962 resultados para Static voltage stability
Resumo:
A novel intelligent online demand side management system is proposed for peak load management in low-voltage distribution networks. This method uses low-cost controllers with low-bandwidth two-way communication installed in custumers’ premises and at distribution transformers to manage the peak load while maximising customer satisfaction. A multi-objective decision making process is proposed to select the load(s) to be delayed or controlled. The efficacy of the proposed control system is verified by simulation of three different feeder types.
Resumo:
Stochastic differential equations (SDEs) arise fi om physical systems where the parameters describing the system can only be estimated or are subject to noise. There has been much work done recently on developing numerical methods for solving SDEs. This paper will focus on stability issues and variable stepsize implementation techniques for numerically solving SDEs effectively.
Resumo:
Multilevel converters, because of the benefits they attract in generating high quality output voltage, are used in several applications. Various modulation and control techniques are introduced by several researchers to control the output voltage of the multilevel converters like space vector modulation and harmonic elimination (HE) methods. Multilevel converters may have a DC link with equal or unequal DC voltages. In this study a new HE technique based on the HE method is proposed for multilevel converters with unequal DC link voltage. The DC link voltage levels are considered as additional variables for the HE method and the voltage levels are defined based on the HE results. Increasing the number of voltage levels can reduce lower order harmonic content because of the fact that more variables are created. In comparison to previous methods, this new technique has a positive effect on the output voltage quality by reducing its total harmonic distortion, which must take into consideration for some applications such as uninterruptable power supply, motor drive systems and piezoelectric transducer excitation. In order to verify the proposed modulation technique, MATLAB simulations and experimental tests are carried out for a single-phase four-level diode-clamped converter.
Resumo:
Smartphones are getting increasingly popular and several malwares appeared targeting these devices. General countermeasures to smartphone malwares are currently limited to signature-based antivirus scanners which efficiently detect known malwares, but they have serious shortcomings with new and unknown malwares creating a window of opportunity for attackers. As smartphones become host for sensitive data and applications, extended malware detection mechanisms are necessary complying with the corresponding resource constraints. The contribution of this paper is twofold. First, we perform static analysis on the executables to extract their function calls in Android environment using the command readelf. Function call lists are compared with malware executables for classifying them with PART, Prism and Nearest Neighbor Algorithms. Second, we present a collaborative malware detection approach to extend these results. Corresponding simulation results are presented.
Resumo:
Smartphones become very critical part of our lives as they offer advanced capabilities with PC-like functionalities. They are getting widely deployed while not only being used for classical voice-centric communication. New smartphone malwares keep emerging where most of them still target Symbian OS. In the case of Symbian OS, application signing seemed to be an appropriate measure for slowing down malware appearance. Unfortunately, latest examples showed that signing can be bypassed resulting in new malware outbreak. In this paper, we present a novel approach to static malware detection in resource-limited mobile environments. This approach can be used to extend currently used third-party application signing mechanisms for increasing malware detection capabilities. In our work, we extract function calls from binaries in order to apply our clustering mechanism, called centroid. This method is capable of detecting unknown malwares. Our results are promising where the employed mechanism might find application at distribution channels, like online application stores. Additionally, it seems suitable for directly being used on smartphones for (pre-)checking installed applications.
Resumo:
The drawdown of reservoirs can significantly affect the stability of upstream slopes of earth dams. This is due to the removal of the balancing hydraulic forces acting on the dams and the undrained condition within the upstream slope soils. In such scenarios, the stability of the slopes can be influenced by a range of factors including drawdown rates, slope inclination and soil properties. This paper investigates the effects of drawdown rate, saturated hydraulic conductivity and unsaturated shear strength of dam materials on the stability of the upstream slope of an earth dam. In this study, the analysis of pore-water pressure changes within the upstream slope during reservoir drawdown was coupled with the slope stability analysis using the general limit equilibrium method. The results of the analysis suggested that a decrease in the reservoir water level caused the stability of the upstream slope to decrease. The dam embankment constructed with highly permeable soil was found to be more stable during drawdown scenarios, compared to others. Further, lower drawdown rates resulted in a higher safety factor for the upstream slope. Also, the safety factor of the slope calculated using saturated shear strength properties of the dam materials was slightly higher than that calculated using unsaturated shear strength properties. In general, for all the scenarios analysed, the lowest safety factor was found to be at the reservoir water level of about 2/3 of drawdown regime.
