definite time
Recently Published Documents


TOTAL DOCUMENTS

62
(FIVE YEARS 16)

H-INDEX

9
(FIVE YEARS 1)

2021 ◽  
Vol 8 (2) ◽  
pp. 80-84
Author(s):  
Rony Maharjan ◽  
Dipesh Mangal Joshi

Nepal is experiencing second wave of COVID-19 infection leading to major health impacts and crisis. Despite the development of vaccine against COVID-19 and its wider coverage, many countries have already experienced third wave. After vaccination against COVID-19 antibodies has been seen to be present till eight months in different studies, evidences beyond that is yet to come. Looking at the trends of reinfections and mathematical models for prediction of COVID-19 infection, there is high chances that Nepal will face third wave, and children will be affected more due to unavailability of vaccine for this age group. There is no fixed definite time to detect when the third wave hit. From the health crisis experience during second wave, Nepal should stress on implication of various strategic and evidence-based measures for third wave preparedness and mitigation to minimize the morbidity, post COVID-19 infection complications and mortality.


2021 ◽  
Vol 11 (18) ◽  
pp. 8454
Author(s):  
Duong Minh Bui ◽  
Phuc Duy Le ◽  
Thanh Phuong Nguyen ◽  
Hung Nguyen

Integration of distributed generators (DGs) into a distribution network (DN) can cause coordination challenges of overcurrent relays (OCRs) because of different fault-current contributions of DGs as well as the directional change in fault currents. Therefore, the OCRs should be properly coordinated to maintain their adaptability and scalability to protect the DG-integrated distribution network. In this study, an adaptive and scalable protection coordination (ASPC) approach has been developed for the OCRs in a DG-contained distribution network based on two implementation stages. At the first stage, the reliability improvement of fault-current calculation results is performed by determining the min-max confidence interval of fault current for each different fault type, which is the basis for properly selecting tripping and pick-up thresholds of definite-time and inverse-time OC functions in the same OCR. At the second stage, optimization algorithms are used for calculating protection-curve coefficients and Time-Dial Setting (TDS) multiplier for the inverse-time OC functions in the OCR. A real 22 kV DG-integrated distribution network which is simulated by ETAP software is considered a reliable test-bed to validate the proposed ASPC system of OCRs in the multiple-DG-contained distribution network. In addition, the coordination results of OCRs can be obtained by three common optimization algorithms, Particle Swarm Optimization (PSO), Gravitational Search Algorithm (GSA), and Genetic Algorithm (GA). These relay coordination results have shown an effective protection combination of the definite-time OC functions (50P and 50G) and the inverse-time OC functions (51P and 51G) in the same OCR to get the adaptable and scalable DN protection system.


Pólemos ◽  
2021 ◽  
Vol 15 (2) ◽  
pp. 207-220
Author(s):  
Nicoletta Vallorani

Abstract My work here focuses on translation and migration, with specific reference to the field of visual arts, exploiting the kind of approach suggested by Loredana Polezzi – and mostly applied to linguistic translation – in her “Translation and Migration”. My contention is that, though apparently mimetic and universally understandable, images are culture-bound and they need being translated when crossing a border. The process of translation becomes more and more complex when the represented object/events/person is framed within a much-debated and politically overloaded issue. Focusing on a definite time (today) and a specific space (the Mediterranean Sea), I select some artistic projects by both Western and non-Western artists, pursuing a twofold objective. I want to show how the selected works raise the issue of responsibility and I want to reflect on the “language” they use to “translate” an untranslatable experience into an understandable message.


Author(s):  
Santhosh Kumar. M ◽  
Dr. M. Surendhar Kumar

A patent is a monopoly right granted to a Patentee for a definite time period, during which he/she is given the exclusive right to stop anyone else from using his/ her invention without approval. The European law may allow patents to be granted to natural products, where such products may not be eligible for patent protection in USA, the European patent office strict assessment of priority and added subject matter, it is important that all subject matter is included in the first application for the invention.


