Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Environmental Sciences (29)
- Law (20)
- Life Sciences (20)
- Social and Behavioral Sciences (18)
- Natural Resources Management and Policy (17)
-
- Public Affairs, Public Policy and Public Administration (16)
- Natural Resources and Conservation (15)
- Water Resource Management (15)
- Earth Sciences (14)
- Computer Sciences (12)
- Engineering (12)
- Environmental Law (12)
- Environmental Policy (11)
- Natural Resources Law (11)
- Water Law (11)
- Environmental Health and Protection (8)
- Natural Resource Economics (8)
- Oceanography and Atmospheric Sciences and Meteorology (8)
- Soil Science (8)
- Law and Society (7)
- Plant Sciences (7)
- Property Law and Real Estate (7)
- State and Local Government Law (7)
- Energy Policy (6)
- Indigenous, Indian, and Aboriginal Law (6)
- Land Use Law (6)
- Sustainability (6)
- Administrative Law (5)
- Biodiversity (5)
- Institution
-
- University of Colorado Law School (17)
- University of Kentucky (7)
- TÜBİTAK (5)
- University of Wollongong (4)
- Utah State University (4)
-
- University of New Hampshire (3)
- Edith Cowan University (2)
- Old Dominion University (2)
- Selected Works (2)
- University of South Florida (2)
- Western Washington University (2)
- Bowling Green State University (1)
- China Coal Technology and Engineering Group (CCTEG) (1)
- Georgia Southern University (1)
- Kennesaw State University (1)
- Manipal Academy of Higher Education (1)
- Nova Southeastern University (1)
- Singapore Management University (1)
- Syracuse University (1)
- The University of San Francisco (1)
- University of Nebraska - Lincoln (1)
- University of South Dakota (1)
- University of Texas Rio Grande Valley (1)
- Publication Year
- Publication
-
- IGC Proceedings (1997-2023) (7)
- All U.S. Government Documents (Utah Regional Depository) (3)
- Allocating and Managing Water for a Sustainable Future: Lessons from Around the World (Summer Conference, June 11-14) (3)
- Indigenous Water Justice Symposium (June 6) (3)
- Turkish Journal of Electrical Engineering and Computer Sciences (3)
-
- Australian Institute for Innovative Materials - Papers (2)
- Faculty of Informatics - Papers (Archive) (2)
- Salish Sea Ecosystem Conference (2)
- The University of New Hampshire Law Review (2)
- Turkish Journal of Chemistry (2)
- Uncovering the Hidden Resource: Groundwater Law, Hydrology, and Policy in the 1990s (Summer Conference, June 15-17) (2)
- Australian Information Security Management Conference (1)
- Australian Information Warfare and Security Conference (1)
- Best Practices for Community and Environmental Protection (October 14) (1)
- Biological Sciences Faculty Publications (1)
- Celebrating the Centennial of the Antiquities Act (October 9) (1)
- Coal Geology & Exploration (1)
- College of Science and Mathematics News (2012-2019) (1)
- Colorado Water Issues and Options: The 90's and Beyond: Toward Maximum Beneficial Use of Colorado's Water Resources (October 8) (1)
- Computer Science Faculty Publications and Presentations (1)
- Conversation with Water Management Reps from Colorado and Australia: "Adapting to Climate Change: Lessons Learned from Australia" (February 14) (1)
- Coping with Water Scarcity in River Basins Worldwide: Lessons Learned from Shared Experiences (Martz Summer Conference, June 9-10) (1)
- Dissertations - ALL (1)
- Distance Learning Faculty & Staff Publications (1)
- Dr Roba Abbas (1)
- Erforschung biologischer Ressourcen der Mongolei / Exploration into the Biological Resources of Mongolia, ISSN 0440-1298 (1)
- Faculty Articles (1)
- Free, Prior and Informed Consent: Pathways for a New Millennium (November 1) (1)
- HCNSO Student Theses and Dissertations (1)
- Honors Thesis (1)
- Publication Type
Articles 1 - 30 of 62
Full-Text Articles in Physical Sciences and Mathematics
Navigating Murky Waters: State-Level Strategies For Wetland Preservation And Tile Drainage Regulation After Sackett V. Epa, Caleb M. Swanson
Navigating Murky Waters: State-Level Strategies For Wetland Preservation And Tile Drainage Regulation After Sackett V. Epa, Caleb M. Swanson
Honors Thesis
Wetlands are some of the world’s most valuable ecosystems, serving as provisioners of species habitat, carbon sequestration, flood mitigation, water quality purification, and other ecosystem services. Human development has resulted in substantial wetland loss the world over. In the 1970s, the United States Congress passed the Clean Water Act, giving the EPA broad authority over wetland protection. However, in the summer of 2023, the United States Supreme Court decided Sackett v. EPA, limiting the EPA’s jurisdiction over wetlands to those indistinguishably connected to generally recognized “Waters of the United States” and removing federal protection for millions of acres of wetlands, …
Undp-Gef Grasslands Project: Conserving Mountain Biodiversity In Southern Lesotho, W. A. Rodgers
Undp-Gef Grasslands Project: Conserving Mountain Biodiversity In Southern Lesotho, W. A. Rodgers
IGC Proceedings (1997-2023)
The Kingdom of Lesotho contains some 70% of the Drakensberg-Maloti Mountains, recognised as the Eastern Mountains "Centre of Biodiversity and Endemism" of southern Africa. The Mountains have globally significant plant diversity, with unique habitats and high endemism. These resources have been increasingly degraded by a grazing regime based on communal access, with reduced regulatory capability. Lack of ownership has restricted investment in conservation. Lesotho has the lowest Protected Area coverage of any nation in Africa (<0.4%). Biodiversity is thus at risk.
