FAULT LOCATION AND SERVICE RESTORATION METHOD FOR LARGE-SCALE DISTRIBUTION NETWORKS

Size: px
Start display at page:

Download "FAULT LOCATION AND SERVICE RESTORATION METHOD FOR LARGE-SCALE DISTRIBUTION NETWORKS"

Transcription

1 FAULT LOCATION AND SERVICE RESTORATION METHOD FOR LARGE-SCALE DISTRIBUTION NETWORKS A. Gonzáez, F. M. Echavarren, L. Rouco, T. Gómez Intituto de Invetigación Tecnoógica Univeridad Pontiicia Comia Madrid, Spain J. Cabeta Iberdroa Ditribución SAU Madrid, Spain Abtract Security o uppy reguation obige companie to deign optima operation procedure during emergency tate o the network. Beide, reiabiity contraint mut be conidered in order to obtain panning deciion abe to meet reguation. Reguation audit companie perormance by mean o power uppy reiabiity indexe. Thu, etimation o reiabiity indexe o medium votage (MV) ditribution network i a key iue. Thi paper preent a nove method to carry out the aut ocation and ervice retoration procee. For a peciic aut, the method etabihe the optima operation procedure to ocate it and to retore the ervice minimizing the non uppied energy (NSE). In addition, weak region o the tudied network can be ocated ince reiabiity indexe can be etimated or every inge network bu. The propoed approach comprie a heuritic agorithm or network reconiguration. Beide, it take into account rea operation criteria conidered during emergency tate o ditribution network. The method i abe to addre arge-cae and compex rea MV ditribution network. The perormance o the propoed method i iutrated conidering actua cenario o Iberdroa MV network in Madrid. Keyword: Faut Location, Service Retoration, Large-Scae Ditribution Network, Reconiguration, Heuritic Agorithm 1 INTRODUCTION Satiying the power quaity tandard, a we a reiabiity, are prioritie or ditribution companie. It ha recenty become an even more critica iue ince reiabiity reguation tend to be increaingy demanding. Reguation require companie to have a deep knowedge o their network in order to deign optima operation procedure during emergency tate o the network. Beide, ditribution companie ind themeve compeed to tudy the reiabiity perormance o the network in order to identiy weak region and deign uitabe panning action. Reguation audit power quaity and reiabiity o uppy by mean o the deinition and the etabihment o minimum vaue or power uppy reiabiity indexe [1]. Thereore, etimation o reiabiity indexe in medium votage (MV) ditribution network i a key iue or ditribution companie to deign operation and panning procedure. Athough the new mart grid paradigm i eading toward higher eve o network automation and contro [2], nowaday, mot o MV ditribution network keep a ow automation eve. A a reut, or mot ditribution network, both aut ocation and ervice retoration procee invove non-automated operation rue which entai direct deciion and action taken by operation ta. Moreover, mot manua witching operation mut be carried out by mobie maintenance crew. Thee procedure invove high vaue o non uppied energy (NSE). In the technica iterature, dierent approache or ervice retoration can be ound: caic optimization technique, genetic agorithm, imuated anneaing, taboo earch and knowedge-baed heuritic. The reconiguration probem, uing caica optimization technique [3-6], invove high computationa time. Moreover, the oution i commony untraceabe ince it i obtained oowing procee dierent than a rea ervice retoration proce. Genetic agorithm [7], imuated anneaing [8] and taboo earch [9, 10] are meta-heuritic agorithm widey ued to ove combinatory probem. Their main drawback i, a in the cae o caic optimization technique, that the oution i untraceabe ince the rue carried out in order to ove the probem are not reated to reconiguration or ervice retoration rue. Knowedge-baed heuritic agorithm appied to ervice retoration are widey known technique [11-16]. Propery et out knowedge-baed agorithm enure quai-optima, traceabe and interpretabe oution due to they are uuay obtained by oowing rue imiar to rea operation one. Furthermore, cacuation time are ower than thoe achieved with caica optimization technique and modern meta-heuritic. Thi paper preent a nove method to ove the aut ocation and ervice retoration probem or permanent aut. It etabihe the optima operation procedure to ocate the aut and to retore the ervice minimizing the NSE. The propoed approach comprie a heuritic agorithm or network reconiguration which conider ecurity (ine capacity and bu votage imit) and opera- 17 th Power Sytem Computation Conerence Stockhom Sweden - Augut 22-26, 2011

2 tiona contraint, uch a keeping the network radia and a ecure ytem reaying cheme. Beide, the method take into account actua operation criteria conidered during emergency tate o ditribution network. In addition to the optima operation procedure to ove the aut ocation and ervice retoration probem, the propoed approach i ueu to etimate reiabiity indexe or the network. Interruption time are cacuated or oad bue ater every witching. The imuation o the aut ocation and ervice retoration procee or every poibe aut in the network provide the expected reiabiity indexe or the compete network. Since ow computationa time are obtained, the enumeration method ha been eected. Thi anayi how up the weak region o the network. Thu, ueu reut are ao obtained or panning deciion. Faut ocation and ervice retoration procee are widey known, but no reerence dea with them a a combined probem. Many conuted reerence dea with aut ocation and ervice retoration procee eparatey. Faut ocation i preented a an independent probem whie ervice retoration approache away aume that the aut ha been previouy ocated [17, 18]. Thi aumption may ignore coniderabe uppy interruption time, even more when preent network, which are actuay ow automated network, are tudied. Moreover, rea ditribution ytem operator perorm imutaneouy both aut ocation and ervice retoration procee. In order to conider a the component o the tota uppy interruption time, the paper preent a knowedge-baed agorithm which optimize both aut ocation and ervice retoration procee imutaneouy. Simutaneity o both procee i required ince a partia retoration i eaibe when the aut i partiay ianded meanwhie it i ocated. Since actua network with a ow automation eve are tudied, imutaneou aut ocation and ervice retoration procee are conidered. Quai-optima reut and interpretabe and traceabe oution are expected. The paper i organized a oow. Section 2 preent the propoed method. Section 3 how a cae exampe in order to prove the perormance o the propoa. Section 4 concude, and ection 5 incude the bibiography. 2 FAULT LOCATION AND SERVICE RESTORATION PROCESSES For the imuation o the aiure o each ine or tranormer o the network, three tep are deined: aut ocation and ervice retoration, aut ioation and iand retoration and reiabiity indexe computation. In aut ocation and ervice retoration tage, optima witching equence i obtained. Remote igna, remote controed and manua operation procedure are conidered. Optima upport are computed when partia ervice retoration i poibe and uitabe. Support are computed uing an agorithm or network reconiguration [19]. Ater aut ocation and partia retoration, in aut ioation and iand retoration tage, the aut i ioated in the minimum indiviibe network area. A a reut, the minimum area i aected by repair time. When ianded area are generated in the aut ioation tep and partia retoration ha been not optima, ervice i inay retored in the unerved iand. Ater every inge deciion on the previou tep, uppy interruption time are computed or every cotumer. Partia vaue o reiabiity indexe o every inge cotumer are computed and accumuated vaue are updated or every imuated aut. 2.1 Faut ocation and ervice retoration Faut ocation and ervice retoration procee are conidered imutaneouy. Thi invove conidering ome operation rue which are oowed by ditribution ytem operator in rea aut ocation proce. Rea rue are ormuated by mean o an inteigent ogic and optimization criteria. Faut ocation proce i carried out irt uing automated device which may indicate the way o the aut current or may be remotey controed. Finay, the aut i conined to a upected area o the network where manua operation i carried out in order to deinitey ocate and ioate the aut. At eat one mobie maintenance crew i required. Manua proce entai a tria and error equence. Each tep trie to ioate the aut by pitting the upected area into two ubarea. Aterward, retoration i tried uptream the opened ectionaizing device. I the uptream breaker trip, the aut i ocated uptream rom the ectionaizing device. Otherwie, the aut i ocated downtream rom that device. Load to retore Search main upport Feaibe main upport? NO Secondary upport earched? NO Search econdary upport Figure 1 Main upport earch YES YES Bet upport No upport I the aut i ocated uptream rom the ectionaizing device, the downtream ubarea remain ioated rom the aut. In that cae, upport rom other eeder are earched and the retoration by mean o them i tudied. Support earch i carried out oowing tep hown in Figure 1. Firt, the oad o the ioated ubarea i determined. Secondy, open ine connecting the ioated ubarea 17 th Power Sytem Computation Conerence Stockhom Sweden - Augut 22-26, 2011

