The presence of dissolved cations such as Al and Zn in alkaline electrolyte (6 M KOH) suppresses the -nickel hydroxide transformation. The uptake of Al (10 mol%) and Zn (30 mol%) exhibited by the active material likely stabilizes the -phase. Dissolved Al is deleterious to the performance of the nickel hydroxide electrode, whereas, dissolved Zn enhances the specific discharge capacity of nickel hydroxide by approximately 25% showing that the mode of metal uptake is different in the two cases. 相似文献
This paper first presents a novel approach for modelling facial features, Local Directional Texture (LDT), which exploits the unique directional information in image textures for the problem of face recognition. A variant of LDT with privacy-preserving temporal strips (TS) is then considered to achieve faceless recognition with a higher degree of privacy while maintaining high accuracy. The TS uses two strips of pixel blocks from the temporal planes, XT and YT, for face recognition. By removing the reliance on spatial context (i.e., XY plane) for this task, the proposed method withholds facial appearance information from public view, where only one-dimensional temporal information that varies across time are extracted for recognition. Thus, privacy is assured, yet without impeding the facial recognition task which is vital for many security applications such as street surveillance and perimeter access control. To validate the reliability of the proposed method, experiments were carried out using the Honda/UCSD, CK+, CAS(ME)2 and CASME II databases. The proposed method achieved a recognition rate of 98.26% in the standard video-based face recognition database, Honda/UCSD. It also offers a 81.92% reduction in the dimension length required for storing the extracted features, in contrast to the conventional LBP-TOP.
Traditional intumescent coatings are widely used as passive fire-protective coatings for steel structures as they are capable of expanding in the range of 20–50 times the original thickness thereby providing excellent insulation. However, the fragile nature of such residue and susceptibility to thermo-oxidation given their carbonaceous nature are key problematic issues. The concept of in situ ceramization is explored in this work as a means to form inorganic cohesive char with improved rigidity and thermo-oxidative stability. Coating samples were prepared by incorporating ammonium polyphosphate, talc, Mg(OH)2, and polydimethylsiloxane as additives into acrylic resin at different weight fractions. Thermal analysis and x-ray diffraction have confirmed the reactions between the additives to form various crystalline magnesium phosphate phases, and to a small extent, silicon phosphate, thereby ensuring the thermo-oxidative stability of the residue. This is reiterated by the fire performance tests (by exposing the coatings to a temperature profile in a furnace similar to ISO 834 fire curve). Despite the advantages of rigid char and its thermo-oxidative stability as a result of formation of inorganic phosphates, the lack of swelling has resulted in relatively poor insulation capabilities of the char, and subsequently, compromised the fire protection times (that are in the range of 45–55 min). However, pyrolysis flow combustion calorimeter results of the coatings are promising and have shown a significant drop of up to 70% in the peak of heat release rate values as compared to neat resin. 相似文献
In General, Mobile Ad-Hoc Network (MANET) has limited energy resources, and it cannot recharge itself. This research goal focuses on building a power management scheme that saves energy in the MANET. Due to power instability, there is a chance that cluster heads fail and function incorrectly in cluster-based routing. As a result, instability occurs with the cluster heads while collecting data and communicating with others effectively. This work focuses on detecting the unstable cluster heads, which are replaced by other nodes implementing the envisaged self-configurable cluster mechanism. A self-configurable cluster mechanism with a k-means protocol approach is proposed to designate cluster heads effectively. The proposed k-means procedure is based on periodic irregular cluster head rotations or altering the number of clusters. We also propose a trust management mechanism in this research to detect and avoid MANET vulnerabilities. Because of the continuously changing topology and limited resources (power, bandwidth, computing), the trust management algorithm should only use local data. Consequently, compared to traditional protocols, the proposed approach with the k-means procedure and its experimental results show lower power usage and provide an optimal system for trust management.
We present polylogarithmic approximations for the R|prec|Cmax and R|prec|∑jwjCj problems, when the precedence constraints are “treelike”—i.e., when the undirected graph underlying the precedences is a
forest. These are the first non-trivial generalizations of the job shop scheduling problem to scheduling with precedence constraints
that are not just chains. These are also the first non-trivial results for the weighted completion time objective on unrelated
machines with precedence constraints of any kind. We obtain improved bounds for the weighted completion time and flow time for the case of chains with restricted assignment—this
generalizes the job shop problem to these objective functions. We use the same lower bound of “congestion + dilation”, as
in other job shop scheduling approaches (e.g. Shmoys, Stein and Wein, SIAM J. Comput. 23, 617–632, 1994). The first step in our algorithm for the R|prec|Cmax problem with treelike precedences involves using the algorithm of Lenstra, Shmoys and Tardos to obtain a processor assignment
with the congestion + dilation value within a constant factor of the optimal. We then show how to generalize the random-delays
technique of Leighton, Maggs and Rao to the case of trees. For the special case of chains, we show a dependent rounding technique
which leads to a bicriteria approximation algorithm for minimizing the flow time, a notoriously hard objective function.
