Search results

Filters

  • Journals
  • Authors
  • Keywords
  • Date
  • Type

Search results

Number of results: 5
items per page: 25 50 75
Sort by:
Download PDF Download RIS Download Bibtex

Abstract

Internalization of external economic effects on urban sprawl affected areas. An example of the Krakow Metropolitan Area, The study is a discussion on economic externalities, with particular emphasis on technological effects. Attention is also paid to the problem of internalization of economic external effects caused by movement (transport) in areas affected by the urban sprawl process. The research was conducted for all communes of the Krakow Metropolitan Area (KOM), as a result of which the value of: directly incurred financial losses and the value of lost time generated by the necessity of commuting and return in the space of KOM were presented.

Go to article

Authors and Affiliations

Artur Hołuj
Download PDF Download RIS Download Bibtex

Abstract

Post-Quantum Cryptography (PQC) attempts to find cryptographic protocols resistant to attacks by means of for instance Shor's polynomial time algorithm for numerical field problems like integer factorization (IFP) or the discrete logarithm (DLP). Other aspects are the backdoors discovered in deterministic random generators or recent advances in solving some instances of DLP. The use of alternative algebraic structures like non-commutative or non-associative partial groupoids, magmas, monoids, semigroups, quasigroups or groups, are valid choices for these new kinds of protocols. In this paper, we focus in an asymmetric cipher based on a generalized ElGamal non-arbitrated protocol using a non-commutative general linear group. The developed protocol forces a hard subgroup membership search problem into a non-commutative structure. The protocol involves at first a generalized Diffie-Hellman key interchange and further on the private and public parameters are recursively updated each time a new cipher session is launched. Security is based on a hard variation of the Generalized Symmetric Decomposition Problem (GSDP). Working with GF(2518) a 64-bits security is achieved, and if GF(25116) is chosen, the security rises to 127-bits. An appealing feature is that there is no need for big number libraries as all arithmetic if performed in Z251 and therefore the new protocol is particularly useful for computational platforms with very limited capabilities like smartphones or smartcards.

Go to article

Authors and Affiliations

P. Hecht
Download PDF Download RIS Download Bibtex

Abstract

Although the explicit commutativitiy conditions for second-order linear time-varying systems have been appeared in some literature, these are all for initially relaxed systems. This paper presents explicit necessary and sufficient commutativity conditions for commutativity of second-order linear time-varying systems with non-zero initial conditions. It has appeared interesting that the second requirement for the commutativity of non-relaxed systems plays an important role on the commutativity conditions when non-zero initial conditions exist. Another highlight is that the commutativity of switched systems is considered and spoiling of commutativity at the switching instants is illustrated for the first time. The simulation results support the theory developed in the paper.

Go to article

Authors and Affiliations

Mehmet Emir Koksal
Download PDF Download RIS Download Bibtex

Abstract

Commutation reactance is an important component in the voltage-source converter- based high-voltage direct current (VSC–HVDC) transmission system. Due to its connection to the converter, when there is a fault occurring on the valve-side bushing of a converter transformer, the nonlinearity operation of the converter complicates the characteristics of current flowing through commutation reactance, which may lead to maloperation of its overcurrent protection. It is of great significance to study the performance of commutation reactance overcurrent protection under this fault condition and propose corresponding improvement measures to ensure the safe and stable operation of AC and DC systems. In the VSC–HVDC system with the pseudo-bipolar structure of a three-phase two-level voltage source converter, the valve has six working periods in a power frequency cycle, and each period is divided into five working states. According to the difference between the fault phase and non-fault phase of the conductive bridge arms at the time of fault occurrence, these five working states are merged into two categories. On this basis, various faults of the valve-side bushing of a converter transformer are analyzed, and the conclusion is drawn that the asymmetric fault of valve-side bushing can lead to the maloperation of the commutation reactance overcurrent protection. Based on the characteristics that the current flowing through the commutation reactance after the asymmetric fault of the valve-side bushing contains decaying aperiodic components in addition to the fundamental frequency wave, a scheme to prevent the maloperation of commutation reactance overcurrent protection is proposed, which uses the unequal of two half cycle integral values with different starting points to realize the blocking of commutation reactance overcurrent protection, and it makes up the deficiency of existing protection in this aspect. Finally, this paper builds a VSC–HVDC system simulation model in the PSCAD/EMTDC platform to verify the effectiveness of the scheme.
Go to article

Authors and Affiliations

Yanxia Zhang
1
Guanghao Dong
1
ORCID: ORCID
Le Wei
1
Jinting Ma
1
Shanshan Du
1

  1. School of Electrical and Information Engineering, Tianjin University, No. 92 Weijin Road, Nankai District, Tianjin, China
Download PDF Download RIS Download Bibtex

Abstract

All the available modes of travel and their respective travel parameters must be known to the commuters before their trip. Otherwise they may either spend more money or more time for the trip. In addition to this, recent pandemic, rapidly spreading novel corona virus is demanding a smart solution for contactless commuting. This paper suggests a practical solution to make both the above possible and it emphasizes the applicability of two developed android applications, one for travel data collection and another to predict travel time for a multimodal trip within the study area. If the whole trip is by a single mode, the user can get the corresponding travel time estimate from “Google maps”. But, if the trip is by multiple modes, it is not possible to get the total travel time estimate for the whole trip at a time from “Google maps”. A separate travel mode for “auto” is unavailable in “Google maps” alongside drive, two-wheeler, train or bus and walk alternatives. It is also observed that the travel time estimate of “Google maps” for the city buses is inaccurate. Hence, the two modes (Buses and Autos) were chosen for the study. Unless and until the travel times and stopping times of the two modes are known, it is not possible to predict their trip times. Hence, the mobility analysis was performed for the two modes in the study area to find their respective average travel rate at peak hours, across 15 corridors and the results were presented.
Go to article

Authors and Affiliations

Kanala Teja Vinay Kumar Reddy
1
ORCID: ORCID
Surya Prakash Challagulla
1
ORCID: ORCID

  1. Dept. of Civil Engineering, K. L. University, Vijayawada-522502, AP, India

This page uses 'cookies'. Learn more