3 with uppied area o the network are earched. Thee open ine are caed main upport. Their margin i cacuated. The margin o a upport i deined a the maximum oad which can be uppied through a main upport whit maintaining branch power ow within capacity imit. The margin o a upport i i cacuated a the minimum among the pare capacity o every eement j whoe power ow i aected aong the path rom the interconnection point up to the ubtation: + margin = min( ) (1) i j j j where + maximum power ow o eement j; j j power ow o eement j. A upport i conidered eaibe i the correponding margin i equa or higher than the oad to retore and i the correponding witching oberve the votage contraint. I there are eaibe upport, the one with the highet margin i eected. Otherwie, or a ineaibe upport ound, econdary upport are earched in order to unoad the network which own the ineaibe main upport and make it eaibe. I any main upport become eaibe, the one with the highet expected margin, computed conidering the econdary upport, i eected. Secondary upport are earched oowing the proce hown in Figure 2. Secondary upport are earched or every ineaibe main upport. For each o them, the margin to recover i computed a the oad to recover minu the exiting margin. The virtua contraint i ocated. The virtua congetion i deined a the vioation o the imit which woud occur i the main upport i ued to retore the conidered oad. It i ocated in the branch whoe imit woud be vioated. Main upport YES No eaibe main upport Figure 2 Secondary upport earch Margin to recover Virtua contraint Search upport or virtua contraint Feaibe econdary upport? NO Feaibe main upport Open ine connecting the area downtream rom the virtua contraint with other uppied area o the network are earched. Thee open ine are caed econdary upport. They are conidered in order to traner ome oad rom the area ocated downtream rom the virtua contraint to other uppied area o the network. A econdary upport i eaibe when it margin i enough to recover the deired margin o the main upport and i the correponding witching oberve the votage contraint. I a eaibe econdary upport i ound, the correponding main upport i conidered eaibe. Once the upport are tudied, the bet witching to ectionaize the network in two ubarea i eected. For every poibe witch, the expected uptream and downtream retored oad are computed taking into account aiure rate o every uptream and downtream branch. Expected interruption time are ao computed in order to deine the eiciency o a witching operation a hown in (2). The eiciency o a witching operation meaure the expected avoided NSE in the next tep o the aut ocation and ervice retoration proce. µ d Pu µ d Pu + µ u Pd (2) e = max, NS S t t Where, or a witching : µ d probabiity o ocation downtream rom ; Pu power oad uptream rom ; µ u probabiity o ocation uptream rom ; Pd power oad downtream rom ; NS t interruption time i the upport i not conidered; t S interruption time i the upport i conidered. Interruption time incude time to reach the witch and time to open it. Interruption time depend on the peed o the mobie crew, the ditance covered by the crew (minimized uing [20]) and the characteritic o the witche. The eected witch to ectionaize the network i the one with the highet eiciency. Support i conidered i eiciency i a maximum when it i taken into account. Ater pitting the network into two ubarea, ix dierent ituation may occur (Figure 3), depending on where the aut i ocated (uptream or downtream o the witch) and whether a upport exit or not. In Figure 3, S repreent the utation o the aied network, S i the ubtation o the upporting network, CB i a circuit breaker, CB tand or the circuit braker o the upporting network, S mean the eected witch, S repreent the upporting witch and S -1 i the eected witch in the previou tep, which i conidered when it remain open in the current tep. Every cae invove a tria and error equence which entai opening S and coing CB. I the aut i ocated uptream rom S, CB wi trip. Otherwie, it wi remain coed. The oowing equence depend on the exitance or not o S -1 and S. Switche are uppoed to be manua operated and they are unabe to operate in charge, thereore an uptream CB i opened beore the witch i operated. Tabe 1 reume the equence or each cae. In Tabe 1, o mean open, c repreent coe and t tand or trip. The initia and the ina tate o every witching device i deined ( 0 or open, 1 or coed and i it i not conidered). 17 th Power Sytem Computation Conerence Stockhom Sweden - Augut 22-26, 2011

4 Uptream/ Initia tate Fina tate Cae S -1 downtream Support CB S -1 S S CB CB S -1 S S CB Sequence a NO downtream NO os ccb b NO uptream NO os ccb tcb cs c NO uptream YES os ccb tcb ocb cs ccb d YES downtream NO os ocb cs -1 ccb e YES uptream NO os ocb cs -1 ccb tcb os -1 ccb cs YES uptream YES os ocb cs -1 ccb tcb os -1 ccb ocb cs ccb Tabe 1: Summary o poibe cae and operation equence Interruption time i conidered or every witching. The combined aut ocation and ervice retoration probem inihe when no more witche exit in the upected area. Then, the aut i deinety ocated, but it i not neceariy ioated and the ervice retoration i not inihed. Thereore, two more tep are imuated in order to conider a the interruption time. Figure 3 Cae o aut ocation and ervice retoration 2.2 Faut ioation and iand retoration Once the aut i ocated, it mut be ioated in the minimum indiviibe iand in order to retore a much ervice a poibe, opening the nearet uptream and downtream witche (Figure 4). Figure 4 Faut ioation and iand retoration tage At the end o aut ioation tep, ome unerved iand may remain. In order to minimize NSE, iand retoration and aut ioation are conidered at the ame time. Main and econdary upport are computed or a the iand. I ervice retoration i eaibe, the operation equence i optimized conidering interruption time and expected retored oad o each upport. In thi tep, eiciency o an ioation witch i deined a hown in equation (3): e = Pd / t (3) Where, or an ioation witching : Pd power oad downtream rom ( Pd = 0 i t there i no eaibe upport); interruption time i the upport i conidered. Interruption time correponding to thi tep conider time to reach the witche, the upport witche and time to operate them. 2.3 Reiabiity indexe computation Each imuated aut contribute to annua expected NSE o a oad bu ( NSE ) a equation (4) how. Where: λ NSE = P T λ (4) aiure rate o a aut (meaured in number o aut per year) ; P power oad in bu ; T interruption time in bu caued by aut. Since utained aut have been conidered, a we a NSE, the mot common IEEE recommended utained interruption indexe have been conidered or reiabiity evauation o ditribution network [1]. The contribution o the aut to annua expected SAIFI o a oad bu ( (5). Where χ SAIFI ) i hown in equation SAIFI = χ λ (5) i a binary variabe whoe vaue i 1 i the aut aect to the oad bu and 0 otherwie. The contribution o the aut to annua expected SAIDI o a oad bu ( (6). SAIDI ) i hown in equation SAIDI = T λ (6) Annua expected NSE o a oad bu ( NSE ) i computed a hown in (7). (7) NSE = NSE = P T λ F F Where F i the et o aut which aect to oad bu. Annua expected SAIFI o a oad bu ( SAIFI ) i 17 th Power Sytem Computation Conerence Stockhom Sweden - Augut 22-26, 2011

