968 resultados para uncommercial transactions
Resumo:
Navigation through tessellated solids in GEANT4 can degrade computational performance, especially if the tessellated solid is large and is comprised of many facets. Redefining a tessellated solid as a mesh of tetrahedra is common in other computational techniques such as finite element analysis as computations need only consider local tetrahedrons rather than the tessellated solid as a whole. Here within we describe a technique that allows for automatic tetrahedral meshing of tessellated solids in GEANT4 and the subsequent loading of these meshes as assembly volumes; loading nested tessellated solids and tetrahedral meshes is also examined. As the technique makes the geometry suitable for automatic optimisation using smartvoxels, navigation through a simple tessellated volume has been found to be more than two orders of magnitude faster than that through the equivalent tessellated solid. Speed increases of more than two orders of magnitude were also observed for a more complex tessellated solid with voids and concavities. The technique was benchmarked for geometry load time, simulation run time and memory usage. Source code enabling the described functionality in GEANT4 has been made freely available on the Internet.
Resumo:
The rate of singlet-to-triplet intersystem crossing in 1,4-didehydrobenzene (the biradical produced as a reactive intermediate in the thermal cycloaromatization of enediynes), cannot be increased by the application of an external magnetic field. The rate of product formation and the distribution of stable products of 2,3-di-n-propyl-1,4-didehydrobenzene thermolysis is unchanged at magnetic flux densities in the range 0–2000 G and at 66 000 G. Similarly, the rate of thermolysis of an unsymmetrical enediyne is insensitive to magnetic field flux in the same range. This finding precludes the modulation of enediyne reaction rates in pharmaceutical and synthetic pursuits.
Resumo:
Optimising the container transfer schedule at the multimodal terminals is known to be NP-hard, which implies that the best solution becomes computationally infeasible as problem sizes increase. Genetic Algorithm (GA) techniques are used to reduce container handling/transfer times and ships' time at the port by speeding up handling operations. The GA is chosen due to the relatively good results that have been reported even with the simplest GA implementations to obtain near-optimal solutions in reasonable time. Also discussed, is the application of the model to assess the consequences of increased scheduled throughput time as well as different strategies such as the alternative plant layouts, storage policies and number of yard machines. A real data set used for the solution and subsequent sensitivity analysis is applied to the alternative plant layouts, storage policies and number of yard machines.
Resumo:
This paper examines the legal facilitation (or rather lack of facilitation) of gifts. The emerging western political ideology of welfare is based on the premise that nonprofit organisations are to play a far greater role in the delivery of welfare services. This role will be enabled in part by increased gifts. The ideology has not addressed the fundamental hostility of the law to the facilitation of gifts. The nature of the legal obstruction of such gifts is compared to equivalent commercial transactions, the reasons given for this obstruction are analysed and the appropriateness of such nonfacilitation is challenged. A state that does not alter the legal hostility to gifts may find that organisations do not attain their expected role in the changing welfare state.
Resumo:
"The text is unique in the way it balances a "user" and "preparer" perspective and integrates real financial information to illustrate business decision choices and how decisions are made using accounting information. The pedagogical approach presented in the text has been tried and tested over many years, and provides a constructive framework for students to learn fundamental accounting concepts and processes. Through the use of real company information and financial statements students will quickly appreciate the use of accounting information. The textbook clearly outlines to students how to account for typical business transactions and prepare financial statements - such as a balance sheet, income statement, and statement of cash flows - that communicate the financing, operating, and investing activities of a business. Whether a student is required to study one accounting subject, as part of a wider business degree, or undertake a major study of accounting the text builds a strong conceptual understanding of accounting and will develop skills that can be applied to an accounting and business environment. The integral role of financial statements for decision making is also emphasised in this text and is reinforced throughout by the Decision Toolkit in each chapter. Students are provided with an extensive set of tools necessary to make business decisions based on financial information." -- publisher website
Resumo:
New substation automation applications, such as sampled value process buses and synchrophasors, require sampling accuracy of 1 µs or better. The Precision Time Protocol (PTP), IEEE Std 1588, achieves this level of performance and integrates well into Ethernet based substation networks. This paper takes a systematic approach to the performance evaluation of commercially available PTP devices (grandmaster, slave, transparent and boundary clocks) from a variety of manufacturers. The ``error budget'' is set by the performance requirements of each application. The ``expenditure'' of this error budget by each component is valuable information for a system designer. The component information is used to design a synchronization system that meets the overall functional requirements. The quantitative performance data presented shows that this testing is effective and informative. Results from testing PTP performance in the presence of sampled value process bus traffic demonstrate the benefit of a ``bottom up'' component testing approach combined with ``top down'' system verification tests. A test method that uses a precision Ethernet capture card, rather than dedicated PTP test sets, to determine the Correction Field Error of transparent clocks is presented. This test is particularly relevant for highly loaded Ethernet networks with stringent timing requirements. The methods presented can be used for development purposes by manufacturers, or by system integrators for acceptance testing. A sampled value process bus was used as the test application for the systematic approach described in this paper. The test approach was applied, components were selected, and the system performance verified to meet the application's requirements. Systematic testing, as presented in this paper, is applicable to a range of industries that use, rather than develop, PTP for time transfer.
