Search results for: voltage security margins
4047 Security Features for Remote Healthcare System: A Feasibility Study
Authors: Tamil Chelvi Vadivelu, Nurazean Maarop, Rasimah Che Yusoff, Farhana Aini Saludin
Abstract:
Implementing a remote healthcare system needs to consider many security features. Therefore, before any deployment of the remote healthcare system, a feasibility study from the security perspective is crucial. Remote healthcare system using WBAN technology has been used in other countries for medical purposes but in Malaysia, such projects are still not yet implemented. This study was conducted qualitatively. The interview results involving five healthcare practitioners are further elaborated. The study has addressed four important security features in order to incorporate remote healthcare system using WBAN in Malaysian government hospitals.Keywords: remote healthcare, IT security, security features, wireless sensor application
Procedia PDF Downloads 3064046 Women from the Margins: An Exploration of the African Women Marginalization in the South African Context from Postcolonial Feminist Perspective
Authors: Goodness Thandi Ntuli
Abstract:
As one of the sub-Saharan African countries, South Africa has a majority of women living at the receiving end of all ferocious atrocities, afflictions and social ills such as utter poverty, unemployment, morbidity, sexual exploitation and abuse, gender-based and domestic violence. The response to these social ills that permeate the South African context like wildfire requires postcolonial feminism as a lens which needs to directly address this particular context. In the empirical study that was conducted among the Zulu people about Zulu young women in the South African context, it was found that a postcolonial young woman has a lot of social challenges that militate against her. In her struggle to liberate herself, there are layers of oppression that she has to deal with before attaining emancipation of any kind. These layers of oppression emanate from postcolonial effects on cultural norms that come with patriarchal issues, racial issues as the woman of colour and socio-economic issues as the poverty-stricken marginalised woman. Such layers also render marginalized women voiceless on many occasions, and hence the kind of feminism that needs to be applied in this context has to give them a voice, worth and human dignity that they deserve. From the postcolonial feminist perspective, this paper examines the condition of women from the margins and seeks the ways in which the layers of oppression could be disengaged. In the process of the severed layers of oppression, these women can be uplifted to becoming the women of worth, restored to life-giving dignity from the inferiority complex of racial discrimination and liberation from all forms of patriarchy and its upshots that keep them bound by gender inequality. This requires, in particular, postcolonial feminism that would find profound ways of reaching into the deep-seated socialization and internalization of every kind of prejudice against women. It is the kind of feminism that questions the status core even among those who consider themselves feminists. With the ruination of all postcolonial layers of oppression, women in the margins could find real emancipation that they have always longed for through feminism that will take into consideration their context. This calls for the rethinking of feminism in different contexts because the conditions of the oppressed woman of the South cannot be the same as the conditions of the woman who considers herself oppressed in the North.Keywords: exploration, feminism, postcolonial, margins, South African, women
Procedia PDF Downloads 2224045 A Survey of Attacks and Security Requirements in Wireless Sensor Networks
Authors: Vishnu Pratap Singh Kirar
Abstract:
Wireless sensor network (WSN) is a network of many interconnected networked systems, they equipped with energy resources and they are used to detect other physical characteristics. On WSN, there are many researches are performed in past decades. WSN applicable in many security systems govern by military and in many civilian related applications. Thus, the security of WSN gets attention of researchers and gives an opportunity for many future aspects. Still, there are many other issues are related to deployment and overall coverage, scalability, size, energy efficiency, quality of service (QoS), computational power and many more. In this paper we discus about various applications and security related issue and requirements of WSN.Keywords: wireless sensor network (WSN), wireless network attacks, wireless network security, security requirements
Procedia PDF Downloads 4914044 Design and Realization of Computer Network Security Perception Control System
Authors: El Miloudi Djelloul
Abstract:
Based on analysis on applications by perception control technology in computer network security status and security protection measures, from the angles of network physical environment and network software system environmental security, this paper provides network security system perception control solution using Internet of Things (IOT), telecom and other perception technologies. Security Perception Control System is in the computer network environment, utilizing Radio Frequency Identification (RFID) of IOT and telecom integration technology to carry out integration design for systems. In the network physical security environment, RFID temperature, humidity, gas and perception technologies are used to do surveillance on environmental data, dynamic perception technology is used for network system security environment, user-defined security parameters, security log are used for quick data analysis, extends control on I/O interface, by development of API and AT command, Computer Network Security Perception Control based on Internet and GSM/GPRS is achieved, which enables users to carry out interactive perception and control for network security environment by WEB, E-MAIL as well as PDA, mobile phone short message and Internet. In the system testing, through middle ware server, security information data perception in real time with deviation of 3-5% was achieved; it proves the feasibility of Computer Network Security Perception Control System.Keywords: computer network, perception control system security strategy, Radio Frequency Identification (RFID)
Procedia PDF Downloads 4464043 Human Security Providers in Fragile State under Asymmetric War Conditions
Authors: Luna Shamieh
Abstract:
Various players are part of the game in an asymmetric war, all making efforts to provide human security to their own adherents. Although a fragile state is not able to provide sufficient and comprehensive services, it still provides special services and security to the elite; the insurgents as well provide services and security to their associates. The humanitarian organisations, on the other hand, provide some fundamental elements of human security, but only in the regions, they are able to access when possible (if possible). The counterinsurgents (security forces of the state and intervention forces) operate within a narrow band defined by the vision of the responsibility to protect and the perspective of the resolution of the conflict through combat; hence, the possibility to provide human security is shaken at this end. This article examines how each player provides human security from the perspective of freedom from want in order to secure basic and strategic needs, freedom from fear through providing protection against all kinds of violence, and the freedom to live in dignity. It identifies a vicious cycle caused by the intervention of the different players causing a centrifugal force that may lead to disintegration of the nation under war.Keywords: asymmetric war, counterinsurgency, fragile state, human security, insurgency
Procedia PDF Downloads 3344042 Review of Cyber Security in Oil and Gas Industry with Cloud Computing Perspective: Taxonomy, Issues and Future Direction
Authors: Irfan Mohiuddin, Ahmad Al Mogren
Abstract:
In recent years, cloud computing has earned substantial attention in the Oil and Gas Industry and provides services in all the phases of the industry lifecycle. Oil and gas supply infrastructure, in particular, is more vulnerable to accidental, natural and intentional threats because of its widespread distribution. Numerous surveys have been conducted on cloud security and privacy. However, to the best of our knowledge, hardly any survey is carried out that reviews cyber security in all phases with a cloud computing perspective. Moreover, a distinctive classification is performed for all the cloud-based cyber security measures based on the cloud component in use. The classification approach will enable researchers to identify the required technique used to enhance the security in specific cloud components. Also, the limitation of each component will allow the researchers to design optimal algorithms. Lastly, future directions are given to point out the imminent challenges that can pave the way for researchers to further enhance the resilience to cyber security threats in the oil and gas industry.Keywords: cyber security, cloud computing, safety and security, oil and gas industry, security threats, oil and gas pipelines
Procedia PDF Downloads 1434041 Blockchain Security in MANETs
Authors: Nada Mouchfiq, Ahmed Habbani, Chaimae Benjbara
Abstract:
The security aspect of the IoT occupies a place of great importance especially after the evolution that has known this field lastly because it must take into account the transformations and the new applications .Blockchain is a new technology dedicated to the data sharing. However, this does not work the same way in the different systems with different operating principles. This article will discuss network security using the Blockchain to facilitate the sending of messages and information, enabling the use of new processes and enabling autonomous coordination of devices. To do this, we will discuss proposed solutions to ensure a high level of security in these networks in the work of other researchers. Finally, our article will propose a method of security more adapted to our needs as a team working in the ad hoc networks, this method is based on the principle of the Blockchain and that we named ”MPR Blockchain”.Keywords: Ad hocs networks, blockchain, MPR, security
