The Experts below are selected from a list of 5310 Experts worldwide ranked by ideXlab platform
Zheng Zhigang - One of the best experts on this subject based on the ideXlab platform.
-
Causing Analysis & Counter Measures on Refusing Act & Incorrect Operation of Stall Protection of Axial Flow Fan
2013Co-Authors: Zheng ZhigangAbstract:This paper analyzes the causes upon refusing act Incorrect Operation of stall protection aiming at conditions and safeguard setting mechanization that produces by stall of axial flow fan. It can prevent refusing act Incorrect Operation of stall protection effectively and pledge the safety of axial flow fan with the idea of increasing the stall probe into three, the adoption of "two-out-of -three"protection setting,conversion on sampling pipe and heat tracing adding.
-
causing analysis counter measures on refusing act Incorrect Operation of stall protection of axial flow fan
Shenhua Science and Technology, 2013Co-Authors: Zheng ZhigangAbstract:This paper analyzes the causes upon refusing act Incorrect Operation of stall protection aiming at conditions and safeguard setting mechanization that produces by stall of axial flow fan. It can prevent refusing act Incorrect Operation of stall protection effectively and pledge the safety of axial flow fan with the idea of increasing the stall probe into three, the adoption of "two-out-of -three"protection setting,conversion on sampling pipe and heat tracing adding.
Kenichi Okada - One of the best experts on this subject based on the ideXlab platform.
-
visualization system for log analysis with probabilities of Incorrect Operation
International Conference on Parallel and Distributed Systems, 2011Co-Authors: Chifumi Nishioka, Masahiro Kozaki, Kenichi OkadaAbstract:As advancement of information society, information leakages grow into a serious problem. It is important for security managers to analysis log-files for finding out cause of leakages promptly. Existing methods of presenting log-files take the method of ordering them in time. It makes easy to understand a flow of Operations. However, if a log recording an Incorrect Operation is included in the back of log-file, finding out it may drop back. To address this problem, this paper presents visualization system for log analysis with probabilities of Incorrect Operation. Incorrect Operations are Operations that may cause a security incident. Probabilities of Incorrect Operation are set up by rate of number of Incorrect Operations in past log-files. Security analysts set order of priority, and logs are sorted. Also, we introduce Visualize Part to help security analysts understand a flow of Operations in spite of not ordering logs in time. We aim to contribute speedy security analyses by combine visualizing log-file with probabilities of Incorrect Operation. To evaluate our proposal, accuracy and efficiency are measured by user experiment. Our proposal tool was compared with the tool without probabilities of Incorrect Operation. As the result, in terms of accuracy, there are no significant difference between. However, our proposal demonstrate a 39.5% improved efficiency.
-
ICPADS - Visualization System for Log Analysis with Probabilities of Incorrect Operation
2011 IEEE 17th International Conference on Parallel and Distributed Systems, 2011Co-Authors: Chifumi Nishioka, Masahiro Kozaki, Kenichi OkadaAbstract:As advancement of information society, information leakages grow into a serious problem. It is important for security managers to analysis log-files for finding out cause of leakages promptly. Existing methods of presenting log-files take the method of ordering them in time. It makes easy to understand a flow of Operations. However, if a log recording an Incorrect Operation is included in the back of log-file, finding out it may drop back. To address this problem, this paper presents visualization system for log analysis with probabilities of Incorrect Operation. Incorrect Operations are Operations that may cause a security incident. Probabilities of Incorrect Operation are set up by rate of number of Incorrect Operations in past log-files. Security analysts set order of priority, and logs are sorted. Also, we introduce Visualize Part to help security analysts understand a flow of Operations in spite of not ordering logs in time. We aim to contribute speedy security analyses by combine visualizing log-file with probabilities of Incorrect Operation. To evaluate our proposal, accuracy and efficiency are measured by user experiment. Our proposal tool was compared with the tool without probabilities of Incorrect Operation. As the result, in terms of accuracy, there are no significant difference between. However, our proposal demonstrate a 39.5% improved efficiency.
Chifumi Nishioka - One of the best experts on this subject based on the ideXlab platform.
-
visualization system for log analysis with probabilities of Incorrect Operation
International Conference on Parallel and Distributed Systems, 2011Co-Authors: Chifumi Nishioka, Masahiro Kozaki, Kenichi OkadaAbstract:As advancement of information society, information leakages grow into a serious problem. It is important for security managers to analysis log-files for finding out cause of leakages promptly. Existing methods of presenting log-files take the method of ordering them in time. It makes easy to understand a flow of Operations. However, if a log recording an Incorrect Operation is included in the back of log-file, finding out it may drop back. To address this problem, this paper presents visualization system for log analysis with probabilities of Incorrect Operation. Incorrect Operations are Operations that may cause a security incident. Probabilities of Incorrect Operation are set up by rate of number of Incorrect Operations in past log-files. Security analysts set order of priority, and logs are sorted. Also, we introduce Visualize Part to help security analysts understand a flow of Operations in spite of not ordering logs in time. We aim to contribute speedy security analyses by combine visualizing log-file with probabilities of Incorrect Operation. To evaluate our proposal, accuracy and efficiency are measured by user experiment. Our proposal tool was compared with the tool without probabilities of Incorrect Operation. As the result, in terms of accuracy, there are no significant difference between. However, our proposal demonstrate a 39.5% improved efficiency.
