989 resultados para residential network
Resumo:
This paper examines a buffer scheme to mitigate the negative impacts of power-conditioned loads on network voltage and transient stabilities. The scheme is based on the use of battery energy-storage systems in the buffers. The storage systems ensure that protected loads downstream of the buffers can ride through upstream voltage sags and swells. Also, by controlling the buffers to operate in either constant impedance or constant power modes, power is absorbed or injected by the storage systems. The scheme thereby regulates the rotor-angle deviations of generators and enhances network transient stability. A computational method is described in which the capacity of the storage systems is determined to achieve simultaneously the above dual objectives of load ride-through and stability enhancement. The efficacy of the resulting scheme is demonstrated through numerical examples.
Resumo:
Toxicity is a major concern for anti-neoplastic drugs, with much of the existing pharmacopoeia being characterized by a very narrow therapeutic index. 'Network-targeted' combination therapy is a promising new concept in cancer therapy, whereby therapeutic index might be improved by targeting multiple nodes in a cell's signaling network, rather than a single node. Here, we examine the potential of this novel approach, illustrating how therapeutic benefit could be achieved with smaller doses of the necessary agents.
Resumo:
Social Networks (SN) users have various privacy requirements to protect their information; to address this issue, a six-stage thematic analysis of scholarly articles related to SN user privacy concerns were synthesized. Then this research combines mixed methods research employing the strengths of quantitative and qualitative research to investigate general SN users, and thus construct a new set of ?ve primary and Twenty-?ve secondary SN user privacy requirements. Such an approach has been rarely used to examine the privacy requirements. Factor analysis results show superior agreement with theoretical predictions and signi?cant improvement over previous alternative models of SN user privacy requirements. This research presented here has the potential to provide for the development of more sophisticated privacy controls which will increase the ability of SN users to: specify their rights in SNs and to determine the protection of their own SN data.
Resumo:
A novel gray-box neural network model (GBNNM), including multi-layer perception (MLP) neural network (NN) and integrators, is proposed for a model identification and fault estimation (MIFE) scheme. With the GBNNM, both the nonlinearity and dynamics of a class of nonlinear dynamic systems can be approximated. Unlike previous NN-based model identification methods, the GBNNM directly inherits system dynamics and separately models system nonlinearities. This model corresponds well with the object system and is easy to build. The GBNNM is embedded online as a normal model reference to obtain the quantitative residual between the object system output and the GBNNM output. This residual can accurately indicate the fault offset value, so it is suitable for differing fault severities. To further estimate the fault parameters (FPs), an improved extended state observer (ESO) using the same NNs (IESONN) from the GBNNM is proposed to avoid requiring the knowledge of ESO nonlinearity. Then, the proposed MIFE scheme is applied for reaction wheels (RW) in a satellite attitude control system (SACS). The scheme using the GBNNM is compared with other NNs in the same fault scenario, and several partial loss of effect (LOE) faults with different severities are considered to validate the effectiveness of the FP estimation and its superiority.
Resumo:
Discussions of public diplomacy in recent years have paid a growing amount of attention to networks. This network perspective is understood to provide insights into various issues of public diplomacy, such as its effects, credibility, reputation, identity and narratives. This paper applies the network idea to analyse China’s Confucius Institutes initiative. It understands Confucius Institutes as a global network and argues that this network structure has potential implications for the operation of public and cultural diplomacy that are perhaps underestimated in existing accounts of Chinese cultural diplomacy. In particular, it is noted that the specific setup of Confucius Institutes requires the engagement of local stakeholders, in a way that is less centralised and more networked than comparable cultural diplomacy institutions. At the same time, the development of a more networked for of public cultural diplomacy is challenged in practice by both practical issues and the configuration of China’s state-centric public diplomacy system informed by the political constitution of the Chinese state.
Resumo:
This thesis explored traffic characteristics at the aggregate level for area-wide traffic monitoring of large urban area. It focused on three aspects: understanding a macroscopic network performance under real-time traffic information provision, measuring traffic performance of a signalised arterial network using available data sets, and discussing network zoning for monitoring purposes in the case of Brisbane, Australia. This work presented the use of probe vehicle data for estimating traffic state variables, and illustrated dynamic features of regional traffic performance of Brisbane. The results confirmed the viability and effectiveness of area-wide traffic monitoring.
