Search results for: Third order dispersion.
4119 A Review on the Comparison of EU Countries Based on Research and Development Efficiencies
Authors: Yeliz Ekinci, Raife Merve Ön
Abstract:
Nowadays, technological progress is one of the most important components of economic growth and the efficiency of R&D activities is particularly essential for countries. This study is an attempt to analyze the R&D efficiencies of EU countries. The indicators related to R&D efficiencies should be determined in advance in order to use DEA. For this reason a list of input and output indicators are derived from the literature review. Considering the data availability, a final list is given for the numerical analysis for future research.Keywords: Data envelopment analysis, economic growth, EU Countries, R&D efficiency.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20434118 Large-Eddy Simulations of Subsonic Impinging Jets
Authors: L. Nguyen, V. Golubev, R. Mankbadi
Abstract:
We consider here the subsonic impinging jet representing the flow field of a vertical take-off aircraft or the initial stage of rocket launching. Implicit Large-Eddy Simulation (ILES) is used to calculate the time-dependent flow field and the radiate sound pressure associated with jet impinging. With proper boundary treatments and high-order numerical scheme, the near field sound pressure is successfully obtained. Results are presented for both a rectangular as well a circular jet.Keywords: Aeroacoustics, Large-Eddy Simulations, Jets, Fluid Dynamics.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 21924117 Automatic Segmentation of Retina Vessels by Using Zhang Method
Authors: Ehsan Saghapour, Somayeh Zandian
Abstract:
Image segmentation is an important step in image processing. Major developments in medical imaging allow physicians to use potent and non-invasive methods in order to evaluate structures, performance and to diagnose human diseases. In this study, an active contour was used to extract vessel networks from color retina images. Automatic analysis of retina vessels facilitates calculation of arterial index which is required to diagnose some certain retinopathies.Keywords: Active contour, retinal vessel segmentation, image processing.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 23744116 Scenario Recognition in Modern Building Automation
Authors: Roland Lang, Dietmar Bruckner, Rosemarie Velik, Tobias Deutsch
Abstract:
Modern building automation needs to deal with very different types of demands, depending on the use of a building and the persons acting in it. To meet the requirements of situation awareness in modern building automation, scenario recognition becomes more and more important in order to detect sequences of events and to react to them properly. We present two concepts of scenario recognition and their implementation, one based on predefined templates and the other applying an unsupervised learning algorithm using statistical methods. Implemented applications will be described and their advantages and disadvantages will be outlined.Keywords: Building automation, ubiquitous computing, scenariorecognition, surveillance system.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16444115 Drilling of Glass Sheets by Abrasive Jet Machining
Authors: A. El-Domiaty, H. M. Abd El-Hafez, M. A. Shaker
Abstract:
Drilling of glass sheets with different thicknesses have been carried out by Abrasive Jet Machining process (AJM) in order to determine its machinability under different controlling parameters of the AJM process. The present study has been introduced a mathematical model and the obtained results have been compared with that obtained from other models published earlier [1-6]. The experimental results of the present work are used to discuss the validity of the proposed model as well as the other models.Keywords: Abrasive Jet Machining, Erosion rate, Glass, Mathematical model.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 39434114 Microbial Fuel Cells and Their Applications in Electricity Generating and Wastewater Treatment
Authors: Shima Fasahat
Abstract:
This research is an experimental research which was done about microbial fuel cells in order to study them for electricity generating and wastewater treatment. These days, it is very important to find new, clean and sustainable ways for energy supplying. Because of this reason there are many researchers around the world who are studying about new and sustainable energies. There are different ways to produce these kind of energies like: solar cells, wind turbines, geothermal energy, fuel cells and many other ways. Fuel cells have different types one of these types is microbial fuel cell. In this research, an MFC was built in order to study how it can be used for electricity generating and wastewater treatment. The microbial fuel cell which was used in this research is a reactor that has two tanks with a catalyst solution. The chemical reaction in microbial fuel cells is a redox reaction. The microbial fuel cell in this research is a two chamber MFC. Anode chamber is an anaerobic one (ABR reactor) and the other chamber is a cathode chamber. Anode chamber consists of stabilized sludge which is the source of microorganisms that do redox reaction. The main microorganisms here are: Propionibacterium and Clostridium. The electrodes of anode chamber are graphite pages. Cathode chamber consists of graphite page electrodes and catalysts like: O2, KMnO4 and C6N6FeK4. The membrane which separates the chambers is Nafion117. The reason of choosing this membrane is explained in the complete paper. The main goal of this research is to generate electricity and treating wastewater. It was found that when you use electron receptor compounds like: O2, MnO4, C6N6FeK4 the velocity of electron receiving speeds up and in a less time more current will be achieved. It was found that the best compounds for this purpose are compounds which have iron in their chemical formula. It is also important to pay attention to the amount of nutrients which enters to bacteria chamber. By adding extra nutrients in some cases the result will be reverse. By using ABR the amount of chemical oxidation demand reduces per day till it arrives to a stable amount.