Undp-Gef Grasslands Project: Mainstreaming Biodiversity Into Productive Landscapes: The Southern African Grasslands Programme, C. Maze, W. A. Rodgers
Undp-Gef Grasslands Project: Mainstreaming Biodiversity Into Productive Landscapes: The Southern African Grasslands Programme, C. Maze, W. A. Rodgers
IGC Proceedings (1997-2023)
This is an exciting new initiative under the second strategic priority for the Global Environment Programme (GEF)'s Biodiversity Focal Area: Mainstreaming biodiversity into productive landscapes and sector. The rationale is that whilst grassland biomes cover some 30% of South Africa, (within montane, coastal and high-veld systems) less than 3% is formally protected at national, provincial or private land-owner levels. Over 40% of the grasslands have been totally converted to other land usages and 30% is degraded. Forces of degradation and conversion (cultivation, forests, urban spread) continue. The issues of conservation are of land use and putting in place incentives to …
Application Of Machine Learning And Cyber Security In Smart Grid, Soham Dutta Dr.
Application Of Machine Learning And Cyber Security In Smart Grid, Soham Dutta Dr.
Technical Collection
Unplanned islanding of microgrids is a major hindrance in providing continuous power supply to the critical loads. The detection of these islanding instants needs to be very fast so that the distributed generators (DG) are able to take control actions in minimum time. Due to high quality data at a rapid rate, micro phasor measurement unit (μ-PMU) are becoming widely popular in distribution system and micro grids. These μ-PMUs can be leveraged for island detection. However, the working of μ-PMU is hugely dependent on communication network for data transmission which is prone to cyber-attacks. In view of the above facts, …
Protection Against Contagion In Complex Networks, Pegah Hozhabrierdi
Protection Against Contagion In Complex Networks, Pegah Hozhabrierdi
Dissertations - ALL
In real-world complex networks, harmful spreads, commonly known as contagions, are common and can potentially lead to catastrophic events if uncontrolled. Some examples include pandemics, network attacks on crucial infrastructure systems, and the propagation of misinformation or radical ideas. Thus, it is critical to study the protective measures that inhibit or eliminate contagion in these networks. This is known as the network protection problem.
