Sort by:
Publication Type:
Open access:
Publication Date:
Periodicals:
Search results
Online since: May 2012
Authors: Chun Mei Liu, Xiao Hua Wang, Mao Sheng Duan
It is important to ensure the quality of emissions data In ETS, MRV is one of the key elements.
Schakenbach (2006) analyzed the Acid Rain program in USA, and descripting several fundamental MRV elements: compliance assurance through incentives and automatic penalties; strong quality assurance; collaborative approach with a petition process; standardized electronic reporting; compliance flexibility for low-emitting sources; complete emissions data record required; centralized administration; level playing field; publicly available data; performance-based approach; and reducing conflicts of interest[3].
The reporting format include the description of corporation, instruction of the equipment, monitoring methodologies, the data of fuel consumption, emissions, the supervisor of the monitoring, etc..
It can utilize the existing law, and can achieve actual reduction
Second, the choice of the monitoring methodologies should consider: cost, technology and the accuracy of monitoring data.
Schakenbach (2006) analyzed the Acid Rain program in USA, and descripting several fundamental MRV elements: compliance assurance through incentives and automatic penalties; strong quality assurance; collaborative approach with a petition process; standardized electronic reporting; compliance flexibility for low-emitting sources; complete emissions data record required; centralized administration; level playing field; publicly available data; performance-based approach; and reducing conflicts of interest[3].
The reporting format include the description of corporation, instruction of the equipment, monitoring methodologies, the data of fuel consumption, emissions, the supervisor of the monitoring, etc..
It can utilize the existing law, and can achieve actual reduction
Second, the choice of the monitoring methodologies should consider: cost, technology and the accuracy of monitoring data.
Online since: April 2013
Authors: Gabriele Papadia, Antonio Del Prete, Teresa Primo, Silvia Schipa
An automatic procedure allows the drawing of the data in files containing numerical input and experimental data.
It also analyzes the obtained data comparing graphs in terms of fluid pressure, punch stroke and force for each actuator [5]. 2.
For experimental data an ultrasonic thickness detector has been used.
Fig. 10 reports the areas where numerical and experimental data has been measured.
As it can be appreciated, thanks to the reported data, there is a good agreement between numerical and experimental values with a discordance of about 1 %.
It also analyzes the obtained data comparing graphs in terms of fluid pressure, punch stroke and force for each actuator [5]. 2.
For experimental data an ultrasonic thickness detector has been used.
Fig. 10 reports the areas where numerical and experimental data has been measured.
As it can be appreciated, thanks to the reported data, there is a good agreement between numerical and experimental values with a discordance of about 1 %.
Online since: July 2014
Authors: P. Kumar, Amaladas John Rajan
Most of the research papers focused about the solution to the reduction of greenhouse gas emission.
The European Union saw a 10% reduction in natural gas consumption (BP, 2012), the largest decline on record.
From this data it is evident that the electricity production created more than 54% of co2 emission.
Conclusion After studying and analyzing the entire data, At India renewable energy production, is the only solution which can reduce the co2 emission.
Vijay for his support in collecting data’s for this paper.
The European Union saw a 10% reduction in natural gas consumption (BP, 2012), the largest decline on record.
From this data it is evident that the electricity production created more than 54% of co2 emission.
Conclusion After studying and analyzing the entire data, At India renewable energy production, is the only solution which can reduce the co2 emission.
Vijay for his support in collecting data’s for this paper.
Online since: October 2014
Authors: Florian Ellert, Max Weeber, Stefan Freiberger
With the aim to enter a process of continuous improvement and assess energy saving potentials, companies require reliable data on their energy consumption.
The sensor data was processed in an energy measuring terminal and transferred to a PC via bus coupler.
The measurement data was then saved to a sql database.
Based on the acquired data, upgrading and reengineering measures could be assessed for their economic viability.
Considering product development, electrical energy metering was found to generate the necessary data, which supports the development of new, energy efficient product generations.
The sensor data was processed in an energy measuring terminal and transferred to a PC via bus coupler.
The measurement data was then saved to a sql database.
Based on the acquired data, upgrading and reengineering measures could be assessed for their economic viability.
Considering product development, electrical energy metering was found to generate the necessary data, which supports the development of new, energy efficient product generations.
Online since: December 2006
Authors: Hyeon Ki Choi, Yeon Sun Choi, Ja Choon Koo, Dong Ho Oh, Nam Hoon Lee
One of the major technological
challenges for the spindles to be successfully employed in the applications is the reduction of power
consumption since the most of the mobile applications operate with a limited power source at
relatively lower voltage.
