This document studies the energy absorption buildup factor (EABF) in some soils. It calculates the EABF for various soil samples from India in the energy range of 0.015-15 MeV and penetration depths up to 40 mean free paths. The EABF is calculated using the five parameter geometrical progression fitting approximation. The results show that the EABF increases with penetration depth and peaks at intermediate energies from 0.15-0.8 MeV due to the dominance of the Compton effect. The EABF then decreases at higher energies above 2 MeV due to the increased effects of pair production. The study provides insights into how the EABF of soils varies with photon energy and penetration depth.
Investigation on Using Fractal Geometry for Classification of Partial Dischar...IOSR Journals
1) The document investigates using fractal geometry to classify partial discharge (PD) patterns from different insulation defects.
2) Fractal features like fractal dimension and lacunarity are extracted from 3D PD patterns using box counting. Each PD pattern has a unique fractal dimension and multiple lacunarity values depending on box size.
3) Neural networks are used to classify PD patterns based on their fractal features. The goal is to minimize input features to improve classification performance. Different lacunarity values from varying box sizes are analyzed to find those most useful for classification.
A Critical Review of the Nigerian Energy ScenarioIOSR Journals
This document provides an overview of Nigeria's energy scenario, identifying its energy mix and constraints. Nigeria has significant fossil fuel reserves like oil and natural gas, but faces issues of inadequate supply, energy poverty, and gas flaring. The key energy sources are oil (37 billion barrels of reserves), natural gas (187 trillion cubic feet of reserves), and biomass. However, poor energy policy implementation, slow private sector participation, and lack of infrastructure have limited energy access and economic development. The document recommends strategies to improve the energy sector through better policy and utilization of alternative resources like solar and hydropower.
IOSR Journal of Applied Chemistry (IOSR-JAC) is an open access international journal that provides rapid publication (within a month) of articles in all areas of applied chemistry and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in Chemical Science. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
1. The document analyzes the cost of a Handover Manager Based Handover Method (HMBHO) for low earth orbit (LEO) satellite networks and compares it to other handover techniques.
2. HMBHO was proposed previously to reduce handover latency and uses a Handover Manager to store upcoming IP addresses, eliminating the need for handover preparation requests.
3. This paper defines the costs of different mobility management events and calculates the total cost of HMBHO, Mobile IP, and another technique called PatHO-LEO based on control message size and number of hops.
4. Simulation results show that the total cost of HMBHO is lower than the other techniques due to
Prototyping the Future Potentials of Location Based Services in the Realm of ...IOSR Journals
This document discusses prototyping future potentials of location-based services in e-governance. It begins by defining ubiquitous computing, context-aware applications, and location-based services. It then outlines two classes of LBS - pull, where users actively request location-based data, and push, where networks proactively provide information to users. The document also describes the key components of an LBS communication model, including user devices, communication networks, positioning systems, application servers, and data servers. Lastly, it discusses challenges with incorporating location and context into existing governance models.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document studies the energy absorption buildup factor (EABF) in some soils. It calculates the EABF for various soil samples from India in the energy range of 0.015-15 MeV and penetration depths up to 40 mean free paths. The EABF is calculated using the five parameter geometrical progression fitting approximation. The results show that the EABF increases with penetration depth and peaks at intermediate energies from 0.15-0.8 MeV due to the dominance of the Compton effect. The EABF then decreases at higher energies above 2 MeV due to the increased effects of pair production. The study provides insights into how the EABF of soils varies with photon energy and penetration depth.
Investigation on Using Fractal Geometry for Classification of Partial Dischar...IOSR Journals
1) The document investigates using fractal geometry to classify partial discharge (PD) patterns from different insulation defects.
2) Fractal features like fractal dimension and lacunarity are extracted from 3D PD patterns using box counting. Each PD pattern has a unique fractal dimension and multiple lacunarity values depending on box size.
3) Neural networks are used to classify PD patterns based on their fractal features. The goal is to minimize input features to improve classification performance. Different lacunarity values from varying box sizes are analyzed to find those most useful for classification.
A Critical Review of the Nigerian Energy ScenarioIOSR Journals
This document provides an overview of Nigeria's energy scenario, identifying its energy mix and constraints. Nigeria has significant fossil fuel reserves like oil and natural gas, but faces issues of inadequate supply, energy poverty, and gas flaring. The key energy sources are oil (37 billion barrels of reserves), natural gas (187 trillion cubic feet of reserves), and biomass. However, poor energy policy implementation, slow private sector participation, and lack of infrastructure have limited energy access and economic development. The document recommends strategies to improve the energy sector through better policy and utilization of alternative resources like solar and hydropower.
IOSR Journal of Applied Chemistry (IOSR-JAC) is an open access international journal that provides rapid publication (within a month) of articles in all areas of applied chemistry and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in Chemical Science. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
1. The document analyzes the cost of a Handover Manager Based Handover Method (HMBHO) for low earth orbit (LEO) satellite networks and compares it to other handover techniques.
2. HMBHO was proposed previously to reduce handover latency and uses a Handover Manager to store upcoming IP addresses, eliminating the need for handover preparation requests.
3. This paper defines the costs of different mobility management events and calculates the total cost of HMBHO, Mobile IP, and another technique called PatHO-LEO based on control message size and number of hops.
