Results (44)
Search Parameters:
Keyword: ProtectionTemperature-Compensated Overcharge Protection Measurement Technology
Recently, many problems have been caused by battery fires. The existing BMS(Battery Managment System) measured the voltage of each cell of the battery through the physical connection between the battery and the control module. However, if a battery with up to 1000 VDC becomes inoperable due to an external factor, the battery is damaged, and…
Read MoreInvestigation of the Impact of Distributed Generation on Power System Protection
Integration of Distributed Generation (DG) on distribution networks has a positive impact which includes the following: low power losses, improved utility system reliability and voltage improvement at buses. A real distribution network is radial in which energy flow is unidirectional from generation to transmission and from distribution to the load. However, when a DG is…
Read MoreBrcLightning – Risk Analysis and Scaling for Protection against Atmospheric Discharge – Extender
This manuscript intending to publicize the improvements incorporated in the BrcLightning application, including the Risk Analysis module with the help of a pop-up, which provides the result and assists in the identification of mitigating measures by the professional, which must be defined to reduce the calculated risks. Other points addressed in this extension are the…
Read MoreEvaluation of Personal Solar UV Exposure in a Group of Italian Dockworkers and Fishermen, and Assessment of Changes in Sun Protection Behaviours After a Sun-Safety Training
Solar ultraviolet radiation (UVR) is considered a relevant health risk for the workers of the maritime and port sectors, but scant data are available on actual exposure measured using personal dosimeters. Moreover, in outdoor workers sun protection habits are usually poor, while some promising data suggest that sun-safety campaigns can be effective in increasing self-protection…
Read MoreTime Granularity-based Privacy Protection for Cloud Metering Systems
Due to the advent of cloud computing and Internet of Things, smart meters have become a crucial part of smart cities. Smart meters generate vast amounts of fine-grained data that can immediately provide useful information to electricity consumers, such as automatic billing, load monitoring, and dynamic time pricing. This will make the electricity consumers more…
Read MoreSurge Protection Device for Ex Application
A modern process plant is controlled, operated and safeguarded by the sophisticated distributed control system or a programmable logic controller and an emergency shutdown system. This process plant’s operation could be seriously affected by lightning, electrical switching, and power outrage. Lightning propagation can travel kilometers away, which has the risk of disturbing the control system’s…
Read MoreDetermination of Submerged Breakwater Location for Coastal Protection in Panjang Island Waters Jepara
Panjang Island is one of the islands which is categorized as a small island and is located in Jepara District, Jepara Regency, Central Java Province. The problem faced by Panjang Island is erosion, which increasingly erodes the shoreline and begins to damage buildings on the beach. A solution that is effective enough to overcome erosion…
Read MoreThe Internet of Things ecosystem: the blockchain and data protection issues
The IoT is innovative and important phenomenon prone to several services and applications such as the blockchain which an emerging phenomenon. We can describe the blockchain as blockchain as a service because of the opportunity to use several applications based on this technology. We, indeed, should take into account the legal issues related to the…
Read MoreA Joint Safety and Security Analysis of message protection for CAN bus protocol
One of the prominent challenges of the automotive-transportation system is represented by the integration of security and safety properties within protocols, applications and connectivity mechanisms. A joint safety/security design can sometimes expose to trade-offs, since their requirements may not match perfectly or even be incompatible. This paper analyses an example of security and safety design,…
Read MoreEstimation of digital protection devices applicability on basis of multiple characterizing parameters
The contemporary electrical power systems (EPS) impose increased requirements for the functionality of the protection systems. The necessity of improved EPS stability is in some extent resulting of the increased integration of renewable sources of electrical energy. The future grid development gives perspective for connection of more converter based generations. The power electronic schemes and…
Read MorePerformance of Surge Arrester Installation to Enhance Protection
The effects of abnormal voltages on power system equipment and appliances in the home have raise concern as most of the equipments are very expensive. Each piece of electrical equipment in an electrical system needs to be protected from surges. To prevent damage to electrical equipment, surge protection considerations are paramount to a well designed…
Read MoreMulti Attribute Stratified Sampling: An Automated Framework for Privacy-Preserving Healthcare Data Publishing with Multiple Sensitive Attributes
The accumulation and analysis of large-scale patient data have led to breakthrough discoveries in potential flags for diseases based on pattern recognition, highlight medication efficacy, and local population health trends that would be impossible with traditional paper-based records. However, these benefits come with unique challenges posed by the application of data sharing for research and…
Read MoreHardware and Secure Implementation of Enhanced ZUC Steam Cipher Based on Chaotic Dynamic S-Box