InterConf ◽  
2021 ◽  
pp. 411-417
Author(s):  
Ketevan Khutsishvili

The problem of study of violence, its appearances, and goals from the anthropological perspective is facing some obstacles. The analyses of the ethnographical data from the mountainous part of East Georgia proves the connection of the forms of violence with the system of values of the definite time-period of the historical-cultural development. The dynamics of the forms of violence depends on the changes of the values. The conclusion is drawn that the violence forms used in traditional societies to regulate the inner relations are to be understood as a cultural fact, the study of which needs to consider not only its instrumental, but also the functional aspects.


Author(s):  
V. Vinodhini ◽  
C. Kumuthini ◽  
K. Santhi

Ransomware attack is known to as WCRY or WannaCry. This ransomware is intriguing advantage of a recently disclosed Microsoft vulnerability (“MS17-010 – “Eternalblue” ) coupled with the Shadow Brokers tools release. After a computer is fouled, WannaCry ransomware targets and encrypts 176 file types. Some of the file types WannaCry targets are database related files, multimedia and archive related files, as well as Microsoft Office documents. In its ransom note, which supports 27 languages, it initially demands US$300 worth of Bitcoins from its fatalities—an amount that increases incrementally after a definite time limit. The victim is also given seven days before the pretentious files are deleted. The WannaCry Ransomware consists of multiple components. It arrives on the ruined computer in the form of a dropper, a self-reliant program that extracts the other application mechanism embedded within it. Those components include:  An application that encrypts and decrypts data Files containing encryption keys A copy of Tor  The program secret code is not obfuscated and was relatively easy for security pros to analyze. Once it is launched, WannaCry tries to access a hard-coded URL (the so-called kill switch); if it can't, it proceeds to investigate for and encrypt files in a slew of important formats, ranging from Microsoft Office files to MP3s and MKVs, leaving them completely inaccessible to the user. It then displays a ransom notice, demanding numbers in Bitcoin to decrypt the files.


2021 ◽  
Vol 57 (1) ◽  
pp. 187-197
Author(s):  
Vincentius Raki Mahindara ◽  
David Felipe Celeita Rodriguez ◽  
Margo Pujiantara ◽  
Ardyono Priyadi ◽  
Mauridhi Hery Purnomo ◽  
...  

2020 ◽  
Vol 14 (4) ◽  
pp. 545-552
Author(s):  
Yevgen Panov ◽  
◽  
Nikolai Gomelia ◽  
Olena Ivanenko ◽  
Andrii Vahin ◽  
...  

In this paper, the influence of carbon material type, temperature and oxygen concentration in gas mixture on the processes of carbon monoxide formation in production of the electrodes by graphitization was explored experimentally. Specific quantity of gas formed for a definite time, reduced to mass unit of carbon loading using pitch, packing materials and charge mixture of industrial use, was calculated. It is demonstrated that pitch provides the highest rate of carbon oxidation with the release of CO and substantially exceeds packing materials and charge mixture for this index.


2020 ◽  
Vol 1 (1) ◽  
pp. 35-44
Author(s):  
Lita Lidyawati ◽  
Lisa Kristiana ◽  
Arsyad Ramadhan Darlis ◽  
Lucia Jambola ◽  
Ratna Susana

Activities such as planting and gardening become one of prominent hobbies. An issue of having such well grown plants is the impractical and unachieavable task to monitor 24 hours a day, thus we need a smart gardening system that can monitor the garden on demand. One of the problems in residential gardening systems is how to water the plants while the owner is not at home. Some of people have an adequate knowledge of using IoT to make their life easier. This paper proposes a simple automatic gardening system in watering several plants as programmed. In addition, this system allows human’s manual intervention either locally or remotely via Internet, to control a water pump. To build this smart gardening system, we use Xiaomi home application from Google Play. In this application, we can set the program to water the plants daily with definite time periodic independently.


2019 ◽  
Vol 11 (12-SPECIAL ISSUE) ◽  
pp. 785-794
Author(s):  
Hussein Shutari ◽  
Chin-Leong Wooi ◽  
Haziah Abdul Hamid ◽  
Mohammed Imran Mousa ◽  
Wen-Shan Tan ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document