967 resultados para Protection systems
Resumo:
Purpose – The international nuclear community continues to face the challenge of managing both the legacy waste and the new wastes that emerge from ongoing energy production. The UK is in the early stages of proposing a new convention for its nuclear industry, that is: waste minimisation through closely managing the radioactive source which creates the waste. This paper proposes a new technique (called waste and source material operability study (WASOP)) to qualitatively analyse a complex, waste-producing system to minimise avoidable waste and thus increase the protection to the public and the environment. Design/methodology/approach – WASOP critically considers the systemic impact of up and downstream facilities on the minimisation of nuclear waste in a facility. Based on the principles of HAZOP, the technique structures managers' thinking on the impact of mal-operations in interlinking facilities in order to identify preventative actions to reduce the impact on waste production of those mal-operations.' Findings – WASOP was tested with a small group of experienced nuclear regulators and was found to support their qualitative examination of waste minimisation and help them to work towards developing a plan of action. Originality/value – Given the newness of this convention, the wider methodology in which WASOP sits is still in development. However, this paper communicates the latest thinking from nuclear regulators on decision-making methodology for supporting waste minimisation and is hoped to form part of future regulatory guidance. WASOP is believed to have widespread potential application to the minimisation of many other forms of waste, including that from other energy sectors and household/general waste.
Resumo:
Vaccination remains a key tool in the protection and eradication of diseases. However, the development of new safe and effective vaccines is not easy. Various live organism based vaccines currently licensed, exhibit high efficacy; however, this benefit is associated with risk, due to the adverse reactions found with these vaccines. Therefore, in the development of vaccines, the associated risk-benefit issues need to be addressed. Sub-unit proteins offer a much safer alternative; however, their efficacy is low. The use of adjuvanted systems have proven to enhance the immunogenicity of these sub-unit vaccines through protection (i.e. preventing degradation of the antigen in vivo) and enhanced targeting of these antigens to professional antigen-presenting cells. Understanding of the immunological implications of the related disease will enable validation for the design and development of potential adjuvant systems. Novel adjuvant research involves the combination of both pharmaceutical analysis accompanied by detailed immunological investigations, whereby, pharmaceutically designed adjuvants are driven by an increased understanding of mechanisms of adjuvant activity, largely facilitated by description of highly specific innate immune recognition of components usually associated with the presence of invading bacteria or virus. The majority of pharmaceutical based adjuvants currently being investigated are particulate based delivery systems, such as liposome formulations. As an adjuvant, liposomes have been shown to enhance immunity against the associated disease particularly when a cationic lipid is used within the formulation. In addition, the inclusion of components such as immunomodulators, further enhance immunity. Within this review, the use and application of effective adjuvants is investigated, with particular emphasis on liposomal-based systems. The mechanisms of adjuvant activity, analysis of complex immunological characteristics and formulation and delivery of these vaccines are considered.
Resumo:
Computer programs have been developed to enable the coordination of fuses and overcurrent relays for radial power systems under estimated fault current conditions. The grading curves for these protection devices can be produced on a graphics terminal and a hard copy can be obtained. Additional programs have also been developed which could be used to assess the validity of relay settings (obtained under the above conditions) when the transient effect is included. Modelling of a current transformer is included because transformer saturation may occur if the fault current is high, and hence the secondary current is distorted. Experiments were carried out to confirm that distorted currents will affect the relay operating time, and it is shown that if the relay current contains only a small percentage of harmonic distortion, the relay operating time is increased. System equations were arranged to enable the model to predict fault currents with a generator transformer incorporated in the system, and also to include the effect of circuit breaker opening, arcing resistance, and earthing resistance. A fictitious field winding was included to enable more accurate prediction of fault currents when the system is operating at both lagging and leading power factors prior to the occurrence of the fault.