5 computed a hown in (8). (8) SAIFI = SAIFI = λ F F Finay, annua expected SAIDI o a oad bu SAIDI ) i computed a hown in (9). ( (9) SAIDI = SAIDI = T λ F F 3 CASE STUDY 3.1 Faut ocation and ervice retoration In order to how the perormance o the method, it ha been teted with a ma educationa network mode (Figure 5). Network data are detaied in Appendix A. Parameter data are detaied in Appendix B Figure 5 Educationa network mode Tabe 2 how the detaied operation equence or the imuation o a peciic aut in ine ection 2-3. In addition, it how interruption time caued by every witching and the aggregated interruption time ater every witching. Finay, Tabe 2 ao how the poition o the crew or every operation. Ater our tep, the aut ocation i achieved. Firt tep correpond with cae b o ection 0. Second tep correpond with cae a. Ater tep 2, the ervice i partiay retored in oad bue 1, 2 and 18. However, interruption time increae or thee bue in ater tep becaue the tria and error equence entai trying to retore the ervice through ubtation 16. Third tep correpond with cae with a eaibe main upport in which i abe to operate in charge. Ater thi tep, ervice i partiay retored in bu 19 and no oad bu i aected in the upporting network. Fourth tep correpond to cae e. Ater thi tep, the aut i ocated in ine 2-3. However, aut i not optimay ioated. Step 5 and 6 correpond to aut ioation and iand retoration tage. Step 5 ioate the aut rom uptream bue and deinitey retore the ervice in oad bue 1, 2 and 18. Step 5 achieve aut ioation rom downtream bue. Thereore, tep 6 inihe the proce by retoring the ervice deinitey in oad bue 3, 4, 5, 6, 7, 8, 9, 19 and 20. An ineaibe main upport i ound in ince virtua congetion appear in In order to ove it, a eaibe econdary upport i ound in 15-21, and oad bue 10, 11, 13, 14, 15 and 19 are tranerred to the network uppied by the ubtation 501. Thi econdary upport make eaibe the main upport in Finay, the ervice i retored through the main upport Step Aggregate Time (min) Time (min) Operation Device Crew poition Open S Coe CB Trip CB Coe S Open S 2-3 S Coe CB 1-16 S Open S 3-19 S Open CB 1-16 S Coe S 2-3 S Coe CB 1-16 S Trip CB 1-16 S Open S 2-3 S Coe CB 1-16 S Coe RB S Open S 3-20 S Open CB 1-16 S Coe S 2-3 S Coe CB 1-16 S Trip CB 1-16 S Open S 2-3 S Coe CB 1-16 S Coe S 3-20 S Open S 2-3 S Coe CB 1-16 S Open CB S Open S S Coe CB S Open CB S Coe S S Coe CB S Open RB S Coe S 3-19 S Coe CB S 3-19 Tabe 2: Operation equence and interruption time 3.2 Reiabiity indexe anayi Appication o the method i iutrated or a part o the 20 kv ditribution network in Madrid. Thi network ha been choen becaue it ize may probe that the too i eicient when it i run in a arge network and imuation o actua incident have hown good agreement with the imuation output. Load and reiabiity data have been ditorted and no detaied data are provided in order to keep the privacy o the owner o the network. Deivered inormation i enough to how how reut o the propoed method may be ueu or panning tudie. Network conit o 1245 bue, 1321 ine ection, 38 tranormer and 578 oad bue. Bue are caiied in ix zone. Some zone cover urban area, but other zone have a more dipered demand and network i weaky mehed. The anayi o the annua expected NSE or every oad bu o a network ha been done. Figure 6 how the ditribution o expected NSE or every oad bu o the 17 th Power Sytem Computation Conerence Stockhom Sweden - Augut 22-26, 2011

6 tudied network. Figure 6 how that about 20% o the oad bue have an NSE o e than 10 kwh whie about 30% o the oad bue preent a NSE o more than 100 kwh. Thee are huge dierence among dierent oad bue and mean dierent need or dierent uer o the network. Figure 6 Ditribution unction o expected NSE or every oad bu A more detaied tudy i done rom reut hown in Figure 7. NSE i tudied or dierent zone o the network. Since network zone are reated to geograica zone and dierent demand concentration and dierent upport trength, reut eem to be coherent. ZONE 4 maintain a imiar and reduced NSE or every oad. Figure 7 Ditribution unction o expected NSE o network zone Mot zone preent the mot o it oad bue in reduced vaue o NSE, whit the 50% o them preent a ight increae and about the 20% preent vaue which may entai more peciic anayi in order to determine the convenience o taking action to reduce them. Finay, ZONE 2 preent an outtanding ditribution. In thi zone, 60% o the oad bue preent igniicant vaue and 20% o the oad bue deinitey require more peciic anayi in order to tudy uture action to reduce them. 4 CONCLUSIONS A new method or aut ocation and ervice retoration ha been preented. The propoed approach conider knowedge baed rue and a heuritic agorithm which optimize the upport o erved network area or ervice retoration. The method dea with the aut ocation and the ervice retoration probem the ame time a a combined probem in order to reduce interruption time in area where the partia retoration i poibe athough the aut i not deinitey ocated. The objective o the agorithm i to minimize the NSE o the compete proce. The output o the imuation o the proce i a detaied operation equence and the interruption time o every inge oad bu caued by a aut. In addition, the imuation o the equence o the aiure o every device o the network provide a computation o annua expected reiabiity indexe o every inge oad bu o the network. The paper detai the impemented rue and the propoed agorithm. In order to how the perormance o the method, it ha been teted with a ma educationa mode. Reut how the detaied operation equence or the imuation o a peciic aut. In addition, reiabiity indexe have been computed or a rea arge-cae network. The anayi o the annua expected NSE or every oad bu o a network turn on a ueu too in order to identiy weak area o the network. REFERENCES [1] "IEEE guide or eectric power ditribution reiabiity indice", IEEE Std 1366, 2001 Edition. [2] S. Kazemi, M. Fotuhi-Firuzabad, M. Sanaye- Paand, and M. Lehtonen, "Impact o Automatic Contro Sytem o Loop Retoration Scheme on the Ditribution Sytem Reiabiity", IET Generation, Tranmiion & Ditribution, [3] Q. Zhou, D. Shirmohammadi, and W.-H. E. Liu, "Ditribution Feeder Reconiguration or Service Retoration and Load Baancing", IEEE Tranaction on Power Sytem, vo. 12, nº 2, pp , May [4] G. J. Peponi, M. P. Papadopouo, and N. D. Hatziargyriou, "Ditribution Network Reconiguration to Minimize Reitive Line Loe", IEEE Tranaction on Power Deivery, vo. 10, nº 3, pp , Juy [5] V. Gamocanin, "Optima Lo Reduction o ditribution Network", IEEE Tranaction on Power Deivery, vo. 5, nº 3, pp , Augut [6] K. Aoki, T. Satoh, M. Itoh, H. Kuwabara, and M. Kanezahi, "Votage Drop Contrained Retoration o Suppy By Switch Operation In Ditribution Sytem", IEEE Tranaction on Power Deivery, vo. 3, nº 3, pp , Juy [7] Y. Fukuyama and C. Haio-Dong, "A parae genetic agorithm or ervice retoration in eectric power ditribution ytem", preented at IEEE Internationa Conerence on Fuzzy Sytem, Mar th Power Sytem Computation Conerence Stockhom Sweden - Augut 22-26, 2011