The network protection problem investigates the most efficient graph manipulations (e.g., node and/or edge removal or addition) to protect a certain set of nodes known as critical nodes. There are two types of critical nodes: (1) …
Assessing The Efficacy Of California’S Wildfire And Forest Resilience Action Plan, Chloe Nelson
Assessing The Efficacy Of California’S Wildfire And Forest Resilience Action Plan, Chloe Nelson
Master's Projects and Capstones
California’s wildfire threat eclipses current forestry management and wildfire mitigation strategies in place to protect people, infrastructure, and the natural environment. Climate change escalates wildfire risks with declining water supply coupled with hotter, drier conditions. California’s Wildfire and Forest Resilience Action Plan attempts to integrate and build upon previously successful wildfire resilience plans to amplify the scale and pace of the state’s land management and community protections. This research assesses the plan’s efficacy to respond to the growing wildfire threat. This study investigates if there is equitable planning for the needs of high-wildfire risk groups living in the WUI and …
Unified Methods In Collecting, Preserving, And Archiving Coral Bleaching And Restoration Specimens To Increase Sample Utility And Interdisciplinary Collaboration, Rebecca Vega Thurber, Emily R. Schmeltzer, Andréa G. Grottoli, Robert Van Woesik, Robert J. Toonen, Mark Warner, Kerri L. Dobson, Rowan H. Mclachlan, Katie Barott, Daniel J. Barshis, Justin Baumann, Leila Chapron, David J. Combosch, Adrienne M.S. Correa, Thomas M. Decarlo, Mary Hagedorn, Laetitia Hédouin, Kenneth Hoadley, Thomas Felis, Christine Ferrier-Pagès, Carly Kenkel, Ilsa B. Kuffner, Jennifer Matthews, Mónica Medina, Christopher Meyer, Corinna Oster, James Price, Hollie M. Putnam, Yvonne Sawall
Unified Methods In Collecting, Preserving, And Archiving Coral Bleaching And Restoration Specimens To Increase Sample Utility And Interdisciplinary Collaboration, Rebecca Vega Thurber, Emily R. Schmeltzer, Andréa G. Grottoli, Robert Van Woesik, Robert J. Toonen, Mark Warner, Kerri L. Dobson, Rowan H. Mclachlan, Katie Barott, Daniel J. Barshis, Justin Baumann, Leila Chapron, David J. Combosch, Adrienne M.S. Correa, Thomas M. Decarlo, Mary Hagedorn, Laetitia Hédouin, Kenneth Hoadley, Thomas Felis, Christine Ferrier-Pagès, Carly Kenkel, Ilsa B. Kuffner, Jennifer Matthews, Mónica Medina, Christopher Meyer, Corinna Oster, James Price, Hollie M. Putnam, Yvonne Sawall
Biological Sciences Faculty Publications
Coral reefs are declining worldwide primarily because of bleaching and subsequent mortality resulting from thermal stress. Currently, extensive efforts to engage in more holistic research and restoration endeavors have considerably expanded the techniques applied to examine coral samples. Despite such advances, coral bleaching and restoration studies are often conducted within a specific disciplinary focus, where specimens are collected, preserved, and archived in ways that are not always conducive to further downstream analyses by specialists in other disciplines. This approach may prevent the full utilization of unexpended specimens, leading to siloed research, duplicative efforts, unnecessary loss of additional corals to research …
Mine Water Drainage Pollution In China's Coal Mining Areas And The Construction Of Prevention And Control Technical System, Sun Yajun, Xu Zhimin, Li Xin, Zhang Li, Chen Ge, Zhao Xianming, Gao Yating, Liu Qi, Zhang Shangguo, Wang Weijun, Zhu Lulu, Wang Sheng
Mine Water Drainage Pollution In China's Coal Mining Areas And The Construction Of Prevention And Control Technical System, Sun Yajun, Xu Zhimin, Li Xin, Zhang Li, Chen Ge, Zhao Xianming, Gao Yating, Liu Qi, Zhang Shangguo, Wang Weijun, Zhu Lulu, Wang Sheng
Coal Geology & Exploration
Mining activities are bound to produce enormous mine water drainage. Mine water in China shows relatively poor water quality and high cost of water treatment and other problems. Firstly, the main characteristics of mine water quality in China's typical mine areas are clarified in this paper: conventional ions are the main chemical components causing poor mine water quality; mine water has a small proportion of toxic and harmful substances, which is generally better than the quality standard of class Ⅲ groundwater. Secondly, some scientific issues on the formation and evolution of mine water quality are discussed in detail, including the …
Protecting Hulun Buir Rangeland Requires Improving The Awareness Of The Importance Of The Ecological Status‐Based On An Investigation In Chen Baerhu Banner, Yunhua Zhang, Rui Liu
Protecting Hulun Buir Rangeland Requires Improving The Awareness Of The Importance Of The Ecological Status‐Based On An Investigation In Chen Baerhu Banner, Yunhua Zhang, Rui Liu
IGC Proceedings (1997-2023)
No abstract provided.
Review And Prospect Of Forage Germplasm Resource Protection In China, Xiaofang Li
Review And Prospect Of Forage Germplasm Resource Protection In China, Xiaofang Li
IGC Proceedings (1997-2023)
No abstract provided.