Keywords: Anaerobic baffled reactor, bioenergy, electrode, energy efficient, microbial fuel cell, renewable chemicals, sustainable.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13894113 Dynamics In Production Processes
Authors: Marco Kennemann, Steffen C. Eickemeyer, Peter Nyhuis
Abstract:
An increasingly dynamic and complex environment poses huge challenges to production enterprises, especially with regards to logistics. The Logistic Operating Curve Theory, developed at the Institute of Production Systems and Logistics (IFA) of the Leibniz University of Hanover, is a recognized approach to describing logistic interactions, nevertheless, it reaches its limits when it comes to the dynamic aspects. In order to facilitate a timely and optimal Logistic Positioning a method is developed for quickly and reliably identifying dynamic processing states.
Keywords: Dynamics, Logistic Operating Curves, Production Logistics, Production Planning and Control
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15064112 Energy Efficiency Approach to Reduce Costs of Ownership of Air Jet Weaving
Authors: Corrado Grassi, Achim Schröter, Yves Gloy, Thomas Gries
Abstract:
Air jet weaving is the most productive, but also the most energy consuming weaving method. Increasing energy costs and environmental impact are constantly a challenge for the manufacturers of weaving machines. Current technological developments concern with low energy costs, low environmental impact, high productivity, and constant product quality. The high degree of energy consumption of the method can be ascribed to the high need of compressed air. An energy efficiency method is applied to the air jet weaving technology. Such method identifies and classifies the main relevant energy consumers and processes from the exergy point of view and it leads to the identification of energy efficiency potentials during the weft insertion process. Starting from the design phase, energy efficiency is considered as the central requirement to be satisfied. The initial phase of the method consists of an analysis of the state of the art of the main weft insertion components in order to point out a prioritization of the high demanding energy components and processes. The identified major components are investigated to reduce the high demand of energy of the weft insertion process. During the interaction of the flow field coming from the relay nozzles within the profiled reed, only a minor part of the stream is really accelerating the weft yarn, hence resulting in large energy inefficiency. Different tools such as FEM analysis, CFD simulation models and experimental analysis are used in order to design a more energy efficient design of the involved components in the filling insertion. A different concept for the metal strip of the profiled reed is developed. The developed metal strip allows a reduction of the machine energy consumption. Based on a parametric and aerodynamic study, the designed reed transmits higher values of the flow power to the filling yarn. The innovative reed fulfills both the requirement of raising energy efficiency and the compliance with the weaving constraints.