7 Powered by TCPDF ( [8] H. Mori and K. Takeda, "Parae imuated anneaing or power ytem decompoition", IEEE Tranaction on Power Sytem, vo. 9, nº 2, pp , May [9] H. Mori and Y. Ogita, "A Parae Tabu Search Baed Approach to Optima Network Reconiguration or Service Retoration in Ditribution Sytem", preented at 2002 IEEE Internationa Conerence on Contro Appication, Gagow, Scotand, UK, September 18-20, [10] S. Toune, H. Fudo, T. Genji, Y. Fukuyama, and Y. Nakanihi, "A Reactive Tabu Search or Service Retoration in Eectric Power Ditribution Sytem", preented at IEEE Word Congre on Computationa Inteigence, May [11] K. N. Miu, H.-D. Chiang, B. Yuan, and G. Daring, "Fat Service Retoration or Large-Scae Ditribution Sytem with Priority Cutomer and Contraint", IEEE Tranaction on Power Sytem, vo. 13, nº 3, pp , Aug [12] D. S. Popovic and R. M. Ciric, "A Muti-Objetive Agorithm For Ditribution Network Retoration", IEEE Tranaction on Power Deivery, vo. 14, nº 3, pp , Juy [13] H.-C. Kuo and Y.-Y. Hu, "Ditribution ytem oad etimation and ervice retoration uing a uzzy et approach", IEEE Tranaction on Power Deivery, vo. 8, nº 4, pp , Oct [14] Y. Y. Hu, H. M. Huang, H. C. Kuo, S. K. Peng, C. W. Chang, K. J. Chang, H. S. A. Yu, C. E. Chow, and R. T. Kuo, "Ditribution ytem ervice retoration uing a heuritic earch approach", Power Deivery, IEEE Tranaction on, vo. 7, nº 2, pp. 734, [15] W.-M. Lin and H.-C. Chin, "A New Approach or Ditribution Feeder Reconiguration or Lo Reduction and Service Retoration", IEEE Tranaction on Power Deivery, vo. 13, nº 3, pp , Juy [16] C.-S. Chen, C.-H. Lin, and H.-Y. Tai, "A Rue- Baed Expert Sytem With Coored Petri Net Mode or Ditribution Sytem Service Retoration", IEEE Tranaction on Power Sytem, vo. 17, nº 4, pp , November [17] L. Seung-Jae, C. Myeon-Song, K. Sang-Hee, J. Bo-Gun, L. Duck-Su, A. Bok-Shin, Y. Nam-Seon, K. Ho-Yong, and W. Sang-Bong, "An inteigent and eicient aut ocation and diagnoi cheme or radia ditribution ytem", Power Deivery, IEEE Tranaction on, vo. 19, nº 2, pp. 524, [18] M. Lehtonen, A. Matinen, E. Antia, and J. Kuru, "An advanced mode or automatic aut management in ditribution network", preented at Power Engineering Society Winter Meeting, IEEE, Jan [19] A. Gonzáez, F. M. Echavarren, L. Rouco, T. Gómez, and J. Cabeta, "A Too or Reconiguration o Large-Scae Ditribution Network", preented at 16th Power Sytem Computation Conerence (PSCC08), Gagow, Scotand,2008. [20] E. W. Dijktra, "A Note on Two Probem in Connexion with Graph", Numeriche Mathematk, vo. 1, pp , I. APPENDIX A In order to make the ma cae exampe reproducibe, network mode i decribed beow. The eected cae i a 20 kv ditribution network. Source are ited in node 16, 17 and 501. Sytem rating i 100 MVA. Aiming at maintain interpretabiity o the reut and impicity o the oution, aiure rate i the ame 6 ai/100km year or every ine. Eectric parameter, ength and type o ectionaizing device reated to a ine are preented in Tabe 3, where M tand or manua and RC tand or remote contro. Load i the ame 400 kw in every bu. Power rate are a conidered unimited except or ine 12-13, whoe vaue i 800 kva. Bu Number Operation From To R (pu) X (pu) Length (m) Operation Device time (min) M Switch RC Circuit breaker M Switch M Manua Switch None M Switch M Switch RC Switch M Switch M Switch RC Switch M Switch M Switch RC Contact breaker M Switch M Switch RC Circuit breaker RC Switch RC Switch RC Switch M Switch M Switch RC Switch M Switch M Switch RC Circuit breaker 0.5 Tabe 3. Educationa network mode parameter II. APPENDIX B The propoed method require the entry o ome execution data which may aect the reut. In order to make the cae exampe reproducibe, thoe parameter are detaied beow: Crew peed: 40 km/h Aowed overoad in ine: 10% Minimum aowed bu votage: 0.93 pu 17 th Power Sytem Computation Conerence Stockhom Sweden - Augut 22-26, 2011

A Cross-Layer Optimization Framework for Multicast in Multi-hop Wireless Networks

A Cross-Layer Optimization Framework for Multicast in Multi-hop Wireless Networks A Cro-Layer Optimization Framework for Muticat in Muti-hop Wiree Network Jun Yuan, Zongpeng Li, Wei Yu, Baochun Li Department of Eectrica and Computer Engineering Univerity of Toronto {teveyuan@comm, arcane@eecg,

More information

Management Science Letters

Management Science Letters Management Science Letter 3 (2013) 1077 1088 Content it avaiabe at GrowingScience Management Science Letter homepage: www.growingscience.com/m A muti-objective mode for ocating ditribution center in a

More information

Dynamic Pricing Trade Market for Shared Resources in IIU Federated Cloud

Dynamic Pricing Trade Market for Shared Resources in IIU Federated Cloud Dynamic Pricing Trade Market or Shared Resources in IIU Federated Coud Tongrang Fan 1, Jian Liu 1, Feng Gao 1 1Schoo o Inormation Science and Technoogy, Shiiazhuang Tiedao University, Shiiazhuang, 543,

More information

Legal assistance for branches for work related stress personal injury advice

Legal assistance for branches for work related stress personal injury advice Stre Form Lega aitance for branche for work reated tre perona injury advice WARNING: Very few work reated tre perona injury cae are uccefu a it i neceary to prove that your empoyer wa on notice that you

More information

PREFACE. 44 p. PARB PIM LTD., PART. 296 Soi Jarunsanitwong 40. and to prepare for the external quality assessment.

PREFACE. 44 p. PARB PIM LTD., PART. 296 Soi Jarunsanitwong 40. and to prepare for the external quality assessment. ManuafortheInternaQuaityAuranceforHigherEducationIntitution : Commiion on Higher Education, Minitry of Education : Bangkok, Thaiand 2008 PREFACE 44 p. The Higher Education Interna Quaity Aurance Committee

More information

A Similarity Search Scheme over Encrypted Cloud Images based on Secure Transformation

A Similarity Search Scheme over Encrypted Cloud Images based on Secure Transformation A Simiarity Search Scheme over Encrypted Coud Images based on Secure Transormation Zhihua Xia, Yi Zhu, Xingming Sun, and Jin Wang Jiangsu Engineering Center o Network Monitoring, Nanjing University o Inormation

More information

Avelino J. Gonzalez School of Electrical Engineering and Computer Science University of Central Florida Orlando, FL 32816-2450, USA

Avelino J. Gonzalez School of Electrical Engineering and Computer Science University of Central Florida Orlando, FL 32816-2450, USA From: FLAIRS-02 Proceeding. Copyright 2002, AAAI (www.aaai.org). A right reerved. Sytem Refinement in Practice Uing a Forma Method to Modify Rea Life Knowedge Rainer Knauf and Ika Phiippow Imenau Technica

More information

Performance of Multiple TFRC in Heterogeneous Wireless Networks

Performance of Multiple TFRC in Heterogeneous Wireless Networks Performance of Multiple TFRC in Heterogeneou Wirele Network 1 Hyeon-Jin Jeong, 2 Seong-Sik Choi 1, Firt Author Computer Engineering Department, Incheon National Univerity, oaihjj@incheon.ac.kr *2,Correponding

More information

Group Mutual Exclusion Based on Priorities

Group Mutual Exclusion Based on Priorities Group Mutual Excluion Baed on Prioritie Karina M. Cenci Laboratorio de Invetigación en Sitema Ditribuido Univeridad Nacional del Sur Bahía Blanca, Argentina kmc@c.un.edu.ar and Jorge R. Ardenghi Laboratorio

More information

CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY

CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Annale Univeritati Apuleni Serie Oeconomica, 2(2), 200 CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Sidonia Otilia Cernea Mihaela Jaradat 2 Mohammad

More information

A note on profit maximization and monotonicity for inbound call centers

A note on profit maximization and monotonicity for inbound call centers A note on profit maximization and monotonicity for inbound call center Ger Koole & Aue Pot Department of Mathematic, Vrije Univeriteit Amterdam, The Netherland 23rd December 2005 Abtract We conider an

More information

SCM- integration: organiational, managerial and technological iue M. Caridi 1 and A. Sianei 2 Dipartimento di Economia e Produzione, Politecnico di Milano, Italy E-mail: maria.caridi@polimi.it Itituto

More information

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS Chritopher V. Kopek Department of Computer Science Wake Foret Univerity Winton-Salem, NC, 2709 Email: kopekcv@gmail.com

More information

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS G. Chapman J. Cleee E. Idle ABSTRACT Content matching i a neceary component of any ignature-baed network Intruion Detection

More information

AFFORDABLE BUSINESS QUALITY PRINTING FOR YOUR OFFICE

AFFORDABLE BUSINESS QUALITY PRINTING FOR YOUR OFFICE AFFORDABLE BUSINESS QUALITY PRINTING FOR YOUR OFFICE www.brother.eu INTRODUCING THE NEW COMPACT MONO LASER RANGE BUSINESS QUALITY PRINTING FOR YOUR OFFICE Brother undertand that your office run on information.

