870 resultados para Power system security
Resumo:
A Work Project, presented as part of the requirements for the Award of a Masters Degree in Economics from the NOVA – School of Business and Economics
Resumo:
Dissertação para obtenção do Grau de Doutor em Engenharia Electrotécnica e de Computadores
Resumo:
INTRODUCTION: Food security remains to be one of the world's biggest problems and is found to be related to HIV/AIDS. The objective was to examine food insecurity in HIV/AIDS patients from Brasilia, Brazil. METHODS: Short version of the Food Security Scale was applied to patients with HIV/AIDS. RESULTS: A total of 103 patients participated (65 HIV+ and 38 with AIDS). Food insecurity was found in 33.8% of HIV+ patients and 36.8% of patients with AIDS. A relation between food insecurity and low educational and social levels was established. CONCLUSIONS: Food security should be an important component in HIV/AIDS treatment programs.
Resumo:
The need for more efficient illumination systems has led to the proliferation of Solid-State Lighting (SSL) systems, which offer optimized power consumption. SSL systems are comprised of LED devices which are intrinsically fast devices and permit very fast light modulation. This, along with the congestion of the radio frequency spectrum has paved the path for the emergence of Visible Light Communication (VLC) systems. VLC uses free space to convey information by using light modulation. Notwithstanding, as VLC systems proliferate and cost competitiveness ensues, there are two important aspects to be considered. State-of-the-art VLC implementations use power demanding PAs, and thus it is important to investigate if regular, existent Switched-Mode Power Supply (SMPS) circuits can be adapted for VLC use. A 28 W buck regulator was implemented using a off-the-shelf LED Driver integrated circuit, using both series and parallel dimming techniques. Results show that optical clock frequencies up to 500 kHz are achievable without any major modification besides adequate component sizing. The use of an LED as a sensor was investigated, in a short-range, low-data-rate perspective. Results show successful communication in an LED-to-LED configuration, with enhanced range when using LED strings as sensors. Besides, LEDs present spectral selective sensitivity, which makes them good contenders for a multi-colour LED-to-LED system, such as in the use of RGB displays and lamps. Ultimately, the present work shows evidence that LEDs can be used as a dual-purpose device, enabling not only illumination, but also bi-directional data communication.
Resumo:
An energy harvesting system requires an energy storing device to store the energy retrieved from the surrounding environment. This can either be a rechargeable battery or a supercapcitor. Due to the limited lifetime of rechargeable batteries, they need to be periodically replaced. Therefore, a supercapacitor, which has ideally a limitless number of charge/discharge cycles can be used to store the energy; however, a voltage regulator is required to obtain a constant output voltage as the supercapacitor discharges. This can be implemented by a Switched-Capacitor DC-DC converter which allows a complete integration in CMOS technology, although it requires several topologies in order to obtain a high efficiency. This thesis presents the complete analysis of four different topologies in order to determine expressions that allow to design and determine the optimum input voltage ranges for each topology. To better understand the parasitic effects, the implementation of the capacitors and the non-ideal effect of the switches, in 130 nm technology, were carefully studied. With these two analysis a multi-ratio SC DC-DC converter was designed with an output power of 2 mW, maximum efficiency of 77%, and a maximum output ripple, in the steady state, of 23 mV; for an input voltage swing of 2.3 V to 0.85 V. This proposed converter has four operation states that perform the conversion ratios of 1/2, 2/3, 1/1 and 3/2 and its clock frequency is automatically adjusted to produce a stable output voltage of 1 V. These features are implemented through two distinct controller circuits that use asynchronous time machines (ASM) to dynamically adjust the clock frequency and to select the active state of the converter. All the theoretical expressions as well as the behaviour of the whole system was verified using electrical simulations.
Resumo:
Based on the report for the unit “Métodos Interactivos de Participação e Decisão A” (Interactive methods of participation and decision A), coordinated by Prof. Lia Maldonado Teles de Vasconcelos and Prof. Nuno Miguel Ribeiro Videira Costa. This unit was provided for the PhD Program in Technology Assessment in 2015/2016.
