scispace - formally typeset
Search or ask a question

Showing papers by "Instituto Tecnológico de Morelia published in 2008"


Journal ArticleDOI
TL;DR: In this paper, the fracture initiation toughness of 6061-T6 aluminum alloy and AISI 4140-T steel was investigated and it was observed that the dynamic fracture toughness decreases as the damage level increases.

30 citations


Journal ArticleDOI
TL;DR: The aim is to reduce protection coordination problems during fault occurrence and changes in the network configuration by calculating the setting impedance of zones 2 and 3 of distance relays based on the impedance seen when faults are simulated on adjacent nodes.
Abstract: In this paper, a methodology for calculating the setting impedance of zones 2 and 3 of distance relays is presented, The aim is to reduce protection coordination problems during fault occurrence and changes in the network configuration. The proposed method is based on the impedance seen by the distance relay when faults are simulated on adjacent nodes. The coordination and relay setting is obtained by means of computational algorithms developed to analyze the network topology, determine the pair of primary-backup relays and short circuit studies considering several types of faults in the power system. This process is carried out in an object oriented environment which allows a flexible approach to the user of the software. In the development of this tool search methods based on graph theory were used. The method was applied to an IEEE 14 nodes test system with satisfactory results.

8 citations


Journal ArticleDOI
TL;DR: A methodology for strategic planning for the computer science security of diverse companies like Banks and Government, cradle in the concepts of strategic administration of enterprise politics, which tries to give answers to key questions.
Abstract: The necessity of the companies and organizations to adapt the technological changes of the computer science takes to formulated key questions: How to measure the security of my organization?, What type of Computer Science Security needs my company, financial organization, or government? Did my financial organization counts with aspects of computer science security in the correct areas? What new tools of computer science security exist? What security strategies we must follow? What is the data stream of information that needs to be transmitted through the different departments of my organization, in terms of computer security? What kind of users' roles exists in terms of organizational security? Is there a way to classify the information in terms of computer security? In this paper we show a methodology for strategic planning for the computer science security of diverse companies like Banks and Government, cradle in the concepts of strategic administration of enterprise politics, which tries to give answers to the questions before mentioned.

8 citations


Proceedings Article
27 May 2008
TL;DR: The evaluation results indicate that the developed protection algorithm is fast, robust and reliable algorithm also suitable for power distribution systems.
Abstract: This research work thoroughly presents an innovative testing-bed for a power system protection relaying scheme whose main algorithm is based on the use of the time-inverse over-current relaying curves. The algorithm is developed using fast digital signal processing techniques to rapidly detect over-currents magnitudes and duration of the occurrence in electrical power system. The protection algorithm also includes a full set of inverse-time curves and, if electro-mechanic relays are installed in the electric grid, a compensating factor for the disk inertia constant. The developed algorithm is evaluated using a DSP-based digital relay prototype testing-platform, also developed by the authors, capable of being programmed with visual language. Several testing cases are presented in this paper. The tests include measurement of response speed, accuracy of detection and noise vulnerability. The evaluation results indicate that the developed protection algorithm is fast, robust and reliable algorithm also suitable for power distribution systems.

6 citations


Journal ArticleDOI
TL;DR: The model presented is based upon the static equilibrium model solved sequentially in time, which incorporates the effects of technical and temporal constraints such as time on/off and ramp up/down.

5 citations


Journal ArticleDOI
TL;DR: The design and construction of a pilot-scale, solid-liquid separation plant is described, which includes conventional measurements as well as Electrical Impedance Tomography measurements to determine the separation status of the separator, by measuring the air core size and position.
Abstract: This paper describes the design and construction of a pilot-scale, solid-liquid separation plant. The system includes conventional measurements, e.g., inlet feed flow rate and pressure etc., as well as Electrical Impedance Tomography (EIT) measurements to determine the separation status of the separator, by measuring the air core size and position. Image and feature extraction procedures are shown for obtaining the air core measurements. The different aspects in the construction of the plant are described. Tests show that the air core size can be maintained automatically using EIT images over the operating range. The resulting equipment can then be used for testing different implementations of data acquisition systems, EIT image reconstruction procedures and control strategies. The equipment is self-contained, does not require special facilities and can be used for teaching different aspects of electronics design and control theory to undergraduate students.

4 citations


Journal ArticleDOI
TL;DR: In this article, a phase-domain frequency domain technique is proposed for the harmonic analysis of a three-phase AC/DC system based on the harmonic multi-port network concept, expressed in terms of an ABCD parameter matrix which links voltage and current harmonics of different orders on both sides of the converter.

3 citations


Journal ArticleDOI
TL;DR: In this article, a six-port impedance network for a three-phase transformer is obtained from a 3D time-harmonic finite-element (FE) model, which properly captures the eddy current effects of the transformer tank and frame.

