Sort by:
Publication Type:
Open access:
Publication Date:
Periodicals:
Search results
Online since: August 2014
Authors: Andrey Pustovgar, Stanislav Pashkevich, Aleksey Adamtsevich, Aleksey Eremin, Sergey Nefedov
According to the data [3], the acceptable temperature conditions for the hydration processes of most hydraulic binders range from +5 to +30 °C.
As shown in [4-7], this leads to destructive changes in its structure and overall reduction in its performance.
As shown in [4-7], this leads to destructive changes in its structure and overall reduction in its performance.
Online since: February 2014
Authors: Kyung Joon Shin
However, because the reinforced fiber mainly comes into action after cracking, the reduction of crack widths by using conventional fiber-reinforced concrete is limited.
The data can also be collected differently to better evaluate the actual movement of chloride ions (as opposed to simply measuring the charge passed).
The data can also be collected differently to better evaluate the actual movement of chloride ions (as opposed to simply measuring the charge passed).
Online since: June 2013
Authors: H. Mata, Marco P. L. Parente, A. A. Fernandes, R. Natal Jorge, Abel dos Santos, Robertt Valente
From the viewpoint of the structural capabilities of the composite structure, the metallic foam core is responsible for absorbing energy when plastically deformed, as well as to provide good insulation of vibrations, reduction of weight of the structure.
An experimental device was also used to collect data of force - displacement of the punch of the test.
An experimental device was also used to collect data of force - displacement of the punch of the test.
Online since: June 2023
Authors: Tassew Tadiwos, Samuel Lakeou, Tefera Terefe, Edemialem Gedefaye
A stand-alone photovoltaic (PV)-Battery energy storage system (BESS)-Genset (PV-BESS-Genset) connected microgrid model, utilizing measured solar irradiation data, real-time manufacturer data for technology components, case study area daily energy consumption data, and a bottom-up approach to model demand response.
Mali Zheng [13] proposes a genetic algorithm optimization method for the energy reduction control of building air-conditioning systems.
Data collection and system components modeling Electrical load In this paper, electric appliances used to carry out a specific household task (lamps, television, computer, cooking stoves, etc.) are loads.
And a 10% day-to-day and 15% time step-to-time step random variability were adopted with the study to improve the realism of the load data.
With the help of primary data from the case study site, this study modeled a roof-top solar-powered microgrid for residential real estate.
Mali Zheng [13] proposes a genetic algorithm optimization method for the energy reduction control of building air-conditioning systems.
Data collection and system components modeling Electrical load In this paper, electric appliances used to carry out a specific household task (lamps, television, computer, cooking stoves, etc.) are loads.
And a 10% day-to-day and 15% time step-to-time step random variability were adopted with the study to improve the realism of the load data.
With the help of primary data from the case study site, this study modeled a roof-top solar-powered microgrid for residential real estate.
Online since: May 2011
Authors: Ye Yuan, Zhong Kai Yang, Qing Fu Li
The data to be extended can be monitored and searched through FIR technique.
Fig. 1 Fuzzy inductive Reasoning Process The fuzzification process of FIR is to convert a quantitative raw data to a qualitative raw data which includes a discrete class value, a fuzzy membership value and a side value.
End Extending Algorithm Assume the underlying signal is a data vector .
Step 6: Let the fuzzified form of vector data be the current input state for front endpoint extension and the fuzzified form of vector data the current input state for back endpoint extension.
Repeat step 4 and step 5 to obtain the second extended data and respectively.
Fig. 1 Fuzzy inductive Reasoning Process The fuzzification process of FIR is to convert a quantitative raw data to a qualitative raw data which includes a discrete class value, a fuzzy membership value and a side value.
End Extending Algorithm Assume the underlying signal is a data vector .
Step 6: Let the fuzzified form of vector data be the current input state for front endpoint extension and the fuzzified form of vector data the current input state for back endpoint extension.
Repeat step 4 and step 5 to obtain the second extended data and respectively.
Online since: July 2013
Authors: Yang Xu, Hong Xing Lv, Ying Xie, Rong Xiao Yao
This course is trying to design a virtual frequency meter that based on NI ELVIS experimental platform and collecting data by NI PCI-6251 data acquisition card in order to let students know more about measuring principle and instrument circuit designing.
Software programming has to collect voltage signal by DAQ data acquisition card, and measure the number of pulses within a sampling period.
Program graph of virtual frequency meter Data acquisition module.
We use a dynamic data conversion control to convert the data collected by data acquisition card and send them into a for cyclic sentence.The number of loops is just as the sampling frequency(1500000) .We can judge whether it is a rising edge by the function of automatic indexing.We call it a rising edge If the pre value is less than zero and the next one is greater than zero, and the accumulator add 1 every time when this happened .
[5] Long Huawei,Gu Yonggang.LabVIEW 8.2.1 and DAQ data acquisition [M].
Software programming has to collect voltage signal by DAQ data acquisition card, and measure the number of pulses within a sampling period.
Program graph of virtual frequency meter Data acquisition module.
We use a dynamic data conversion control to convert the data collected by data acquisition card and send them into a for cyclic sentence.The number of loops is just as the sampling frequency(1500000) .We can judge whether it is a rising edge by the function of automatic indexing.We call it a rising edge If the pre value is less than zero and the next one is greater than zero, and the accumulator add 1 every time when this happened .
[5] Long Huawei,Gu Yonggang.LabVIEW 8.2.1 and DAQ data acquisition [M].
Online since: August 2011
Authors: Xu Hua Pan, Zhao Ming Lei, Xiao Qin Su
With this scheduling, each node listens to see if any other node wants to transmit data to it in the listening period.
The RT class is assigned to high priority real time traffic such as alarm data or real time audio/video.
Fig. 3 illustrates a data transmission from the source node (A) to the sink (E).
Each node without data to send wakes up only at the scheduled listen period.
Illustration of data transmission The best effort traffic.
The RT class is assigned to high priority real time traffic such as alarm data or real time audio/video.
Fig. 3 illustrates a data transmission from the source node (A) to the sink (E).
Each node without data to send wakes up only at the scheduled listen period.
Illustration of data transmission The best effort traffic.
Online since: June 2014
Authors: Yun Peng
With the development of memory carrier, data capacity is also growing [5].
Because RFID tags are bearing electronic information, whose data content can be protected by password, difficult to be forged and altered.
The current passive RFID system in widespread use has not very reliable security mechanism with poor data secrecy.
RFID data is vulnerable to attacks, mainly because the RFID chip itself as well as the process that the chip is reading or writing data are easy to be used by hackers [7].
In the process of IOT application, when there are two or more transponders sending data at the same time, data interference shall appear, which is known as collision and lead to data transmission failure [8].
Because RFID tags are bearing electronic information, whose data content can be protected by password, difficult to be forged and altered.
The current passive RFID system in widespread use has not very reliable security mechanism with poor data secrecy.
RFID data is vulnerable to attacks, mainly because the RFID chip itself as well as the process that the chip is reading or writing data are easy to be used by hackers [7].
In the process of IOT application, when there are two or more transponders sending data at the same time, data interference shall appear, which is known as collision and lead to data transmission failure [8].