Resumo:
Information systems are widespread and used by anyone with computing devices as well as corporations and governments. It is often the case that security leaks are introduced during the development of an application. Reasons for these security bugs are multiple but among them one can easily identify that it is very hard to define and enforce relevant security policies in modern software. This is because modern applications often rely on container sharing and multi-tenancy where, for instance, data can be stored in the same physical space but is logically mapped into different security compartments or data structures. In turn, these security compartments, to which data is classified into in security policies, can also be dynamic and depend on runtime data. In this thesis we introduce and develop the novel notion of dependent information flow types, and focus on the problem of ensuring data confidentiality in data-centric software. Dependent information flow types fit within the standard framework of dependent type theory, but, unlike usual dependent types, crucially allow the security level of a type, rather than just the structural data type itself, to depend on runtime values. Our dependent function and dependent sum information flow types provide a direct, natural and elegant way to express and enforce fine grained security policies on programs. Namely programs that manipulate structured data types in which the security level of a structure field may depend on values dynamically stored in other fields The main contribution of this work is an efficient analysis that allows programmers to verify, during the development phase, whether programs have information leaks, that is, it verifies whether programs protect the confidentiality of the information they manipulate. As such, we also implemented a prototype typechecker that can be found at http://ctp.di.fct.unl.pt/DIFTprototype/.
Resumo:
O fim da Guerra Fria é um caso inédito de mudança pacífica da estrutura internacional, em que os Estados Unidos e a União Soviética transcendem a divisão bipolar para decidir os termos da paz no quadro das instituições que definem o modelo de ordenamento multilateral, consolidando a sua legitimidade. Nesse contexto, ao contrário dos casos precedentes de reconstrução internacional no fim de uma guerra hegemónica, o novo sistema do post-Guerra Fria, caracterizado pela unipolaridade, pela regionalização e pela homogeneização, forma-se num quadro de continuidade institucional. A ordem política do post-Guerra Fria é um sistema misto em que as tensões entre a hierarquia unipolar e a anarquia multipolar, a integração global e a fragmentação regional e a homogeneidade e a heterogeneidade política, ideológica e cultural condicionam as estratégias das potências. As crises internacionais vão pôr à prova a estabilidade da nova ordem e a sua capacidade para garantir mudanças pacíficas. A primeira década do post-Guerra Fria mostra a preponderância dos Estados Unidos e a sua confiança crescente, patente nas Guerras do Golfo Pérsico e dos Balcãs, bem como na crise dos Estreitos da Formosa. A reacção aos atentados do "11 de Setembro" revela uma tentação imperial da potência unipolar, nomeadamente com a invasão do Iraque, que provoca uma crise profunda da comunidade de segurança ocidental. A vulnerabilidade do centro da ordem internacional é confirmada pela crise constitucional europeia e pela crise financeira global. Essas crises não alteram a estrutura de poder mas aceleram a erosão da ordem multilateral e criam um novo quadro de possibilidades para a evolução internacional, que inclui uma escalada dos conflitos num quadro de multipolaridade regional, uma nova polarização entre as potências democráticas conservadoras e uma coligação revisionista autoritária, bem como a restauração de um concerto entre as principais potências internacionais.
Resumo:
This paper proposes a multifunctional converter to interface renewable energy sources (e.g., solar photovoltaic panels) and electric vehicles (EVs) with the power grid in smart grids context. This multifunctional converter allows deliver energy from the solar photovoltaic panels to an EV or to the power grid, and exchange energy in bidirectional mode between the EV and the power grid. Using this multifunctional converter are not required multiple conversion stages, as occurs with the traditional solutions, where are necessary two power converters to integrate the solar photovoltaic system in the power grid and also two power converters to integrate an off-board EV battery charger in the power grid (dc-dc and dc-ac power converters in both cases). Taking into account that the energy provided (or delivered) from the power grid in each moment is function of the EV operation mode and also of the energy produced from the solar photovoltaic system, it is possible to define operation strategies and control algorithms in order to increase the energy efficiency of the global system and to improve the power quality of the electrical system. The proposed multifunctional converter allows the operation in four distinct cases: (a) Transfer of energy from the solar photovoltaic system to the power grid; (b) Transfer of energy from the solar photovoltaic system and from the EV to the power grid; (c) Transfer of energy from the solar photovoltaic system to the EV or to the power grid; (d) Transfer of energy between the EV and the power grid. Along the paper are described the system architecture and the control algorithms, and are also presented some computational simulation results for the four aforementioned cases. It is also presented a comparative analysis between the traditional and the proposed solution in terms of operation efficiency and estimated cost of implementation.
