Mark Z. Jacobson, Mark A. Delucchi, Mary A. Cameron et al.
Hasil untuk "Water supply for domestic and industrial purposes"
Menampilkan 20 dari ~3352853 hasil · dari arXiv, CrossRef
Ran Gu, Enhui Ding, Shigui Ma
Vaccines play a crucial role in the prevention and control of infectious diseases. However, the vaccine supply chain faces numerous challenges that hinder its efficiency. To address these challenges and enhance public health outcomes, many governments provide subsidies to support the vaccine supply chain. This study analyzes a government-subsidized, three-tier vaccine supply chain within a continuous-time differential game framework. The model incorporates dynamic system equations that account for both vaccine quality and manufacturer goodwill. The research explores the effectiveness and characteristics of different government subsidy strategies, considering factors such as price sensitivity, and provides actionable managerial insights. Key findings from the analysis and numerical simulations include the following: First, from a long-term perspective, proportional subsidies for technological investments emerge as a more strategic approach, in contrast to the short-term focus of volume-based subsidies. Second, when the public is highly sensitive to vaccine prices and individual vaccination benefits closely align with government objectives, a volume-based subsidy policy becomes preferable. Finally, the integration of blockchain technology positively impacts the vaccine supply chain, particularly by improving vaccine quality and enhancing the profitability of manufacturers in the later stages of production.
Jiashun Hui, Yichen Zhang, Xiaoyou Zhu
Water resources are the core natural resources for human survival and development. In the process of rapid industrialization, the uneven distribution of water resources and pollution problems are becoming increasingly serious, threatening the ecological environment, economic development, and public health. This paper examines the current situation and impact of water pollution in China and discusses the main sources of pollution, such as industrial wastewater, agricultural non-point source pollution, and domestic sewage discharge. Through case analysis, the pollution problems and ecological damage of typical water bodies such as the Yellow River and Dianchi Lake are revealed. This paper further analyzes the threat of water pollution to the ecological environment and human health, especially the impact on public health through biological pathogen infection and chemical pollutant poisoning. Finally, this paper proposes the improvement of policies and regulations, pollution control technologies and measures, and ecological restoration solutions for water pollution, such as the promotion of Fenton oxidation and biological coupling technology, agricultural prevention and control technology, and domestic sewage treatment technology, aiming to provide theoretical support and practical guidance for water environment governance.
Inga Zinicovscaia
Haiyang Luo, Caroline Dorn, Jie Deng
Water is an important component of exoplanets, with its distribution, i.e., whether at the surface or deep inside, fundamentally influencing the planetary properties. The distribution of water in most exoplanets is determined by yet-unknown partitioning coefficients at extreme conditions. Our new first-principles molecular dynamics simulations reveal that water strongly partitions into iron over silicate at high pressures and thus would preferentially stay in a planet's core. Furthermore, we model planet interiors by considering the effect of water on density, melting temperature, and water partitioning. The results shatter the notion of water worlds as imagined before: the majority of the bulk water budget (even more than 95%) can be stored deep within the core and the mantle, and not at the surface. For planets more massive than ~6 Earth's mass and Earth-size planets (of lower mass and small water budgets), the majority of water resides deep in the cores of planets, Whether water is assumed to be at the surface or at depth can affect the radius by up to 25% for a given mass. This has drastic consequences for the inferred water distribution in exoplanets from mass-radius data.
Shinpei Hayashi, Takashi Kobayashi, Tadahisa Kato
This study reports the results of applying the cross-lingual bug localization approach proposed by Xia et al. to industrial software projects. To realize cross-lingual bug localization, we applied machine translation to non-English descriptions in the source code and bug reports, unifying them into English-based texts, to which an existing English-based bug localization technique was applied. In addition, a prototype tool based on BugLocator was implemented and applied to two Japanese industrial projects, which resulted in a slightly different performance from that of Xia et al.
Mindy Tran, Yasemin Acar, Michel Cucker et al.