More information

8 TWO-WAY SLABS. Figure 1: Two way slabs

8 TWO-WAY SLABS. Figure 1: Two way slabs 1 8 TWO-WAY SLABS To-ay Sab: When the ratio (L/ S) i e than 2.0, it i caed to-ay ab, hon in Figure 1. Bending i take pace in the to direction in a dih-ike form. Accordingy, main reinforcement i required

More information

6. Friction, Experiment and Theory

6. Friction, Experiment and Theory 6. Friction, Experiment and Theory The lab thi wee invetigate the rictional orce and the phyical interpretation o the coeicient o riction. We will mae ue o the concept o the orce o gravity, the normal

More information

Bi-Objective Optimization for the Clinical Trial Supply Chain Management

Bi-Objective Optimization for the Clinical Trial Supply Chain Management Ian David Lockhart Bogle and Michael Fairweather (Editor), Proceeding of the 22nd European Sympoium on Computer Aided Proce Engineering, 17-20 June 2012, London. 2012 Elevier B.V. All right reerved. Bi-Objective

More information

Active Sway Control of a Single Pendulum Gantry Crane System using Output-Delayed Feedback Control Technique

Active Sway Control of a Single Pendulum Gantry Crane System using Output-Delayed Feedback Control Technique 21 11th. Int. Conf. Contro, Automation, Robotic and Viion Singapore, 5-8th December 21 Active Sway Contro of a Singe Penduum Gantry Crane Sytem uing Output-Deayed Feedback Contro echnique Rajeeb Dey, Nihant

More information

Detecting App-DDoS Attacks Based on Marking Access and d-svdd

Detecting App-DDoS Attacks Based on Marking Access and d-svdd Proceeding of the nd Internationa Sympoium on Computer, Communication, Contro and Automation (ISCCCA-3 Detecting App-DDoS Attack Baed on Marking Acce and d-svdd LI Jin-ing, WANG Bin-qiang Nationa Digita

More information

A New Optimum Jitter Protection for Conversational VoIP

A New Optimum Jitter Protection for Conversational VoIP Proc. Int. Conf. Wirele Commun., Signal Proceing (Nanjing, China), 5 pp., Nov. 2009 A New Optimum Jitter Protection for Converational VoIP Qipeng Gong, Peter Kabal Electrical & Computer Engineering, McGill

More information

A Note on Profit Maximization and Monotonicity for Inbound Call Centers

A Note on Profit Maximization and Monotonicity for Inbound Call Centers OPERATIONS RESEARCH Vol. 59, No. 5, September October 2011, pp. 1304 1308 in 0030-364X ein 1526-5463 11 5905 1304 http://dx.doi.org/10.1287/opre.1110.0990 2011 INFORMS TECHNICAL NOTE INFORMS hold copyright

More information

Name: SID: Instructions

Name: SID: Instructions CS168 Fall 2014 Homework 1 Aigned: Wedneday, 10 September 2014 Due: Monday, 22 September 2014 Name: SID: Dicuion Section (Day/Time): Intruction - Submit thi homework uing Pandagrader/GradeScope(http://www.gradecope.com/

More information

Partial optimal labeling search for a NP-hard subclass of (max,+) problems

Partial optimal labeling search for a NP-hard subclass of (max,+) problems Partial optimal labeling earch for a NP-hard ubcla of (max,+) problem Ivan Kovtun International Reearch and Training Center of Information Technologie and Sytem, Kiev, Uraine, ovtun@image.iev.ua Dreden

More information

MANAGING DATA REPLICATION IN MOBILE AD- HOC NETWORK DATABASES (Invited Paper) *

MANAGING DATA REPLICATION IN MOBILE AD- HOC NETWORK DATABASES (Invited Paper) * MANAGING DATA REPLICATION IN MOBILE AD- HOC NETWORK DATABASES (Invited Paper) * Praanna Padmanabhan School of Computer Science The Univerity of Oklahoma Norman OK, USA praannap@yahoo-inc.com Dr. Le Gruenwald

More information

NETWORK TRAFFIC ENGINEERING WITH VARIED LEVELS OF PROTECTION IN THE NEXT GENERATION INTERNET

NETWORK TRAFFIC ENGINEERING WITH VARIED LEVELS OF PROTECTION IN THE NEXT GENERATION INTERNET Chapter 1 NETWORK TRAFFIC ENGINEERING WITH VARIED LEVELS OF PROTECTION IN THE NEXT GENERATION INTERNET S. Srivatava Univerity of Miouri Kana City, USA hekhar@conrel.ice.umkc.edu S. R. Thirumalaetty now

More information

Queueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems,

Queueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems, MANAGEMENT SCIENCE Vol. 54, No. 3, March 28, pp. 565 572 in 25-199 ein 1526-551 8 543 565 inform doi 1.1287/mnc.17.82 28 INFORMS Scheduling Arrival to Queue: A Single-Server Model with No-Show INFORMS

More information

How To Understand The Hort Term Power Market

How To Understand The Hort Term Power Market Short-term allocation of ga network and ga-electricity input forecloure Miguel Vazquez a,, Michelle Hallack b a Economic Intitute (IE), Federal Univerity of Rio de Janeiro (UFRJ) b Economic Department,

More information

Creat-Poreen Power Electronics Co., Ltd

Creat-Poreen Power Electronics Co., Ltd (STOCK CODE) 002350 Creat-Poreen Power Eectronics Co., Ltd Address: 4F, Xue Zhi Xuan Mansion, NO.16 Xue Qing Road, Hasidian District, Beijing, 100083 Te: +86 (010) 82755151 Fax: +86 (010) 82755268 Website:

More information

Performance of a Browser-Based JavaScript Bandwidth Test

Performance of a Browser-Based JavaScript Bandwidth Test Performance of a Brower-Baed JavaScript Bandwidth Tet David A. Cohen II May 7, 2013 CP SC 491/H495 Abtract An exiting brower-baed bandwidth tet written in JavaScript wa modified for the purpoe of further

More information

Control of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling

Control of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling Control of Wirele Network with Flow Level Dynamic under Contant Time Scheduling Long Le and Ravi R. Mazumdar Department of Electrical and Computer Engineering Univerity of Waterloo,Waterloo, ON, Canada

More information

Solved Problems Chapter 3: Mechanical Systems

Solved Problems Chapter 3: Mechanical Systems ME 43: Sytem Dynamic and Contro Probem A-3-8- Soved Probem Chapter 3: Mechanica Sytem In Figure 3-3, the impe penduum hown conit of a phere of ma m upended by a tring of negigibe ma. Negecting the eongation

More information

A Spam Message Filtering Method: focus on run time

A Spam Message Filtering Method: focus on run time , pp.29-33 http://dx.doi.org/10.14257/atl.2014.76.08 A Spam Meage Filtering Method: focu on run time Sin-Eon Kim 1, Jung-Tae Jo 2, Sang-Hyun Choi 3 1 Department of Information Security Management 2 Department

More information

1 Introduction. Reza Shokri* Privacy Games: Optimal User-Centric Data Obfuscation

1 Introduction. Reza Shokri* Privacy Games: Optimal User-Centric Data Obfuscation Proceeding on Privacy Enhancing Technologie 2015; 2015 (2):1 17 Reza Shokri* Privacy Game: Optimal Uer-Centric Data Obfucation Abtract: Conider uer who hare their data (e.g., location) with an untruted

More information

REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND TAGUCHI METHODOLOGY. Abstract. 1.

REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND TAGUCHI METHODOLOGY. Abstract. 1. International Journal of Advanced Technology & Engineering Reearch (IJATER) REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND Abtract TAGUCHI METHODOLOGY Mr.