2 citations


Proceedings Article
25 Jan 2008
TL;DR: A methodology for strategic planning for the computer science security of Banks, Companies and Government, cradle in the concepts of strategic administration of enterprise politics, which tries to give answers to the questions before mentioned.
Abstract: The necessity of the companies and organizations to adapt the technological and computer science change takes to formulated key questions: What type of Computer science Security needs my company, financial organization, or government? My financial organization counts with aspects of computer science security in the correct areas? What new tools of computer science security exist? What strategies of security we must follow? In this paper we show a methodology for strategic planning for the computer science security of Banks, Companies and Government, cradle in the concepts of strategic administration of enterprise politics, which tries to give answers to the questions before mentioned.

2 citations


07 Nov 2008
TL;DR: This article addresses the problem of inconsistency in SELinux policies, and proposes an architecture that integrates a policy server for enabling a simple and secure administration and aims to achieve authenticity, integrity and confidentiality in the policy update process through the Kerberos V protocol.
Abstract: Users and organizations seek to obtain from an operating system integrity, confidentiality, and availability in both hardware and software resources. These characteristics must come coupled with easy handling and administration. An operating system designed under the criteria of the class A1, consists of a collection of security strengthening mechanisms for the kernel. SELinux is an example of this type of operating system that supports several types of security policies applied to access control. In this article we address the problem of inconsistency in SELinux policies, which is present in distributed environments. To solve this problem, we propose an architecture that integrates a policy server for enabling a simple and secure administration. The policy server collects, integrates, and updates all policies that are applied in the distributed environment. We aim to achieve authenticity, integrity and confidentiality in the policy update process through the Kerberos V protocol. We propose a redundant policy server. We do not assure that the proposed architecture is bug free; it is impossible to guarantee a completely secure system. Nonetheless, we consider it a viable solution for centralized management of SELinux policies.

1 citations


Journal ArticleDOI
TL;DR: In this article, an approach to the completely quantized description of nonlinear dynamic systems with chaos is considered, based on the correspondence between operators and their symbols in a phase-space representation.
Abstract: An approach to the completely quantized description of nonlinear dynamic systems with chaos is considered. The method bases on the correspondence between operators and their symbols in a phase-space representation. Heisenberg equations in a wide class of phase-space representations are obtained. Nonlinear oscillations of the coupled quasiparticles-oscillator system are analyzed in the completely quantized description in terms of symbols of operators in the Wigner representation. The asymptotic solutions of the Heisenberg equations for the symbols Q t , P t , etc. are obtained for a stable region of the phase-space, and the respective quantum observables are calculated.

01 Jan 2008
TL;DR: In this article, the authors present una perspectiva que permite determinar a las organizaciones si the gestion de proyectos that realizan is acorde with their objectives, i.e., the interfaces and comunicacion entre la direccion, el negocio, personal, ventas y mercadeo.
Abstract: El sector de las PyMes es uno de los sectores de crecimiento economico mas importante para Latinoamerica, y la tendencia mundial hacia la globalizacion y la erradicacion de las fronteras geograficas, ha empezado a obligar a este sector a crear nuevas estrategias de competencia en un entorno cada vez mas cambiante, competitivo y exigente. En este orden, los gobiernos vienen implementado una serie de estrategias, orientadas a la apertura de nuevas PyMes en el mercado internacional, obligando con esto a desarrollar y/o actualizar las Tecnologias de Informacion que existen y que se utilizan al interior de estas organizaciones [EBE05], [MET02], [STA05], [WYS03]. En los mercados actuales podemos encontrar una amplia variedad de productos, por lo que las empresas estan en constante lucha por subsistir y producir o comercializar articulos que demandan una alta calidad a un bajo costo. Un ejemplo representativo es el software y que en la actualidad es considerado mas como un producto de consumo que de soporte tecnico. En America latina las Mypimes y Pymes representan mas del 80% de las empresas existentes en los diversos paises, por lo que dada su naturaleza requieren de procesos que le ayuden a una eficiente Gestion de Proyectos, siendo imprescindible acometer a los proyectos con la mayor solidez metodologica para que, independientemente de su complejidad y tamano, se puedan entregar practicamente sin defectos, respetando plazos y costos estimados. Se tienen antecedentes que en investigaciones bibliograficas ulteriores, utilizan a la medicion como una herramienta importante para que la organizacion realice escenarios comparativos que le ayuden a entender como un proyecto se esta desempenando, y si este esta dentro de sus objetivos organizacionales y del mercado actual, manteniendo altos niveles de competitividad [REP04], [GAR00], [STA05], [EBE05]. La presente Investigacion plantea una perspectiva que permite determinar a las organizaciones si la gestion de proyectos que realizan es acorde a sus objetivos. Obteniendo como resultado los siguientes puntos: • Mayor visibilidad de los proyectos y del desempeno de los procesos, • Una mejora en las predicciones, • Maximizar el valor de la generacion de inversiones, • Transparencia en la decisiones justas y respetables sobre los proyectos, • Optimizar el balance de contenido, tecnologia, riesgos y, las reservas de capital, • Mejora en las interfaces y comunicacion entre la direccion, el negocio, personal, ventas y mercadeo, • Armonizar la toma de decisiones, hacer eficientes y efectivos los recursos disponibles, simplificar y hacer transparente la cancelacion de proyectos, entre otras.