67,688 research outputs found

    Practical applications of data mining in plant monitoring and diagnostics

    Get PDF
    Using available expert knowledge in conjunction with a structured process of data mining, characteristics observed in captured condition monitoring data, representing characteristics of plant operation may be understood, explained and quantified. Knowledge and understanding of satisfactory and unsatisfactory plant condition can be gained and made explicit from the analysis of data observations and subsequently used to form the basis of condition assessment and diagnostic rules/models implemented in decision support systems supporting plant maintenance. This paper proposes a data mining method for the analysis of condition monitoring data, and demonstrates this method in its discovery of useful knowledge from trip coil data captured from a population of in-service distribution circuit breakers and empirical UHF data captured from laboratory experiments simulating partial discharge defects typically found in HV transformers. This discovered knowledge then forms the basis of two separate decision support systems for the condition assessment/defect clasification of these respective plant items

    Reed Canarygrass in Alaska

    Get PDF
    North American strains of reed canarygrass (Phalaris arundinacea L.) frequently sustain severe winter injury or total winterkill in southcentral Alaska. Objectives of this study were to compare reed canarygrass strains adapted to extreme northern latitudes in Europe with North American cultivars for winter-hardiness and forage production in Alaska

    Polyimides with carbonyl and ether connecting groups between the aromatic rings

    Get PDF
    New polyimides have been prepared from the reaction of aromatic dianhydrides with novel aromatic diamines containing carbonyl and ether connecting groups between the aromatic rings. Several of these polyimides are shown to be semi-crystalline as evidenced by wide angle x ray diffraction and differential scanning calorimetry. Most of the polyimides form tough solvent resistant films with high tensile properties. Several of these materials can be thermally processed to form solvent and base resistant moldings

    Methyl substituted polyimides containing carbonyl and ether connecting groups

    Get PDF
    Polyimides were prepared from the reaction of aromatic dianhydrides with novel aromatic diamines having carbonyl and ether groups connecting aromatic rings containing pendant methyl groups. The methyl substituent polyimides exhibit good solubility and form tough, strong films. Upon exposure to ultraviolet irradiation and/or heat, the methyl substituted polyimides crosslink to become insoluble

    Exploiting multi-agent system technology within an autonomous regional active network management system

    Get PDF
    This paper describes the proposed application of multi-agent system (MAS) technology within AuRA-NMS, an autonomous regional network management system currently being developed in the UK through a partnership between several UK universities, distribution network operators (DNO) and a major equipment manufacturer. The paper begins by describing the challenges facing utilities and why those challenges have led the utilities, a major manufacturer and the UK government to invest in the development of a flexible and extensible active network management system. The requirements the utilities have for a network automation system they wish to deploy on their distribution networks are discussed in detail. With those requirements in mind the rationale behind the use of multi-agent systems (MAS) within AuRA-NMS is presented and the inherent research and design challenges highlighted including: the issues associated with robustness of distributed MAS platforms; the arbitration of different control functions; and the relationship between the ontological requirements of Foundation for Intelligent Physical Agent (FIPA) compliant multi-agent systems, legacy protocols and standards such as IEC 61850 and the common information model (CIM)

    Securing a Quantum Key Distribution Network Using Secret Sharing

    Full text link
    We present a simple new technique to secure quantum key distribution relay networks using secret sharing. Previous techniques have relied on creating distinct physical paths in order to create the shares. We show, however, how this can be achieved on a single physical path by creating distinct logical channels. The technique utilizes a random 'drop-out' scheme to ensure that an attacker must compromise all of the relays on the channel in order to access the key
    • …
    corecore