Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (4)

Search Parameters:
Keywords = power system fortification

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
17 pages, 4102 KiB  
Article
The Quality Assessment of Commercial Lycium Berries Using LC-ESI-MS/MS and Chemometrics
by Mariam Jarouche, Harsha Suresh, James Hennell, Shaun Sullivan, Samiuela Lee, Swastika Singh, Declan Power, Cindy Xu and Cheang Khoo
Plants 2019, 8(12), 604; https://doi.org/10.3390/plants8120604 - 13 Dec 2019
Cited by 18 | Viewed by 3779
Abstract
Lycium (also known as Goji berry) is used in traditional Chinese medicine (TCM) with claimed benefits, including eye and liver protection, immune system fortification and blood glucose control. The commercially available product comes from either the L. barbarum or L. chinense species, with [...] Read more.
Lycium (also known as Goji berry) is used in traditional Chinese medicine (TCM) with claimed benefits, including eye and liver protection, immune system fortification and blood glucose control. The commercially available product comes from either the L. barbarum or L. chinense species, with the former dominating the marketplace due to its better taste profile. The main objective of this study was to develop a validated LC-ESI-MS/MS method to quantify multiple key bio-active analytes in commercially available Lycium berries and to qualitatively assess these samples using a principal component analysis (PCA). A LC-ESI-MS/MS method for the quantitation of seven analytes selected using the Herbal Chemical Marker Ranking System (Herb MaRS) was developed. The Herb MaRS ranking system considered bioavailability, bioactivity and physiological action of each target analyte, its intended use and the commercial availability of an analytical standard. After method optimization combining high resolving power with selective detection, seven analytes were quantified and the Lycium samples were quantitatively profiled. Chromatographic spectra were also obtained using longer run-time LC-UV and GC-MS methods in order to qualitatively assess the samples using a principal component analysis (PCA). The result of the method validation procedure was a 15.5 min LC-ESI-MS/MS method developed for the quantification of seven analytes in commercial Lycium samples. Wide variation in analyte concentration was observed with the following results (analyte range in mg/g): rutin, 16.1–49.2; narcissin, 0.37–1.65; nictoflorin, 0.26–0.78; coumaric acid, 6.84–12.2; scopoletin, 0.33–2.61; caffeic acid, 0.08–0.32; chlorogenic acid, 1.1–9.12. The quantitative results for the L. barbarum and L. chinense species samples indicate that they cannot be differentiated based on the bio-actives tested. A qualitative assessment using PCA generated from un-targeted LC-UV and GC-MS phytochemical spectra led to the same conclusion. The un-targeted quantitative and qualitative phytochemical profiling indicates that commercial L. barbarum and L. chinense cannot be distinguished using chemical analytical methods. Genetic fingerprinting and pharmacological testing may be needed to ensure the efficacy of commercial Lycium in order to validate label claims. Full article
(This article belongs to the Section Phytochemistry)
Show Figures

Figure 1

22 pages, 1254 KiB  
Article
Minimizing the Impact of Intermittent Wind Power on Multiperiod Power System Operation with Pumped Hydro Generation
by Aliyu Hassan, Yskandar Hamam and Josiah L. Munda
Energies 2019, 12(18), 3583; https://doi.org/10.3390/en12183583 - 19 Sep 2019
Cited by 5 | Viewed by 2576
Abstract
In power system operations, unforeseen energy imbalances commonly occur, resulting in unexpected constraints on the system. This leads to a disturbance in normal operation. In systems with integration of large intermittent wind power resources, additional complications are imposed on the system, especially under [...] Read more.
In power system operations, unforeseen energy imbalances commonly occur, resulting in unexpected constraints on the system. This leads to a disturbance in normal operation. In systems with integration of large intermittent wind power resources, additional complications are imposed on the system, especially under heavy winds that require immediate measures to minimize possible impact of abrupt wind power fallout. Effective power system fortifications have to be put in place to address the challenges. Wind varies more on the sub-hourly time scales; therefore, sub-hourly dispatch is bound to address more of these issues than commonly used hourly methods. Hybrid power system operation with wind necessitates the use of fast start-up generation and storage to improve quality of power. In this work, the impact of intermittent wind power curtailment on power system operation is addressed to prevent system instability. A modified wind turbine power curve is used to restrict the onset of the normal cut-off point, thereby allowing sufficient time for effective power switchover with pumped hydro generation. This improves the voltage stability of the power system during curtailment. Singular value decomposition matrix of the power system network is employed to evaluate the performance of the proposed method. Full article
(This article belongs to the Section F: Electrical Engineering)
Show Figures

