Research on the Detection of Parallel Arc Faults Based on the Characteristic Analysis in Time Domain

2013 ◽  
Vol 380-384 ◽  
pp. 749-752
Author(s):  
Yuan Wu ◽  
Zhong Xiao Song

Arc fault is one of main cause of fires which bring great loss and damage every year. Researchers show that the conventional circuit breakers probably fail to interrupt the circuit when an arc fault occurs. So, it is very important and necessary to find a new way to detect the arc fault. This thesis focuses on discussing the special characters of parallel arc faults, which are the main cause of fires. In this paper, not only the data of parallel faults, but also the normal working data of different apparatus are obtained. Two significant characters will be described and they will be the key criterions to detect the appearance of parallel arc faults. At last, we test the correctness of this method and get good results.

2017 ◽  
Vol 31 (18) ◽  
pp. 1750207 ◽  
Author(s):  
Pibin Bing ◽  
Shichao Huang ◽  
Zhongyang Li ◽  
Zhou Yu ◽  
Ying Lu ◽  
...  

The absorption characteristics of a photoexcited metamaterial absorber at terahertz frequencies were analyzed in this study. Filling photosensitive semiconductor silicon into the gap between the resonator arms leads to modulation of its electromagnetic response through a pump beam which changes conductivity of silicon. Comparisons of terahertz absorbing properties which were caused by different thicknesses and dielectric constants of polyimide, cell sizes and widths of SRRs, and lengths and conductivities of the photosensitive silicon, were studied by using Finite Difference Time Domain (FDTD) from 0.4 THz to 1.6 THz. The results of this study will facilitate the design and preparation of terahertz modulator, filters and absorbers.


2020 ◽  
Vol 1616 ◽  
pp. 012105
Author(s):  
Jiajin Qi ◽  
Qingkui He ◽  
Yijun Jiang ◽  
Yinfei Xu

Author(s):  
Shunottara Ingle

Lot of the fake currency note is being printed in recent years which has caused great loss and damage to society. So, it has become necessary to develop a tool to detect fake currency. This project proposes an approach that will detect fake currency notes being circulated by using their image. Our project will provide required portability and compatibility to most peoples as well as feasible accuracy for fake currency detection. The paper is about Fake Indian Paper Currency using image processing implemented in Android Studio to make the app portable and efficient. Features of currency notes like color, height, width, ratio, watermarks were extracted. The process starts from capturing or browsing the image of a currency note and then compare its features with the real note and check whether it is fake or original.


1974 ◽  
Vol 9 (2) ◽  
pp. 194-220 ◽  
Author(s):  
J. J. Lador-Lederer

L'internationalisation du crime terroriste ne pouvait laisser indifférents les criminalistes et les internationalistes pas plus que les gouvernements, d'autant que, souvent, des crimes d'une telle gravité restent impunis, car à l'internationalisation du terrorisme ne répond encore l'internationalisation de la répression.Antoine Sottile, 1938The great upbuilding of international law which set in with the end of World War II did not overlook the penal aspects affecting the social substratum and organizational assignments of international law. Matters were no longer envisaged in the rather simplistic manner of Art. 231 of the Treaty of Versailles which had, authoritatively though not arbitrarily, decreed that “Germany accepts the responsibility … for causing all the loss and damage to which Allied and Associated Governments and their nationals had been subjected as a consequence of the war imposed on them by the aggression of Germany and her allies”, and, not less authoritatively, though more arbitrarily, decided “publicly [to] arraign William II for a supreme offence against international morality and the sanctity of treaties”. More realistically, Art. 228 postulated the “right of the Allied and Associated Powers to bring before military tribunals persons accused of having committed acts in violation of the laws and customs of war”. To the great loss of mankind, these provisions were in time eroded to the point of becoming less than meaningless.


2020 ◽  
Vol 8 (6) ◽  
pp. 1260-1264

To ensure company stability in running a business, the management team of the company must be aware of risks that could arise under various condition. These risks should be identified and mitigated as early as possible, before its effect the company. No matter what resource its affected, either core or support resource risks must be mitigated to avoid loss and damage to the company. Data Centre is one of the core resources of a company; it keeps the company information and used daily in the company. If by any causes, the data center could not be accessed or function; normally, it would cause a great loss to the company. This paper discussed the used of Facilitated Risk Analysis and Assessment Process (FRAAP) technique to list and mitigate risk to the company data center. There are four steps of FRAAP technique used in this paper: creating risk description list, creating a risk sensitivity profile, creating risk exposure rating, and creating mitigating control list. The used of FRAAP technique, resulted in identification of two type of risk which are confidentiality and availability. The mitigation plan in this paper, cover the steps planned to mitigated risk resulted from information leak (Confidentiality); ex. hacking, virus, Etc. and natural disaster (Availability); ex. Flood, earthquake, fire, Etc. These planned mitigation steps are divided into three lists, which are: Risks response, Emergency Response Steps, Recovery steps, and restoration steps of the company data center.


Sign in / Sign up

Export Citation Format

Share Document