Keywords: Air jet weaving, aerodynamic simulation, energy efficiency, experimental measurements, power costs, weft insertion.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15084111 A Research in Relationship between ICT1 and SCM2
Authors: A. Rayati Shavazi, M. Abzari, A. Mohammadzadeh
Abstract:
ICT and supply chain management (SCM) are two notions, which have attracted much attention among both academicians and practitioners during the last decade. However, the discussion of the relationship between the two notions has been limited and fragmented. In this paper, we will present a summary of the discussion of ICT components and SCM on an extensive literature review. Then, we will discuss the interrelation between ICT and SCM from some major components and applications of ICT perspective. After all, we can introduce e-SCM concept, that arisen recently in management literature, in order to cover the whole topic. The authors look at all of the major components of electronic supply chain management and demonstrate that the future holds tremendous opportunity for those firms that take advantage of all of its possibilities.Keywords: e-SCM3, ICT, IT4, SCM.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19374110 Financial Ethics: A Review of 2010 Flash Crash
Authors: Omer Farooq, Salman Ahmed Khan, Sadaf Khalid
Abstract:
Modern day stock markets have almost entirely became automated. Even though it means increased profits for the investors by algorithms acting upon the slightest price change in order of microseconds, it also has given birth to many ethical dilemmas in the sense that slightest mistake can cause people to lose all of their livelihoods. This paper reviews one such event that happened on May 06, 2010 in which $1 trillion dollars disappeared from the Dow Jones Industrial Average. We are going to discuss its various aspects and the ethical dilemmas that have arisen due to it.
Keywords: Flash Crash, Market Crash, Stock Market, Stock Market Crash.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18574109 Analyzing the Historical Ayazma Bath within the Scope of Integrated Preservation and Specifying the Criteria for Reuse
Authors: Meryem Elif Çelebi Yakartepe, Ayşe Betül Gökarslan
Abstract:
Today, preservation of the historical constructions in "single construction" scale creates an inadequate preservation model in terms of the integrity of the historical environment in which they are located. However, in order to preserve these structures forming this integrity with a holistic approach, the structures either need to continue their unique functions or to be reshaped for function conforming to today's comfort conditions brought by the modern life.
In this work, the preservation of Ayazma Social Complex located in Ayazma Neighborhood of Üsküdar, one of the most important historical districts of İstanbul, with integrated preservation method has been discussed. In the conventional Turkish architecture, the social complex is a structure complex formed via constructing the public buildings required for the daily life of the people living in a settlement. Thus, the preservation of the social complexes within the scope of "integrated preservation" has gained importance. Ayazma Social Complex that forms the examination area of this work consists of a mosque in its center and structures around this mosque such as sultan mansion, time assignment center, primary school, stores, bath and water reservoirs. Mosque, sultan mansion and the water reservoirs survived to today as mostly preserved status. However, time assignment center, primary school and the stores didn't survive to today and new structures were built on their plots. The bath was mostly damaged and only the wall residues survive to today. Thus, it's urgent and crucial especially carry out the preservation restoration of the bath in accordance with integrated preservation principles. The preservation problems of the bath based on the social complex were determined as a working method and preservation suggestions were made to overcome these problems and to include the bath into daily life. Furthermore, it was suggested that the bath should be reshaped for a different function in order to be preserved with the social complex.
Keywords: Üsküdar, Ayazma Complex, Ayazma Bath, Conservation, Restoration.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18204108 Study of Base-Isolation Building System
Authors: G. W. Ni, Y. M. Zhang, D. L. Jiang, J. N. Chen, B. Liu
Abstract:
In order to improve the effect of isolation structure, the principles and behaviours of the base-isolation system are studied, and the types and characteristics of the base-isolation are also discussed. Compared to the traditional aseismatic structures, the base isolation structures decrease the seismic response obviously: the total structural aseismatic value decreases to 1/4-1/32 and the seismic shear stress in the upper structure decreases to 1/14-1/23. In the huge seism, the structure can have an obvious aseismatic effect.Keywords: Base-isolation, earthquake wave, dynamic response.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 23534107 Project Risk Management Techniques in Resource Allocation, Scheduling and Planning
Authors: Hossein Amoozad Khalili, Anahita Maleki
Abstract:
Normally business changes are made in order to change a level of activity in some way, whether it is sales, cash flow, productivity, or product portfolio. When attempts are made to make such changes, too often the business reverts to the old levels of activity as soon as management attention is diverted. Risk management is a field of growing interest to project managers as well as in general business and organizational management. There are several approaches used to manage risk in projects and this paper is a brief outline of some that you might encounter, with an indication of their strengths and weaknesses.Keywords: Risk Management, Project Management, Scheduling, Planning
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 34154106 Entropy Based Data Hiding for Document Images
Authors: Swetha Kurup, Sridhar G., Sridhar V.