Introduction As the generaton of the information-oriented society has proceeded rapidly, the functional requirement of massive digital information storage devices are on a trend for the higher data transfer rate and lower cost.
The cost of the higher data density requirements has been always prohibitive for the development engineers due to the radical reduction of the TMR budget.
Introduction As the generaton of the information-oriented society has proceeded rapidly, the functional requirement of massive digital information storage devices are on a trend for the higher data transfer rate and lower cost.
The cost of the higher data density requirements has been always prohibitive for the development engineers due to the radical reduction of the TMR budget.
Online since: July 2011
Authors: Min Chen, Jian Guo Chen, Xin Xin Cheng
According to statistical data, the construction wastes frequently makes up 30–40% of the whole solid wastes.
Thus, the implementation of construction waste management is urgently needed,which will benefit both the environment and the construction firms in terms of cost reduction.
McDonald and Smithers(1998) conducted a survey suggesting that a proper waste management plan can contribute significantly to eliminate waste source, and can result in up to 50% cost savings for waste handling charges, 15% volume reduction of waste generation prior to recycling on site, and 43% waste reduction for landfill.
Reward schemes can be used to motivate construction site workers to increase their participation in waste reduction schemes [9].
For example, the intelligent terminals PDA can be used to automatically track data of materials.
Thus, the implementation of construction waste management is urgently needed,which will benefit both the environment and the construction firms in terms of cost reduction.
McDonald and Smithers(1998) conducted a survey suggesting that a proper waste management plan can contribute significantly to eliminate waste source, and can result in up to 50% cost savings for waste handling charges, 15% volume reduction of waste generation prior to recycling on site, and 43% waste reduction for landfill.
Reward schemes can be used to motivate construction site workers to increase their participation in waste reduction schemes [9].
For example, the intelligent terminals PDA can be used to automatically track data of materials.
Online since: October 2009
Authors: Xin Cun Zhuang, Hua Xiang, Zhen Zhao
In order to obtain accurate experimental data,
full-bridge strain gauge configurations were mounted onto the punch to measure extrusion force.
Fig.5 shows that there is no obvious influence of RP and extrusion force increases a lot with material change and area reduction.
Therefore the key influence parameters are material type and area reduction.
In order to optimize extrusion force, it is important to select the proper material and area reduction. 0 50 100 150 200 250 A1 A2 A3 B1 B2 B3 C1 C2 C3 D1 D2 D3 E1 E2 E3 F1 F2 F3 Fig.5 Main effects of plot-data mean for forming redundancy Conclusions Orthogonal analysis combined FEM simulation is introduced in the current study to investigate effect of the process parameters on sheet metal extrusion force, which is not only reliable and efficient, but also referential to other systems.
Especially, area reduction and material type as key parameters have further more influence on the extrusion force than others.
Fig.5 shows that there is no obvious influence of RP and extrusion force increases a lot with material change and area reduction.
Therefore the key influence parameters are material type and area reduction.
In order to optimize extrusion force, it is important to select the proper material and area reduction. 0 50 100 150 200 250 A1 A2 A3 B1 B2 B3 C1 C2 C3 D1 D2 D3 E1 E2 E3 F1 F2 F3 Fig.5 Main effects of plot-data mean for forming redundancy Conclusions Orthogonal analysis combined FEM simulation is introduced in the current study to investigate effect of the process parameters on sheet metal extrusion force, which is not only reliable and efficient, but also referential to other systems.
Especially, area reduction and material type as key parameters have further more influence on the extrusion force than others.
Online since: June 2014
Authors: Yong Kang Xu, Zheng Jing Wan, Ji Lan Zhang, Jia Ju Wu
The relational mapping tabla has a large data size, and the data access to this table mainly positions the only data by two fields of TableName and OID, so these two fields are used to create the index.
Because the index of main memory database is created based on the plaintext data table and the index of relational mapping table is also created based on the plaintext, the plaintext index has solved other complicated ciphertext index problems in other database encryption schemes, and the failure in effective using or the performance reduction of index caused by the loss of original partial ordering relation among data due to the encryption will never occur. 3.2 Encryption and Decryption Synchronous Layer The data which need to be encrypted are plaintext data rows in the main memory database and ciphertext files in the relational database, so in order to keep the consistency to the application system of data in the two databases, the encryption and decryption synchronous layer is required to realize the data synchronization.
As for the data adding, the basic service of adding ciphertext file data will be called; as for the data deletion, the basic service of deleting ciphertext file data will be called; as for the data modification, the basic service of deleting ciphertext file data will be called firstly, and then the basic service of adding ciphertext file data will be called.
