1,644 research outputs found

    Time traveler : interpreting landscape process through time by immersive narrative

    Get PDF
    Phenomenon1: A fact or situation happens in the present or current period, like this moment’s wind or this spring’s raining. People usually have a sensory experience of the phenomenon. Landscape Process: a. The phenomenon is extending and changing through time. b. Nature tries to take back its space/land verses human construction and expansion through natural powers like tsunami, forestification. c. The landscape designer is using ecological methods to recover or improve the environment. Problems: Landscape process, whether through natural behavior or human behavior, usually takes decades or even centuries to see its impacts. For instance, the ice age2 iteration is about 100,000 year, and right now, we are at the end of a 10,000 year small ice age period. It would be extremely hard for the public to envision such long process and its impacts on personal life and city. As a designer or decision maker, it is important to understand and emphasize the issue of landscape process. Traditional media has a hard time doing this. However, virtual reality as a new media has unique qualities that could potentially represent and communicate landscape process through time effectively. Question: “How to interpret LANDSCAPE PROCESS through TIME by first-person IMMERSIVE NARRATIVE?

    Cyber-Based Contingency Analysis and Insurance Implications of Power Grid

    Get PDF
    Cybersecurity for power communication infrastructure is a serious subject that has been discussed for a decade since the first North American Electric Reliability Corporation (NERC) critical infrastructure protection (CIP) initiative in 2006. Its credibility on plausibility has been evidenced by attack events in the recent past. Although this is a very high impact, rare probability event, the establishment of quantitative measures would help asset owners in making a series of investment decisions. First, this dissertation tackles attackers\u27 strategies based on the current communication architecture between remote IP-based (unmanned) power substations and energy control centers. Hypothetically, the identification of intrusion paths will lead to the worst-case scenarios that the attackers could do harm to the grid, e.g., how this switching attack may perturb to future cascading outages within a control area when an IP-based substation is compromised. Systematic approaches are proposed in this dissertation on how to systematically determine pivotal substations and how investment can be prioritized to maintain and appropriate a reasonable investment in protecting their existing cyberinfrastructure. More specifically, the second essay of this dissertation focuses on digital protecting relaying, which could have similar detrimental effects on the overall grid\u27s stability. The R-k contingency analyses are proposed to verify with steady-state and dynamic simulations to ensure consistencies of simulation outcome in the proposed modeling in a power system. This is under the assumption that attackers are able to enumerate all electronic devices and computers within a compromised substation network. The essay also assists stakeholders (the defenders) in planning out exhaustively to identify the critical digital relays to be deployed in substations. The systematic methods are the combinatorial evaluation to incorporate the simulated statistics in the proposed metrics that are used based on the physics and simulation studies using existing power system tools. Finally, a risk transfer mechanism of cyber insurance against disruptive switching attacks is studied comprehensively based on the aforementioned two attackers\u27 tactics. The evaluation hypothetically assesses the occurrence of anomalies and how these footprints of attackers can lead to a potential cascading blackout as well as to restore the power back to normal stage. The research proposes a framework of cyber insurance premium calculation based on the ruin probability theory, by modeling potential electronic intrusion and its direct impacts. This preliminary actuarial model can further improve the security of the protective parameters of the critical infrastructure via incentivizing investment in security technologies

    A Conjugate System for Twisted Araki-Woods von Neumann Algebras of finite dimensional spaces

    Full text link
    We compute the conjugate system of twisted Araki-Woods von Neumann algebras LT(H) \mathcal{L}_T(H) for a compatible braided crossing symmetric twist TT on a finite dimensional Hilbert space H \mathcal{H} with norm ∥T∥<1 \|T\| <1. This implies that those algebras have finite non-microstates free Fisher information and therefore are always factors of type IIIλ\text{III}_\lambda (0<λ≤10<\lambda\leq 1) or II1 \text{II}_1 . Moreover, using the nontracial free monotone transport, we show that LT(H) \mathcal{L}_T(H) is isomorphic to the free Araki-Woods algebra L0(H) \mathcal{L}_0(H) when ∥T∥=q \|T\|=q is small enough.Comment: v2: 33 pages, fixed typos. Added infinite dimension cases in Example 2.1
    • …
    corecore