832 resultados para operation system security mechanism
Resumo:
Evaporative cooling operates using water and air as working fluids. It consists in water evaporation, through the passage of an airflow, thus decreasing the air temperature. This system has a great potential to provide thermal comfort in places where air humidity is low, being, however, less efficient where air humidity is high. A way to solve this problem is to use dehumidifiers to pre-conditioning the process air. This paper presents a system that can be used in humid climates coupling desiccant dehumidification equipment to evaporative coolers. The paper shows, initially, the main characteristics of the evaporative cooling and of the adsorption dehumidification systems. Later on the coupled systems, in which occurs a dehumidification by adsorption in a counter flow rotary heat exchanger following the evaporate cooling of the air in evaporative coolers, are analyzed. The thermodynamic equations of state are also presented. Following, this paper analyzes some operation parameters such as: reactivation temperature, R/P relationship (reactivation air flow/ process air flow) and the thermodynamic conditions of the entering air flow. The paper shows the conditions for the best operation point, with regard to thermal comfort conditions and to the energy used in the process. In addition this paper presents an application of the system in different climate characteristics of several tropical and equatorial cities. Copyright © 2005 by ABCM.
Resumo:
The aim of this paper is to present the current development status of a low cost system for surface reconstruction with structured light. The acquisition system is composed of a single off-the-shelf digital camera and a pattern projector. A pattern codification strategy was developed to allow the pattern recognition automatically and a calibration methodology ensures the determination of the direction vector of each pattern. The experiments indicated that an accuracy of 0.5mm in depth could be achieved for typical applications.
Resumo:
Nowadays there is great interest in damage identification using non destructive tests. Predictive maintenance is one of the most important techniques that are based on analysis of vibrations and it consists basically of monitoring the condition of structures or machines. A complete procedure should be able to detect the damage, to foresee the probable time of occurrence and to diagnosis the type of fault in order to plan the maintenance operation in a convenient form and occasion. In practical problems, it is frequent the necessity of getting the solution of non linear equations. These processes have been studied for a long time due to its great utility. Among the methods, there are different approaches, as for instance numerical methods (classic), intelligent methods (artificial neural networks), evolutions methods (genetic algorithms), and others. The characterization of damages, for better agreement, can be classified by levels. A new one uses seven levels of classification: detect the existence of the damage; detect and locate the damage; detect, locate and quantify the damages; predict the equipment's working life; auto-diagnoses; control for auto structural repair; and system of simultaneous control and monitoring. The neural networks are computational models or systems for information processing that, in a general way, can be thought as a device black box that accepts an input and produces an output. Artificial neural nets (ANN) are based on the biological neural nets and possess habilities for identification of functions and classification of standards. In this paper a methodology for structural damages location is presented. This procedure can be divided on two phases. The first one uses norms of systems to localize the damage positions. The second one uses ANN to quantify the severity of the damage. The paper concludes with a numerical application in a beam like structure with five cases of structural damages with different levels of severities. The results show the applicability of the presented methodology. A great advantage is the possibility of to apply this approach for identification of simultaneous damages.
Resumo:
Includes bibliography
Resumo:
Includes bibliography
Resumo:
Malware has become a major threat in the last years due to the ease of spread through the Internet. Malware detection has become difficult with the use of compression, polymorphic methods and techniques to detect and disable security software. Those and other obfuscation techniques pose a problem for detection and classification schemes that analyze malware behavior. In this paper we propose a distributed architecture to improve malware collection using different honeypot technologies to increase the variety of malware collected. We also present a daemon tool developed to grab malware distributed through spam and a pre-classification technique that uses antivirus technology to separate malware in generic classes. © 2009 SPIE.
Resumo:
Reliability is a key aspect in power system design and planning. Maintaining a reliable power system is a very important issue for their design and operation. Under the new competitive framework of the electricity sector, power systems find ever more and more strained to operate near their limits. Under this new scenario, it is crucial for the system operator to use tools that facilitate an energy dispatch that minimizes possible power cuts. This paper presents a mathematical model to calculate an energy dispatch that considers security constraints (single contingencies in transmission lines and transformers). The model involves pool markets and fixed bilateral contracts. Traditional methodologies that include security constraints are usually based in multistage dispatch processes. In this case, we propose a single-stage model that avoids the economic inefficiencies which result when conventional multi-stage dispatch approaches are applied. The proposed model includes an AC representation of the transport system and allows calculating the cost overruns incurred in due to reliability restrictions. We found that complying with fixed bilateral contracts, when they go above certain levels, might lead to congestion problems in transmission lines.