968 resultados para Energy functions


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Bats (Chiroptera) are generally awkward crawlers, but the common vampire bat (Desmodus rotundus) and the New Zealand short-tailed bat (Mystacina tuberculata) have independently evolved the ability to manoeuvre well on the ground. In this study we describe the kinematics of locomotion in both species, and the kinetics of locomotion in M. tuberculata. We sought to determine whether these bats move terrestrially the way other quadrupeds do, or whether they possess altogether different patterns of movement on the ground than are observed in quadrupeds that do not fly. Using high-speed video analyses of bats moving on a treadmill, we observed that both species possess symmetrical lateral-sequence gaits similar to the kinematically defined walks of a broad range of tetrapods. At high speeds, D. rotundus use an asymmetrical bounding gait that appears to converge on the bounding gaits of small terrestrial mammals, but with the roles of the forelimbs and hindlimbs reversed. This gait was not performed by M. tuberculata. Many animals that possess a single kinematic gait shift with increasing speed from a kinetic walk (where kinetic and potential energy of the centre of mass oscillate out of phase from each other) to a kinetic run (where they oscillate in phase). To determine whether the single kinematic gait of M. tuberculata meets the kinetic definition of a walk, a run, or a gait that functions as a walk at low speed and a run at high speed, we used force plates and high-speed video recordings to characterize the energetics of the centre of mass in that species. Although oscillations in kinetic and potential energy were of similar magnitudes, M. tuberculata did not use pendulum-like exchanges of energy between them to the extent that many other quadrupedal animals do, and did not transition from a kinetic walk to kinetic run with increasing speed. The gait of M. tuberculata is kinematically a walk, but kinetically run-like at all speeds.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Preneel, Govaerts and Vandewalle (PGV) analysed the security of single-block-length block cipher based compression functions assuming that the underlying block cipher has no weaknesses. They showed that 12 out of 64 possible compression functions are collision and (second) preimage resistant. Black, Rogaway and Shrimpton formally proved this result in the ideal cipher model. However, in the indifferentiability security framework introduced by Maurer, Renner and Holenstein, all these 12 schemes are easily differentiable from a fixed input-length random oracle (FIL-RO) even when their underlying block cipher is ideal. We address the problem of building indifferentiable compression functions from the PGV compression functions. We consider a general form of 64 PGV compression functions and replace the linear feed-forward operation in this generic PGV compression function with an ideal block cipher independent of the one used in the generic PGV construction. This modified construction is called a generic modified PGV (MPGV). We analyse indifferentiability of the generic MPGV construction in the ideal cipher model and show that 12 out of 64 MPGV compression functions in this framework are indifferentiable from a FIL-RO. To our knowledge, this is the first result showing that two independent block ciphers are sufficient to design indifferentiable single-block-length compression functions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Battery energy storage systems (BESS) are becoming feasible to provide system frequency support due to recent developments in technologies and plummeting cost. Adequate response of these devices becomes critical as the penetration of the renewable energy sources increases in the power system. This paper proposes effective use of BESS to improve system frequency performance. The optimal capacity and the operation scheme of BESS for frequency regulation are obtained using two staged optimization process. Furthermore, the effectiveness of BESS for improving the system frequency response is verified using dynamic simulations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis examines the existing frameworks for energy management in the brewing industry and details the design, development and implementation of a new framework at a modern brewery. The aim of the research was to develop an energy management framework to identify opportunities in a systematic manner using Systems Engineering concepts and principles. This work led to a Sustainable Energy Management Framework, SEMF. Using the SEMF approach, one of Australia's largest breweries has achieved number 1 ranking in the world for water use for the production of beer and has also improved KPI's and sustained the energy management improvements that have been implemented during the past 15 years. The framework can be adapted to other manufacturing industries in the Australian context and is considered to be a new concept and a potentially important tool for energy management.