930 resultados para Harmonic mitigation


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Risks exist in every form of construction project. The risks associated with construction projects are often diverse and varied and the management of these risks is nowadays considered compulsory in order to achieve project success. This paper analyses the diverse strategies of risk mitigation that have been employed in construction projects. These strategies are classified into analysed categories of procurement strategies. contingency and co-operative approach along with the utilisation of a designated risk manager. The analysis showed that in order to improve risk mitigation within the construction industry, there is a requirement tor an industry based standard. This standard will improve the efficiency and effectiveness of the risk mitigation response technique to risk management.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

With the purpose of solving the real solutions number of the nonlinear transcendental equations in the selective harmonic eliminated PWM (SHEPWM) technology, the nonlinear transcendental equations were transformed to a set of polynomial equations with a set of inequality constraints using the multiple-angle formulas, an analytic method based on semi-algebraic systems machine proving algorithm was proposed to classify the real solution number of the switching angles. The complete classifications of the real solution number and the analytic boundary point of the single phase and three phases SHEPWM inverter with switch points of N=3 and the single phase SHEPWM inverter with switch points of N=4 are obtained. The results indicate that the relationship between the modulation ratio and the real solution number can be demonstrated theoretically by this method, which has great implications for the solution procedure of switching angles and the improvement of harmonic elimination effects of the inverter.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents the analysis of a choice experiment designed to estimate willingness-to-pay (WTP) to mitigate damages caused by invasive plant species in a rural community of Nepal. In order to address the cash constraints problem in a subsistence economy, two payment attributes, labour contribution and membership fee, were included in the choice sets. The results reveal that rural farmers have significant WTP for forest management activities, in terms of both cash and labour contributions. The results also suggest that rural farmers value their time in this context at a different rate from the current wage rate.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The analysis provided in this research ainis to improve the understanding of the structure and nature of organisations in the transport industry so that policy-makers and researchers can be informed about the impact of size of an organisation on its preparation for the transition to a low carboneconomy. Descriptive and infetential are calculated to aid in understanding how organisations manage their C02mitigation action and carbon emission disclosure. It is noted that small and medium sized companies appear to be less financially capable of responding to the challenges of transiting to a low carbon environment that large companies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Magnesium alloy ZE41 (Mg-Zn-RE-Zr), which is used extensively in the aerospace industry, possesses excellent mechanical properties albeit poor corrosion resistance. This work investigates the mechanism of corrosion, and the interaction between the grain boundary intermetallic phases, the zirconium (Zr)-rich regions within the grains and the bulk Mg rich matrix in both the as-cast and heat-treated conditions. The results of optical and scanning electron microscopy (SEM) show the importance of the microstructure in the initiation and propagation of corrosion in an aqueous environment. The Zr-rich regions play a distinct role in the early stages of corrosion with this alloy. The second part of this work investigates the interaction of two different ionic liquids (ILs) with the surface of the ZE41 alloy. ILs based on trihexyltetradecylphosphonium (P 6,6,6,14) coupled with either diphenylphosphate (DPP) or bis(trifluoromethanesulfonyl) amide (Tf 2N) have been shown to react with Mg alloy surfaces, leading to the formation of a surface film that can improve the corrosion resistance of the alloy. The interaction of the ILs with the ZE41 surface has been investigated by optical microscopy and SEM. Surface characterization has been performed using Time of Flight-Secondary Ion Mass Spectrometry (ToF-SIMS) and X-ray Photoelectron Spectroscopy (XPS). The surface characterization and microscopy revealed the preferential interaction with the grain boundaries and grain boundary phases. Thus the morphology and microstructure of the Mg surface seems critical in determining the nature of the interaction with the IL. The corrosion protection of the IL films formed on the ZE41 surface was investigated by SEM and potentiodynamic polarisation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Insider threat has become a serious information security issues within organizations. In this paper, we analyze the problem of insider threats with emphases on the Cloud computing platform. Security is one of the major anxieties when planning to adopt the Cloud. This paper will contribute towards the conception of mitigation strategies that can be relied on to solve the malicious insider threats. While Cloud computing relieves organizations from the burden of the data management and storage costs, security in general and the malicious insider threats in particular is the main concern in cloud environments. We will analyses the existing mitigation strategies to reduce malicious insiders threats in Cloud computing.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

With the increasing trends of mobile interactions, voice authentication applications are in a higher demand, giving rise to new rounds of research activities. Authentication is an important security mechanism that requires the intended communication parties to present valid credentials to the communication network. In a stronger sense, all the involved parties are required to be authenticated to one another (mutual authentication). In the voice authentication technique described in this paper, the voice characteristics of an intended individual wishing to take part in a communication channel will be classified and processed. This involves a low overhead voice authentication scheme, which features equalization and scaling of the voice frequency harmonics. The performance of this system is discussed in a Labview 8.5 visual development environment, following a complete security analysis. © 2013 Elsevier Ltd. All rights reserved.