Recent years have shown increased cyber attacks targeting less secure elements in the software supply chain and causing fatal damage to businesses and organizations. Past well-known examples of software supply chain attacks are the SolarWinds or log4j incidents that have affected thousands of customers and businesses. The US government and industry are equally interested in enhancing software supply chain security. We conducted six panel discussions with a diverse set of 19 practitioners from industry. We asked them open-ended questions regarding SBOMs, vulnerable dependencies, malicious commits, build and deploy, the Executive Order, and standards compliance. The goal of this summit was to enable open discussions, mutual sharing, and shedding light on common challenges that industry practitioners with practical experience face when securing their software supply chain. This paper summarizes the summit held on September 30, 2022.
Kaspar Rosager Ludvigsen, Shishir Nagaraja, Angela Daly
The world is currently strongly connected through both the internet at large, but also the very supply chains which provide everything from food to infrastructure and technology. The supply chains are themselves vulnerable to adversarial attacks, both in a digital and physical sense, which can disrupt or at worst destroy them. In this paper, we take a look at two examples of such successful attacks and consider what their consequences may be going forward, and analyse how EU and national law can prevent these attacks or otherwise punish companies which do not try to mitigate them at all possible costs. We find that the current types of national regulation are not technology specific enough, and cannot force or otherwise mandate the correct parties who could play the biggest role in preventing supply chain attacks to do everything in their power to mitigate them. But, current EU law is on the right path, and further vigilance may be what is necessary to consider these large threats, as national law tends to fail at properly regulating companies when it comes to cybersecurity.
Tim Lackorzynski, Sebastian Rehms, Tao Li et al.
Trends like Industry 4.0 will pose new challenges for future industrial networks. Greater interconnectedness, higher data volumes as well as new requirements for speeds as well as security will make new approaches necessary. Performanceoptimized networking techniques will be demanded to implement new use cases, like network separation and isolation, in a secure fashion. A new and highly efficient protocol, that will be vital for that purpose, is MACsec. It is a Layer 2 encryption protocol that was previously extended specifically for industrial environments. Yet, it lacks the ability to bridge local networks. Therefore, in this work, we propose a secure and efficient Layer 3 tunneling scheme for MACsec. We design and implement two approaches, that are equally secure and considerably outperform comparable state-of-the-art techniques.
Kevin Hu, Retsef Levi, Raphael Yahalom et al.
This paper provides the first large-scale data-driven analysis to evaluate the predictive power of different attributes for assessing risk of cyberattack data breaches. Furthermore, motivated by rapid increase in third party enabled cyberattacks, the paper provides the first quantitative empirical evidence that digital supply-chain attributes are significant predictors of enterprise cyber risk. The paper leverages outside-in cyber risk scores that aim to capture the quality of the enterprise internal cybersecurity management, but augment these with supply chain features that are inspired by observed third party cyberattack scenarios, as well as concepts from network science research. The main quantitative result of the paper is to show that supply chain network features add significant detection power to predicting enterprise cyber risk, relative to merely using enterprise-only attributes. Particularly, compared to a base model that relies only on internal enterprise features, the supply chain network features improve the out-of-sample AUC by 2.3\%. Given that each cyber data breach is a low probability high impact risk event, these improvements in the prediction power have significant value. Additionally, the model highlights several cybersecurity risk drivers related to third party cyberattack and breach mechanisms and provides important insights as to what interventions might be effective to mitigate these risks.
Raúl Fuentes-Azcatl, José Rafael Bordin, Marcia C. Barbosa
In this work, the dielectric behavior of water inside charged nanoslit of graphene is studied to analized the water molecules under electrical confinement; through polarizing the nanoslit of graphene, creating an electric field inside the nanopore. How the water molecules are structured under this type of electrical confinement is studied with two force fields of water, the three-site water models here used are the SCP/$ε$ and the FAB/$ε$, the first is a rigid model that improves the SPC model and the second is a flexible model that improves all the force fields of three sites non-polarizables and flexibles.
