Sort by:
Publication Type:
Open access:
Publication Date:
Periodicals:
Search results
Online since: January 2024
Authors: Dyah Aris Widyastuti, Yusril Yusuf
The crystallinity (Xc) of the samples was evaluated using a relation from Landi et al.[19].
Habibie et al., “Production and Characterization of Hydroxyapatite Bone Substitute Material Performed from Indonesian Limestone,” Int.
El-Latif, and D.
Haberko et al., “Natural hydroxyapatite - Its behaviour during heat treatment,” J.
El-Dek, and M.
Habibie et al., “Production and Characterization of Hydroxyapatite Bone Substitute Material Performed from Indonesian Limestone,” Int.
El-Latif, and D.
Haberko et al., “Natural hydroxyapatite - Its behaviour during heat treatment,” J.
El-Dek, and M.
Online since: December 2014
Authors: Yong Wang, Chao Nan Liu, Zhi Yuan Pan, Jing Wang
[4] Daneshdoost M,Lotfalian M,Bumroonggit G,et al.Neural network with fuzzy set-based classification for short-term load forecasting [J].IEEE Transactions on Power Systems,1998, 13(4):1386-1391
[8] NIU Dongxiao,GU Zhihong,XING Mian,et al.Study on Forecasting Approach to Short-Term Load of SVM Based on Data Mining [J].Proceedings of the CSEE,2006(18):6-12
[9] Abu-El-Magd M A,Sinha N K.Two New Algorithms for On-Line Modelling and Forecasting of the Load Demand of a Multinode Power System[J].
[10] Abu-El-Magd M A,Sinha N K.Univariate and multivariate time series techniques for modeling and forecasting short-term load demand.in IFAC Symposium on Theory and Application of Digital Control.1982.329-334
[18] Kang Chongqing, Xia Qing, Shen Yu, et al.
[8] NIU Dongxiao,GU Zhihong,XING Mian,et al.Study on Forecasting Approach to Short-Term Load of SVM Based on Data Mining [J].Proceedings of the CSEE,2006(18):6-12
[9] Abu-El-Magd M A,Sinha N K.Two New Algorithms for On-Line Modelling and Forecasting of the Load Demand of a Multinode Power System[J].
[10] Abu-El-Magd M A,Sinha N K.Univariate and multivariate time series techniques for modeling and forecasting short-term load demand.in IFAC Symposium on Theory and Application of Digital Control.1982.329-334
[18] Kang Chongqing, Xia Qing, Shen Yu, et al.
Online since: July 2014
Authors: S. Satishkumar, D. Dinakaran, Ramasamay S. Nakandhrakumar, M. Gopal
Slavko Dolinsek et al., [2] used the acoustic emission signals for identifying tool wear and tool breakage in the turning operation.
El-wardany et al., [4] used vibration signature analysis technique for monitoring tool wear and failure in drilling.
Panda et al., [6] used back propagation neural network and radial basis function network for predicting HSS drill flank wear in a cast iron workpiece using drill diameter, spindle speed, feed, thrust force, torque and vibration signals as input parameters and flank wear as output parameter for both neural network.
Nakandhrakumar et al., [5] carried drilling experiments using constant cutting conditions(speed, feed, drill diameter) and by varying distances in radius by keeping sensor at centre of the plate and concluded that amplitude variation in vibration signals due to distance variation from sensor position.
El-Wardany, D.Gao and M.A.Elbestawi, “Tool condition monitoring in drilling using vibration signature analysis”, International Journal Machine Tools and Manufacture, 36 (1996) 687–711
El-wardany et al., [4] used vibration signature analysis technique for monitoring tool wear and failure in drilling.
Panda et al., [6] used back propagation neural network and radial basis function network for predicting HSS drill flank wear in a cast iron workpiece using drill diameter, spindle speed, feed, thrust force, torque and vibration signals as input parameters and flank wear as output parameter for both neural network.
Nakandhrakumar et al., [5] carried drilling experiments using constant cutting conditions(speed, feed, drill diameter) and by varying distances in radius by keeping sensor at centre of the plate and concluded that amplitude variation in vibration signals due to distance variation from sensor position.
El-Wardany, D.Gao and M.A.Elbestawi, “Tool condition monitoring in drilling using vibration signature analysis”, International Journal Machine Tools and Manufacture, 36 (1996) 687–711
Online since: August 2014
Authors: Xiao Yu Li, Chang Feng Xia, Dong Yang Jin, Rui Xi Jia
[2] Heng L, Gao GX, Walter T, et al(2011) Statistical characterization of GPS signal-in-space errors.