More information

International Journal of Heat and Mass Transfer

International Journal of Heat and Mass Transfer International Journal of Heat and Ma Tranfer 5 (9) 14 144 Content lit available at ScienceDirect International Journal of Heat and Ma Tranfer journal homepage: www.elevier.com/locate/ijhmt Technical Note

More information

Growth and characterization of Ge 1-x Sn x alloys grown on Ge(001) and GaAs(001)

Growth and characterization of Ge 1-x Sn x alloys grown on Ge(001) and GaAs(001) Superficie y Vacío 17(4), 10-14 diciembre de 2004 Sociedad Mexicana de Ciencia de Superficie y de Vacío Growth and characterization of aoy grown on Ge(001) and GaA(001) H. Pérez Ladrón de Guevara Intituto

More information

A Resolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networks

A Resolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networks A Reolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networ Joé Craveirinha a,c, Rita Girão-Silva a,c, João Clímaco b,c, Lúcia Martin a,c a b c DEEC-FCTUC FEUC INESC-Coimbra International

More information

Risk Management for a Global Supply Chain Planning under Uncertainty: Models and Algorithms

Risk Management for a Global Supply Chain Planning under Uncertainty: Models and Algorithms Rik Management for a Global Supply Chain Planning under Uncertainty: Model and Algorithm Fengqi You 1, John M. Waick 2, Ignacio E. Gromann 1* 1 Dept. of Chemical Engineering, Carnegie Mellon Univerity,

More information

Two Dimensional FEM Simulation of Ultrasonic Wave Propagation in Isotropic Solid Media using COMSOL

Two Dimensional FEM Simulation of Ultrasonic Wave Propagation in Isotropic Solid Media using COMSOL Excerpt from the Proceeding of the COMSO Conference 0 India Two Dimenional FEM Simulation of Ultraonic Wave Propagation in Iotropic Solid Media uing COMSO Bikah Ghoe *, Krihnan Balaubramaniam *, C V Krihnamurthy

More information

Research Article An (s, S) Production Inventory Controlled Self-Service Queuing System

Research Article An (s, S) Production Inventory Controlled Self-Service Queuing System Probability and Statitic Volume 5, Article ID 558, 8 page http://dxdoiorg/55/5/558 Reearch Article An (, S) Production Inventory Controlled Self-Service Queuing Sytem Anoop N Nair and M J Jacob Department

More information

REVISTA INVESTIGACIÓN OPERACIONAL V ol. 29, No. 2,,95-105 2007

REVISTA INVESTIGACIÓN OPERACIONAL V ol. 29, No. 2,,95-105 2007 REVISTA INVESTIGACIÓN OPERACIONAL V ol. 29, No. 2,,95-105 2007 GENETIC OPERATORS FOR THE MULTIOBJECTIVE FLOWSHOW PROBLEM Magdalena Bandala*, María A. Oorio-Lama** School of Computer Science, Univeridad

More information

INFORMATION Technology (IT) infrastructure management

INFORMATION Technology (IT) infrastructure management IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 2, NO. 1, MAY 214 1 Buine-Driven Long-term Capacity Planning for SaaS Application David Candeia, Ricardo Araújo Santo and Raquel Lope Abtract Capacity Planning

More information

Algorithms for Advance Bandwidth Reservation in Media Production Networks

Algorithms for Advance Bandwidth Reservation in Media Production Networks Algorithm for Advance Bandwidth Reervation in Media Production Network Maryam Barhan 1, Hendrik Moen 1, Jeroen Famaey 2, Filip De Turck 1 1 Department of Information Technology, Ghent Univerity imind Gaton

More information

Figure 2.1. a. Block diagram representation of a system; b. block diagram representation of an interconnection of subsystems

Figure 2.1. a. Block diagram representation of a system; b. block diagram representation of an interconnection of subsystems Figure. a. Block diagram repreentation o a ytem; b. block diagram repreentation o an interconnection o ubytem REVIEW OF THE LAPLACE TRANSFORM Table. Laplace tranorm table Table. Laplace tranorm theorem

More information

Combining Statistics and Semantics via Ensemble Model for Document Clustering

Combining Statistics and Semantics via Ensemble Model for Document Clustering ombining tatitic and emantic via Enemble Model or Document lutering amah Jamal Fodeh Michigan tate Univerity Eat Laning, MI, 48824 odeham@mu.edu William F Punch Michigan tate Univerity Eat Laning, MI,

More information

Acceleration-Displacement Crash Pulse Optimisation A New Methodology to Optimise Vehicle Response for Multiple Impact Speeds

Acceleration-Displacement Crash Pulse Optimisation A New Methodology to Optimise Vehicle Response for Multiple Impact Speeds Acceleration-Diplacement Crah Pule Optimiation A New Methodology to Optimie Vehicle Repone for Multiple Impact Speed D. Gildfind 1 and D. Ree 2 1 RMIT Univerity, Department of Aeropace Engineering 2 Holden

More information

Optimal Digital Content Distribution Strategy in the Presence of the Consumer-to-Consumer Channel

Optimal Digital Content Distribution Strategy in the Presence of the Consumer-to-Consumer Channel Optimal Digital Content Ditribution Strategy in the Preence o the Conumer-to-Conumer Channel Yunang Feng, Zhiling Guo, and Wei-yu Kevin Chiang Yu n a n g Fe n g received hi PhD in Inormation Sytem rom

More information

Availability of WDM Multi Ring Networks

Availability of WDM Multi Ring Networks Paper Availability of WDM Multi Ring Network Ivan Rado and Katarina Rado H d.o.o. Motar, Motar, Bonia and Herzegovina Faculty of Electrical Engineering, Mechanical Engineering and Naval Architecture, Univerity

More information

Mixed Method of Model Reduction for Uncertain Systems

Mixed Method of Model Reduction for Uncertain Systems SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol 4 No June Mixed Method of Model Reduction for Uncertain Sytem N Selvaganean Abtract: A mixed method for reducing a higher order uncertain ytem to a table reduced

More information

Equalizer tap length requirement for mode group delay-compensated fiber link with weakly random mode coupling

Equalizer tap length requirement for mode group delay-compensated fiber link with weakly random mode coupling Equalizer tap length requirement or mode group delay-compenated iber link with weakly random mode coupling eng Bai,2,* and Guiang Li,3,4 CREOL, The College o Optic & Photonic, Univerity o Central Florida

More information

Mobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN

Mobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN Mobile Network Configuration for Large-cale Multimedia Delivery on a Single WLAN Huigwang Je, Dongwoo Kwon, Hyeonwoo Kim, and Hongtaek Ju Dept. of Computer Engineering Keimyung Univerity Daegu, Republic

More information

FEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS

FEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS Aignment Report RP/98-983/5/0./03 Etablihment of cientific and technological information ervice for economic and ocial development FOR INTERNAL UE NOT FOR GENERAL DITRIBUTION FEDERATION OF ARAB CIENTIFIC

More information

Return on Investment and Effort Expenditure in the Software Development Environment

Return on Investment and Effort Expenditure in the Software Development Environment International Journal of Applied Information ytem (IJAI) IN : 2249-0868 Return on Invetment and Effort Expenditure in the oftware Development Environment Dineh Kumar aini Faculty of Computing and IT, ohar

More information

Profitability of Loyalty Programs in the Presence of Uncertainty in Customers Valuations

Profitability of Loyalty Programs in the Presence of Uncertainty in Customers Valuations Proceeding of the 0 Indutrial Engineering Reearch Conference T. Doolen and E. Van Aken, ed. Profitability of Loyalty Program in the Preence of Uncertainty in Cutomer Valuation Amir Gandomi and Saeed Zolfaghari

More information

Control Theory based Approach for the Improvement of Integrated Business Process Interoperability

Control Theory based Approach for the Improvement of Integrated Business Process Interoperability www.ijcsi.org 201 Control Theory baed Approach for the Improvement of Integrated Buine Proce Interoperability Abderrahim Taoudi 1, Bouchaib Bounabat 2 and Badr Elmir 3 1 Al-Qualadi Reearch & Development

More information

A technical guide to 2014 key stage 2 to key stage 4 value added measures

A technical guide to 2014 key stage 2 to key stage 4 value added measures A technical guide to 2014 key tage 2 to key tage 4 value added meaure CONTENTS Introduction: PAGE NO. What i value added? 2 Change to value added methodology in 2014 4 Interpretation: Interpreting chool

