oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Search Results: 1 - 10 of 1379 matches for " Seth Blumsack "
All listed articles are free for downloading (OA Articles)
Page 1 /1379
Display every page Item
Cost and Emissions Implications of Coupling Wind and Solar Power  [PDF]
Seth Blumsack, Kelsey Richardson
Smart Grid and Renewable Energy (SGRE) , 2012, DOI: 10.4236/sgre.2012.34041
Abstract: We assess the implications on long-run average energy production costs and emissions of CO2 and some criteria pollutants from coupling wind, solar and natural gas generation sources. We utilize five-minute meteorological data from a US location that has been estimated to have both high-quality wind and solar resources, to simulate production of a coupled generation system that produces a constant amount of electric energy. The natural gas turbine is utilized to provide fill-in energy for the coupled wind/solar system, and is compared to a base case where the gas turbine produces a constant power output. We assess the impacts on variability of coupled wind and solar over multiple time scales, and compare this variability with regional demand in a nearby load center, and find that coupling wind and solar does decrease variability of output. The cost analysis found that wind energy with gas back-up has a lower levelized cost of energy than using gas energy alone, resulting in production savings. Adding solar energy to the coupled system increases levelized cost of energy production; this cost is not made up by any reductions in emissions costs.
Do topological models provide good information about vulnerability in electric power networks?
Paul Hines,Eduardo Cotilla-Sanchez,Seth Blumsack
Physics , 2010, DOI: 10.1063/1.3489887
Abstract: In order to identify the extent to which results from topological graph models are useful for modeling vulnerability in electricity infrastructure, we measure the susceptibility of power networks to random failures and directed attacks using three measures of vulnerability: characteristic path lengths, connectivity loss and blackout sizes. The first two are purely topological metrics. The blackout size calculation results from a model of cascading failure in power networks. Testing the response of 40 areas within the Eastern US power grid and a standard IEEE test case to a variety of attack/failure vectors indicates that directed attacks result in larger failures using all three vulnerability measures, but the attack vectors that appear to cause the most damage depend on the measure chosen. While our topological and power grid model results show some trends that are similar, there is only a mild correlation between the vulnerability measures for individual simulations. We conclude that evaluating vulnerability in power networks using purely topological metrics can be misleading.
Centralized versus Decentralized Infrastructure Networks
Paul D. H. Hines,Seth Blumsack,Markus Schl?pfer
Physics , 2015,
Abstract: While many large infrastructure networks, such as power, water, and natural gas systems, have similar physical properties governing flows, these systems tend to have distinctly different sizes and topological structures. This paper seeks to understand how these different size-scales and topological features can emerge from relatively simple design principles. Specifically, we seek to describe the conditions under which it is optimal to build decentralized network infrastructures, such as a microgrid, rather than centralized ones, such as a large high-voltage power system. While our method is simple it is useful in explaining why sometimes, but not always, it is economical to build large, interconnected networks and in other cases it is preferable to use smaller, distributed systems. The results indicate that there is not a single set of infrastructure cost conditions under which optimally-designed networks will have highly centralized architectures. Instead, as costs increase we find that average network sizes increase gradually according to a power-law. When we consider the reliability costs, however, we do observe a transition point at which optimally designed networks become more centralized with larger geographic scope. As the losses associated with node and edge failures become more costly, this transition becomes more sudden.
Comparing the Topological and Electrical Structure of the North American Electric Power Infrastructure
Eduardo Cotilla-Sanchez,Paul D. H. Hines,Clayton Barrows,Seth Blumsack
Computer Science , 2011, DOI: 10.1109/JSYST.2012.2183033
Abstract: The topological (graph) structure of complex networks often provides valuable information about the performance and vulnerability of the network. However, there are multiple ways to represent a given network as a graph. Electric power transmission and distribution networks have a topological structure that is straightforward to represent and analyze as a graph. However, simple graph models neglect the comprehensive connections between components that result from Ohm's and Kirchhoff's laws. This paper describes the structure of the three North American electric power interconnections, from the perspective of both topological and electrical connectivity. We compare the simple topology of these networks with that of random (Erdos and Renyi, 1959), preferential-attachment (Barabasi and Albert, 1999) and small-world (Watts and Strogatz, 1998) networks of equivalent sizes and find that power grids differ substantially from these abstract models in degree distribution, clustering, diameter and assortativity, and thus conclude that these topological forms may be misleading as models of power systems. To study the electrical connectivity of power systems, we propose a new method for representing electrical structure using electrical distances rather than geographic connections. Comparisons of these two representations of the North American power networks reveal notable differences between the electrical and topological structure of electric power networks.