Resumo:
This study is concerned with the mechanisms of growth and wear of protective oxide films formed under various tribological conditions. In the study three different tribological systems are examined in each of which oxidational wear is the dominant equilibrium mode. These are an unlubricated steel on steel system sliding at low and elevated temperatures, a boundary lubricated aluminium bronze on steel system and an unlubricated reciprocating sliding 9% Cr steel system operated at elevated temperature, in an atmosphere of carbon dioxide. The results of mechanical measurements of wear and friction are presented for a range of conditions of load, speed and temper.ature for the systems, together with the results of extensive examinations of the surfaces and sub surfaces by various physical methods of analysis. The major part of the thesis, however, is devoted to the development and application of surface models and theoretical quantative expressions in order to explain the observed oxidational wear phenomena. In this work, the mechanisms of formation of load bearing ox ide plateaux are described and are found to be dependent on system geometry and environment. The relative importance of ''in contact" and "out of contact" oxidation is identified together with growth rate constants appropriate to the two situations. Hypotheses are presented to explain the mechanisms of removal of plateaux to form wear debris. The latter hypotheses include the effects of cyclic stressing and dislocation accumulation, together with effects associated with the kinetics of growth and physical properties of the various oxides. The proposed surf ace mode1s have led to the develop ment of quantitative expressions for contact temperature, unlubricated wear rates, boundary lubricated wear rates and the wear of rna ter ial during the transition from severe to mild wear. In general theoretical predictions from these expressions are in very good agreement with experimental values.
Resumo:
The multiterminal dc wind farm is a promising topology with a voltage-source inverter (VSI) connection at the onshore grid. Voltage-source converters (VSCs) are robust to ac-side fault conditions. However, they are vulnerable to dc faults on the dc side of the converter. This paper analyzes dc faults, their transients, and the resulting protection issues. Overcurrent faults are analyzed in detail and provide an insight into protection system design. The radial wind farm topology with star or string connection is considered. The outcomes may be applicable for VSCs in the multi-VSC dc wind farm collection grid and VSC-based high-voltage direct current (HVDC) offshore transmission systems.
Resumo:
In our attempts to thwart the unwanted attentions of microbes by prophylactic and therapeutic vaccination, the knowledge of interactions at the molecular level may prove to be an invaluable asset. This article examines how particulate delivery systems such as liposomes and polymer microspheres can be applied in the light of recent advances in immunological understanding. Some of the biological interactions of these delivery systems are discussed with relevance for antigen trafficking and molecular pathways of immunogenicity and emphasis on the possible interaction of liposomal components. In particular, traditional concepts such as antigen protection, delivery to antigen presenting cells and depot formation remain important aspects, whilst the inclusion of selected co-adjuvants and enhanced delivery of these moieties in conjunction with antigen now has a firm rationale. © 2006 The Authors.
Conceptual Model and Security Requirements for DRM Techniques Used for e-Learning Objects Protection
Resumo:
This paper deals with the security problems of DRM protected e-learning content. After a short review of the main DRM systems and methods used in e-learning, an examination is made of participators in DRM schemes (e-learning object author, content creator, content publisher, license creator and end user). Then a conceptual model of security related processes of DRM implementation is proposed which is improved afterwards to reflect some particularities in DRM protection of e-learning objects. A methodical way is used to describe the security related motives, responsibilities and goals of the main participators involved in the DRM system. Taken together with the process model, these security properties are used to establish a list of requirements to fulfill and a possibility for formal verification of real DRM systems compliance with these requirements.
Resumo:
The paper represents a verification of a previously developed conceptual model of security related processes in DRM implementation. The applicability of established security requirements in practice is checked as well by comparing these requirements to four real DRM implementations (Microsoft Media DRM, Apple's iTunes, SunnComm Technologies’s MediaMax DRM and First4Internet’s XCP DRM). The exploited weaknesses of these systems resulting from the violation of specific security requirements are explained and the possibilities to avoid the attacks by implementing the requirements in designing step are discussed.
Resumo:
This article is dedicated to the vital problem of the creation of GIS-systems for the monitoring, prognostication and control of technogenic natural catastrophes. The decrease of risks, the protection of economic objects, averting the human victims, caused by the dynamism of avalanche centers, depends on the effectiveness of the prognostication procedures of avalanche danger used. In the article the structure of a prognostication subsystem information input is developed and the technology for the complex forecast of avalanche-prone situations is proposed.
Resumo:
All information systems have to be protected. As the number of information objects and the number of users increase the task of information system’s protection becomes more difficult. One of the most difficult problems is access rights assignment. This paper describes the graph model of access rights inheritance. This model takes into account relations and dependences between different objects and between different users. The model can be implemented in the information systems controlled by the metadata, describing information objects and connections between them, such as the systems based on CASE-technology METAS.
Resumo:
This paper provides a discussion on future direct current (DC) network development in terms of system protection under DC-side fault scenarios. The argument between appropriate DC circuit breaker and new DC fault-tolerant converters is discussed after a review on DC technology development and bottleneck issues that require proper solutions. The overcurrent/cost curve of power-electronic DC circuit breakers (CB) superimposed to voltage-source converter (VSC) systems is derived and compared with other possible fault-tolerant power conversion options. This in-advance planning of protection capability is essential for the future development of DC networks.