Despite the development of the Internet and wired networks such as fiber optics, mobile networks remain the most used thanks to the mobility they offer to the user. However, data protection in these networks is more complex because of the radio channels they use for transmission. Hence,there is a need to find more sophisticated data…
Read MoreExploring Current Challenges on Security and Privacy in an Operational eHealth Information System
Bearing in mind that patient data is extremely sensitive, it is crucial to establish strong protection when the security and privacy of healthcare data are concerned. Prioritizing data security and privacy is essential for the overall healthcare industry in order to maintain the reliability of electronic healthcare (eHealth) information systems. This study explores the gathered…
Read MoreThe Effect of Introduction of Wind Energy System on the Energy Networks
The increase electricity production based on renewable energies sources responds to the requirements of sustainable development. In recent years, the investment in the wind energy sector has increased to satisfy green electricity generation and environment protection. Wind energy is currently the most competitive energy resource that is part of the world’s countries views on the…
Read MoreWaterfall: Salto Collazo. High-Level Design of Tokenomics
This article explains the fundamental principles of the economic policy that are integrated into the decentralized public platform Waterfall. The platform has a DAG (Directed Acyclic Graph) based system architecture and is designed to develop decentralized applications and financial services. The main goal of this work is to create a favorable environment that incentivizes positive…
Read MoreNatural Tsunami Wave Amplitude Reduction by Straits – Seto Inland Sea
Seto Inland Sea is situated between Japanese islands Honshu, Kyushu, and Shikoku. It is separated from the ocean by the Bungo Channel, Kii Channel, and other narrow straits around Shikoku Island. The objective of the article is to draw the attention to the question of how well the coastal population and infrastructure of those locations…
Read MorePhysics behind the Concept of a Sodium-Potassium-Cesium-Cooled Martian Nuclear Reactor
The main goal of the work is to determine the basic conceptual solutions of a nuclear reactor operating on the surface of another planet. The problem was solved using the example of the Martian nuclear power plant. The article uses calculation and optimization research methods and corresponding program codes (well-known and author’s). The results of…
Read MoreEnvironmental Acoustics Modelling Techniques for Forest Monitoring
Environmental sounds detection plays an increasing role in computer science and robotics as it simulates the human faculty of hearing. It is applied in environment research, monitoring and protection, by allowing investigation of natural reserves, and showing potential risks of damage that can be deduced from the environmental acoustic. The research presented in this paper…
Read MoreExposure to Optical Radiation and Electromagnetic Fields at the Workplace: Criteria for Occupational Health Surveillance According to Current European Legislation
A very large number of workers is occupationally exposed to Optical Radiation (OR) worldwide, while indeed nowadays an exposure to Electromagnetic fields (EMF) can occur in almost all workplaces. OR origin can be natural, including the most relevant source, i.e. the sun, or artificial, that can be further classified in incoherent and coherent, i.e. the…
Read MoreAn Innovative Angle of Attack Virtual Sensor for Physical-Analytical Redundant Measurement System Applicable to Commercial Aircraft
The angle of attack is a critical flight parameter for commercial aviation aircraft, because automatic envelope protection systems rely on it to keep the aircraft within its safe flight envelope. Faulty measurements of the angle of attack could have catastrophic effects, leading to aircraft loss of control in flight and fatalities, as demonstrated by the…
Read MoreWaste To Energy Feedstock Sources for the Production of Biodiesel as Fuel Energy in Diesel Engine – A Review
In the recent past, there has been a renewed shift into biomass and other recycled waste sources for biodiesel production and utilization. This is a critical area of research and study in which this present work intends to review and identify gaps in literature by shifting the focus of review to non-plant based sources for…
Read MoreEvaluation of the Living Condition in Fishermen Settlement in the Coastal Area of Marisa City, Gorontalo Province
The population living in the residential area in two villages, including Pohuwato village and Pohuwato Timur village, are mostly fishermen, who live under the poverty line, meaning that the people there have low income. The objective of the present study was to explore the living condition in terms of the physical, social, and economic aspects…
Read MoreElectronic Warfare Methods Combatting UAVs
This paper describes methods of eliminating Unmanned Aerial Vehicles (UAV) non-destructively, using Electronic Warfare Methods. The aim is to introduce certain methods of UAV detection and elimination in a complex environment and terrain, e.g., in an urban and battlefield environment, that will result in finding the control device position and the UAV itself. Neural networks,…
Read MoreDC-DC Buck Converter Driver with Variable Off-Time Peak Current Mode Control
Power converters in automotive industries are needed to source electronic devices. DC-DC Buck converter allows to drive loads ensuring their safety operation taking the car battery voltage as an input to generate a sub-voltage or current. By means of a control loop, the system makes sure that the output variable has the desired value in…
Read More