Resumo:
In the last decade, smartphones have gained widespread usage. Since the advent of online application stores, hundreds of thousands of applications have become instantly available to millions of smart-phone users. Within the Android ecosystem, application security is governed by digital signatures and a list of coarse-grained permissions. However, this mechanism is not fine-grained enough to provide the user with a sufficient means of control of the applications' activities. Abuse of highly sensible private information such as phone numbers without users' notice is the result. We show that there is a high frequency of privacy leaks even among widely popular applications. Together with the fact that the majority of the users are not proficient in computer security, this presents a challenge to the engineers developing security solutions for the platform. Our contribution is twofold: first, we propose a service which is able to assess Android Market applications via static analysis and provide detailed, but readable reports to the user. Second, we describe a means to mitigate security and privacy threats by automated reverse-engineering and refactoring binary application packages according to the users' security preferences.
Resumo:
As a novel sensitive element and due to its advantages of immunity to electrical interference, distributed measurement, etc., fiber Bragg grating (FBG) has been researched widely. To realize the substitution of high accurate electronic temperature sensors, high sensitive FBG temperature sensors can be made by taking advantage of its characters of being sensitive to both temperature and strain. Although there are reports about high sensitive FBG temperature sensors, however, few about their stability have been done. We manufactured a high sensitive FBG temperature sensor, and put it together with an average FBG temperature sensor and an electronic crystal temperature sensor into a stainless steel container filled by water to observe the room temperature change. By comparing their results in two weeks, we have found out that: although the high sensitive FBG temperature sensor is in much better agreement with the electronic crystal sensor than the average FBG sensor is, it has occurred some small drifts. Because the drifts appeared in the process of further pulling the FBG, it might be a result of the slip of the FBG fixing points. This contributes some good experiences to the application of FBG in high accuracy temperature measurement.
Resumo:
Static anaylsis represents an approach of checking source code or compiled code of applications before it gets executed. Chess and McGraw state that static anaylsis promises to identify common coding problems automatically. While manual code checking is also a form of static analysis, software tools are used in most cases in order to perform the checks. Chess and McGraw additionaly claim that good static checkers can help to spot and eradicate common security bugs.
Resumo:
Sedimentary palygorskite (SP) and hydrothermal palygorskite (HP) were characterized by XRF, TG/DSC, andXRD. The total iron and dissociative iron in palygorskite were detected using spectrophotometry. The results showed that about 3.57 wt% of Fe2O3 was detected in SP in contrast with 0.4 wt% in HP. SP was a Fe-substituted palygorskite, and HP was an Al-rich palygorskite. The occurrence of Fe substitution in SP resulted in two mass loss steps of coordinated water and resulted in a larger d spacing. The SP showed greater thermal stability than the HP. It was proposed the change of (200) diffraction peak and (240) diffraction peak reflect changes of tetrahedral and octahedral structures in palygorskite.
Resumo:
The optimum parameters for synthesis of zeolite NaA based on metakaolin were investigated according to results of cation exchange capacity and static water adsorption of all synthesis products and selected X-ray diffraction (XRD). Magnetic zeolite NaA was synthesized by adding Fe3O4 in the precursor of zeolite. Zeolite NaA and magnetic zeolite NaA were characterized with scanning electron microscopy (SEM) and XRD. Magnetic zeolite NaA with different Fe3O4 loadings was prepared and used for removal of heavy metals (Cu2+, Pb2+). The results show the optimum parameters for synthesis zeolite NaA are SiO2/Al2O3 = 2.3, Na2O/SiO2 = 1.4, H2O/Na2O = 50, crystallization time 8 h, crystallization temperature 95 �C. The addition of Fe3O4 makes the NaA zeolite with good magnetic susceptibility and good magnetic stability regardless of the Fe3O4 loading, confirming the considerable separation efficiency. Additionally, Fe3O4 loading had a little effect on removal of heavy metal by magnetic zeolite, however, the adsorption capacity still reaches 2.3 mmol g�1 for Cu2+, Pb2+ with a removal efficiency of over 95% in spite of 4.7% Fe3O4 loading. This indicates magnetic zeolite can be used to remove metal heavy at least Cu2+, Pb2+ from water with metallic contaminants and can be separated easily after a magnetic process.