Abstract:
In this paper we present a novel technique for data hiding in binary document images. We use the concept of entropy in order to identify document specific least distortive areas throughout the binary document image. The document image is treated as any other image and the proposed method utilizes the standard document characteristics for the embedding process. Proposed method minimizes perceptual distortion due to embedding and allows watermark extraction without the requirement of any side information at the decoder end.Keywords: Entropy, Steganography, Watermarking.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15304105 Study on the Heat Transfer Performance of the Annular Fin under Condensing Conditions
Authors: Abdenour Bourabaa, Malika Fekih, Mohamed Saighi
Abstract:
A numerical investigation of the fin efficiency and temperature distribution of an annular fin under dehumidification has been presented in this paper. The non-homogeneous second order differential equation that describes the temperature distribution from the fin base to the fin tip has been solved using the central finite difference method. The effects of variations in parameters including relative humidity, air temperature, air face velocity on temperature distribution and fin efficiency are investigated and compared with those under fully dry fin conditions. Also, the effect of fin pitch on the dimensionless temperature has been studied.
Keywords: Annular fin, Dehumidification, Fin efficiency, Heat and mass transfer, Wet fin.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 45084104 A Neighborhood Condition for Fractional k-deleted Graphs
Authors: Sizhong Zhou, Hongxia Liu
Abstract:
Abstract–Let k ≥ 3 be an integer, and let G be a graph of order n with n ≥ 9k +3- 42(k - 1)2 + 2. Then a spanning subgraph F of G is called a k-factor if dF (x) = k for each x ∈ V (G). A fractional k-factor is a way of assigning weights to the edges of a graph G (with all weights between 0 and 1) such that for each vertex the sum of the weights of the edges incident with that vertex is k. A graph G is a fractional k-deleted graph if there exists a fractional k-factor after deleting any edge of G. In this paper, it is proved that G is a fractional k-deleted graph if G satisfies δ(G) ≥ k + 1 and |NG(x) ∪ NG(y)| ≥ 1 2 (n + k - 2) for each pair of nonadjacent vertices x, y of G.
Keywords: Graph, minimum degree, neighborhood union, fractional k-factor, fractional k-deleted graph.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 10674103 Fuel Cell/DC-DC Convertor Control by Sliding Mode Method
Authors: Farzad Abdous
Abstract:
Fuel cell's system requires regulating circuit for voltage and current in order to control power in case of connecting to other generative devices or load. In this paper Fuel cell system and convertor, which is a multi-variable system, are controlled using sliding mode method. Use of weighting matrix in design procedure made it possible to regulate speed of control. Simulation results show the robustness and accuracy of proposed controller for controlling desired of outputs.Keywords: DC-DC converter, Fuel cell, PEM, Slides mode control.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16144102 Innovative Activity and Firm Performance: The Case of Eurozone Periphery
Authors: Ilias A. Makris
Abstract:
In this work, we attempt to analyze the contribution of innovative activities to firm performance and growth. We examine economic data from some of the economies that were heavily affected by current economic crisis: the countries of southern Europe (Portugal, Italy, Greece and Spain) and Ireland. Following literature, an appropriate econometric model is developed and several indicators are tested in order to disclose possible relation with innovative activity. Findings confirm the crucial effect of innovative process in economic activity, in firm and country level.
