967 resultados para Distribution Functions
Resumo:
We propose and mathematically examine a theory of calcium profile formation in unwounded mammalian epidermis based on: changes in keratinocyte proliferation, fluid and calcium exchange with the extracellular fluid during these cells' passage through the epidermal sublayers, and the barrier functions of both the stratum corneum and tight junctions localised in the stratum granulosum. Using this theory, we develop a mathematical model that predicts epidermal sublayer transit times, partitioning of the epidermal calcium gradient between intracellular and extracellular domains, and the permeability of the tight junction barrier to calcium ions. Comparison of our model's predictions of epidermal transit times with experimental data indicates that keratinocytes lose at least 87% of their volume during their disintegration to become corneocytes. Intracellular calcium is suggested as the main contributor to the epidermal calcium gradient, with its distribution actively regulated by a phenotypic switch in calcium exchange between keratinocytes and extracellular fluid present at the boundary between the stratum spinosum and the stratum granulosum. Formation of the extracellular calcium distribution, which rises in concentration through the stratum granulosum towards the skin surface, is attributed to a tight junction barrier in this sublayer possessing permeability to calcium ions that is less than 15 nm/s in human epidermis and less than 37 nm/s in murine epidermis. Future experimental work may refine the presented theory and reduce the mathematical uncertainty present in the model predictions.
Resumo:
This thesis addresses voltage violation problem, the most critical issue associated with high level penetration of photovoltaic (PV) in electricity distribution network. A coordinated control algorithm using the reactive power from PV inverter and integrated battery energy storage has been developed and investigated in different network scenarios in the thesis. Probable variations associated with solar generation, end-user participation and network parameters are also considered. Furthermore, a unified data model and well-defined communication protocol to ensure the smooth coordination between all the components during the operation of the algorithm is described. Finally this thesis incorporated the uncertainties of solar generation using probabilistic load flow analysis.
Resumo:
This paper suggests a supervisory control for storage units to provide load leveling in distribution networks. This approach coordinates storage units to charge during high generation and discharge during peak load times, while utilized to improve the network voltage profile indirectly. The aim of this control strategy is to establish power sharing on a pro rata basis for storage units. As a case study, a practical distribution network with 30 buses is simulated and the results are provided.
Resumo:
Re-supplying loads on outage through cross-connect from adjacent feeders in a distribution system may cause voltage drop and hence require load shedding. However, the surplus PV generated in some of the LV feeders can prevent load shedding, and improve reliability. In order to measure these effects, this paper proposes the application of Direct Load Flow method[1] in reliability evaluation of distribution systems with PV units. As part of this study, seasonal impacts on load consumption together with surplus PV output power injection to higher voltage networks are also considered. New indices are proposed to measure yearly expected energy export, from LV to MV and from MV to higher voltage network.
Resumo:
This chapter presents the stability analysis based on bifurcation theory of the distribution static compensator (DSTATCOM) operating both in current control mode as in voltage control mode. The bifurcation analysis allows delimiting the operating zones of nonlinear power systems and hence the computation of these boundaries is of interest for practical design and planning purposes. Suitable mathematical representations of the DSTATCOM are proposed to carry out the bifurcation analyses efficiently. The stability regions in the Thevenin equivalent plane are computed for different power factors at the Point of Common Coupling (PCC). In addition, the stability regions in the control gain space are computed, and the DC capacitor and AC capacitor impact on the stability are analyzed in detail. It is shown through bifurcation analysis that the loss of stability in the DSTATCOM is in general due to the emergence of oscillatory dynamics. The observations are verified through detailed simulation studies.
Resumo:
This work examined the suitability of the PAGAT gel dosimeter for use in dose distribution measurements around high-density implants. An assessment of the gels reactivity with various metals was performed and no corrosive effects were observed. An artefact reduction technique was also investigated in order to minimise scattering of the laser light in the optical CT scans. The potential for attenuation and backscatter measurements using this gel dosimeter were examined for a temporary tissue expander's internal magnetic port.
