow analysis using decoupled technique and solution of the linear programming problem using upper bound optimization technique. Results obtained with all these objectives are compared. The analysis of these objective functions are presented to illustrate their advantages. It is observed comparing different objective functions it is possible to identify critical On Load Tap Changers (OLTCs) that should be made manual to avoid possible voltage instability due to their operation based on voltage improvement criteria under heavy load conditions. These algorithms have been tested under simulated conditions on few test systems. The results obtained on practical systems of 24-node equivalent EHV Indian power network, and for a 205 bus EHV system are presented for illustration purposes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Indian region is presently the second region after the Neotropics in terms of diversity of phalangopsid crickets. Yet their study is impeded by the lack of necessary taxonomic tools for taxon identification. In the present paper, all generic diagnoses are clarified, using morphological and genitalic characters; female genitalia are described and illustrated for all genera with known females. New taxa are described from southern India: Kempiola flavipunctatus Desutter-Grandcolas n. sp., Opiliosina meridionalis Desutter-Grandcolas n. gen., n. sp., Phalangopsina bolivari Desutter-Grandcolas n. sp., P. chopardi Desutter-Grandcolas n. sp., P. gravelyi Desutter-Grandcolas n. sp., and Speluncasina Desutter-Grandcolas n. gen. The list of phalangopsid crickets from the Indian Region is updated, and a key to phalangopsid genera proposed. A lectotype and a paralectotype are designated to fix the name of Phalangopsina dubia (Bolivar, 1900). Opilionacris annandalei Chopard, 1928, previously transferred to the African genus Phaeophilacris Walker, 1871, is transferred to the genus Speluncasina Desutter-Grandcolas n. gen., while Larandopsis jharnae Bhowmik, 1981 and L. newguineae Bhowmik, 1981 described from New Guinea are transferred to the eneopterine genus Lebinthus Stal, 1877. Finally Luzaropsis confusa Chopard, 1969 is removed from its synonymy with L. ferruginea Walker, 1871.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We consider the problem of secure communication in mobile Wireless Sensor Networks (WSNs). Achieving security in WSNs requires robust encryption and authentication standards among the sensor nodes. Severe resources constraints in typical Wireless Sensor nodes hinder them in achieving key agreements. It is proved from past studies that many notable key management schemes do not work well in sensor networks due to their limited capacities. The idea of key predistribution is not feasible considering the fact that the network could scale to millions. We prove a novel algorithm that provides robust and secure communication channel in WSNs. Our Double Encryption with Validation Time (DEV) using Key Management Protocol algorithm works on the basis of timed sessions within which a secure secret key remains valid. A mobile node is used to bootstrap and exchange secure keys among communicating pairs of nodes. Analysis and simulation results show that the performance of the DEV using Key Management Protocol Algorithm is better than the SEV scheme and other related work.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We propose a generic three-pass key agreement protocol that is based on a certain kind of trapdoor one-way function family. When specialized to the RSA setting, the generic protocol yields the so-called KAS2 scheme that has recently been standardized by NIST. On the other hand, when specialized to the discrete log setting, we obtain a new protocol which we call DH2. An interesting feature of DH2 is that parties can use different groups (e.g., different elliptic curves). The generic protocol also has a hybrid implementation, where one party has an RSA key pair and the other party has a discrete log key pair. The security of KAS2 and DH2 is analyzed in an appropriate modification of the extended Canetti-Krawczyk security model.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A modification of the jogged-screw model has been adopted recently by the authors to explain observations of 1/2[110]-type jogged-screw dislocations in equiaxed Ti-48Al under creep conditions. The aim of this study has been to verify and validate the parameters and functional dependencies that have been assumed in this previous work. The original solution has been reformulated to take into account the finite length of the moving jog. This is a better approximation of the tall jog. The substructural model parameters have been further investigated in light of the Finite Length Moving Line (FLML) source approximation. The original model assumes that the critical jog height (beyond which the jog is not dragged) is inversely proportional to the applied stress. By accounting for the fact that there are three competing mechanisms (jog dragging, dipole dragging, dipole bypass) possible, we can arrive at a modified critical jog height. The critical jog height was found to be more strongly stress dependent than assumed previously. The original model assumes the jog spacing to be invariant over the stress range. However, dynamic simulation using a line tension model has shown that the jog spacing is inversely proportional to the applied stress. This has also been confirmed by TEM measurements of jog spacings over a range of stresses. Taylor's expression assumed previously to provide the dependence of dislocation density on the applied stress, has now been confirmed by actual dislocation density measurements. Combining all of these parameters and dependencies, derived both from experiment and theory, leads to an excellent prediction of creep rates and stress exponents. The further application of this model to other materials, and the important role of atomistic and dislocation dynamics simulations in its continued development is also discussed.