More information

Unit 11 Using Linear Regression to Describe Relationships

Unit 11 Using Linear Regression to Describe Relationships Unit 11 Uing Linear Regreion to Decribe Relationhip Objective: To obtain and interpret the lope and intercept of the leat quare line for predicting a quantitative repone variable from a quantitative explanatory

More information

Simulation of Sensorless Speed Control of Induction Motor Using APFO Technique

Simulation of Sensorless Speed Control of Induction Motor Using APFO Technique International Journal of Computer and Electrical Engineering, Vol. 4, No. 4, Augut 2012 Simulation of Senorle Speed Control of Induction Motor Uing APFO Technique T. Raghu, J. Sriniva Rao, and S. Chandra

More information

A COMPARATIVE STUDY OF THREE-PHASE AND SINGLE-PHASE PLL ALGORITHMS FOR GRID-CONNECTED SYSTEMS

A COMPARATIVE STUDY OF THREE-PHASE AND SINGLE-PHASE PLL ALGORITHMS FOR GRID-CONNECTED SYSTEMS A COMPARATIE STUDY OF THREEPHASE AND SINGLEPHASE PLL ALGORITHMS FOR GRIDCONNECTED SYSTEMS Ruben Marco do Santo Filho Centro Federal de Educação Tecnológica CEFETMG Coord. Eletrônica Av. Amazona 553 Belo

More information

CERTIFICATE COURSE ON CLIMATE CHANGE AND SUSTAINABILITY. Course Offered By: Indian Environmental Society

CERTIFICATE COURSE ON CLIMATE CHANGE AND SUSTAINABILITY. Course Offered By: Indian Environmental Society CERTIFICATE COURSE ON CLIMATE CHANGE AND SUSTAINABILITY Course Offered By: Indian Environmenta Society INTRODUCTION The Indian Environmenta Society (IES) a dynamic and fexibe organization with a goba vision

More information

TRADING rules are widely used in financial market as

TRADING rules are widely used in financial market as Complex Stock Trading Strategy Baed on Particle Swarm Optimization Fei Wang, Philip L.H. Yu and David W. Cheung Abtract Trading rule have been utilized in the tock market to make profit for more than a

More information

Trusted Document Signing based on use of biometric (Face) keys

Trusted Document Signing based on use of biometric (Face) keys Truted Document Signing baed on ue of biometric (Face) Ahmed B. Elmadani Department of Computer Science Faculty of Science Sebha Univerity Sebha Libya www.ebhau.edu.ly elmadan@yahoo.com ABSTRACT An online

More information

CONTRIBUTION OF INTERNAL AUDITING IN THE VALUE OF A NURSING UNIT WITHIN THREE YEARS

CONTRIBUTION OF INTERNAL AUDITING IN THE VALUE OF A NURSING UNIT WITHIN THREE YEARS Dehi Business Review X Vo. 4, No. 2, Juy - December 2003 CONTRIBUTION OF INTERNAL AUDITING IN THE VALUE OF A NURSING UNIT WITHIN THREE YEARS John N.. Var arvatsouakis atsouakis DURING the present time,

More information

Towards Control-Relevant Forecasting in Supply Chain Management

Towards Control-Relevant Forecasting in Supply Chain Management 25 American Control Conference June 8-1, 25. Portland, OR, USA WeA7.1 Toward Control-Relevant Forecating in Supply Chain Management Jay D. Schwartz, Daniel E. Rivera 1, and Karl G. Kempf Control Sytem

More information

How to Maximize User Satisfaction Degree in Multi-service IP Networks

How to Maximize User Satisfaction Degree in Multi-service IP Networks How to Maximize Uer Satifaction Degree in Multi-ervice IP Network Huy Anh Nguyen, Tam Van Nguyen and Deokai Choi Department of Electronic and Computer Engineering Chonnam National Univerity Gwangu, KOREA

More information

ACTION: Breaking the Privacy Barrier for RFID Systems

ACTION: Breaking the Privacy Barrier for RFID Systems ACTION: Breaking the Privacy Barrier for RFID Sytem Li Lu, Jinong Han, Renyi Xiao, and Yunhao Liu Deartment of Comuter Science & Engineering, Hong Kong Univerity of Science & Technoogy, Hong Kong, China

More information

Finance 360 Problem Set #6 Solutions

Finance 360 Problem Set #6 Solutions Finance 360 Probem Set #6 Soutions 1) Suppose that you are the manager of an opera house. You have a constant margina cost of production equa to $50 (i.e. each additiona person in the theatre raises your

More information

INTERACTIVE TOOL FOR ANALYSIS OF TIME-DELAY SYSTEMS WITH DEAD-TIME COMPENSATORS

INTERACTIVE TOOL FOR ANALYSIS OF TIME-DELAY SYSTEMS WITH DEAD-TIME COMPENSATORS INTERACTIVE TOOL FOR ANALYSIS OF TIMEDELAY SYSTEMS WITH DEADTIME COMPENSATORS Joé Lui Guzmán, Pedro García, Tore Hägglund, Sebatián Dormido, Pedro Alberto, Manuel Berenguel Dep. de Lenguaje y Computación,

More information

THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE

THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE Li-Chiou Chen Department of Information Sytem School of Computer Science and Information Sytem Pace Univerity

More information

Tap Into Smartphone Demand: Mobile-izing Enterprise Websites by Using Flexible, Open Source Platforms

Tap Into Smartphone Demand: Mobile-izing Enterprise Websites by Using Flexible, Open Source Platforms Tap Into Smartphone Demand: Mobile-izing Enterprie Webite by Uing Flexible, Open Source Platform acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 Tap Into Smartphone Demand:

More information

A Supplier Evaluation System for Automotive Industry According To Iso/Ts 16949 Requirements

A Supplier Evaluation System for Automotive Industry According To Iso/Ts 16949 Requirements A Suppier Evauation System for Automotive Industry According To Iso/Ts 16949 Requirements DILEK PINAR ÖZTOP 1, ASLI AKSOY 2,*, NURSEL ÖZTÜRK 2 1 HONDA TR Purchasing Department, 41480, Çayırova - Gebze,

More information

Optical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng

Optical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng Optical Illuion Sara Bolouki, Roger Groe, Honglak Lee, Andrew Ng. Introduction The goal of thi proect i to explain ome of the illuory phenomena uing pare coding and whitening model. Intead of the pare

More information

Maximizing Acceptance Probability for Active Friending in Online Social Networks

Maximizing Acceptance Probability for Active Friending in Online Social Networks Maximizing for Active Friending in Online Social Network De-Nian Yang, Hui-Ju Hung, Wang-Chien Lee, Wei Chen Academia Sinica, Taipei, Taiwan The Pennylvania State Univerity, State College, Pennylvania,

More information

Secure Network Coding with a Cost Criterion

Secure Network Coding with a Cost Criterion Secure Network Coding with a Cost Criterion Jianong Tan, Murie Médard Laboratory for Information and Decision Systems Massachusetts Institute of Technoogy Cambridge, MA 0239, USA E-mai: {jianong, medard}@mit.edu

More information

THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE

THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE Journal of Information Technology Management ISSN #1042-1319 A Publication of the Aociation of Management THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE LI-CHIOU

More information

1. Introduction. C. Camisullis 1, V. Giard 2, G. Mendy-Bilek 3

1. Introduction. C. Camisullis 1, V. Giard 2, G. Mendy-Bilek 3 Proceeding of the 3 rd International Conference on Information Sytem, Logitic and Supply Chain Creating value through green upply chain ILS 2010 Caablanca (Morocco), April 14-16 The right information to

More information

Pipe Flow Calculations

Pipe Flow Calculations Pipe Flow Calculation R. Shankar Subramanian epartment o Chemical and Biomolecular Engineering Clarkon Univerity We begin with ome reult that we hall ue when making riction lo calculation or teady, ully