Resumo:
Structural damage detection using measured dynamic data for pattern recognition is a promising approach. These pattern recognition techniques utilize artificial neural networks and genetic algorithm to match pattern features. In this study, an artificial neural network–based damage detection method using frequency response functions is presented, which can effectively detect nonlinear damages for a given level of excitation. The main objective of this article is to present a feasible method for structural vibration–based health monitoring, which reduces the dimension of the initial frequency response function data and transforms it into new damage indices and employs artificial neural network method for detecting different levels of nonlinearity using recognized damage patterns from the proposed algorithm. Experimental data of the three-story bookshelf structure at Los Alamos National Laboratory are used to validate the proposed method. Results showed that the levels of nonlinear damages can be identified precisely by the developed artificial neural networks. Moreover, it is identified that artificial neural networks trained with summation frequency response functions give higher precise damage detection results compared to the accuracy of artificial neural networks trained with individual frequency response functions. The proposed method is therefore a promising tool for structural assessment in a real structure because it shows reliable results with experimental data for nonlinear damage detection which renders the frequency response function–based method convenient for structural health monitoring.
Resumo:
Cryptographic hash functions are an important tool of cryptography and play a fundamental role in efficient and secure information processing. A hash function processes an arbitrary finite length input message to a fixed length output referred to as the hash value. As a security requirement, a hash value should not serve as an image for two distinct input messages and it should be difficult to find the input message from a given hash value. Secure hash functions serve data integrity, non-repudiation and authenticity of the source in conjunction with the digital signature schemes. Keyed hash functions, also called message authentication codes (MACs) serve data integrity and data origin authentication in the secret key setting. The building blocks of hash functions can be designed using block ciphers, modular arithmetic or from scratch. The design principles of the popular Merkle–Damgård construction are followed in almost all widely used standard hash functions such as MD5 and SHA-1.
Resumo:
In this thesis various schemes using custom power devices for power quality improvement in low voltage distribution network are studied. Customer operated distributed generators makes a typical network non-radial and affect the power quality. A scheme considering different algorithm of DSTATCOM is proposed for power circulation and islanded operation of the system. To compensate reactive power overflow and facilitate unity power factor, a UPQC is introduced. Stochastic analysis is carried out for different scenarios to get a comprehensive idea about a real life distribution network. Combined operation of static compensator and voltage regulator is tested for the optimum quality and stability of the system.
Resumo:
We analyse the security of iterated hash functions that compute an input dependent checksum which is processed as part of the hash computation. We show that a large class of such schemes, including those using non-linear or even one-way checksum functions, is not secure against the second preimage attack of Kelsey and Schneier, the herding attack of Kelsey and Kohno and the multicollision attack of Joux. Our attacks also apply to a large class of cascaded hash functions. Our second preimage attacks on the cascaded hash functions improve the results of Joux presented at Crypto’04. We also apply our attacks to the MD2 and GOST hash functions. Our second preimage attacks on the MD2 and GOST hash functions improve the previous best known short-cut second preimage attacks on these hash functions by factors of at least 226 and 254, respectively. Our herding and multicollision attacks on the hash functions based on generic checksum functions (e.g., one-way) are a special case of the attacks on the cascaded iterated hash functions previously analysed by Dunkelman and Preneel and are not better than their attacks. On hash functions with easily invertible checksums, our multicollision and herding attacks (if the hash value is short as in MD2) are more efficient than those of Dunkelman and Preneel.
Resumo:
In this paper we present concrete collision and preimage attacks on a large class of compression function constructions making two calls to the underlying ideal primitives. The complexity of the collision attack is above the theoretical lower bound for constructions of this type, but below the birthday complexity; the complexity of the preimage attack, however, is equal to the theoretical lower bound. We also present undesirable properties of some of Stam’s compression functions proposed at CRYPTO ’08. We show that when one of the n-bit to n-bit components of the proposed 2n-bit to n-bit compression function is replaced by a fixed-key cipher in the Davies-Meyer mode, the complexity of finding a preimage would be 2 n/3. We also show that the complexity of finding a collision in a variant of the 3n-bits to 2n-bits scheme with its output truncated to 3n/2 bits is 2 n/2. The complexity of our preimage attack on this hash function is about 2 n . Finally, we present a collision attack on a variant of the proposed m + s-bit to s-bit scheme, truncated to s − 1 bits, with a complexity of O(1). However, none of our results compromise Stam’s security claims.