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Structural damage detection using measured dynamic data for pattern recognition is a promising approach. These pattern recognition techniques utilize artificial neural networks and genetic algorithm to match pattern features. In this study, an artificial neural network–based damage detection method using frequency response functions is presented, which can effectively detect nonlinear damages for a given level of excitation. The main objective of this article is to present a feasible method for structural vibration–based health monitoring, which reduces the dimension of the initial frequency response function data and transforms it into new damage indices and employs artificial neural network method for detecting different levels of nonlinearity using recognized damage patterns from the proposed algorithm. Experimental data of the three-story bookshelf structure at Los Alamos National Laboratory are used to validate the proposed method. Results showed that the levels of nonlinear damages can be identified precisely by the developed artificial neural networks. Moreover, it is identified that artificial neural networks trained with summation frequency response functions give higher precise damage detection results compared to the accuracy of artificial neural networks trained with individual frequency response functions. The proposed method is therefore a promising tool for structural assessment in a real structure because it shows reliable results with experimental data for nonlinear damage detection which renders the frequency response function–based method convenient for structural health monitoring.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Society is increasingly calling for professionals across government, industry, business and civil society to be able to problem-solve issues related to climate change and sustainable development as part of their work. In particular there is an emerging realisation of the fundamental need to swiftly reduce the growing demand for energy across society, and to then meet the demand with low emissions options. A key ingredient to addressing such issues is equipping professionals with emerging knowledge and skills to address energy challenges in all aspects of their work. The Council of Australian Governments has recognised this need, signing the National Partnership Agreement on Energy Efficiency in July 2009, which included a commitment to assist business and industry obtain the knowledge, skills and capacity to pursue cost-effective energy efficiency opportunities.2 Engineering will play a critical part among the professions, with Engineers Australia acknowledging that, ‘The need to make changes in the way energy is used and supplied throughout the world represents the greatest challenge to engineers in moving toward sustainability.’

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This report presents the findings of an investigation of energy efficiency resources for undergraduate engineering education, undertaken by web-based research, conversations with educators, and a university survey. The investigation draws on the results of a number of previous investigations undertaken by the research team for NFEE related to energy efficiency education and presents the following findings and recommendations, as explained in greater detail in the body of the report. The findings suggest that even though certain EE concepts and principles have been identified by lecturers as being important there is little to no coverage of a number of these concepts in some programs/courses. Similarly, many topics relating to the most important EE workforce skills and significant shortages as identified in industry research, do not rate highly in terms of both perceived importance by lecturers, or coverage within existing courses. Overall, these findings suggest that despite growing awareness of the importance of EE in both industry and academia, the current depth and breadth of EE content in courses does not reflect this. It confirms that efforts in these areas can be better supported.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Energy Efficiency (EE) Graduate Attributes Project focuses on engineering as a priority profession that has a significant role to play in addressing energy demand and supply issues in Australia. Specifically, this project aims to support embedding EE knowledge and skills throughout the engineering undergraduate curriculum, to help build capacity within the Australian workforce across major sectors of the economy, from mining, manufacturing and industrial applications to design, construction, maintenance and retrofitting built environments. The resultant report is intended to assist in future consultation with key groups such as Engineers Australia (EA), the Australian Council of Engineering Deans (ACED) and the eight EA colleges, to support systemic curriculum renewal and promote the design and development of high quality EE engineering education resources. The project is based on a whole-of-program outcomes-based approach to curriculum renewal, creating a transparent framework for integrating EE. This comprises collaborative consideration by academics and professional engineers who have experience in teaching and practising EE, to identify what students should learn to be equipped with relevant competencies by the time they graduate.