845 resultados para Abuse of Power
Resumo:
This paper presents a novel real-time power-device temperature estimation method that monitors the power MOSFET's junction temperature shift arising from thermal aging effects and incorporates the updated electrothermal models of power modules into digital controllers. Currently, the real-time estimator is emerging as an important tool for active control of device junction temperature as well as online health monitoring for power electronic systems, but its thermal model fails to address the device's ongoing degradation. Because of a mismatch of coefficients of thermal expansion between layers of power devices, repetitive thermal cycling will cause cracks, voids, and even delamination within the device components, particularly in the solder and thermal grease layers. Consequently, the thermal resistance of power devices will increase, making it possible to use thermal resistance (and junction temperature) as key indicators for condition monitoring and control purposes. In this paper, the predicted device temperature via threshold voltage measurements is compared with the real-time estimated ones, and the difference is attributed to the aging of the device. The thermal models in digital controllers are frequently updated to correct the shift caused by thermal aging effects. Experimental results on three power MOSFETs confirm that the proposed methodologies are effective to incorporate the thermal aging effects in the power-device temperature estimator with good accuracy. The developed adaptive technologies can be applied to other power devices such as IGBTs and SiC MOSFETs, and have significant economic implications.
Resumo:
The purpose of this research was to apply the concepts of power and influence tactics to the joint venture context by examining how they relate to venture performance. In addition, culture and the expectations of future cooperation were examined for their association with influence tactic use and joint venture performance. Data were collected from 58 parent firms of U.S.-based domestic and international joint ventures about their relationships with their partners.^ Under the theories of social exchange and power dependence, a parent's level of power is based on its partner's dependence on the relationship. The statistical results indicated that: (1) the greater the total of power of both parents in an equal power relationship, the greater the joint venture's performance; and (2) the greater the inequality between each parent's level of power, the lower the joint venture's performance. It was also found that the way in which a parent firm tried to influence its partner was related to joint venture performance. Specifically, the use of references to a partner's legitimate authority was negatively related to performance, while the use of rational arguments and compromises was positively related.^ Contrary to expectations, the cultural backgrounds of the parents were not shown to have a relationship to influence tactic use or joint venture's performance. On the other hand, greater expectation of future cooperation had a positive association with performance, and a significant relationship with influence tactic use. The greater the expectation, the less partners used more confrontational tactics such as pressure or legitimate authority. ^
Resumo:
The North Atlantic Treaty Organization (NATO) is a product of the Cold War through which its members organized their military forces for the purpose of collective defense against the common threat of Soviet-backed aggression. Employing the terminology of regime theory, the creation of NATO can be viewed as the introduction of an international security regime. Throughout the Cold War, NATO member states preserved their commitment to mutual defense while increasingly engaging in activities aimed at overcoming the division of Europe and promoting regional stability. The end of the Cold War has served as the catalyst for a new period of regime change as the Alliance introduced elements of a collective security regime by expanding its mandate to address new security challenges and reorganizing both its political and military organizational structures. ^ This research involves an interpretive analysis of NATO's evolution applying ideal theoretical constructs associated with distinct approaches to regime analysis. The process of regime change is investigated over several periods throughout the history of the Alliance in an effort to understand the Alliance's changing commitment to collective security. This research involves a review of regime theory literature, consisting of an examination of primary source documentation, including official documents and treaties, as well as a review of numerous secondary sources. This review is organized around a typology of power-based, organization-based, and norm-based approaches to regime analysis. This dissertation argues that the process of regime change within NATO is best understood by examining factors associated with multiple theoretical constructs. Relevant factors provide insights into the practice of collective security among NATO member states within Europe, while accounting for the inability of the NATO allies to build on the experience gained within Europe to play a more central role in operations outside of this region. This research contributes to a greater understanding of the nature of international regimes and the process of regime change, while offering recommendations aimed at increasing NATO's viability as a source of greater security and more meaningful international cooperation.^
Resumo:
This study investigated the nature and impact of the sexual abuse of children ages birth through 6 years. The purpose was to enhance knowledge about this understudied population through examination of: (1) characteristics of the abuse; (2) socioemotional developmental outcomes of young victims; and (3) potential moderating effects of family dynamics. An ecological-developmental theoretical framework was applied. Secondary data analysis was conducted using data collected from the consortium Longitudinal Studies of Child Abuse and Neglect (LONGSCAN). A sample of 250 children was drawn from LONGSCAN data, including children who were sexually abused (n=125) and their nonabused counterparts (n=125), matched on demographic variables. Results revealed that young victims of sexual abuse were disproportionately female (91 girls; 73%). The sexual abuse committed against these youngsters was severe in nature, with 111 children (89%) experiencing contact offenses ranging from fondling to forcible rape. Sixty-two percent of child victims demonstrated borderline, clinical, or less than adequate functioning on normative, expected socioemotional outcomes. Child victims reported low degrees of perceived competence and satisfaction in the social environment. When compared with their nonabused counterparts, child victims demonstrated significantly poorer socioemotional functioning, as evidenced by aggressive behaviors, attention and thought problems. Sexually abused youngsters also reported lower self-perceptions of cognitive and physical competence and maternal acceptance. Family dynamic factors did not significantly moderate the relationships between abuse and socioemotional outcomes, with one exception. The caregivers’ degree of empathy for their children had a significant moderating effect on the children’s social problems. This study contributes to an otherwise scant body of literature on the sexual abuse of preschoolers. Findings provide implications for social work practice, especially in the development of assessment and prevention strategies.
Resumo:
In recent years, wireless communication infrastructures have been widely deployed for both personal and business applications. IEEE 802.11 series Wireless Local Area Network (WLAN) standards attract lots of attention due to their low cost and high data rate. Wireless ad hoc networks which use IEEE 802.11 standards are one of hot spots of recent network research. Designing appropriate Media Access Control (MAC) layer protocols is one of the key issues for wireless ad hoc networks. ^ Existing wireless applications typically use omni-directional antennas. When using an omni-directional antenna, the gain of the antenna in all directions is the same. Due to the nature of the Distributed Coordination Function (DCF) mechanism of IEEE 802.11 standards, only one of the one-hop neighbors can send data at one time. Nodes other than the sender and the receiver must be either in idle or listening state, otherwise collisions could occur. The downside of the omni-directionality of antennas is that the spatial reuse ratio is low and the capacity of the network is considerably limited. ^ It is therefore obvious that the directional antenna has been introduced to improve spatial reutilization. As we know, a directional antenna has the following benefits. It can improve transport capacity by decreasing interference of a directional main lobe. It can increase coverage range due to a higher SINR (Signal Interference to Noise Ratio), i.e., with the same power consumption, better connectivity can be achieved. And the usage of power can be reduced, i.e., for the same coverage, a transmitter can reduce its power consumption. ^ To utilizing the advantages of directional antennas, we propose a relay-enabled MAC protocol. Two relay nodes are chosen to forward data when the channel condition of direct link from the sender to the receiver is poor. The two relay nodes can transfer data at the same time and a pipelined data transmission can be achieved by using directional antennas. The throughput can be improved significant when introducing the relay-enabled MAC protocol. ^ Besides the strong points, directional antennas also have some explicit drawbacks, such as the hidden terminal and deafness problems and the requirements of retaining location information for each node. Therefore, an omni-directional antenna should be used in some situations. The combination use of omni-directional and directional antennas leads to the problem of configuring heterogeneous antennas, i e., given a network topology and a traffic pattern, we need to find a tradeoff between using omni-directional and using directional antennas to obtain a better network performance over this configuration. ^ Directly and mathematically establishing the relationship between the network performance and the antenna configurations is extremely difficult, if not intractable. Therefore, in this research, we proposed several clustering-based methods to obtain approximate solutions for heterogeneous antennas configuration problem, which can improve network performance significantly. ^ Our proposed methods consist of two steps. The first step (i.e., clustering links) is to cluster the links into different groups based on the matrix-based system model. After being clustered, the links in the same group have similar neighborhood nodes and will use the same type of antenna. The second step (i.e., labeling links) is to decide the type of antenna for each group. For heterogeneous antennas, some groups of links will use directional antenna and others will adopt omni-directional antenna. Experiments are conducted to compare the proposed methods with existing methods. Experimental results demonstrate that our clustering-based methods can improve the network performance significantly. ^