A Quantitative Assessment of the Morphology of the Piriform Aperture as an Indicator of Race  [PDF]
Seth Gardner
Forensic Medicine and Anatomy Research (FMAR) , 2015, DOI: 10.4236/fmar.2015.31002
Abstract: Piriform apertures from skulls in the Bass Collection at the University of Tennessee were examined. The morphology of the perform aperture from digital images was captured using Adobe Measuring Tool 9.0 and data analyzed with SPSS 17.0. Twenty-four linear measurements from a central point of the aperture as well as the perimeter were evaluated to quantify a difference between Black and White populations. The statistical analyses employed Discriminate Functional Analysis followed by Stepwise analysis. Discriminate functions were generated to predict to which group a skull belonged. A discriminate function produced an accuracy of 77.4%. Step-wise discriminate function analysis, using only three variables, produced an accuracy of 79.0%.
Unusual Drainage of the Right Testicular Vein: A Case Report  [PDF]
Seth Gardner
Case Reports in Clinical Medicine (CRCM) , 2015, DOI: 10.4236/crcm.2015.46046
Abstract:
Routine dissection was carried out on a 75-year-old male cadaver and the drainage pattern of the testicular veins was identified and photographed. Dissection showed that the right testicular vein demonstrated an abnormal drainage pattern by terminating into the right renal vein. The left testicular vein demonstrated a normal drainage pattern by terminating into the left renal vein. The unusual drainage of the right testicular vein into the right renal vein may complicate hemodynamics thus causing a varicocele. Complications of a varicocele could lead to testis atrophy and/or infertility. Knowing the anatomical variants of the testicular veins drainage pattern may help the surgeon avoid potential complications during routine laparoscopic procedures and may also uncover a reason for male infertility.
A Human Skull with a Tripartite Inca Bone: A Case Report  [PDF]
Seth Gardner
Forensic Medicine and Anatomy Research (FMAR) , 2016, DOI: 10.4236/fmar.2016.43007
Abstract: An adult human skull was discovered in a college osteological collection presenting with two Inca bones. Inca bones or interparietal (supernumerary) bones are rarely seen among dry human skulls. Their frequency of presentation is much less than that of sutural or Wormian bones. Inca bones or interparietal (supernumerary) bones are accepted as normal variants most often found in the occipitoparietal region of the skull. Their characteristic shape, a triangle, resembles a monument design of the Inca tribe of South America and Latin America. The significance of the presence of these variants is that Inca bones or interparietal bones may be mistaken for a skull fracture. They may also be very useful in forensic identification of an unknown individual.
Addendum to: An Approach to Hierarchical Clustering via Level Surfaces and Convexity  [PDF]
Jerome Malitz, Seth Malitz
Intelligent Information Management (IIM) , 2010, DOI: 10.4236/iim.2010.25035
Abstract: This article is an addendum to the 2001 paper [1] which investigated an approach to hierarchical clustering based on the level sets of a density function induced on data points in a d-dimensional feature space. We refer to this as the “level-sets approach” to hierarchical clustering. The density functions considered in [1] were those formed as the sum of identical radial basis functions centered at the data points, each radial basis function assumed to be continuous, monotone decreasing, convex on every ray, and rising to positive infinity at its center point. Such a framework can be investigated with respect to both the Euclidean (L2) and Manhattan (L1) metrics. The addendum here puts forth some observations and questions about the level-sets approach that go beyond those in [1]. In particular, we detail and ask the following questions. How does the level-sets approach compare with other related approaches? How is the resulting hierarchical clustering affected by the choice of radial basis function? What are the structural properties of a function formed as the sum of radial basis functions? Can the levels-sets approach be theoretically validated? Is there an efficient algorithm to implement the level-sets approach?
When a Glue Sniffer Turns Weak  [PDF]
Poh Juliana, Puneet Seth
International Journal of Clinical Medicine (IJCM) , 2012, DOI: 10.4236/ijcm.2012.37A135
Abstract:

Toluene inhalation can result in electrolyte and acid-base derangements and should be considered in the differential diagnosis of young patients with unexplained hypokalaemia and normal anion gap metabolic acidosis. This case serves to illustrate the abnormalities and heighten awareness among emergency physicians who may not have laboratory results on hand when evaluating causes of limb weakness.

Revisiting the Outsiders: Innovative Recruitment of a Marijuana User Network via Web-Based Respondent Driven Sampling  [PDF]
Seth S. Crawford
Social Networking (SN) , 2014, DOI: 10.4236/sn.2014.31003
Abstract:

This study uses an innovative, network-based recruitment strategy (non-monetary, web-based respondent driven sampling) to gather a sample of il/legal marijuana users. Network-driven effects amongst marijuana users are examined to test the explanatory validity of several theories of social deviance. The study finds that respondent driven sampling techniques lack effectiveness without primary monetary incentives, even when meaningful secondary incentives are utilized. Additionally, the study suggests that marijuana user networks exhibit strong homophilic attachment tendencies.

Page 1 /1379
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.