Resumo:
This paper focuses on the implementation of a damping controller for the doubly fed induction generator (DFIG) system. Coordinated tuning of the damping controller to enhance the damping of the oscillatory modes is presented using bacterial foraging technique. The effect of the tuned damping controller on converter ratings of the DFIG system is also investigated. The results of both eigenvalue analysis and the time-domain simulation studies are presented to elucidate the effectiveness of the tuned damping controller in the DFIG system. The improvement of the fault ride-through capability of the system is also demonstrated.
Resumo:
The Midwest Independent Transmission System Operator (MISO) has experienced significant amounts of wind power development within the last decade. The MISO footprint spans the majority of the upper Midwest region of the country, from the Dakotas to Indiana and as far east as Michigan. These areas have a rich wind energy resource. States in the MISO footprint have passed laws or set goals that require load serving entities to supply a portion of their load using renewable energy. In order to meet these requirements, significant investments are needed to build the transmission infrastructure necessary to deliver the power from these often remote wind energy resources to the load centers. This paper presents some of the transmission planning related work done at MISO which was largely influenced by current and future needs for increased wind power generation in the footprint. Specifically, topics covered are generator interconnection, long-term planning coordination, and cost-allocation for new transmission lines.
Resumo:
With the advent of large-scale wind farms and their integration into electrical grids, more uncertainties, constraints and objectives must be considered in power system development. It is therefore necessary to introduce risk-control strategies into the planning of transmission systems connected with wind power generators. This paper presents a probability-based multi-objective model equipped with three risk-control strategies. The model is developed to evaluate and enhance the ability of the transmission system to protect against overload risks when wind power is integrated into the power system. The model involves: (i) defining the uncertainties associated with wind power generators with probability measures and calculating the probabilistic power flow with the combined use of cumulants and Gram-Charlier series; (ii) developing three risk-control strategies by specifying the smallest acceptable non-overload probability for each branch and the whole system, and specifying the non-overload margin for all branches in the whole system; (iii) formulating an overload risk index based on the non-overload probability and the non-overload margin defined; and (iv) developing a multi-objective transmission system expansion planning (TSEP) model with the objective functions composed of transmission investment and the overload risk index. The presented work represents a superior risk-control model for TSEP in terms of security, reliability and economy. The transmission expansion planning model with the three risk-control strategies demonstrates its feasibility in the case study using two typical power systems
Resumo:
The last twenty years have seen an explosion of approaches for dealing with an inevitable consequence of globalised markets, that of cross-border insolvencies. This article places phenomena such as the United Nations Commission on International Trade Law (UNCITRAL) Model Law on Cross-border Insolvency and Cross-border Insolvency Agreements (also known as Protocols) within the context of developing laws on international commercial transactions. First it briefly describes the evolution of the international commercial law (sometimes known as the law merchant) to provide a context to understanding the international commercial responses to the problems created by cross-border insolvencies. Next, it outlines the range of approaches being adopted by States and multilateral bodies in recent decades to resolve cross-border insolvency issues. Finally it draws some preliminary conclusions on the potential implication of this transnationalisation process and broader international commercial law perspective, in particular on the capacity of Cross-Border Insolvency Agreements to address cross-border insolvency issues.
