Over the last few decades, the inverse over-current protection scheme has been one of the most common schemes utilised in protecting the distribution networks (DNs). Although over-current relays ...(OCRs) give an excellent protection in extreme failure situations, but continuous integration of distributed generation (DG) and the multi-looped structure of modern DN has made it difficult for the existing industrial OCR's to secure suitable coordination between the different OCR's. The problem of coordinating over-current schemes in the presence of DG needs a complementary between the optimisation techniques employed and the limitation of the manufactured relays existed in the DN for proper discrimination between OCRs. This study investigates the influence of excessive fault current due to DG penetration on conventional IEC characteristics. A novel constraint had been proposed to be added to the formula of the coordination problem – taking into consideration – the limitation of conventional IEC tripping characteristics utilised in nowadays numerical relays. Furthermore, a new non-standard tripping characteristic is suggested to increase the applicability of the optimisation techniques with the existing OCR's. A benchmark IEC microgrid is implemented in ETAP Package. The genetic algorithm is employed to investigate the effectiveness of the two proposed approaches to the conventional optimisation techniques in different operational modes.
Perhaps no kind of regulation is more common or less useful than mandated disclosure-requiring one party to a transaction to give the other information. It is the iTunes terms you assent to, the ...doctor's consent form you sign, the pile of papers you get with your mortgage. Reading the terms, the form, and the papers is supposed to equip you to choose your purchase, your treatment, and your loan well.More Than You Wanted to Knowsurveys the evidence and finds that mandated disclosure rarely works. But how could it? Who reads these disclosures? Who understands them? Who uses them to make better choices?
Omri Ben-Shahar and Carl Schneider put the regulatory problem in human terms. Most people find disclosures complex, obscure, and dull. Most people make choices by stripping information away, not layering it on. Most people find they can safely ignore most disclosures and that they lack the literacy to analyze them anyway. And so many disclosures are mandated that nobody could heed them all. Nor can all this be changed by simpler forms in plainer English, since complex things cannot be made simple by better writing. Furthermore, disclosure is a lawmakers' panacea, so they keep issuing new mandates and expanding old ones, often instead of taking on the hard work of writing regulations with bite.
Timely and provocative,More Than You Wanted to Knowtakes on the form of regulation we encounter daily and asks why we must encounter it at all.
Seven days a week, twenty-four hours a day, electronic databases are compiling information about you. As you surf the Internet, an unprecedented amount of your personal information is being recorded ...and preserved forever in the digital minds of computers. For each individual, these databases create a profile of activities, interests, and preferences used to investigate backgrounds, check credit, market products, and make a wide variety of decisions affecting our lives. The creation and use of these databases—which Daniel J. Solove calls “digital dossiers”—has thus far gone largely unchecked. In this startling account of new technologies for gathering and using personal data, Solove explains why digital dossiers pose a grave threat to our privacy.
The Digital Person sets forth a new understanding of what privacy is, one that is appropriate for the new challenges of the Information Age. Solove recommends how the law can be reformed to simultaneously protect our privacy and allow us to enjoy the benefits of our increasingly digital world.
The first volume in the series EX MACHINA: LAW, TECHNOLOGY, AND SOCIETY
Eighteenth-century gentleman scholars collected antiquities. Nineteenth-century nation states built museums to preserve their historical monuments. In the present world, heritage is a global concern ...as well as an issue of identity politics. What does it mean when runic stones or medieval churches are transformed from antiquities to monuments to heritage sites? This book argues that the transformations concern more than words alone: They reflect fundamental changes in the way we experience the past, and the way historical objects are assigned meaning and value in the present. This book presents a series of cases from Norwegian culture to explore how historical objects and sites have changed in meaning over time. It contributes to the contemporary debates over collective memory and cultural heritage as well to our knowledge about early modern antiquarianism.
Several issues need to be considered in the design and control of converters for converter-interfaced distributed generators (DGs). Under fault conditions, the semiconductor devices withstand ratings ...must not be exceeded. The converter control strategy is also required to facilitate fault ride through (FRT) capability. On the other hand, protection against fault is better served by employing control strategies that allow the converter-interfaced DGs to contribute short duration fault current sufficient to aid the detection of faults. Semiconductor devices protection and FRT capability have the same objective of limiting the magnitude of the fault current. Protection coordination in the complex DG-integrated network is difficult and may result in protection settings that are not optimal or contribute to long relay operating times that may impact FRT support. On this basis, this study proposes the de-coupling of the protection solution from FRT and semiconductor device considerations. This study critically reviews various strategies proposed in the literature for the protection of the DG-integrated distribution system and develops an argument that aims to influence a paradigm shift towards voltage-based protection that may see protection design decoupled from inverter design and control, since fault current contribution may not be required to achieve effective protection.