Mohammed Benzaouia, Hajji Bekkay, Abdelhamid Rabhi et al.
Pumping water using multiple energy sources is the ideal solution for supplying of potable water in isolated or arid areas. In this paper, an effective control and energy management strategy for a stand-alone photovoltaic-batteries water pumping system for agriculture applications is presented. The system is composed of photovoltaic solar panels as primary energy sources, and Lead-Acid batteries as seconder energy sources to supply the brushless DC motor and the centrifugal pump. The energy management strategy uses an intelligent algorithm to satisfy the energy demanded by the motor, also to maintain the state-of-charge of the battery between safe margins in order to eliminate the full discharge and the destruction of the batteries. Drift is a major problem in photovoltaic systems; this phenomenon occurs when the solar irradiation changes rapidly. Classical MPPT algorithms do not solve this problem, for this reason a modified P\&O has been implemented, the obtained results shown the efficiency of the algorithm compared to the conventional P\&O. Computer simulation results confirm the effectiveness of the proposed energy management algorithm under random meteorological conditions.
Yanwen Gu, Yunzhou Bai, Yuxi Xin et al.
The motion of water filled bottles is studied when it is thrown into the air and falls back to the floor, including the possibilities of an upright landing or rolling down before it finally reaches static state. When dealing with the process after throwing a water bottle, the free falling (bottle falls without initial angular velocity) and flipping (bottle falls with initial angular velocity) are considered. In theory, the physical principles behind the motion are analyzed. In addition, the impacts of initial angle, linear velocity, angular velocity and the water amount on the uprightness of the bottle are discussed. In experiment of throwing bottle, we changed the water amount, angular velocity, and releasing height, and examined the impacts of these factors. The results suggest that a certain amount of water and spinning result in higher possibility of upright landing. When dealing with rolling bottle, theoretically we build the bottle-and-bead model to describe the coupled motion of water and the bottle. Analytical solutions are obtained for small amplitude and the numerical solution can be done in a general situation. In the experiment of rolling bottle, we firstly verified the theoretical model, and then addressed the impact of initial conditions and water amount on the motion patterns of the bottle.
Su Nan
Yanghua Lu, Yanfei Yan, Xutao Yu et al.
There is a rising prospective in harvesting energy from water droplets, as microscale energy is required for the distributed sensors in the interconnected human society. However, achieving a sustainable direct-current generating device from water flow is rarely reported, and the quantum polarization principle of the water molecular remains uncovered. Herein, we propose a dynamic water-semiconductor junction with moving water sandwiched between two semiconductors as a moving dielectric medium, which outputs a sustainable direct-current voltage of 0.3 V and current of 0.64 uA with low internal resistance of 390 kilohm. The sustainable direct-current electricity is originating from the dynamic water polarization process in water-semiconductor junction, in which water molecules are continuously polarized and depolarized driven by the mechanical force and Fermi level difference, during the movement of the water on silicon. We further demonstrated an encapsulated portable power-generating device with simple structure and continuous direct-current voltage, which exhibits its promising potential application in the field of wearable electronic generators.
Sotiris Samatas, Carles Calero, Fausto Martelli et al.
An accurate description of the structure and dynamics of interfacial water is essential for phospholipid membranes, since it determines their function and their interaction with other molecules. Here we consider water confined in stacked membranes with hydration from poor to complete, as observed in a number of biological systems. Experiments show that the dynamics of water slows down dramatically when the hydration level is reduced. All-atom molecular dynamics simulations identify three (inner, hydration and outer) regions, within a distance of approximately 1 nm from the membrane, where water molecules exhibit different degrees of slowing down in the dynamics. The slow-down is a consequence of the robustness of the hydrogen bonds between water and lipids and the long lifetime of the hydrogen bonds between water molecules near the membrane. The interaction with the interface, therefore, induces a structural change in the water that can be emphasized by calculating its intermediate range order. Surprisingly, at distances as far as ~ 2.5 nm from the interface, although the bulk-like dynamics is recovered, the intermediate range order of water is still slightly higher than that in the bulk at the same thermodynamic conditions. Therefore, the water-membrane interface has a structural effect at ambient conditions that propagates further than the often-invoked 1 nm length scale. Membrane fluctuations smear out this effect macroscopically, but an analysis performed by considering local distances and instantaneous configurations is able to reveal it, possibly contributing to our understanding of the role of water at biomembrane interfaces.
