The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The paper contribute to establish pragmatic methods to obtain modeling, identification and control laws of double stator windings induction generator DSWIG. The DSWIG model is obtained by formally juxtaposing/over lapping two induction machines, mechanically and magnetically identical to the real DSWIG machine, and having as stator winding the DSWIG load winding, one of them, and the second one having,...
Wireless Sensor Networks (WSNs) have known a tremendous and accentuated development in recent past and in present. Because in almost all applications the sensors must be autonomous, the lifetime of a WSN highly depends on the sensors' energy. The main limitation in designing and developing a WSN is the energy problem since battery replenishment or replacement is difficult or impossible. This paper...
The aim of this research is to study parameters influence in the electric arc modeling. In order to perform this, a study of the electric arc behavior was made by implementing three models of the electric arc in the Matlab/Simulink environment. Furthermore, graphical user interfaces in Matlab were developed, the purpose being to obtain the dynamic voltage-current characteristic of the electric arc...
This paper demonstrates the effectiveness of DTF method, by simulating a network and testing how it responds to different situations. All the packets injected into the simulator are collected from real computers. The simulator allow to create a virtual network, with as many network stations as desired. The simulation proves that DTF method can quickly determine if a MAC address is or it is not what...
The present paper presents specific issues that arise in Photovoltaic Energy Conversion Systems, being focused on maximizing the output power. There is proposed a model for Photovoltaic PV panel external characteristics. The coordinates of maximum power point are determined and used for imposing the appropriate load resistance to maximize the provided power. A comparison is made considering the classical...
Cloud Computing is a technology which is susceptible to a continuous development, because of its strong advantages of accessing data from any place in the world over the Internet without concerning about the infrastructure used and the problems involved by the installation and maintenance processes. The purpose of this article is to provide an overview of several management interfaces for Eucalyptus...
This paper demonstrates the effectiveness of DTF method, by examining real traffic, collected from a large number of computers. The Destination Traffic Fingerprint Method, described in detail by the authors in [1][2], focuses on the fact that most computers have a constant traffic to a specific set of IP destinations. This paper presents results of the DTF method applied to real traffic and proves...
The paper presents a study for determination the optimal control law for a small horizontal axis windgenerator. Experimentally, using a mixed physical-analog laboratory model, were determined the state variables, corresponding to different wind speed values, for the optimum regimes of the wind turbine, based on the turbine theoretical estimated mathematical model. From a large multitude of possible...
The paper presents a control strategy for a wind energy conversion system (WECS) which tracks the maximum power point of the wind turbine. The topology of the system consists of a permanent magnet synchronous generator (PMSG), a diode bridge rectifier, a hybrid dc-dc converter which lowers the dc voltage, a supercapacitor and a battery charger. This strategy uses the measured wind speed and imposes...
Taking into account the directives of the European Union concerning the increasing role of renewable power sources for supplying loads and reduction of CO2 emission, this paper presents details of the technical and economic characteristics for a hybrid solution generation power system. The goal of this micro power system is to supply residential electrical load that consist in 60 consumers of 5 kW...
Ancillary services are support services within the power system, those which are necessary to support the transmission capacity and are essential in maintaining power quality, reliability and security of the grid. Considering these facts the supply method of the ancillary services is a key feature for the appropriate operation of the power system. Within this paper the authors are focusing on electric...
The purpose of the present paper is to highlight the advantages we have when using the SAP NetWeaver integration and application platform in developing a multidisciplinary project that needs Multilanguage support, web interface, human resources, database & portal and offers schooling possibilities along with the communication with an external application. To prove these advantages, we are going...
This paper addresses the issue of detecting spoofed MAC addresses in a Local Area Network using constant traffic to specific IP destinations, as a fingerprint of the authorized station. In the chapters that follow, the authors describe how to determine this fingerprint and then how can it be used by applications to monitor network traffic in order to determine if one network station is or is not who...
This paper demonstrates the effectiveness of the method for determining spoofed MAC Addresses by extracting a fingerprint of constant traffic to specific IP destinations. This method, called DTF (Destination Traffic Fingerprint), was described in detail by the authors [8]. This paper presents results of the DTF method in a software tool called NetDTF, which is able to capture traffic in real time...
The paper concerns a dual (double) split-wound three-phase stator windings induction generator having the same poles number (split-wound). The separate stator windings have distinct functions — excitation and, respectively, electric energy generation, that assures the physical decoupling of the excitation and of the load and their control simplification, There was considered [1] 90 electrical degrees...
The paper proposes Markov models for the reliability analysis of the wireless sensor networks with standby backup elements. There are presented the theoretical aspects and some of the variables that are used in the domain of fault tolerant systems. There has been conducted a study regarding the reliability of system versus cost price, considering different number of hot redundant spare parts. Reliability...
The paper proposes Markov models for the reliability analysis of the wireless sensor networks. There are presented the theoretical aspects and some of the variables that are used in the domain of fault tolerant systems. There is also presented a comparison between systems using dedicated replacements and universal replacements for defective nodes. There has been conducted a study regarding the reliability...
The last decade's research has highlighted the necessity of using of wind aggregates' at full capacity, fact that involves the functioning at a imposed precise value of rotation and torque at certain wind speed values (on the maximum power point located on the wind turbine characteristic). The autonomous power energy system composed from a synchronous generator (SG), wind turbine and the load is dynamically...
A Web Dynpro component is an aggregate of units revealed as views, controllers and windows. In a controller, we can create a context node and an attribute; in a view, we can simply drag and drop an UI element, applying the what you see is what you get view editor, we can use the generated methods or we can create our own methods, we can define an usage or navigation plugs. To create the navigation...
Nowadays many control systems are able to control the continuous casting process by complying with all technological features. These systems do not consider all the causes of the factory rejects - semi-product crust cracks - which are extremely important for economical reasons. The continuous casting process referred in this paper is controlled by a complex system based on fuzzy logic and by individual...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.