A preliminary version of this paper appeared in the Proc. International Workshop on Approximation Algorithms for Combinatorial Optimization Problems (APPROX), pages 146–157, 2005.
V.S. Anil Kumar supported in part by NSF Award CNS-0626964. Part of this work was done while at the Los Alamos National Laboratory,
and supported in part by the Department of Energy under Contract W-7405-ENG-36.
M.V. Marathe supported in part by NSF Award CNS-0626964. Part of this work was done while at the Los Alamos National Laboratory,
and supported in part by the Department of Energy under Contract W-7405-ENG-36.
Part of this work by S. Parthasarathy was done while at the Department of Computer Science, University of Maryland, College
Park, MD 20742, and in part while visiting the Los Alamos National Laboratory. Research supported in part by NSF Award CCR-0208005
and NSF ITR Award CNS-0426683.
Research of A. Srinivasan supported in part by NSF Award CCR-0208005, NSF ITR Award CNS-0426683, and NSF Award CNS-0626636. 相似文献
A new elegant and simple algorithm for mutual exclusion of N processes is proposed. It only requires shared variables in a memory model where shared variables need not be accessed atomically.
We prove mutual exclusion by reformulating the algorithm as a transition system (automaton), and applying simulation of automata.
The proof has been verified with the higher-order interactive theorem prover PVS. Under an additional atomicity assumption,
the algorithm is starvation free, and we conjecture that no competing process is passed by any other process more than once.
This conjecture was verified by model checking for systems with at most five processes. 相似文献
We present control strategies for an Integrated Gasification Combined Cycle (IGCC) power plant with CO2 recycles. One recycle allows for composition control and is useful when the side objective is to produce synthesis gas for chemicals. The second recycle enables temperature control in the gas turbine by using CO2 as a diluent. The main advantages of the second recycle are that NOx is not produced and that CO2/H2O separation is significantly easier than CO2/N2 separation, which reduces cost if the CO2 is to be sequestered. Models and control systems are developed using process network theory. We introduce a novel method for controlling quality variables and functions of inventories. Dynamic simulations using MATLAB/Simulink models show the response to step changes in setpoints and disturbances. The inventory control method is derived from conservation laws and the second law and it is applicable to process system models of any degree of complexity. A steady-state sensitivity analysis is performed, examining the effect of changing the temperature and C:O ratio within the gasifier on the power production. 相似文献
In a cloud computing paradigm, energy efficient allocation of different virtualized ICT resources (servers, storage disks, and networks, and the like) is a complex problem due to the presence of heterogeneous application (e.g., content delivery networks, MapReduce, web applications, and the like) workloads having contentious allocation requirements in terms of ICT resource capacities (e.g., network bandwidth, processing speed, response time, etc.). Several recent papers have tried to address the issue of improving energy efficiency in allocating cloud resources to applications with varying degree of success. However, to the best of our knowledge there is no published literature on this subject that clearly articulates the research problem and provides research taxonomy for succinct classification of existing techniques. Hence, the main aim of this paper is to identify open challenges associated with energy efficient resource allocation. In this regard, the study, first, outlines the problem and existing hardware and software-based techniques available for this purpose. Furthermore, available techniques already presented in the literature are summarized based on the energy-efficient research dimension taxonomy. The advantages and disadvantages of the existing techniques are comprehensively analyzed against the proposed research dimension taxonomy namely: resource adaption policy, objective function, allocation method, allocation operation, and interoperability. 相似文献
A simple mutual exclusion algorithm is presented that only uses nonatomic shared variables of bounded size, and that satisfies
bounded overtaking. When the shared variables behave atomically, it has the first-come-first-served property (FCFS). Nonatomic
access makes information vulnerable. The effects of this can be mitigated by minimizing the information and by spreading it
over more variables. The design approach adopted here begins with such mitigating efforts. These resulted in an algorithm
with a proof of correctness, first for atomic variables. This proof is then used as a blueprint for the simultaneous development
of the algorithm for nonatomic variables and its proof. Mutual exclusion is proved by means of invariants. Bounded overtaking
and liveness under weak fairness are proved with invariants and variant functions. Liveness under weak fairness is formalized
and proved in a set-theoretic version of temporal logic. All these assertions are verified with the proof assistant PVS. We
heavily rely on the possibility offered by a proof assistant like PVS to reuse proofs developed for one context in a different
context. 相似文献