As for adding data, the basic service of adding ciphertext data will be called to increase the data in the relational mapping table and generate the files in the operating system; as for deleting data, the basic service of deleting ciphertext data will be called to delete the data in the relational mapping table and the files in the operating system; as for modifying data, the basic service of deleting ciphertext data will be firstly called to delete the data and files before modification, and then the basic service of adding ciphertext data will be called to generate the data and files after modification. 2) Ciphertext loaded to plaintext when starting: when the application system starts, this functional service can firstly decrypt all ciphertext data in the relational database and then load into the corresponding plaintext table in the main memory database.
Scheme Evaluation This scheme administrates the running state and storage state of data separately, and even the medium is stolen or lost, the running-state plaintext data administrated by the main memory database will be protected due to the data loss caused by the memory outage, and the storage-state ciphertext data administrated by the relational database will be protected due to the data encryption, so as to avoid the data leakage effectively.
Because the index of main memory database is created based on the plaintext data table and the index of relational mapping table is also created based on the plaintext, the plaintext index has solved other complicated ciphertext index problems in other database encryption schemes, and the failure in effective using or the performance reduction of index caused by the loss of original partial ordering relation among data due to the encryption will never occur. 3.2 Encryption and Decryption Synchronous Layer The data which need to be encrypted are plaintext data rows in the main memory database and ciphertext files in the relational database, so in order to keep the consistency to the application system of data in the two databases, the encryption and decryption synchronous layer is required to realize the data synchronization.
As for the data adding, the basic service of adding ciphertext file data will be called; as for the data deletion, the basic service of deleting ciphertext file data will be called; as for the data modification, the basic service of deleting ciphertext file data will be called firstly, and then the basic service of adding ciphertext file data will be called.
As for adding data, the basic service of adding ciphertext data will be called to increase the data in the relational mapping table and generate the files in the operating system; as for deleting data, the basic service of deleting ciphertext data will be called to delete the data in the relational mapping table and the files in the operating system; as for modifying data, the basic service of deleting ciphertext data will be firstly called to delete the data and files before modification, and then the basic service of adding ciphertext data will be called to generate the data and files after modification. 2) Ciphertext loaded to plaintext when starting: when the application system starts, this functional service can firstly decrypt all ciphertext data in the relational database and then load into the corresponding plaintext table in the main memory database.
Scheme Evaluation This scheme administrates the running state and storage state of data separately, and even the medium is stolen or lost, the running-state plaintext data administrated by the main memory database will be protected due to the data loss caused by the memory outage, and the storage-state ciphertext data administrated by the relational database will be protected due to the data encryption, so as to avoid the data leakage effectively.
Online since: September 2012
Authors: Viorel Sandu, Elena Sandu, Paul Litra-Cristian, Ivan Ion
However, the transport data suggest that carbon diffusion is limited to the outer layer of the MgB2 grains in both cases.
The estimate of the carbon amount x in Mg(B1-xCx)2 for each sample was based on neutron diffraction data [11].
The data for each sample are given in The Table 1.
From the resistance data measured in applied field we extracted the upper critical field Hc2 (Fig. 4).
Data show a systematic enhancement of Hc2.
The estimate of the carbon amount x in Mg(B1-xCx)2 for each sample was based on neutron diffraction data [11].
The data for each sample are given in The Table 1.
From the resistance data measured in applied field we extracted the upper critical field Hc2 (Fig. 4).
Data show a systematic enhancement of Hc2.
Online since: July 2012
Authors: Hirokazu Nagai, Kazuyuki Tamura, Kenji Araki, Kensuke Nishioka, Hiroto Yano
The reduction rate of h was also 12%.
The reasonability of the measured date obtained by the LBIC system was confirmed by using the simulation data.
Figure 3 shows the relationship between the reduction rate of calculated optical efficiency and measured Isc in the case of the tracking error with 1.0o.
At the center position, the reduction of measured Isc was remarkable.
The percentage of reduction in Isc owing to the unavailable area was only 0.12% of total Isc (derived from the data in Fig.2(a)).
The reasonability of the measured date obtained by the LBIC system was confirmed by using the simulation data.
Figure 3 shows the relationship between the reduction rate of calculated optical efficiency and measured Isc in the case of the tracking error with 1.0o.
At the center position, the reduction of measured Isc was remarkable.
The percentage of reduction in Isc owing to the unavailable area was only 0.12% of total Isc (derived from the data in Fig.2(a)).