Procedia PDF Downloads 1854040 Review on Low Actuation Voltage RF Mems Switches
Authors: Hassan Saffari, Reza Askari Moghadam
Abstract:
In modern communication systems, it is highly demanded to achieve high performance with minimal power consumption. Low actuation voltage RF MEMS (Micro-Electro-Mechanical Systems) switches represent a significant advancement in this regard. These switches, with their ability to operate at lower voltages, offer promising solutions for enhancing connectivity while minimizing energy consumption. Microelectromechanical switches are good alternatives for electronic and mechanical switches due to their low insertion loss, high isolation, and fast switching speeds. They have attracted more attention in recent years. Most of the presented RF MEMS switches use electrostatic actuators due to their low power consumption. Low actuation voltage RF MEMS switches are among the important issues that have been investigated in research articles. The actuation voltage can be reduced by different methods. One usually implemented method is low spring constant structures. However, despite their numerous benefits, challenges remain in the widespread adoption of low-actuation voltage RF MEMS switches. Issues related to reliability, durability, and manufacturing scalability need to be addressed to realize their full potential in commercial applications. While overcoming certain challenges, their exceptional performance characteristics and compatibility with miniaturized electronic systems make them a promising choice for next-generation wireless communication and RF applications. In this paper, some previous works that proposed low-voltage actuation RF MEMS switches are investigated and analyzed.Keywords: RF MEMS switches, low actuation voltage, small spring constant structures, electrostatic actuation
Procedia PDF Downloads 464039 Design a Network for Implementation a Hospital Information System
Authors: Abdulqader Rasool Feqi Mohammed, Ergun Erçelebi̇
Abstract:
A large number of hospitals from developed countries are adopting hospital information system to bring efficiency in hospital information system. The purpose of this project is to research on new network security techniques in order to enhance the current network security structure of save a hospital information system (HIS). This is very important because, it will avoid the system from suffering any attack. Security architecture was optimized but there are need to keep researching on best means to protect the network from future attacks. In this final project research, security techniques were uncovered to produce best network security results when implemented in an integrated framework.Keywords: hospital information system, HIS, network security techniques, internet protocol, IP, network
Procedia PDF Downloads 4404038 Some Tips for Increasing Online Services Safety
Authors: Mohsen Rezaee
Abstract:
Although robust security softwares, including anti-viruses, anti-spywares, anti-spam and firewalls are amalgamated with new technologies such as safe zone, hybrid cloud, sand box and etc., and although it can be said that they have managed to prepare highest level of security against viruses, spywares and other malwares in 2012, in fact, hacker attacks to websites are increasingly becoming more and more complicated. Because of security matters developments it can be said it was expected to happen so. Here in this work we try to point out some functional and vital notes to enhance security on the web, enabling the user to browse safely in unlimited web world and to use virtual space securely.Keywords: firewalls, security, web services, computer science
Procedia PDF Downloads 4044037 An Architectural Model for APT Detection
Authors: Nam-Uk Kim, Sung-Hwan Kim, Tai-Myoung Chung
Abstract:
Typical security management systems are not suitable for detecting APT attack, because they cannot draw the big picture from trivial events of security solutions. Although SIEM solutions have security analysis engine for that, their security analysis mechanisms need to be verified in academic field. Although this paper proposes merely an architectural model for APT detection, we will keep studying on correlation analysis mechanism in the future.Keywords: advanced persistent threat, anomaly detection, data mining
Procedia PDF Downloads 5284036 Study of the Effect of the Continuous Electric Field on the Rd Cancer Cell Line by Response Surface Methodology
Authors: Radia Chemlal, Salim Mehenni, Dahbia Leila Anes-boulahbal, Mohamed Kherat, Nabil Mameri
Abstract:
The application of the electric field is considered to be a very promising method in cancer therapy. Indeed, cancer cells are very sensitive to the electric field, although the cellular response is not entirely clear. The tests carried out consisted in subjecting the RD cell line under the effect of the continuous electric field while varying certain parameters (voltage, exposure time, and cell concentration). The response surface methodology (RSM) was used to assess the effect of the chosen parameters, as well as the existence of interactions between them. The results obtained showed that the voltage, the cell concentration as well as the interaction between voltage and exposure time have an influence on the mortality rate of the RD cell line.Keywords: continuous electric field, RD cancer cell line, RSM, voltage
Procedia PDF Downloads 1134035 Voltage Controlled Ring Oscillator for RF Applications in 0.18 µm CMOS Technology
Authors: Mohammad Arif Sobhan Bhuiyan, Zainal Abidin Nordin, Mamun Bin Ibne Reaz
Abstract:
A compact and power efficient high performance Voltage Controlled Oscillator (VCO) is a must in analog and digital circuits especially in the communication system, but the best trade-off among the performance parameters is a challenge for researchers. In this paper, a design of a compact 3-stage differential voltage controlled ring oscillator (VCRO) with low phase noise, low power and higher tuning bandwidth is proposed in 0.18 µm CMOS technology. The VCRO is designed with symmetric load and positive feedback techniques to achieve higher gain and minimum delay. The proposed VCRO can operate at tuning range of 3.9-5.0 GHz at 1.6 V supply voltage. The circuit consumes only 1.0757 mW of power and produces -129 dbc/Hz. The total active area of the proposed VCRO is only 11.74 x 37.73 µm2. Such a VCO can be the best choice for compact and low-power RF applications.Keywords: CMOS, VCO, VCRO, oscillator
Procedia PDF Downloads 4754034 A Study of the British Security Disembedding Mechanism from a Comparative Political Perspective: Centering on the Bosnia War and the Russian-Ukrainian War
Abstract:
Globalization has led to an increasingly interconnected international community and transmitted risks to every corner of the world through the chain of globalization. Security risks arising from international conflicts seem inescapable. Some countries have begun to build their capacity to deal with the globalization of security risks. They establish disembedding security mechanisms that transcend spatial or temporal boundaries and promote security cooperation with countries or regions that are not geographically close. This paper proposes four hypotheses of the phenomenon of "risks and security disembedding" in the post-Cold War international society and uses them to explain The United Kingdom’s behavior in the Bosnian War and the Russo-Ukrainian War. In the Bosnian War, confident in its own security and focused on maintaining European stability, The UK has therefore chosen to be cautious in its use of force in international frameworks such as the EU and to maintain a very limited intervention in Bosnia and Herzegovina's affairs. In contrast, the failure of the EU and NATO’s security mechanism in the Russo-Ukrainian war heightened Britain's anxiety, and the volatile international situation led it to show a strong tendency towards security disembedding, choosing to conclude security communities with extra-territorial states. Analysis suggests that security mechanisms are also the starting point of conflict and that countries will rely more on disembedding mechanisms to counteract the global security risks. The current mechanism of security disembedding occurs as a result of the global proliferation of security perceptions as a symbolic token and the recognition of an expert system of security mechanisms formed by states with similar security perceptions.Keywords: disembedding mechanism, bosnia war, the russian-ukrainian war, british security strategy
Procedia PDF Downloads 864033 Superordinated Control for Increasing Feed-in Capacity and Improving Power Quality in Low Voltage Distribution Grids
Authors: Markus Meyer, Bastian Maucher, Rolf Witzmann
Abstract:
The ever increasing amount of distributed generation in low voltage distribution grids (mainly PV and micro-CHP) can lead to reverse load flows from low to medium/high voltage levels at times of high feed-in. Reverse load flow leads to rising voltages that may even exceed the limits specified in the grid codes. Furthermore, the share of electrical loads connected to low voltage distribution grids via switched power supplies continuously increases. In combination with inverter-based feed-in, this results in high harmonic levels reducing overall power quality. Especially high levels of third-order harmonic currents can lead to neutral conductor overload, which is even more critical if lines with reduced neutral conductor section areas are used. This paper illustrates a possible concept for smart grids in order to increase the feed-in capacity, improve power quality and to ensure safe operation of low voltage distribution grids at all times. The key feature of the concept is a hierarchically structured control strategy that is run on a superordinated controller, which is connected to several distributed grid analyzers and inverters via broad band powerline (BPL). The strategy is devised to ensure both quick response time as well as the technically and economically reasonable use of the available inverters in the grid (PV-inverters, batteries, stepless line voltage regulators). These inverters are provided with standard features for voltage control, e.g. voltage dependent reactive power control. In addition they can receive reactive power set points transmitted by the superordinated controller. To further improve power quality, the inverters are capable of active harmonic filtering, as well as voltage balancing, whereas the latter is primarily done by the stepless line voltage regulators. By additionally connecting the superordinated controller to the control center of the grid operator, supervisory control and data acquisition capabilities for the low voltage distribution grid are enabled, which allows easy monitoring and manual input. Such a low voltage distribution grid can also be used as a virtual power plant.Keywords: distributed generation, distribution grid, power quality, smart grid, virtual power plant, voltage control
Procedia PDF Downloads 2674032 Voltage Stabilization of Hybrid PV and Battery Systems by Considering Temperature and Irradiance Changes in Standalone Operation
Authors: S. Jalilzadeh, S. M. Mohseni Bonab
Abstract:
Solar and battery energy storage systems are very useful for consumers who live in deprived areas and do not have access to electricity distribution networks. Nowadays one of the problems that photo voltaic systems (PV) have changing of output power in temperature and irradiance variations, which directly affects the load that is connected to photo voltaic systems. In this paper, with considering the fact that the solar array varies with change in temperature and solar power radiation, a voltage stabilizer system of a load connected to photo voltaic array is designed to stabilize the load voltage and to transfer surplus power of the battery. Also, in proposed hybrid system, the needed load power amount is supplemented considering the voltage stabilization in standalone operation for supplying unbalanced AC load. Electrical energy storage system for voltage control and improvement of the performance of PV by a DC/DC converter is connected to the DC bus. The load is also feed by an AC/DC converter. In this paper, when the voltage increases in its reference limit, the battery gets charged by the photo voltaic array and when it decreases in its defined limit, the power gets injected to the DC bus by this battery. The constant of DC bus Voltage is the cause for the reduced harmonics generated by the inverter. In addition, a series of filters are provided in the inverter output in to reduced harmonics. The inverter control circuit is designed that the voltage and frequency of the load remain almost constant at different load conditions. This paper has focused on controlling strategies of converters to improve their performance.Keywords: photovoltaic array (PV), DC/DC Boost converter, battery converter, inverters control
Procedia PDF Downloads 4854031 Power Flow and Modal Analysis of a Power System Including Unified Power Flow Controller
Authors: Djilani Kobibi Youcef Islam, Hadjeri Samir, Djehaf Mohamed Abdeldjalil
Abstract:
The Flexible AC Transmission System (FACTS) technology is a new advanced solution that increases the reliability and provides more flexibility, controllability, and stability of a power system. The Unified Power Flow Controller (UPFC), as the most versatile FACTS device for regulating power flow, is able to control respectively transmission line real power, reactive power, and node voltage. The main purpose of this paper is to analyze the effect of the UPFC on the load flow, the power losses, and the voltage stability using NEPLAN software modules, Newton-Raphson load flow is used for the power flow analysis and the modal analysis is used for the study of the voltage stability. The simulation was carried out on the IEEE 14-bus test system.Keywords: FACTS, load flow, modal analysis, UPFC, voltage stability
Procedia PDF Downloads 5164030 Optimal Placement and Sizing of Energy Storage System in Distribution Network with Photovoltaic Based Distributed Generation Using Improved Firefly Algorithms
Authors: Ling Ai Wong, Hussain Shareef, Azah Mohamed, Ahmad Asrul Ibrahim
Abstract:
The installation of photovoltaic based distributed generation (PVDG) in active distribution system can lead to voltage fluctuation due to the intermittent and unpredictable PVDG output power. This paper presented a method in mitigating the voltage rise by optimally locating and sizing the battery energy storage system (BESS) in PVDG integrated distribution network. The improved firefly algorithm is used to perform optimal placement and sizing. Three objective functions are presented considering the voltage deviation and BESS off-time with state of charge as the constraint. The performance of the proposed method is compared with another optimization method such as the original firefly algorithm and gravitational search algorithm. Simulation results show that the proposed optimum BESS location and size improve the voltage stability.Keywords: BESS, firefly algorithm, PVDG, voltage fluctuation
