Search results for " mac"
showing 10 items of 3066 documents
Violencia en relaciones de pareja jóvenes
2012
La violencia contra la mujer en las relaciones de pareja es un fenómeno que ocurre desde tiempos inmemoriales. Entonces se consideraba como algo privado dentro de la relación de pareja y únicamente concernía a los miembros de la misma, incluso en los medios de comunicación aparecían estadísticas sobre accidentes de tráfico al tiempo que se ignoraba la incidencia de feminicidios y agresiones sexuales contra mujeres. Afortunadamente desde hace 50 años se empieza a hablar de ello desde una perspectiva científica, empieza a tener relevancia en todos los ámbitos culturales y se entiende que su erradicación es necesaria, requiriéndose para ello abordajes multidisciplinares e interinstitucionales.…
Violencia machista: tolerancia cero
2015
Con motivo del Día Internacional de la Eliminación de la Violencia contra la Mujer, breve reflexión acerca de la violencia hacia mujeres y niñas por razón de género que sigue siendo una auténtica lacra social a erradicar y constituye una verdadera preocupación mundial, en cuya prevención y erradicación debemos implicarnos tanto la sociedad como las distintas instituciones y gobiernos.
Damping Provision by Different Virtual Synchronous Machine Schemes
2020
The adoption of virtual synchronous machine (VSM) schemes for the control of power converters is gaining more and more attention both in academia and industry. The VSM control strategies fall into the category of grid-forming converter controls, and they are intended for a range of different applications, providing specific services and different kinds of support to the grid. The paper investigates the possibility of damping provision to the system by VSM power converters. Different schemes are considered and compared, showing the opportunity of the investigated solutions through combined modal and time domain analyses. A specific modification of the power synchronization loop is recognized…
Sensitivity Analysis and Frequency Dynamics of Grid-Connected Converters with Virtual Inertia
2021
For the participation in the frequency control of the system, power converters can be controlled with different strategies and methods, sharing the common concept of virtual inertia capability. In this work, a sensitivity analysis of two main categories of converter controls with virtual inertia is presented. The considered schemes are a grid-following current vector control with additional virtual inertia block and a grid-forming control scheme based on virtual synchronous machine concept. A proper basis for the comparison is first assessed providing an analytical correlation between the control parameters of the two schemes. For the two control strategies, the sensitivity analysis of the …
SV40 transformed fibroblasts recognize the same 140 kD fibronectin chemotactic fragment as non-transformed cells
1985
SV40-virus-transformed human embryonal fibroblasts show an enhanced chemotactic response to the glycoprotein fibronectin. However, they recognize the same chemotactic active region as non-transformed fibroblasts. The result suggests that an enhancement of chemotaxis by fibroblasts which have been transformed with Simian Virus 40 is due not to the utilization of further chemotactic domains in the molecule, but to an increased sensitivity of the cells to the chemoattractant.
Experimental Validation of Maximum Constant Boost Control and Switching Frequency Optimal for three-phase Quasi-Z-Source Converters
2020
This paper presents a modified modulation scheme for quasi-Z-Source converters, based on the Maximum Constant Boost Control (MCBC) concept and Switching Frequency Optimal (SFO) as reference signal. The effectiveness of the proposed technique is validated by comparing the obtained results (in terms of AC harmonic content and voltage stress) with those carried out from traditional modulation schemes. For this reason, a test bench has been assembled and the benefits of the SFO MCBC modulation scheme have been valuated.
Evaluation of the wave energy density on the Sicilian coast
2016
In this article the wave energy density of the northern Sicilian coasts is evaluated and is used to evaluate the producibility of a wave nergy converter to be installed in an area in the north west part of Sicily. In particular, the objective of the study is the evaluation of a potential installation in an area between Trapani and Palermo, which are the largest cities in the north west part of Sicily. In particular in this research, the wave energy density of Sicily has been analyzed by using an analysis of wave data carried out in a 10-year period, using the measurements of buoyant of National Wave measuring System (RON - Rete Ondametrica Nazionale). The analysis shows that the north-weste…
Anomaly detection using one-class SVM with wavelet packet decomposition
2011
Anomaly detection has become a popular research topic in the field of machine learning. Support vector machine is one anomaly detection technique and it is coming one the most widely used. In this research, anomaly detection is applied to road condition monitoring, especially pothole detection, using accelerometer data. The proposed concept includes data preprocessing, feature extraction, feature selection and classification. Accelerometer data was first filtered and segmented, after which features were extracted with frequency- and time-domain functions, with genetic programming and with wavelet packet decomposition. A classification model was built using support vector machine and the cal…
HIGH-EFFICIENCY OSCILLATING-BLADE WIND TURBINE
2011
Making IEEE 802.11 wireless access programmable
2013
In this paper, we present a modular Layer 2 architecture which makes wireless access in {IEEE}~802.11 networks programmable and thus opens the door for broader range of enhancements. We show the power of the proposed architecture by presenting a number of innovative solutions for infrastructure, direct links and mesh cases. Early prototyping results are publicly available and can be used to develop solutions not so strictly bounded by legacy access rules, to quicker and more accurately meet evolving user demands.