Keywords: Eurozone Periphery, Firm Performance, Innovative activity, R&D.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22104101 Trustworthy in Virtual Organization
Authors: Abdolhamid Fetanat, Mehdi Naghian Feshaareki
Abstract:
In open settings, the participants in virtual organization are autonomous and there is no central authority to ensure the felicity of their interactions. When agents interact in such settings, each relies upon being able to model the trustworthiness of the agents with whom it interacts. Fundamentally, such models must consider the past behavior of the other parties in order to predict their future behavior. Further, it is sensible for the agents to share information via referrals to trustworthy agents. In this article, trust is a bet on the future contingent actions of others" and enumerates six major factors supporting it: (1) reputation, (2) performance, (3) appearance, (4) accountability, (5) precommitment, and (6) contextual facilitation.Keywords: Trustworthy, trust, virtual organization.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13274100 Performance Evaluation of Packet Scheduling with Channel Conditioning Aware Based On WiMAX Networks
Authors: Elmabruk Laias, Abdalla M. Hanashi, Mohammed Alnas
Abstract:
Worldwide Interoperability for Microwave Access (WiMAX) became one of the most challenging issues, since it was responsible for distributing available resources of the network among all users this leaded to the demand of constructing and designing high efficient scheduling algorithms in order to improve the network utilization, to increase the network throughput, and to minimize the end-to-end delay. In this study, the proposed algorithm focuses on an efficient mechanism to serve non_real time traffic in congested networks by considering channel status.
Keywords: WiMAX, Quality of Services (QoS), OPNE, Diff-Serv (DS).
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18354099 Is E-learning Based On Learning Theories? A Literature Review
Authors: Apostolia Pange, Jenny Pange
Abstract:
E-learning aims to build knowledge and skills in order to enhance the quality of learning. Research has shown that the majority of the e-learning solutions lack in pedagogical background and present some serious deficiencies regarding teaching strategies and content delivery, time and pace management, interface design and preservation of learners- focus. The aim of this review is to approach the design of e-learning solutions with a pedagogical perspective and to present some good practices of e-learning design grounded on the core principles of Learning Theories (LTs).Keywords: design principles, e-learning, Learning Theories
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 52294098 Isomorphism on Fuzzy Graphs
Authors: A.Nagoor Gani, J.Malarvizhi
Abstract:
In this paper, the order, size and degree of the nodes of the isomorphic fuzzy graphs are discussed. Isomorphism between fuzzy graphs is proved to be an equivalence relation. Some properties of self complementary and self weak complementary fuzzy graphs are discussed.Keywords: complementary fuzzy graphs, co-weak isomorphism, equivalence relation, fuzzy relation, weak isomorphism.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 40764097 A Note on Potentially Power-Positive Sign Patterns
Authors: Ber-Lin Yu, Ting-Zhu Huang
Abstract:
In this note, some properties of potentially powerpositive sign patterns are established, and all the potentially powerpositive sign patterns of order ≤ 3 are classified completely.
Keywords: Sign pattern, potentially eventually positive sign pattern, potentially power-positive sign pattern.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 11184096 The BGMRES Method for Generalized Sylvester Matrix Equation AXB − X = C and Preconditioning
Authors: Azita Tajaddini, Ramleh Shamsi
Abstract:
In this paper, we present the block generalized minimal residual (BGMRES) method in order to solve the generalized Sylvester matrix equation. However, this method may not be converged in some problems. We construct a polynomial preconditioner based on BGMRES which shows why polynomial preconditioner is superior to some block solvers. Finally, numerical experiments report the effectiveness of this method.Keywords: Linear matrix equation, Block GMRES, matrix Krylov subspace, polynomial preconditioner.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 8744095 Achieving High Availability by Implementing Beowulf Cluster
Authors: A.F.A. Abidin, N.S.M. Usop
Abstract:
A computer cluster is a group of tightly coupled computers that work together closely so that in many respects they can be viewed as though they are a single computer. The components of a cluster are commonly, but not always, connected to each other through fast local area networks. Clusters are usually deployed to improve performance and/or availability over that provided by a single computer, while typically being much more cost-effective than single computers of comparable speed or availability. This paper proposed the way to implement the Beowulf Cluster in order to achieve high performance as well as high availability.Keywords: Beowulf Cluster, grid computing, GridMPI, MPICH.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16774094 A Comprehensive Survey on Machine Learning Techniques and User Authentication Approaches for Credit Card Fraud Detection
Authors: Niloofar Yousefi, Marie Alaghband, Ivan Garibay
Abstract:
With the increase of credit card usage, the volume of credit card misuse also has significantly increased, which may cause appreciable financial losses for both credit card holders and financial organizations issuing credit cards. As a result, financial organizations are working hard on developing and deploying credit card fraud detection methods, in order to adapt to ever-evolving, increasingly sophisticated defrauding strategies and identifying illicit transactions as quickly as possible to protect themselves and their customers. Compounding on the complex nature of such adverse strategies, credit card fraudulent activities are rare events compared to the number of legitimate transactions. Hence, the challenge to develop fraud detection that are accurate and efficient is substantially intensified and, as a consequence, credit card fraud detection has lately become a very active area of research. In this work, we provide a survey of current techniques most relevant to the problem of credit card fraud detection. We carry out our survey in two main parts. In the first part, we focus on studies utilizing classical machine learning models, which mostly employ traditional transnational features to make fraud predictions. These models typically rely on some static physical characteristics, such as what the user knows (knowledge-based method), or what he/she has access to (object-based method). In the second part of our survey, we review more advanced techniques of user authentication, which use behavioral biometrics to identify an individual based on his/her unique behavior while he/she is interacting with his/her electronic devices. These approaches rely on how people behave (instead of what they do), which cannot be easily forged. By providing an overview of current approaches and the results reported in the literature, this survey aims to drive the future research agenda for the community in order to develop more accurate, reliable and scalable models of credit card fraud detection.