Sotiris Lenas, Vassilis Tsaoussidis, Srikanth Sundaresan et al.
Open-access domestic broadband connection sharing constitutes a voluntary practice that is associated with societal, economic and public-safety benefits. Despite this fact, broadband subscribers are usually hesitant to freely share their broadband connection with guests for a multitude of reasons; one of them being sharing their network might hinder their own broadband quality of experience. In this paper, we investigate experimentally the impact of uplink guest traffic on the sharer's broadband quality of experience under both generic and broadband-sharing-specific packet scheduling policies. Both guest-user traffic and access point profiles employed in our study are developed by analyzing real-world traffic traces and measurements, captured from actual broadband sharing networking environments. Our results validate the suitability of hybrid packet scheduling policies for broadband sharing schemes and show that only a few dozen kilobytes per second of uplink guest traffic can be tolerated by sharers without hampering their broadband quality of experience. In this context, we show that the selection of the most appropriate packet scheduling policy for broadband sharing, as well as its respective configuration, depend largely on the capacity of the broadband connection and the policy's packet-dropping behavior on guest traffic.
Juan Manuel Grosso, Carlos Ocampo-Martínez, Vicenç Puig
Shiva Navabi, Ashutosh Nayyar
The problem of designing a profit-maximizing, Bayesian incentive compatible and individually rational mechanism with flexible consumers and costly heterogeneous supply is considered. In our setup, each consumer is associated with a flexibility set that describes the subset of goods the consumer is equally interested in. Each consumer wants to consume one good from its flexibility set. The flexibility set of a consumer and the utility it gets from consuming a good from its flexibility set are its private information. We adopt the flexibility model of [1] and focus on the case of nested flexibility sets -- each consumer's flexibility set can be one of k nested sets. Examples of settings with this inherent nested structure are provided. On the supply side, we assume that the seller has an initial stock of free supply but it can purchase more goods for each of the nested sets at fixed exogenous prices. We characterize the allocation and purchase rules for a profit-maximizing, Bayesian incentive compatible and individually rational mechanism as the solution to an integer program. The optimal payment function is pinned down by the optimal allocation rule in the form of an integral equation. We show that the nestedness of flexibility sets can be exploited to obtain a simple description of the optimal allocations, purchases and payments in terms of thresholds that can be computed through a straightforward iterative procedure.
Miguel Alberto Mercado, Roy Dong, Allan Nerves
Supply Shortage Outages are a major concern during peak demand for developing countries. In the Philippines, commercial loads have unused backup generation of up to 3000 MW, at the same time there are shortages of as much as 700 MW during peak demand. This gives utilities the incentive to implement Demand Response programs to minimize this shortage. But when considering Demand Response from a modeling perspective, social welfare through profit is always the major objective for program implementation. That isn't always the case during an emergency situation as there can be a trade-off between grid resilience and cost of electricity. The question is how the Distribution Utility (DU) shall optimally allocate the unused generation to meet the shortage when this trade-off exists. We formulate a combined multi-objective optimal dispatch model where we can make a direct comparison between the least-cost and resilience objectives. We find that this trade-off is due to the monotonically increasing nature of energy cost functions. If the supply is larger than the demand, the DU can perform a least-cost approach in the optimal dispatch since maximizing the energy generated in this case can lead to multiple solutions. We also find in our simulation that in cases where the supply of energy from the customers is less than shortage quantity, the DU must prioritize maximizing the generated energy rather than minimizing cost.
Halaman 51 dari 167643