Resumo:
Chromium oxyhydroxide nanomaterials with narrow size-distribution were synthesised through a simple hydrothermal method. Experimental conditions, such as reaction duration and pH values of the precipitation process and hydrothermal treatment played important roles in determining the nature of the final product chromium oxyhydroxide nanomaterials. The effect of these synthesis parameters were studied with the assistance of X-ray diffraction, scanning electron microscopy, X-ray photoelectron spectroscopy and thermogravimetric analyses. This research has developed a controllable synthesis of Chromium oxyhydroxide nanomaterials from Chromium oxide colloids.
Resumo:
In power hardware in the loop (PHIL) simulations, a real-time simulated power system is interfaced to a piece of hardware, usually called hardware under test (HuT). A PHIL test can be realized using several simulation tools. Among them Real Time Digital Simulator (RTDS) is an ideal tool to perform complex power system simulations in near real-time. Stable operation of the entire system, along with the accuracy of simulation results are the main concerns regarding a PHIL simulation. In this paper, a simulated power network on RTDS will be interfaced to HuT through a voltage source converter (VSC). Issues around stability and other interface problems are studied and a new method to stabilize some unstable PHIL cases is proposed. PHIL simulation results in PSCAD and RSCAD are presented.
Resumo:
Context: It has been theorized that a positive Trendelenburg test (TT) indicates weakness of the stance hip-abductor (HABD) musculature, results in contralateral pelvic drop, and represents impaired load transfer, which may contribute to low back pain. Few studies have tested whether weakness of the HABDs is directly related to the magnitude of pelvic drop (MPD). Objective: To examine the relationship between HABD strength and MPD during the static TT and during walking for patients with nonspecific low back pain (NSLBP) and healthy controls (CON). A secondary purpose was to examine this relationship in NSLBP after a 3-wk HABD-strengthening program. Design: Quasi-experimental. Setting: Clinical research laboratory. Participants: 20 (10 NSLBP and 10 CON). Intervention: HABD strengthening. Main Outcome Measures: Normalized HABD strength, MPD during TT, and maximal pelvic frontal-plane excursion during walking. Results: At baseline, the NSLBP subjects were significantly weaker (31%; P = .03) than CON. No differences in maximal pelvic frontal-plane excursion (P = .72), right MPD (P = 1.00), or left MPD (P = .40) were measured between groups. During the static TT, nonsignificant correlations were found between left HABD strength and right MPD for NSLBP (r = -.32, P = .36) and CON (r = -.24, P = .48) and between right HABD strength and left MPD for NSLBP (r = -.24, P = .50) and CON (r = -.41, P = .22). Nonsignificant correlations were found between HABD strength and maximal pelvic frontal-plane excursion for NSLBP (r = -.04, P = .90) and CON (r = -.14, P = .68). After strengthening, NSLBP demonstrated significant increases in HABD strength (12%; P = .02), 48% reduction in pain, and no differences in MPD during static TT and maximal pelvic frontal-plane excursion compared with baseline. Conclusions: HABD strength was poorly correlated to MPD during the static TT and during walking in CON and NSLBP. The results suggest that HABD strength may not be the only contributing factor in controlling pelvic stability, and the static TT has limited use as a measure of HABD function.
Resumo:
Anisotropic damage distribution and evolution have a profound effect on borehole stress concentrations. Damage evolution is an irreversible process that is not adequately described within classical equilibrium thermodynamics. Therefore, we propose a constitutive model, based on non-equilibrium thermodynamics, that accounts for anisotropic damage distribution, anisotropic damage threshold and anisotropic damage evolution. We implemented this constitutive model numerically, using the finite element method, to calculate stress–strain curves and borehole stresses. The resulting stress–strain curves are distinctively different from linear elastic-brittle and linear elastic-ideal plastic constitutive models and realistically model experimental responses of brittle rocks. We show that the onset of damage evolution leads to an inhomogeneous redistribution of material properties and stresses along the borehole wall. The classical linear elastic-brittle approach to borehole stability analysis systematically overestimates the stress concentrations on the borehole wall, because dissipative strain-softening is underestimated. The proposed damage mechanics approach explicitly models dissipative behaviour and leads to non-conservative mud window estimations. Furthermore, anisotropic rocks with preferential planes of failure, like shales, can be addressed with our model.