Graphical abstract

20 pages, 5902 KiB  
Article
Optimal Deception Strategies in Power System Fortification against Deliberate Attacks
by Peng Jiang, Shengjun Huang and Tao Zhang
Energies 2019, 12(3), 342; https://doi.org/10.3390/en12030342 - 22 Jan 2019
Cited by 7 | Viewed by 3097
Abstract
As a critical infrastructure, the modern electrical network is faced with various types of threats, such as accidental natural disaster attacks and deliberate artificial attacks, thus the power system fortification has attracted great concerns in the community of academic, industry, and military. Nevertheless, [...] Read more.
As a critical infrastructure, the modern electrical network is faced with various types of threats, such as accidental natural disaster attacks and deliberate artificial attacks, thus the power system fortification has attracted great concerns in the community of academic, industry, and military. Nevertheless, the attacker is commonly assumed to be capable of accessing all information in the literature (e.g., network configuration and defensive plan are explicitly provided to the attacker), which might always be the truth since the grid data access permission is usually restricted. In this paper, the information asymmetry between defender and attacker is investigated, leading to an optimal deception strategy problem for power system fortification. Both the proposed deception and traditional protection strategies are formulated as a tri-level mixed-integer linear programming (MILP) problem and solved via two-stage robust optimization (RO) framework and the column-and-constraint generation (CCG) algorithm. Comprehensive case studies on the 6-bus system and IEEE 57-bus system are implemented to reveal the difference between these two strategies and identify the significance of information deception. Numerical results indicate that deception strategy is superior to protection strategy. In addition, detailed discussions on the performance evaluation and convergence analysis are presented as well. Full article
(This article belongs to the Section F: Electrical Engineering)
Show Figures

Figure 1

31 pages, 22159 KiB  
Article
Fortified Construction Techniques in al-Ṭagr al-Awsaṯ, 8th–13th Centuries
by Ignacio Javier Gil Crespo, Miguel Ángel Bru Castro and David Gallego Valle
Arts 2018, 7(4), 55; https://doi.org/10.3390/arts7040055 - 29 Sep 2018
Viewed by 6240
Abstract
Spanish Islamic military architecture shows an attempt at the systematization of works, techniques, and defensive elements, commencing in the era of the Umayyad Emirate and Caliphate up to the North African Empires (Almoravids and Almohads). This article presents an analysis of the constructive [...] Read more.
Spanish Islamic military architecture shows an attempt at the systematization of works, techniques, and defensive elements, commencing in the era of the Umayyad Emirate and Caliphate up to the North African Empires (Almoravids and Almohads). This article presents an analysis of the constructive techniques and systems employed in the fortified architecture in al-Ṭagr al-Awsaṯ; that is, the Medium Frontier Territory of al-Andalus, called Marca Media, between the 8th and 13th centuries. The fortification of the borders was an objective of the Umayyad Emirate and Caliphate, as well as of the new kingdoms of Taifas and the Almoravid and Almohad Empires. The buildings were designed not only to defend a territory but also as a way of demonstrating the political power, and thus they were used as “state propaganda”. The triumph of the Islamic State over different groups, the advance of the Christian conquest, the decline of the Caliphate, and the invasion of the Almoravids and Almohads were situations that modified the definition of borders, the strategies of defense, and the organization of cities and territories. Therefore, the construction of fortifications acted as a mirror reflecting the social, political, and economic circumstances, whose changes depended on the real possibilities, knowledge, celerity, or technological evolution of the time. As such, these constructions permit an analysis of not only the building techniques, but also the people who carried them out, showing in their remains the social implications and organization of work from the master builders down to the quarry workers. This article presents the organization and technical knowledge of construction through a selection of cases studies, including watchtowers, castles, city walls, and fortresses. Full article
(This article belongs to the Special Issue Andalusi Architecture: Shapes, Meaning and Influences)
Show Figures

Figure 1

Back to TopTop