Effects Of Fence On Daily Variation Of Co2 Flux From The Soil In Subalpine Meadow Of Xinjiang, Ping'an Jiang
Effects Of Fence On Daily Variation Of Co2 Flux From The Soil In Subalpine Meadow Of Xinjiang, Ping'an Jiang
IGC Proceedings (1997-2023)
No abstract provided.
Advice On The Exploitation And Protection Of Grassland Ecotourism Resources In China, Lin Ai
Advice On The Exploitation And Protection Of Grassland Ecotourism Resources In China, Lin Ai
IGC Proceedings (1997-2023)
No abstract provided.
The Majority Rule: A General Protection On Recommender System, Lei Xu, Lin Chen, Martin Flores, Hansheng Lei, Liyu Zhang, Mahmoud K. Quweider, Fitratullah Khan, Weidong Shi
The Majority Rule: A General Protection On Recommender System, Lei Xu, Lin Chen, Martin Flores, Hansheng Lei, Liyu Zhang, Mahmoud K. Quweider, Fitratullah Khan, Weidong Shi
Computer Science Faculty Publications and Presentations
Recommender systems are widely used in a variety of scenarios, including online shopping, social network, and contents distribution. As users rely more on recommender systems for information retrieval, they also become attractive targets for cyber-attacks. The high-level idea of attacking a recommender system is straightforward. An adversary selects a strategy to inject manipulated data into the database of the recommender system to influence the recommendation results, which is also known as a profile injection attack. Most existing works treat attacking and protection in a static manner, i.e., they only consider the adversary’s behavior when analyzing the influence without considering normal …
Overview Of Grassland And Its Development In China, Jiawen Liu, Yingjun Zhang, Yongjun Li, Deli Wang, Guodong Han, Fujiang Hou
Overview Of Grassland And Its Development In China, Jiawen Liu, Yingjun Zhang, Yongjun Li, Deli Wang, Guodong Han, Fujiang Hou
IGC Proceedings (1997-2023)
No abstract provided.
Comment On “Assessing Preservation Priorities Of Caves And Karst Areas Using The Frequency Of Endemic Cave-Dwelling Species” By Nitzu Et Al. (2018), Int. J. Speleol., 47 (1): 43-52, Oana T. Moldovan, Traian Brad
Comment On “Assessing Preservation Priorities Of Caves And Karst Areas Using The Frequency Of Endemic Cave-Dwelling Species” By Nitzu Et Al. (2018), Int. J. Speleol., 47 (1): 43-52, Oana T. Moldovan, Traian Brad
International Journal of Speleology
No abstract provided.
Integrating Watershed-Scale And River-Reach Protection And Restoration Planning To Promote Climate Resilience In The South Fork Nooksack River (Sfnr), Oliver Grah, Susan Dickerson-Lange
Integrating Watershed-Scale And River-Reach Protection And Restoration Planning To Promote Climate Resilience In The South Fork Nooksack River (Sfnr), Oliver Grah, Susan Dickerson-Lange
Salish Sea Ecosystem Conference
The Nooksack Indian Tribe reservation is located at the foot of the North Cascades Mountains, approximately 13 miles east of Bellingham, WA and the Salish Sea. The Tribe relies on a harvestable surplus of Pacific salmon in the Nooksack River for cultural, subsistence, and commercial purposes. Today, Pacific salmon runs are less than 10 percent of the runs in the late 1800’s. Causes of the declines are complex; however, it is well understood that the legacy of commercial forestry, agriculture, and development has increased sediment loading and water temperature. Climate impacts will cumulatively add to the legacy impacts, which are …
Protection And Restoration Of Salmon Bearing Streams In Agricultural Landscapes Of The Puget Sound Basin: A Synthesis Of Approaches To Reach-Scale Planning For Eight Focus Areas, Colin Hume
Salish Sea Ecosystem Conference
In 2015 the Department of Ecology led development of a new initiative to protect and restore riparian areas on salmon bearing streams across agricultural landscapes of the Puget Sound Basin. Using Environmental Protection Agency National Estuary Program funding through the Watershed Lead Organization, the initiative solicited grant proposals from local organizations to develop reach-scale plans for river reaches that provide the strategic basis for a subsequent phase of implementation funding to acquire riparian zones from willing landowners either through conservation easement or fee-simple purchase. Grants were awarded to an array of partnerships between land trusts, Native American tribes, local governments, …
The Dark Side Of Banning Hacking Technique Discussion, Qiu-Hong Wang, Ting Zhang Le
The Dark Side Of Banning Hacking Technique Discussion, Qiu-Hong Wang, Ting Zhang Le
Research Collection School Of Computing and Information Systems
Prior studies have evidenced the effectiveness of more severe and broader enforcement in deterringcybercrimes. This study addresses the other side of the story. Our data analysis shows that theenforcement against the production / distribution / possession of computer misuse tools tends toincrease the contribution on detection and protection related posts in online hacker forums. Butthis enforcement may discourage those contributors who had originally actively contributed to theprotection discussions. Thus government regulations have to be cautiously justify the incentives ofmultiple parties in the cybersecurity context.