Available: http: // gscb. jpl. nasa. gov /components/formats.html [5] Malys S,el al.GPS accurary improvement intiative[A].PROC ion GPS 97[C]
[6] Chen Y K, Chien J S, Ghassemi K, et al.
[7] Heng L, Gao G X, Walter T, et al.
Available: http: // gscb. jpl. nasa. gov /components/formats.html [5] Malys S,el al.GPS accurary improvement intiative[A].PROC ion GPS 97[C]
[6] Chen Y K, Chien J S, Ghassemi K, et al.
[7] Heng L, Gao G X, Walter T, et al.
Online since: October 2006
Authors: Zhao Yang, J.W. Bae, C.G. Kang
Sukumaran et al. [12] have investigated the effect of stirring on the grain refinement of semisolid
a356 alloy using master alloy Al-5Ti-0.6B.
However, when the Ti/B decreased, as in the case of Al-3Ti-3B and Al-2.5Ti-2.5B, the poison effect will be overcome.
The percentage of Al is extremely high.
Vol. 49 (2001), p. 1867 [10] A.L.
Jarfors, T.El-Benawy: Materials & Design Vol. 22 (2001), p. 443 [18] Z.
However, when the Ti/B decreased, as in the case of Al-3Ti-3B and Al-2.5Ti-2.5B, the poison effect will be overcome.
The percentage of Al is extremely high.
Vol. 49 (2001), p. 1867 [10] A.L.
Jarfors, T.El-Benawy: Materials & Design Vol. 22 (2001), p. 443 [18] Z.
Online since: April 2019
Authors: Salahuddin Junus, Sumarji Sumarji, Robertus Sidartawan, Denni Riyanto
Magnesium addition produce modification level of silicon’s eutectic for Al-Si-Mg.
The purpose of adding magnesium to the Al-Si alloy is to improve the mechanical properties of Al-Si.
This Si eutectic’s unsure that make Al-Si alloy possess high ductility.
Bozchaloei et al, 2012 [15], on his research append that porosity is the main cause of lowering the tensile strength in Al-7%Si-Mg alloy.
[11] El-Karomi K.
The purpose of adding magnesium to the Al-Si alloy is to improve the mechanical properties of Al-Si.
This Si eutectic’s unsure that make Al-Si alloy possess high ductility.
Bozchaloei et al, 2012 [15], on his research append that porosity is the main cause of lowering the tensile strength in Al-7%Si-Mg alloy.
[11] El-Karomi K.
Online since: October 2017
Authors: Rashid Tanzadeh, Javad Tanzadeh, Navid Kamvar, Hossein Nazari
In the research of Shen et al. the results demonstrated the better exhibition of moisture resistance in the nano-sized lime [12].
The result in the study of Osborn et al. also indicates that the service life of TiO2 coating in concrete is between 6 and 11 months and between 10 and 16 months in asphalt pavements [16].
Hassan et al. in their research took into this measure that the use of TiO2 as a modifier to asphalt binder was effective in removing part of the NOx pollutants from the air stream [17].
El-Shafie, I.M.
Abd El Rahman, The addition effects of macro and nano clay on the performance of asphalt binder, Egyptian Journal of Petroleum, 21(2) (2012) 149-154
The result in the study of Osborn et al. also indicates that the service life of TiO2 coating in concrete is between 6 and 11 months and between 10 and 16 months in asphalt pavements [16].
Hassan et al. in their research took into this measure that the use of TiO2 as a modifier to asphalt binder was effective in removing part of the NOx pollutants from the air stream [17].
El-Shafie, I.M.
Abd El Rahman, The addition effects of macro and nano clay on the performance of asphalt binder, Egyptian Journal of Petroleum, 21(2) (2012) 149-154
Online since: January 2013
Authors: Ananthanarayanan Rajeshkannan, S. Narayan
Thus, the present investigation evaluates the instantaneous work hardening behaviour of sintered and cold deformed Cu-7%Al-1.8%Sipreforms with the influence of three different aspect ratios against induced strain and attained density.
Experimental Details Electrolytic copper powder (Cu) of -150 µm, atomized aluminium powder (Al) and silicon powder (Si) of - 37µm size were used in the present investigation.