This open access book provides researchers and professionals with a foundational understanding of online privacy as well as insight into the socio-technical privacy issues that are most pertinent to ...modern information systems, covering several modern topics (e.g., privacy in social media, IoT) and underexplored areas (e.g., privacy accessibility, privacy for vulnerable populations, cross-cultural privacy). The book is structured in four parts, which follow after an introduction to privacy on both a technical and social level: Privacy Theory and Methods covers a range of theoretical lenses through which one can view the concept of privacy. The chapters in this part relate to modern privacy phenomena, thus emphasizing its relevance to our digital, networked lives. Next, Domains covers a number of areas in which privacy concerns and implications are particularly salient, including among others social media, healthcare, smart cities, wearable IT, and trackers. The Audiences section then highlights audiences that have traditionally been ignored when creating privacy-preserving experiences: people from other (non-Western) cultures, people with accessibility needs, adolescents, and people who are underrepresented in terms of their race, class, gender or sexual identity, religion or some combination. Finally, the chapters in Moving Forward outline approaches to privacy that move beyond one-size-fits-all solutions, explore ethical considerations, and describe the regulatory landscape that governs privacy through laws and policies. Perhaps even more so than the other chapters in this book, these chapters are forward-looking by using current personalized, ethical and legal approaches as a starting point for re-conceptualizations of privacy to serve the modern technological landscape. The book’s primary goal is to inform IT students, researchers, and professionals about both the fundamentals of online privacy and the issues that are most pertinent to modern information systems. Lecturers or teacherscan assign (parts of) the book for a “professional issues” course. IT professionals may select chapters covering domains and audiences relevant to their field of work, as well as the Moving Forward chapters that cover ethical and legal aspects. Academicswho are interested in studying privacy or privacy-related topics will find a broad introduction in both technical and social aspects.
The UNESCO Convention on the Protection of the Underwater Cultural Heritage 2001, which entered into force internationally in 2009, is designed to deal with threats to underwater cultural heritage ...arising as a result of advances in deep-water technology. However, the relationship between this new treaty and the UN Convention on the Law of the Sea is deeply controversial. This study of the international legal framework regulating human interference with underwater cultural heritage explores the development and present status of the framework and gives some consideration to how it may evolve in the future. The central themes are the issues that provided the UNESCO negotiators with their greatest challenges: the question of ownership rights in sunken vessels and cargoes; sovereign immunity and sunken warships; the application of salvage law; the ethics of commercial exploitation; and, most crucially, the question of jurisdictional competence to regulate activities beyond territorial sea limits.
The registration of plant protection products (PPPs) in the EU is under Regulation 1107/2009, which recommends a tiered approach to assessing the risk to non-target terrestrial plants (NTTPs). ...However, little information is provided on how to perform and implement higher tier studies or how to use them to refine the risk assessments. Therefore, a stakeholder workshop was organized to consolidate current knowledge and expertise to aid the further development of testing and assessment procedures for NTTPs. This brief communication highlights the agreed recommendations of the workshop, which relate to the three main themes, i.e. specific protection goals, risk assessment and mitigation. The participants of the workshop adopted the European Food Safety Authority (EFSA) approach of using an ecosystem services framework for identifying specific protection goals. First, delivery and protection of ecosystem services were discussed for in-crop, in-field and off-crop, and off-field areas. Second, lower and higher tier risk assessment methods, including modelling approaches, were evaluated. Third, options for risk mitigation of spray drift and run-off were discussed and evaluated. Several important knowledge gaps were identified, and specific data collation and literature-based tasks were actioned to begin to address them. A full workshop report is planned for the fall of 2014.
Knowledge is an intrinsic element of environmental management. Understanding what kinds of knowledge are needed and how to communicate them effectively is crucial for building environmental ...management capacity. Despite extensive research, knowledge and its exchange are commonly considered from the viewpoint of its creators and disseminators, rather than that of its recipients. This can lead to mismatches between supply of and demand for knowledge, and futile knowledge exchange that undermines the effectiveness of interventions. Research is needed that looks carefully at the contexts and consequences of such scenarios. Addressing this gap, we examine the implementation of National Environmental Programs (NEPs) in north-western China, drawing from interviews and questionnaires with scientists, grassroots implementers, and farmers and herders, to identify what and how knowledge has been exchanged and what their perspectives are about knowledge exchange with other actors. We ascertain the positive impacts of knowledge exchange during NEP implementation, as well as the consequences when it is lacking, by analysing the interfaces and interactions between actors, seeking explanation for successes and failures. We conclude that with changing socio-ecological systems, knowledge and its exchange also need to change accordingly, extending beyond the environmental domain to integrate local socioeconomic concerns. Such efforts are necessary to improve environmental management outcomes and advance sustainable development.