The Risk Of Public Data Availability On Critical Infrastructure Protection, Roba Abbas
The Risk Of Public Data Availability On Critical Infrastructure Protection, Roba Abbas
Dr Roba Abbas
This paper examines the threat of freely available information on critical infrastructure protection (CIP) efforts. Critical infrastructure are the services required to maintain the stability and security of a country, and comprise both physical and cyber infrastructures. These interdependent entities must be protected from natural disasters, accidental errors, and deliberate attacks. The CIP process typically includes vulnerability assessment, risk assessment and risk management, and has been a global concern for many years; the concern now amplified in Australia due to a number of recent events such the 9/11 attacks, and the Bali bombings. The events have called into question the …
Slides: Indigenous Water Justice Symposium, Jason Robison
Slides: Indigenous Water Justice Symposium, Jason Robison
Coping with Water Scarcity in River Basins Worldwide: Lessons Learned from Shared Experiences (Martz Summer Conference, June 9-10)
Presenter: Jason Robison, Assistant Professor of Law, University of Wyoming
11 slides
Slides: Synthesis Session: Indigenous Water Symposium, Jason Anthony Robison
Slides: Synthesis Session: Indigenous Water Symposium, Jason Anthony Robison
Indigenous Water Justice Symposium (June 6)
Presenter: Jason Robison, University of Wyoming
15 slides
Slides: The Nsw Aboriginal Land Council (Nswalc) And Aboriginal Land Rights In Nsw, New South Wales Aboriginal Land Council
Slides: The Nsw Aboriginal Land Council (Nswalc) And Aboriginal Land Rights In Nsw, New South Wales Aboriginal Land Council
Indigenous Water Justice Symposium (June 6)
Presenter: Phil Duncan, Gomeroi Nation, New South Wales Aboriginal Land Council
19 slides
Slides: Crystalised Not Frozen: Addressing Historical Exclusion Of Traditional Owners From Water, Poh-Ling Tan
Slides: Crystalised Not Frozen: Addressing Historical Exclusion Of Traditional Owners From Water, Poh-Ling Tan
Indigenous Water Justice Symposium (June 6)
Poh-Ling Tan, Griffith University
13 slides
Grid-Connected Induction Generator Interturn Fault Analysis Using A Pca-Ann-Based Algorithm, Haydar Bayar, Ümi̇t Kemaletti̇n Terzi̇
Grid-Connected Induction Generator Interturn Fault Analysis Using A Pca-Ann-Based Algorithm, Haydar Bayar, Ümi̇t Kemaletti̇n Terzi̇
Turkish Journal of Electrical Engineering and Computer Sciences
It is difficult for short circuits among the internal windings of one phase in electrical machines to be determined in a reliable and speedy manner. The failure currents that occur, especially in short circuits with a few windings, are at such low levels that they cannot be determined by relay systems. This results in growing faults and damage. In this study, we designed a model that can define winding failures successfully at very small levels by using the PCA and ANN algorithms. We tested the real-time faults and measured the system performance with the installed test rig. The developed protection …
Metal Frame As Local Protection Of Superconducting Films From Thermomagnetic Avalanches, Pavlo Mikheenko, J I. Vestgarden, Supratim Chaudhuri, I J. Maasilta, Y Galperin, Tom H. Johansen
Metal Frame As Local Protection Of Superconducting Films From Thermomagnetic Avalanches, Pavlo Mikheenko, J I. Vestgarden, Supratim Chaudhuri, I J. Maasilta, Y Galperin, Tom H. Johansen
Australian Institute for Innovative Materials - Papers
Thermomagnetic avalanches in superconducting films propagating extremely fast while forming unpredictable patterns, represent a serious threat for the performance of devices based on such materials. It is shown here that a normal-metal frame surrounding a selected region inside the film area can provide efficient protection from the avalanches during their propagation stage. Protective behavior is confirmed by magneto-optical imaging experiments on NbN films equipped with Cu and Al frames, and also by performing numerical simulations. Experimentally, it is found that while conventional flux creep is not affected by the frames, the dendritic avalanches are partially or fully screened by them. …
Innovating Additional Layer 2 Security Requirements For A Protected Stack, Brian Cusack, Raymond Lutui