More information

Queueing Models for Multiclass Call Centers with Real-Time Anticipated Delays

Queueing Models for Multiclass Call Centers with Real-Time Anticipated Delays Queueing Model for Multicla Call Center with Real-Time Anticipated Delay Oualid Jouini Yve Dallery Zeynep Akşin Ecole Centrale Pari Koç Univerity Laboratoire Génie Indutriel College of Adminitrative Science

More information

Teamwork. Abstract. 2.1 Overview

Teamwork. Abstract. 2.1 Overview 2 Teamwork Abstract This chapter presents one of the basic eements of software projects teamwork. It addresses how to buid teams in a way that promotes team members accountabiity and responsibiity, and

More information

Design of Channel Filter based on Asymmetric One-Dimensional Defective Photonic Crystal for Broadband Responses

Design of Channel Filter based on Asymmetric One-Dimensional Defective Photonic Crystal for Broadband Responses Proceeding of the Internationa uticonference of Engineer and Computer Scientit 25 Vo II, IECS 25, arch 8-2, 25, Hong Kong Deign of Channe Fiter baed on Aymmetric One-Dimeniona Defective Photonic Cryta

More information

EVALUATING SERVICE QUALITY OF MOBILE APPLICATION STORES: A COMPARISON OF THREE TELECOMMUNICATION COMPANIES IN TAIWAN

EVALUATING SERVICE QUALITY OF MOBILE APPLICATION STORES: A COMPARISON OF THREE TELECOMMUNICATION COMPANIES IN TAIWAN International Journal of Innovative Computing, Information and Control ICIC International c 2012 ISSN 1349-4198 Volume 8, Number 4, April 2012 pp. 2563 2581 EVALUATING SERVICE QUALITY OF MOBILE APPLICATION

More information

Cost Models for Selecting Materialized Views in Public Clouds

Cost Models for Selecting Materialized Views in Public Clouds International Journal of Data Warehouing and Mining, 0(4), -25, October-December 204 Cot Model for Selecting Materialized View in ublic Cloud Romain erriot, Clermont Univerité, Univerité Blaie acal, Aubière

More information

Assessing the Discriminatory Power of Credit Scores

Assessing the Discriminatory Power of Credit Scores Aeing the Dicriminatory Power of Credit Score Holger Kraft 1, Gerald Kroiandt 1, Marlene Müller 1,2 1 Fraunhofer Intitut für Techno- und Wirtchaftmathematik (ITWM) Gottlieb-Daimler-Str. 49, 67663 Kaierlautern,

More information

Distributed, Secure Load Balancing with Skew, Heterogeneity, and Churn

Distributed, Secure Load Balancing with Skew, Heterogeneity, and Churn Ditributed, Secure Load Balancing with Skew, Heterogeneity, and Churn Jonathan Ledlie and Margo Seltzer Diviion of Engineering and Applied Science Harvard Univerity Abtract Numerou propoal exit for load

More information

In this paper, we investigate toll setting as a policy tool to regulate the use of roads for dangerous goods

In this paper, we investigate toll setting as a policy tool to regulate the use of roads for dangerous goods Vol. 43, No. 2, May 2009, pp. 228 243 in 0041-1655 ein 1526-5447 09 4302 0228 inform doi 10.1287/trc.1080.0236 2009 INFORMS Toll Policie for Mitigating Hazardou Material Tranport Rik Patrice Marcotte,

More information

UNDERSTANDING SCHOOL LEADERSHIP AND MANAGEMENT IN CONTEMPORARY NIGERIA

UNDERSTANDING SCHOOL LEADERSHIP AND MANAGEMENT IN CONTEMPORARY NIGERIA ISSN: 2222990 UNDERSTANDING SCHOOL LEADERSHIP AND MANAGEMENT IN CONTEMPORARY NIGERIA Autin N. Noike The Granada Management Intitute, GranadaSpain Email: Autin_dac@yahoo.com Nkaiobi S. Oguzor ederal College

More information

A Description of the California Partnership for Long-Term Care Prepared by the California Department of Health Care Services

A Description of the California Partnership for Long-Term Care Prepared by the California Department of Health Care Services 2012 Before You Buy A Description of the Caifornia Partnership for Long-Term Care Prepared by the Caifornia Department of Heath Care Services Page 1 of 13 Ony ong-term care insurance poicies bearing any

More information

Apigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management

Apigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management Apigee Edge: Apigee Cloud v. Private Cloud Evaluating deployment model for API management Table of Content Introduction 1 Time to ucce 2 Total cot of ownerhip 2 Performance 3 Security 4 Data privacy 4

More information

Fast Robust Hashing. ) [7] will be re-mapped (and therefore discarded), due to the load-balancing property of hashing.

Fast Robust Hashing. ) [7] will be re-mapped (and therefore discarded), due to the load-balancing property of hashing. Fast Robust Hashing Manue Urueña, David Larrabeiti and Pabo Serrano Universidad Caros III de Madrid E-89 Leganés (Madrid), Spain Emai: {muruenya,darra,pabo}@it.uc3m.es Abstract As statefu fow-aware services

More information

Proceedings of Power Tech 2007, July 1-5, Lausanne

Proceedings of Power Tech 2007, July 1-5, Lausanne Second Order Stochatic Dominance Portfolio Optimization for an Electric Energy Company M.-P. Cheong, Student Member, IEEE, G. B. Sheble, Fellow, IEEE, D. Berleant, Senior Member, IEEE and C.-C. Teoh, Student

More information

Cluster-Aware Cache for Network Attached Storage *

Cluster-Aware Cache for Network Attached Storage * Cluter-Aware Cache for Network Attached Storage * Bin Cai, Changheng Xie, and Qiang Cao National Storage Sytem Laboratory, Department of Computer Science, Huazhong Univerity of Science and Technology,

More information

Bite-Size Steps to ITIL Success

Bite-Size Steps to ITIL Success 7 Bite-Size Steps to ITIL Success Pus making a Business Case for ITIL! Do you want to impement ITIL but don t know where to start? 7 Bite-Size Steps to ITIL Success can hep you to decide whether ITIL can

More information

AA Fixed Rate ISA Savings

AA Fixed Rate ISA Savings AA Fixed Rate ISA Savings For the road ahead The Financia Services Authority is the independent financia services reguator. It requires us to give you this important information to hep you to decide whether

More information

TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME

TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME RADMILA KOCURKOVÁ Sileian Univerity in Opava School of Buine Adminitration in Karviná Department of Mathematical Method in Economic Czech Republic

More information

CASE STUDY ALLOCATE SOFTWARE

CASE STUDY ALLOCATE SOFTWARE CASE STUDY ALLOCATE SOFTWARE allocate caetud y TABLE OF CONTENTS #1 ABOUT THE CLIENT #2 OUR ROLE #3 EFFECTS OF OUR COOPERATION #4 BUSINESS PROBLEM THAT WE SOLVED #5 CHALLENGES #6 WORKING IN SCRUM #7 WHAT

More information

Australian Bureau of Statistics Management of Business Providers

Australian Bureau of Statistics Management of Business Providers Purpose Austraian Bureau of Statistics Management of Business Providers 1 The principa objective of the Austraian Bureau of Statistics (ABS) in respect of business providers is to impose the owest oad

More information

LAB1 2D and 3D step-index waveguides. TE and TM modes.

LAB1 2D and 3D step-index waveguides. TE and TM modes. LAB1 2D and 3D tep-index waveguide. T and TM mode. 1. Getting tarted 1.1. The purpoe o thi laboratory are: - T/TM mode propagation in 2D (lab waveguide) tep-index waveguide a a unction o guide peciic parameter

More information

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective Growth and Sutainability of Managed Security Service etwork: An Economic Perpective Alok Gupta Dmitry Zhdanov Department of Information and Deciion Science Univerity of Minneota Minneapoli, M 55455 (agupta,

More information

Growing Self-Organizing Maps for Surface Reconstruction from Unstructured Point Clouds

Growing Self-Organizing Maps for Surface Reconstruction from Unstructured Point Clouds Growing Self-Organizing Map for Surface Recontruction from Untructured Point Cloud Renata L. M. E. do Rêgo, Aluizio F. R. Araújo, and Fernando B.de Lima Neto Abtract Thi work introduce a new method for

More information