Resumo:
This paper presents the proposal of a three phase current source shunt active power filter (CS-SAPF) with photovoltaic grid interface. The proposed system combines the compensation of reactive power and harmonics with the injection of energy from a solar photovoltaic array into the electrical power grid. The proposed equipment presents the advantage of giving good use to the current source inverter, even when the solar photovoltaic array is not producing energy. The paper describes the control system of the CS SAPF, the energy injection control strategy, and the current harmonics and power factor compensation strategy. Simulation results to assess the performance of the proposed system are also presented.
Resumo:
"Lecture notes in computer science series, ISSN 0302-9743, vol. 9273"
Resumo:
Information security is concerned with the protection of information, which can be stored, processed or transmitted within critical information systems of the organizations, against loss of confidentiality, integrity or availability. Protection measures to prevent these problems result through the implementation of controls at several dimensions: technical, administrative or physical. A vital objective for military organizations is to ensure superiority in contexts of information warfare and competitive intelligence. Therefore, the problem of information security in military organizations has been a topic of intensive work at both national and transnational levels, and extensive conceptual and standardization work is being produced. A current effort is therefore to develop automated decision support systems to assist military decision makers, at different levels in the command chain, to provide suitable control measures that can effectively deal with potential attacks and, at the same time, prevent, detect and contain vulnerabilities targeted at their information systems. The concept and processes of the Case-Based Reasoning (CBR) methodology outstandingly resembles classical military processes and doctrine, in particular the analysis of “lessons learned” and definition of “modes of action”. Therefore, the present paper addresses the modeling and design of a CBR system with two key objectives: to support an effective response in context of information security for military organizations; to allow for scenario planning and analysis for training and auditing processes.
Resumo:
The Childhood protection is a subject with high value for the society, but, the Child Abuse cases are difficult to identify. The process from suspicious to accusation is very difficult to achieve. It must configure very strong evidences. Typically, Health Care services deal with these cases from the beginning where there are evidences based on the diagnosis, but they aren’t enough to promote the accusation. Besides that, this subject it’s highly sensitive because there are legal aspects to deal with such as: the patient privacy, paternity issues, medical confidentiality, among others. We propose a Child Abuses critical knowledge monitor system model that addresses this problem. This decision support system is implemented with a multiple scientific domains: to capture of tokens from clinical documents from multiple sources; a topic model approach to identify the topics of the documents; knowledge management through the use of ontologies to support the critical knowledge sensibility concepts and relations such as: symptoms, behaviors, among other evidences in order to match with the topics inferred from the clinical documents and then alert and log when clinical evidences are present. Based on these alerts clinical personnel could analyze the situation and take the appropriate procedures.
Resumo:
This paper presents a comparison between three switching techniques that can be used in three-phase four-wire Shunt Active Power Filters (SAPFs). The implemented switching techniques are: Periodic-Sampling (PS), Triangular Carrier Pulse-Width Modulation (TC-PWM) and Space Vector PWM (SVPWM). The comparison between them is made in terms of the compensated currents THD%, implementation complexity, necessary CPU time and SAPF efficiency. To perform this comparison are presented and analyzed several experimental results, obtained with a 20 kVA Shunt Active Power Filter prototype, specially developed for this purpose. The control system of the developed SAPF is based in the p-q Theory with a grid synchronization algorithm p-PLL.
Resumo:
This paper presents the development of the power electronics needed for the interaction between the electrical generator of a wind turbine and an isolated ac micro grid. In this system there are basically two types of receptors for the energy produced by the wind turbine, which are the loads connected to the isolated micro grid and the batteries used to store energy. There are basically two states in which the system will work. One of the states is when there is enough wind power to supply the loads and the extra energy is used to charge the batteries. The other state is when there is low wind power and the batteries have to compensate the lack of power, so that the isolated micro grid has enough power to supply at least the priority loads. In this paper are presented the hardware and the control algorithm for the developed system. The topology was previously tested in computer simulations, using the software PSIM 9.0, and then validated with the implementation of a laboratory prototype.