Innovating Additional Layer 2 Security Requirements For A Protected Stack, Brian Cusack, Raymond Lutui
Australian Information Security Management Conference
Security is only as good as the weakest link and if the weakness is at a low level in the communication stack then every other Layer has potential to inherit the problem. The OSI Layer model has defined the theoretical architecture for network communications (ISO/IEC 7498-1). Standardisation assures that each element of an internetwork uses the same model and hence a message can be moved intelligibly and correctly between participants. The OSI model divides communications into seven hierarchical Layers that provide the necessary services from the application Layer through to the physical Layer of electricity (ISO/IEC 7498-2). Each Layer is …
Central Coordination Relay For Distribution Systems With Distributed Generation, Fati̇h Mehmet Nuroğlu, Ayşen Basa Arsoy
Central Coordination Relay For Distribution Systems With Distributed Generation, Fati̇h Mehmet Nuroğlu, Ayşen Basa Arsoy
Turkish Journal of Electrical Engineering and Computer Sciences
As distributed generation resources penetrate into distribution systems, protection and service continuity are becoming major issues. A new approach for protection coordination and higher reliability of a distribution system with distributed generation is explored in this paper. The concept of central coordination relay (CCR) is developed for this purpose. After a brief introduction of the design and operating procedures of CCR, the utilization of the proposed relay on two feeders of a substation in the Kocaeli region of Turkey is simulated using DIgSILENT PowerFactory. The study results show that CCR can provide better protection coordination and improved reliability indices for …
Corrosion Protection Afforded By Praseodymium Conversion Film On Mg Alloy Aznd In Simulated Biological Fluid Studied By Scanning Electrochemical Microscopy, Seyed S. Jamali, Simon E. Moulton, Dennis E. Tallman, Maria Forsyth, Jan Weber, Azadehsadat Mirabedini, Gordon G. Wallace
Corrosion Protection Afforded By Praseodymium Conversion Film On Mg Alloy Aznd In Simulated Biological Fluid Studied By Scanning Electrochemical Microscopy, Seyed S. Jamali, Simon E. Moulton, Dennis E. Tallman, Maria Forsyth, Jan Weber, Azadehsadat Mirabedini, Gordon G. Wallace
Australian Institute for Innovative Materials - Papers
Surface passivation of AZNd Mg alloy with Pr(NO3)3 is studied using scanning electrochemical microscopy (SECM) in surface generation/tip collection (SG/TC) and AC modes. Corrosion protection afforded by the Pr treatment and the degradation mechanism in a simulated biological environment was examined on a local scale and compared with non-treated AZNd. SG/TC mode results revealed a drastic decrease in H2 evolution due to the Pr treatment. Mapping the local insulating characteristics using AC-SECM showed higher conductivity of the surface where H2 evolution was most favorable.
Faults Identification In Three-Phase Induction Motors Using Support Vector Machines, Rama Hammo
Faults Identification In Three-Phase Induction Motors Using Support Vector Machines, Rama Hammo
Master of Technology Management Plan II Graduate Projects
Induction motor is one of the most important motors used in industrial applications. The operating conditions may sometime lead the machine into different fault situations. The main types of external faults experienced by these motors are over loading, single phasing, unbalanced supply voltage, locked rotor, phase reversal, ground fault, under voltage and over voltage. The machine should be shut down when a fault is experienced to avoid damage and for the safety of the workers. Computer based relays monitor the machine and disconnect it during the faults. The relay logic used to identify these faults requires sophisticated signal processing techniques …
Indigenous Peoples’ Right Of Free Prior Informed Consent With Respect To Indigenous Lands, Territories And Resources (United Nations Workshop, 17-19 January 2005), Indian Law Resource Center
Indigenous Peoples’ Right Of Free Prior Informed Consent With Respect To Indigenous Lands, Territories And Resources (United Nations Workshop, 17-19 January 2005), Indian Law Resource Center
Free, Prior and Informed Consent: Pathways for a New Millennium (November 1)
3 pages.
U.N. Doc PFII/2004/WS.2/6