Keywords: credit card fraud detection, user authentication, behavioral biometrics, machine learning, literature survey
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5444093 Signalling Cost Analysis of PDE-NEMO
Authors: Kamarularifin Abd Jalil, John Dunlop
Abstract:
A Personal Distributed Environment (PDE) is an example of an IP-based system architecture designed for future mobile communications. In a single PDE, there exist several Subnetworks hosting devices located across the infrastructure, which will inter-work with one another through the coordination of a Device Management Entity (DME). Some of these Sub-networks are fixed and some are mobile. In order to support Mobile Sub-networks mobility in the PDE, the PDE-NEMO protocol was proposed. This paper discussed the signalling cost analysis of PDE-NEMO by use of a detailed simulation model. The paper started with the introduction of the protocol, followed by the experiments and results and then followed by discussions.Keywords: Mobile Network, PDE-NEMO, Signallling Cost.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13974092 The Discriminate Analysis and Relevant Model for Mapping Export Potential
Authors: Jana Gutierrez Chvalkovská, Michal Mejstřík, Matěj Urban
Abstract:
There are pending discussions over the mapping of country export potential in order to refocus export strategy of firms and its evidence-based promotion by the Export Credit Agencies (ECAs) and other permitted vehicles of governments. In this paper we develop our version of an applied model that offers “stepwise” elimination of unattractive markets. We modify and calibrate the model for the particular features of the Czech Republic and specific pilot cases where we apply an individual approach to each sector.
Keywords: Export strategy, Modeling export, Calibration, Export promotion.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 24204091 Predicting Automotive Interior Noise Including Wind Noise by Statistical Energy Analysis
Authors: Yoshio Kurosawa
Abstract:
The applications of soundproof materials for reduction of high frequency automobile interior noise have been researched. This paper presents a sound pressure prediction technique including wind noise by Hybrid Statistical Energy Analysis (HSEA) in order to reduce weight of acoustic insulations. HSEA uses both analytical SEA and experimental SEA. As a result of chassis dynamo test and road test, the validity of SEA modeling was shown, and utility of the method was confirmed.
Keywords: Vibration, noise, car, statistical energy analysis.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15774090 A Low Power High Frequency CMOS RF Four Quadrant Analog Mixer
Authors: M. Aleshams, A. Shahsavandi
Abstract:
This paper describes a CMOS four-quadrant multiplier intended for use in the front-end receiver by utilizing the square-law characteristic of the MOS transistor in the saturation region. The circuit is based on 0.35 um CMOS technology simulated using HSPICE software. The mixer has a third-order inter the power consumption is 271uW from a single 1.2V power supply. One of the features of the proposed design is using two MOS transistors limitation to reduce the supply voltage, which leads to reduce the power consumption. This technique provides a GHz bandwidth response and low power consumption.Keywords: RF-Mixer, Multiplier, cut-off frequency, power consumption
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2012