Resumo:
Neither an international tax, nor an international taxing body exists. Rather, there are domestic taxing rules adopted by jurisdictions which, coupled with double tax treaties, apply to cross-border transactions and international taxation issues. International bodies such as the OECD and UN, which provide guidance on tax issues, often steer and supplement these domestic adoptions but have no binding international taxing powers. These pragmatic realities, together with the specific use of the word ‘regime’ within the tax community, lead many to argue that an international tax regime does not exist. However, an international tax regime should be defined no differently to any other area of international law and when we step outside the confines of tax law to consider the definition of a ‘regime’ within international relations it is possible to demonstrate that such a regime is very real. The first part of this article, by defining an international tax regime in a broader and more traditional context, also outlining both the tax policy and principles which frame that regime, reveals its existence. Once it is accepted that an international tax regime exists, it is possible to consider its adoption by jurisdictions and subsequent constraints it places on them. Using the proposed changes to transfer pricing laws as the impetus for assessing Australia’s adoption of the international tax regime, the constraints on sovereignty are assessed through a taxonomy of the level adoption. This reveals the subsequent constraints which flow from the broad acceptance of an international tax regime through to the specific adoption of technical detail. By undertaking this analysis, the second part of this article demonstrates that Australia has inherently adopted an international tax regime, with a move towards explicit adoption and a clear embedding of its principles within the domestic tax legislation.
Resumo:
"Defrauding land titles systems impacts upon us all. Those who deal in land include ordinary citizens, big business, small business, governments, not-for-profit organisation, deceased estates...Fraud here touches almost everybody." the thesis presented in this paper is that the current and disparate steps taken by jurisdictions to alleviate land fraud associated with identity-based crimes are inadequate. The centrepiece of the analysis is the consideration of two scenarios that have recently occurred. One is the typical scenario where a spouse forges the partner's signature to obtain a mortgage from a financial institution. The second is atypical. It involves a sophisticated overseas fraud duping many stakeholders involved in the conveyancing process. After outlining these scenarios, we will examine how identity verification requirements of the United Kingdom, Ontario, the Australian states, and New Zealand would have been applied to these two frauds. Our conclusion is that even though some jurisdictions may have prevented the frauds from occurring, the current requirements are inadequate. We use the lessons learnt to propose what we consider core principles for identity verification in land transactions.
Resumo:
Process bus networks are the next stage in the evolution of substation design, bringing digital technology to the high voltage switchyard. Benefits of process buses include facilitating the use of Non-Conventional Instrument Transformers, improved disturbance recording and phasor measurement and the removal of costly, and potentially hazardous, copper cabling from substation switchyards and control rooms. This paper examines the role a process bus plays in an IEC 61850 based Substation Automation System. Measurements taken from a process bus substation are used to develop an understanding of the network characteristics of "whole of substation" process buses. The concept of "coherent transmission" is presented and the impact of this on Ethernet switches is examined. Experiments based on substation observations are used to investigate in detail the behavior of Ethernet switches with sampled value traffic. Test methods that can be used to assess the adequacy of a network are proposed, and examples of the application and interpretation of these tests are provided. Once sampled value frames are queued by an Ethernet switch the additional delay incurred by subsequent switches is minimal, and this allows their use in switchyards to further reduce communications cabling, without significantly impacting operation. The performance and reliability of a process bus network operating with close to the theoretical maximum number of digital sampling units (merging units or electronic instrument transformers) was investigated with networking equipment from several vendors, and has been demonstrated to be acceptable.
Resumo:
New substation technology, such as non-conventional instrument transformers,and a need to reduce design and construction costs, are driving the adoption of Ethernet based digital process bus networks for high voltage substations. Protection and control applications can share a process bus, making more efficient use of the network infrastructure. This paper classifies and defines performance requirements for the protocols used in a process bus on the basis of application. These include GOOSE, SNMP and IEC 61850-9-2 sampled values. A method, based on the Multiple Spanning Tree Protocol (MSTP) and virtual local area networks, is presented that separates management and monitoring traffic from the rest of the process bus. A quantitative investigation of the interaction between various protocols used in a process bus is described. These tests also validate the effectiveness of the MSTP based traffic segregation method. While this paper focusses on a substation automation network, the results are applicable to other real-time industrial networks that implement multiple protocols. High volume sampled value data and time-critical circuit breaker tripping commands do not interact on a full duplex switched Ethernet network, even under very high network load conditions. This enables an efficient digital network to replace a large number of conventional analog connections between control rooms and high voltage switchyards.