Resumo:
Abstract: Social network technologies, as we know them today have become a popular feature of everyday life for many people. As their name suggests, their underlying premise is to enable people to connect with each other for a variety of purposes. These purposes however, are generally thought of in a positive fashion. Based on a multi-method study of two online environments, Habbo Hotel and Second Life, which incorporate social networking functionality, we she light on forms of what can be conceptualized as antisocial behaviours and the rationales for these. Such behaviours included: scamming, racist/homophobic attacks, sim attacks, avatar attacks, non-conformance to contextual norms, counterfeiting and unneighbourly behaviour. The rationales for sub behaviours included: profit, fun, status building, network disruption, accidental acts and prejudice. Through our analysis we are able to comment upon the difficulties of defining antisocial behaviour in such environments, particularly when such environments are subject to interpretation vis their use and expected norms. We also point to the problems we face in conducting our public and private lives given the role ICTs are playing in the convergence of these two spaces and also the convergence of ICTs themselves.
Resumo:
STAC is a mobile application (app) designed to promote the benefits of climate-aware urban development in Subtropical environments. Although, STAC is primarily tool for understanding climate efficient buildings in Brisbane, Australia, it also demonstrates how other exemplary buildings operate in other subtropical cities of the world. The STAC research and development team applied research undertaken by the Centre for Subtropical Design (Brisbane) to profile buildings past and present that have contributed to the creation of a vibrant society, a viable economy, a healthy environment, and an authentic sense of place. In collaboration with researchers from the field of Interaction Design, this knowledge and data was collated, processed and curated for presentation via a custom mobile application designed to distribute this important research for review and consideration on-location in local settings and for comparison across all other global subtropical regions and projects identified by this research. This collaboration adopted a Design-based Research (DBR) Methodology guided by the main tenets of research and design iteration and cross-discipline collaboration in real-world settings, resulting in the formulation of contextually-sensitive design principles, theories, and tools for design intervention. Combined with significant context review of available technology and data and subsequent case study analysis of exemplar design applications.
Resumo:
This paper presents a case study for the application of a Linear Engineering Asset Renewal decision support software tool (LinEAR) at a water distribution network in Australia. This case study examines how the LinEAR can assist water utilities to minimise their total pipeline management cost, to make a long-term budget based on mathematically predicted expenditure, and to present calculated evidence for supporting their expenditure requirements. The outcomes from the study on pipeline renewal decision support demonstrate that LinEAR can help water utilities to improve the decision process and save renewal costs over a long-term by providing an optimum renewal schedules. This software can help organisation to accumulate technical knowledge and prediction future impact of the decision using what-if analysis.
Resumo:
This article examines the new Property Occupations Act 2014 (POA) and relevant provisions of the Agents Financial Administration Act 2014 (AFAA) and the impacts for property practitioners. The Acts are due to commence later in 2014 once regulations and relevant forms are drafted. Coinciding with the commencement of the Acts further versions of the REIQ Houses and Land Contract and REIQ Community Title Contract will also be released. The POA introduces changes for licencing of real estate agents, property developers and resident letting agents as well as significant changes for the contract formation process. The AFAA includes the trust account and claim fund provisions of PAMDA, which avoids duplication of these provisions across each of the industry-specific Bills. The most significant change is to the process for making a claim against the fund for the conduct of property agents.
Resumo:
This paper introduces a new method to automate the detection of marine species in aerial imagery using a Machine Learning approach. Our proposed system has at its core, a convolutional neural network. We compare this trainable classifier to a handcrafted classifier based on color features, entropy and shape analysis. Experiments demonstrate that the convolutional neural network outperforms the handcrafted solution. We also introduce a negative training example-selection method for situations where the original training set consists of a collection of labeled images in which the objects of interest (positive examples) have been marked by a bounding box. We show that picking random rectangles from the background is not necessarily the best way to generate useful negative examples with respect to learning.