Procedia PDF Downloads 3214029 The Impact of Human Resources Management on the Job Security of Self-Initiated Expatriates after the Brexit
Authors: Yllka Hysaj, Ylberina Hysaj Arifi
Abstract:
Recently, with BREXIT taking place, organizations and employees have been affected in the way of job and employment security. Career-oriented human resources management (HRM) practices are likely to facilitate self-initiated expatriates’ adjustment to the host country. This was related to the career security (job security and employment security), which were missing in their home country and seemed to be important elements to adjust to the host country. The aim of this study is to assess whether the perception of career security by Frances self-initiated expatriates (SIEs) have changed in the wake of the referendum result. Quantitative research method will be used, and the data will be collected through electronic questionnaires. Data will be analyzed through Statistical Package for the Social Sciences (SPSS). The study variables will include an adjustment to the host country, HRM practices, employability, and job security. Predicted results consist that career-oriented HRM practices are positively related to the adjustment to the host country, employability, and job security. However, with Brexit, there might be a negative relationship between career-oriented HRM practices and job security.Keywords: migration, self-initiated expatriates, Brexit, job security
Procedia PDF Downloads 1704028 The Application of the Security Audit Method on the Selected Objects of Critical Infrastructure
Authors: Michaela Vašková
Abstract:
The paper is focused on the application of the security audit method on the selected objects of the critical infrastructure. The emphasis is put on security audit method to find gaps in the critical infrastructure security. The theoretical part describes objects of the critical infrastructure. The practical part describes using the security audit method. The main emphasis was put on the protection of the critical infrastructure in the Czech Republic.Keywords: crisis management, critical infrastructure, object of critical infrastructure, security audit, extraordinary event
Procedia PDF Downloads 4314027 Low Voltage Ride through Capability Techniques for DFIG-Based Wind Turbines
Authors: Sherif O. Zain Elabideen, Ahmed A. Helal, Ibrahim F. El-Arabawy
Abstract:
Due to the drastic increase of the wind turbines installed capacity; the grid codes are increasing the restrictions aiming to treat the wind turbines like other conventional sources sooner. In this paper, an intensive review has been presented for different techniques used to add low voltage ride through capability to Doubly Fed Induction Generator (DFIG) wind turbine. A system model with 1.5 MW DFIG wind turbine is constructed and simulated using MATLAB/SIMULINK to explore the effectiveness of the reviewed techniques.Keywords: DFIG, grid side converters, low voltage ride through, wind turbine
Procedia PDF Downloads 4254026 Redefining State Security Using Gender: Case Study of the United States of America Post-Cold War
Authors: E. K. Linsenmayer
Abstract:
Traditional international relations theorists define state security, the principal national interest, as a state’s military force. However, many political theorists argue the current definition of security is not comprehensive and therefore, problematic. This paper argues that women’s physical security is not only linked but also necessary to achieve state security. In today’s unipolar political international system, the United States continues to accredit national security to its military. However, in one of the most militarized countries, women remain insecure. Through a case study method of the United States, this paper illuminates a necessary political prescription: the empowerment of women through an inside-out, feminist theoretical approach that makes state security attainable. The research through empirical testing, drawing from several databases, shows the positive effects of women’s physical security on state security. Women’s physical security is defined in terms of equal legal practices, health, education, and female representation in the government. State security is measured by the relative peace of a state, its involvement in conflict and a state’s relations with neighboring states. This paper shows that empowering women, 50% of the world’s population, is necessary for ending the current vicious circle of militarization, war, and insecurity. Without undoing gender power dynamics at the individual and societal level, security at all levels remains unattainable.Keywords: gender inequality, politics, state security, women's security
Procedia PDF Downloads 2074025 Hybrid Approach for Controlling Inductive Load Fed by a Multicellular Converter by Using the Petri Nets
Authors: I. Bentchikou, A. Tlemcani, F. Boudjema, D. Boukhetala, N. Ould Cherchali
Abstract:
In this paper, hybrid approach is proposed to regulate the voltages of the floating capacitor multicell inverter and the current in the load. This structure makes it possible to ensure the distribution of the voltage stresses on the various low-voltage semiconductor components connected in series. And as the problem and to keep a constant voltage across the capacitors. Thus, it is necessary to ensure a distribution balanced voltages at the terminals of floating capacitors thanks to Algorithm develop for this, using the Petri nets. So we consider a three-cell converter represented as a hybrid system with eight modes of operation. The operating modes of the system are governed by the control reference voltage and a reference current. Finally, we present the results of the simulation with MATLAB/SIMULINK to illustrate the performances of this approach.Keywords: hybrid control, floating condensers, multicellular converter, petri nets
Procedia PDF Downloads 1274024 Sliding Mode Control of a Photovoltaic Grid-Connected System with Active and Reactive Power Control
Authors: M. Doumi, K. Tahir, A. Miloudi, A. G. Aissaoui, C. Belfedal, S. Tahir
Abstract:
This paper presents a three-phase grid-connected photovoltaic generation system with unity power factor for any situation of solar radiation based on voltage-oriented control (VOC). An input voltage clamping technique is proposed to control the power between the grid and photovoltaic system, where it is intended to achieve the maximum power point operation. This method uses a Perturb and Observe (P&O) controller. The main objective of this work is to compare the energy production unit performances by the use of two types of controllers (namely, classical PI and Sliding Mode (SM) Controllers) for the grid inverter control. The proposed control has a hierarchical structure with a grid side control level to regulate the power (PQ) and the current injected to the grid and to obtain a common DC voltage constant. To show the effectiveness of both control methods performances analysis of the system are analyzed and compared by simulation and results included in this paper.Keywords: grid connected photovoltaic, MPPT, inverter control, classical PI, sliding mode, DC voltage constant, voltage-oriented control, VOC
Procedia PDF Downloads 6094023 Characterization of current–voltage (I–V) and capacitance–voltage–frequency (C–V–f) features of Au/GaN Schottky diodes
Authors: Abdelaziz Rabehi
Abstract:
The current–voltage (I–V) characteristics of Au/GaN Schottky diodes were measured at room temperature. In addition, capacitance–voltage–frequency (C–V–f) characteristics are investigated by considering the interface states (Nss) at frequency range 100 kHz to 1 MHz. From the I–V characteristics of the Schottky diode, ideality factor (n) and barrier height (Φb) values of 1.22 and 0.56 eV, respectively, were obtained from a forward bias I–V plot. In addition, the interface states distribution profile as a function of (Ess − Ev) was extracted from the forward bias I–V measurements by taking into account the bias dependence of the effective barrier height (Φe) for the Schottky diode. The C–V curves gave a barrier height value higher than those obtained from I–V measurements. This discrepancy is due to the different nature of the I–V and C–V measurement techniques.Keywords: Schottky diodes, frequency dependence, barrier height, interface states
Procedia PDF Downloads 3024022 Low-Voltage Multiphase Brushless DC Motor for Electric Vehicle Application
Authors: Mengesha Mamo Wogari
Abstract:
In this paper, low voltage multiphase brushless DC motor with square wave air-gap flux distribution for electric vehicle application is proposed. Ten-phase, 5 kW motor, has been designed and simulated by finite element methods demonstrating the desired high torque capability at low speed and flux weakening operation for high-speed operations. The motor torque is proportional to number of phases for a constant phase current and air-gap flux. The concept of vector control and simple space vector modulation technique is used on MATLAB to control the motor demonstrating simple switching pattern for selected number of phases. The low voltage DC and inverter output AC are desired characteristics to avoid any electric shock in the vehicle, accidentally and during abnormal conditions. The switching devices for inverter are of low-voltage rating and cost effective though their number is equal to twice the number of phases.Keywords: brushless DC motors, electric Vehicle, finite element methods, Low-voltage inverter, multiphase
Procedia PDF Downloads 1534021 Ultra-High Voltage Energization of Electrostatic Precipitators for Coal Fired Boilers
Authors: Mads Kirk Larsen
Abstract:
Strict air pollution control is today high on the agenda world-wide. By reducing the particular emission, not only the mg/Nm3 will be reduced – also parts of mercury and other hazardous matters attached to the particles will be reduced. Furthermore, it is possible to catch the fine particles (PM2.5). For particulate control, the precipitators are still the preferred choice and much efforts have been done to improve the efficiencies. Many ESP’s have seen electrical upgrading by changing the traditional 1 phase power system into either 3 phase or SMPS (High Frequency) units. However, there exist a 4th type of power supply – the pulse type. This is unfortunately widely unknown, but may be of great benefit to power plants. The FLSmidth type is called COROMAX® and it is a high voltage pulse generator for precipitators using a semiconductor switch operating at medium potential. The generated high voltage pulses have rated amplitude of 80 kV and duration of 75 μs and are superimposed on a variable base voltage of 60 kV rated voltage. Hereby, achieving a peak voltage of 140 kV. COROMAX® has the ability to increase the voltage beyond the natural spark limit inside the precipitator. Voltage levels may often be twice as high after installation of COROMAX®. Hereby also the migration velocity increases and thereby the efficiency. As the collection efficiency is proportional to the voltage peak and mean values, this also increases the collection efficiency of the fine particles where test has shown 80% removal of particles less than 0.07 micron. Another great advantage is the indifference to back-corona. Simultaneously with emission reduction, the power consumption will also be reduced. Another great advantage of the COROMAX® system is that the emission can be improved without the need to change the internal parts or enlarge the ESP. Recently, more than 150 units have been installed in China, where emissions have been reduced to ultra-low levels.Keywords: eleectrostatic precipitator, high resistivity dust, micropulse energization, particulate removal
Procedia PDF Downloads 3004020 English Title Adaptive Comparison of Outdoor and Indoor Social Security in Damaged Area and New Residential Complex with Two-Way Anova Case Study: Qasr-Al-Dasht and Moalem District in Shiraz
Authors: Homa Parmoon, Narges Hamzeh
Abstract:
Since today's urban spaces are disposed towards behavioral disorders and lack of security, both qualitative and quantitative aspects of security especially social and physical security are considered as basic necessities in urban planning. This research focused on the variable of place of living, examined social security in the old and new textures, and investigated the amount of residents’ social security in Shiraz including safety, financial, emotional and moral security. To this end, two neighborhoods in region 1 of Shiraz- Qasr-Al-Dasht (old texture) and Moalem (new texture)- were examined through a comparative study of 60 samples lived in two neighborhoods. Data were gathered through two-way ANOVA between the variables of residential context and internal and external security. This analysis represents the significance or insignificance of the model as well as the individual effects of each independent variable on the dependent variable. It was tested by ANCOVA and F-test. Research findings indicated place of living has a significant effect on families’ social security. The safety, financial, emotional, and moral security also represented a great impact on social security. As a result, it can be concluded that social security changes with the changing in place of living.Keywords: social security, damaged area, two-way ANOVA, Shiraz
Procedia PDF Downloads 1394019 Reform of the Law Relating to Personal Property Security
Authors: Ji Lian Yap
Abstract:
This paper will critically consider developments in 2014 in relation to the law relating to security over personal property in Hong Kong. The rules governing the registration of charges under the Hong Kong Companies Ordinance will be examined. Case law relating to personal property security will also be discussed. The transplantation of the floating charge into China’s Property Law will also be considered.Keywords: personal property, security law, reform of the law, law
Procedia PDF Downloads 4254018 Dynamic Voltage Restorer Control Strategies: An Overview
Authors: Arvind Dhingra, Ashwani Kumar Sharma
Abstract:
Power quality is an important parameter for today’s consumers. Various custom power devices are in use to give a proper supply of power quality. Dynamic Voltage Restorer is one such custom power device. DVR is a static VAR device which is used for series compensation. It is a power electronic device that is used to inject a voltage in series and in synchronism to compensate for the sag in voltage. Inductive Loads are a major source of power quality distortion. The induction furnace is one such typical load. A typical induction furnace is used for melting the scrap or iron. At the time of starting the melting process, the power quality is distorted to a large extent especially with the induction of harmonics. DVR is one such approach to mitigate these harmonics. This paper is an attempt to overview the various control strategies being followed for control of power quality by using DVR. An overview of control of harmonics using DVR is also presented.Keywords: DVR, power quality, harmonics, harmonic mitigation
Procedia PDF Downloads 377