(9) Results and Discussion Sintered Cu-7%Al-1.8%Si preforms were subjected to secondary operations to enhance its density subsequently to enhance its mechanical strengthening.
El-Mahallawy, AM.
El-Sabbagh, Some experimental data on workability of aluminium-particulate-reinforced metal matrix composites, J Mater Process Technol 202 (2008) 380-385
Experimental Details Electrolytic copper powder (Cu) of -150 µm, atomized aluminium powder (Al) and silicon powder (Si) of - 37µm size were used in the present investigation.
(9) Results and Discussion Sintered Cu-7%Al-1.8%Si preforms were subjected to secondary operations to enhance its density subsequently to enhance its mechanical strengthening.
El-Mahallawy, AM.
El-Sabbagh, Some experimental data on workability of aluminium-particulate-reinforced metal matrix composites, J Mater Process Technol 202 (2008) 380-385
Online since: June 2011
Authors: Yao Hong Suo
Quarantine is an effective method to prevent and control epidemic diseases, such as SARS, H1N1, et al, Therefore, quarantine as an necessary factor should be considered in process of modeling.
This paper is organized as follows: Section 2 formulates an SIQS epidemic model; Section 3 studies the existence of equilibria and the stability of the disease free equilibrium; Section 4 discusses the stability of the endemic equilibrium; Section 5 makes the conclusions. 1 Mode formulation In [7], Hethcote, et al. separated the population into three classes: the susceptibles, the quarantined and the infectives, formulated and studied the following model (1) whereanddenote the numbers of the suscepeibles, infectives and quarantined, respectively, is the input flow, is the natural mortality rate,is the transmission rate, is the death rate caused by disease, is the quarantined rate, is the recovery rate of the infective, is the recovery rate of the quarantined,is the bilinear incidence rate .
It is mentionable that the incidence rate dependents on the infection age in our model, which makes the model be more suitable for the disease with long infected period such as AIDS, et al.
Mcdugal, E.L.
G.Huisman, F. de Wolf, H.van den Berg, et al.
This paper is organized as follows: Section 2 formulates an SIQS epidemic model; Section 3 studies the existence of equilibria and the stability of the disease free equilibrium; Section 4 discusses the stability of the endemic equilibrium; Section 5 makes the conclusions. 1 Mode formulation In [7], Hethcote, et al. separated the population into three classes: the susceptibles, the quarantined and the infectives, formulated and studied the following model (1) whereanddenote the numbers of the suscepeibles, infectives and quarantined, respectively, is the input flow, is the natural mortality rate,is the transmission rate, is the death rate caused by disease, is the quarantined rate, is the recovery rate of the infective, is the recovery rate of the quarantined,is the bilinear incidence rate .
It is mentionable that the incidence rate dependents on the infection age in our model, which makes the model be more suitable for the disease with long infected period such as AIDS, et al.
Mcdugal, E.L.
G.Huisman, F. de Wolf, H.van den Berg, et al.
Online since: August 2013
Authors: Gang Yao, Li Guo
In 2006, Zhu, at el, [11] proposed an authenticated constant round group key agreement protocol which is based on authenticated two-party elliptic curve Diffie-Hellman key agreement protocol.
In 2008, Wan, at el. [7] proposed an anonymous ID-based group key agreement protocol for wireless networks.
In 2009, Park, at el. [4] showed that Wan, et al.’s group key agreement protocol is insecure against colluding attack, and the joining/leaving protocols do not guarantee forward and backward secrecy.
Park, at el. also proposed a new forward secure ID-based group key agreement protocol with anonymity.
In 2010, Teo and Choo [6] also showed that Wan, et al.’s Join and Leave Protocols do not provide backward and forward secrecy respectively, and then propose three improved anonymous ID-based group key agreement protocols.
In 2008, Wan, at el. [7] proposed an anonymous ID-based group key agreement protocol for wireless networks.
In 2009, Park, at el. [4] showed that Wan, et al.’s group key agreement protocol is insecure against colluding attack, and the joining/leaving protocols do not guarantee forward and backward secrecy.
Park, at el. also proposed a new forward secure ID-based group key agreement protocol with anonymity.
In 2010, Teo and Choo [6] also showed that Wan, et al.’s Join and Leave Protocols do not provide backward and forward secrecy respectively, and then propose three improved anonymous ID-based group key agreement protocols.