Resumo:
The PMSG-based wind power generation system protection is presented in this paper. For large-scale systems, a voltagesource converter rectifier is included. Protection circuits for this topology are studied with simulation results for cable permanent fault conditions. These electrical protection methods are all in terms of dumping redundant energy resulting from disrupted path of power delivery. Pitch control of large-scale wind turbines are considered for effectively reducing rotor shaft overspeed. Detailed analysis and calculation of damping power and resistances are presented. Simulation results including fault overcurrent, DC-link overvoltage and wind turbine overspeed are shown to illustrate the system responses under different protection schemes to compare their application and effectiveness.
Resumo:
A cikkben a szerzők megvizsgálják a tudásmenedzsment komplex rendszerfejlesztési projektekben és az informatikai auditban játszott szerepét. Fő céljuk, hogy a tudásmenedzsment-rendszerek fejlesztéséhez kapcsolódó audit támogatására értékelési modellt készítsenek. Cikkükben megvizsgálják a tudásmenedzsmentnek az IT-auditban játszott általános szerepét, az auditban érintett tudásvagyon védelmének kérdését, a tudásmenedzsment-folyamatok szerepét a rendszerfejlesztésben (auditszempontból), a kontrollok implementálását, valamint a tudásmenedzsment és az IT-audittal kapcsolatos szabványok, módszertanok kapcsolatát. Az eredmények illusztrálására egy az Európai Unió 7. keretprogramjából finanszírozott nemzetközi projekt (GUIDE, IST–2003–507498) szolgál. ________________ Authors investigate the role of knowledge management in complex system development projects and IT audit. The primary goal is to provide an evaluation framework for an assessment of the development of special knowledge management solutions. On the other hand IT audit itself is a knowledge-dependent activity. The paper analyses the role of knowledge management in IT audit in general, the protection of knowledge assets during an audit, the role of knowledge management processes during system development (from audit point of view) and in the implementation of controls, the relationship of knowledge management with audit standards. Authors investigate the specialities of KM developments from audit point of view (particularly important aspects of audit, specific control objectives) A case study, based on experiences gained from GUIDE project (IST-2003-507498 funded by the European Commission’s 6th Framework Programme) illustrates the findings.
Resumo:
This work is the first work using patterned soft underlayers in multilevel three-dimensional vertical magnetic data storage systems. The motivation stems from an exponentially growing information stockpile, and a corresponding need for more efficient storage devices with higher density. The world information stockpile currently exceeds 150EB (ExaByte=1x1018Bytes); most of which is in analog form. Among the storage technologies (semiconductor, optical and magnetic), magnetic hard disk drives are posed to occupy a big role in personal, network as well as corporate storage. However; this mode suffers from a limit known as the Superparamagnetic limit; which limits achievable areal density due to fundamental quantum mechanical stability requirements. There are many viable techniques considered to defer superparamagnetism into the 100's of Gbit/in2 such as: patterned media, Heat-Assisted Magnetic Recording (HAMR), Self Organized Magnetic Arrays (SOMA), antiferromagnetically coupled structures (AFC), and perpendicular magnetic recording. Nonetheless, these techniques utilize a single magnetic layer; and can thusly be viewed as two-dimensional in nature. In this work a novel three-dimensional vertical magnetic recording approach is proposed. This approach utilizes the entire thickness of a magnetic multilayer structure to store information; with potential areal density well into the Tbit/in2 regime. ^ There are several possible implementations for 3D magnetic recording; each presenting its own set of requirements, merits and challenges. The issues and considerations pertaining to the development of such systems will be examined, and analyzed using empirical and numerical analysis techniques. Two novel key approaches are proposed and developed: (1) Patterned soft underlayer (SUL) which allows for enhanced recording of thicker media, (2) A combinatorial approach for 3D media development that facilitates concurrent investigation of various film parameters on a predefined performance metric. A case study is presented using combinatorial overcoats of Tantalum and Zirconium Oxides for corrosion protection in magnetic media. ^ Feasibility of 3D recording is demonstrated, and an emphasis on 3D media development is emphasized as a key prerequisite. Patterned SUL shows significant enhancement over conventional "un-patterned" SUL, and shows that geometry can be used as a design tool to achieve favorable field distribution where magnetic storage and magnetic phenomena are involved. ^