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Deep geothermal from the hot crystalline basement has remained an unsolved frontier for the geothermal industry for the past 30 years. This poses the challenge for developing a new unconventional geomechanics approach to stimulate such reservoirs. While a number of new unconventional brittle techniques are still available to improve stimulation on short time scales, the astonishing richness of failure modes of longer time scales in hot rocks has so far been overlooked. These failure modes represent a series of microscopic processes: brittle microfracturing prevails at low temperatures and fairly high deviatoric stresses, while upon increasing temperature and decreasing applied stress or longer time scales, the failure modes switch to transgranular and intergranular creep fractures. Accordingly, fluids play an active role and create their own pathways through facilitating shear localization by a process of time-dependent dissolution and precipitation creep, rather than being a passive constituent by simply following brittle fractures that are generated inside a shear zone caused by other localization mechanisms. We lay out a new theoretical approach for the design of new strategies to utilize, enhance and maintain the natural permeability in the deeper and hotter domain of geothermal reservoirs. The advantage of the approach is that, rather than engineering an entirely new EGS reservoir, we acknowledge a suite of creep-assisted geological processes that are driven by the current tectonic stress field. Such processes are particularly supported by higher temperatures potentially allowing in the future to target commercially viable combinations of temperatures and flow rates.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cryptographic hash functions are an important tool of cryptography and play a fundamental role in efficient and secure information processing. A hash function processes an arbitrary finite length input message to a fixed length output referred to as the hash value. As a security requirement, a hash value should not serve as an image for two distinct input messages and it should be difficult to find the input message from a given hash value. Secure hash functions serve data integrity, non-repudiation and authenticity of the source in conjunction with the digital signature schemes. Keyed hash functions, also called message authentication codes (MACs) serve data integrity and data origin authentication in the secret key setting. The building blocks of hash functions can be designed using block ciphers, modular arithmetic or from scratch. The design principles of the popular Merkle–Damgård construction are followed in almost all widely used standard hash functions such as MD5 and SHA-1.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this thesis various schemes using custom power devices for power quality improvement in low voltage distribution network are studied. Customer operated distributed generators makes a typical network non-radial and affect the power quality. A scheme considering different algorithm of DSTATCOM is proposed for power circulation and islanded operation of the system. To compensate reactive power overflow and facilitate unity power factor, a UPQC is introduced. Stochastic analysis is carried out for different scenarios to get a comprehensive idea about a real life distribution network. Combined operation of static compensator and voltage regulator is tested for the optimum quality and stability of the system.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We analyse the security of iterated hash functions that compute an input dependent checksum which is processed as part of the hash computation. We show that a large class of such schemes, including those using non-linear or even one-way checksum functions, is not secure against the second preimage attack of Kelsey and Schneier, the herding attack of Kelsey and Kohno and the multicollision attack of Joux. Our attacks also apply to a large class of cascaded hash functions. Our second preimage attacks on the cascaded hash functions improve the results of Joux presented at Crypto’04. We also apply our attacks to the MD2 and GOST hash functions. Our second preimage attacks on the MD2 and GOST hash functions improve the previous best known short-cut second preimage attacks on these hash functions by factors of at least 226 and 254, respectively. Our herding and multicollision attacks on the hash functions based on generic checksum functions (e.g., one-way) are a special case of the attacks on the cascaded iterated hash functions previously analysed by Dunkelman and Preneel and are not better than their attacks. On hash functions with easily invertible checksums, our multicollision and herding attacks (if the hash value is short as in MD2) are more efficient than those of Dunkelman and Preneel.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper we present concrete collision and preimage attacks on a large class of compression function constructions making two calls to the underlying ideal primitives. The complexity of the collision attack is above the theoretical lower bound for constructions of this type, but below the birthday complexity; the complexity of the preimage attack, however, is equal to the theoretical lower bound. We also present undesirable properties of some of Stam’s compression functions proposed at CRYPTO ’08. We show that when one of the n-bit to n-bit components of the proposed 2n-bit to n-bit compression function is replaced by a fixed-key cipher in the Davies-Meyer mode, the complexity of finding a preimage would be 2 n/3. We also show that the complexity of finding a collision in a variant of the 3n-bits to 2n-bits scheme with its output truncated to 3n/2 bits is 2 n/2. The complexity of our preimage attack on this hash function is about 2 n . Finally, we present a collision attack on a variant of the proposed m + s-bit to s-bit scheme, truncated to s − 1 bits, with a complexity of O(1). However, none of our results compromise Stam’s security claims.