-
ICPADS - Visualization System for Log Analysis with Probabilities of Incorrect Operation
2011 IEEE 17th International Conference on Parallel and Distributed Systems, 2011Co-Authors: Chifumi Nishioka, Masahiro Kozaki, Kenichi OkadaAbstract:As advancement of information society, information leakages grow into a serious problem. It is important for security managers to analysis log-files for finding out cause of leakages promptly. Existing methods of presenting log-files take the method of ordering them in time. It makes easy to understand a flow of Operations. However, if a log recording an Incorrect Operation is included in the back of log-file, finding out it may drop back. To address this problem, this paper presents visualization system for log analysis with probabilities of Incorrect Operation. Incorrect Operations are Operations that may cause a security incident. Probabilities of Incorrect Operation are set up by rate of number of Incorrect Operations in past log-files. Security analysts set order of priority, and logs are sorted. Also, we introduce Visualize Part to help security analysts understand a flow of Operations in spite of not ordering logs in time. We aim to contribute speedy security analyses by combine visualizing log-file with probabilities of Incorrect Operation. To evaluate our proposal, accuracy and efficiency are measured by user experiment. Our proposal tool was compared with the tool without probabilities of Incorrect Operation. As the result, in terms of accuracy, there are no significant difference between. However, our proposal demonstrate a 39.5% improved efficiency.
Pawel Wirkowski - One of the best experts on this subject based on the ideXlab platform.
-
influence of the Incorrect settings of axial compressor inlet variable stator vanes on gas turbine engine work parameters
Journal of KONES, 2015Co-Authors: Pawel WirkowskiAbstract:The paper deals with the problem of influence of changes variable stator vanes axial compressor settings of gas turbine engine on work parameters of compressor and engine. Incorrect Operation of change setting system of variable vanes could make unstable work of compressor and engine. This paper presents theoretical analysis of situation described above and results of own research done on real engine. When in the compressor construction there is assembled system of setting change of variable stator vanes its task is to make optimal coOperation engine units during the permanent improvement of compressor characteristic. Perturbations in the Operation of this system could cause changes in work of compressor and engine similarly as in the case of changes caused by changes of rotational speed or polluted interblades ducts of compressor. The purpose of investigations, which was carried out on real engine was determination influence of Incorrect Operation of axial compressor inlet guide variable stator vanes control system of gas turbine engine on compressor and engine work parameters. The object of research is type DR 77 marine gas turbine engine, which is a part of power transmission system of war ship. In compressor construction configuration of this engine there are used inlet guide stator vanes which make possibilities to change the setting angle incidance (change of compressor flow duct geometry) in depend on engine load. On the base of results of experiment there were determined the mathematical equations modelling the changes of particular engine work parameters in the function of variable inlet guide stator vanes setting angle.
-
influence of axial compressor flow passage geometry changes on gas turbine engine work parameters
Journal of Polish CIMAC, 2009Co-Authors: Pawel WirkowskiAbstract:The paper deals with the problem of influence of changes variable stator vanes axial compressor settings of gas turbine engine on work parameters of compressor and engine. Incorrect Operation of change setting system of variable vanes could make unstable work of compressor and engine. This paper presents theoretical analysis of situation described above and results of own research done on real engine. On the base of results of experiment there were determined mathematical equations determining relationships of changes of particular engine work parameters in function of variable inlet guide stator vanes setting angle. There are presented results of the solution of mathematical equations, which describe the changes of engine work parameters values too.
-
research of variation of gas turbine engine work parameters changes equipped with changeable geometry of axial compressor flow passage
Journal of Polish CIMAC, 2008Co-Authors: Pawel WirkowskiAbstract:The paper deals with problem influence of changes variable stator vanes axial compressor settings of gas turbine engine on work parameters of compressor and engine. Incorrect Operation of change setting system of variable vanes could make unstable work of compressor and engine. This paper presents theoretical analysis of situation described above and results of own research done on real engine. The next there are presented results of mathematical modelling of changes of gas turbine engine work parameters during change of angle setting of axial compressor variable stator vanes but in the most wide angle range than in real research.
Mehrdad Ghandhari - One of the best experts on this subject based on the ideXlab platform.
-
The comparison and analysis for loss of excitation protection schemes in generator protection
11th IET International Conference on Developments in Power Systems Protection (DPSP 2012), 2012Co-Authors: Z. P. Shi, J. P. Wang, Z. Gajic, C. Sao, Mehrdad GhandhariAbstract:Loss-Of-Excitation (LOE) condition of a generator may cause severe damages on both generator and the interconnected systems. This paper analyses the behaviours of different LOE protection schemes, such as R-X, G-B, P-Q and U-I schemes, for a hydro generator, which is connected to an infinite bus. Based on the simulation results, the reliability and stability of existing LOE protection schemes are compared and a preferred scheme is selected. An improvement to the scheme is also proposed to prevent the LOE relay Incorrect Operation during external faults, such as short-circuit faults on busbar or transmission lines.