4. Simulation results show that the total cost of HMBHO is lower than the other techniques due to
Prototyping the Future Potentials of Location Based Services in the Realm of ...IOSR Journals
This document discusses prototyping future potentials of location-based services in e-governance. It begins by defining ubiquitous computing, context-aware applications, and location-based services. It then outlines two classes of LBS - pull, where users actively request location-based data, and push, where networks proactively provide information to users. The document also describes the key components of an LBS communication model, including user devices, communication networks, positioning systems, application servers, and data servers. Lastly, it discusses challenges with incorporating location and context into existing governance models.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
An Overview of Harmonic Sources in Power SystemIOSR Journals
This document discusses the various sources of harmonics in power systems. It defines harmonics as multiples of the fundamental power system frequency that distort voltages and currents. The main sources described include transformers, rotating machines, power converters such as large and medium power converters and variable frequency drives, fluorescent lamps, and arcing devices like electric arc furnaces. Power converters are identified as the most widespread source due to their use of electronic switching to rectify and vary AC power frequencies and voltages. The impacts of increasing non-linear loads on power quality are also noted.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help boost serotonin and endorphins, which can positively impact mood.
This document analyzes the mastheads of three magazines - Q Magazine, Rolling Stones, and NME. It finds that Q Magazine establishes an important and trendy style with its round, clear font and single letter title. Rolling Stones has a calm and relaxed feel from its curved, joint font and two-word attached title. NME establishes a serious and independent tone with its sharp, bold font and capitalized three-letter title. All three magazines' color schemes support the ideas of individuality and ownership represented by the image of blood.
Challenging Retrieval Scenarios: Social Media and Linked Open DataThomas Gottron
Invited talk given in April 2012 at USI in Lugano at the IR research group of Fabio Crestani. Review of the work on Interestingness on Twitter and schema based indices on Linked Open Data (SchemEX).
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...IOSR Journals
This document summarizes and compares four medium access control (MAC) protocols for wireless sensor networks: T-MAC, B-MAC, S-MAC, and DSMAC. It discusses the key constraints and characteristics of wireless sensor networks that impact MAC protocol design, including limited energy resources. For each protocol, it describes the protocol's operation, analyzes its power consumption and latency performance, and compares the protocols. It finds that T-MAC is more energy efficient than S-MAC due to its adaptive active period, but S-MAC has lower latency. DSMAC achieves lower power consumption than B-MAC through adaptive duty cycling.
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...IOSR Journals
This document describes a proposed energy efficient and secure trusted network discovery framework for wireless sensor networks called TARF. The framework aims to secure routing against attacks like sinkhole, wormhole, and Sybil attacks by evaluating the trustworthiness of neighboring nodes. It identifies untrustworthy nodes and routes around them. TARF also aims to be energy efficient. It uses elliptic curve cryptography for encryption and maintains a neighborhood table with trust and energy cost values to select low-cost, trusted next hop nodes for routing. The framework generates network certificates, starts sensor nodes, creates a trusted center, and has nodes find neighbors to select routing paths while avoiding attackers. Simulation results show certificate generation, node interfaces, the trusted center, and a node finding
The document discusses methods for calculating the Debye temperature from experimental data for mixed Na x K 1−x Cl crystals grown from aqueous solution. It describes growing 14 crystals with different compositions and doping some with ZnS. The Debye temperature was calculated using four methods: 1) from melting point data, 2) from Debye-Waller factor measurements from X-ray diffraction, 3) from microhardness values, and 4) from the Kopp-Neumann relation. The results from the first three methods were compared to the Kopp-Neumann relation to assess the accuracy of the different calculation techniques.
Survey of different Web Application Attacks & Its Preventive MeasuresIOSR Journals
This document summarizes different types of web application attacks and proposed preventative measures. It discusses denial of service (DOS) attacks, cross-site scripting (XSS) attacks, SQL injection attacks, and request encoding attacks that have occurred from 2012-2014. Statistics on the financial impact of these attacks on various industries are provided. The document then proposes solutions to prevent DOS attacks, XSS attacks, SQL injection attacks, and request encoding attacks. These include implementing input validation, output encoding, access control, and encryption. Overall, the document aims to survey common web application attacks and identify best practices for building secure applications.
The NEW New West: Strategic Approach to Community Building Lisa Spitaleinvestnewwest
The document summarizes the City of New Westminster's strategic approach to community building since the 1990s. It involved taking a three-pronged approach of enforcement against criminal elements, social planning to address root causes of issues like poverty, and civic leadership in economic development. This included initiatives like cracking down on problematic housing and businesses, addressing homelessness, and reducing liquor licenses. It resulted in significant declines in crime. The city has focused on growth around SkyTrain stations, developing amenities like Westminster Pier Park, and partnerships with major institutions. Population and development have increased substantially under this approach.
This document discusses using a virtual machine monitor (VMM) to provide resilient execution of critical applications even when the operating system is corrupted. The VMM monitors application execution and memory to detect corruption and uses error recovery techniques like Luby Transform and Reed-Solomon codes to repair corruption and allow continued application execution. Experimental results show the VMM approach imposes reasonable memory and performance overhead. The VMM protects applications from memory corruption attacks and denial of service attacks by repairing corruption and preventing termination.
A Novel Approach for Tracking with Implicit Video Shot DetectionIOSR Journals
1) The document presents a novel approach that combines video shot detection and object tracking using a particle filter to create an efficient tracking algorithm with implicit shot detection.
2) It uses a robust pixel difference method for shot detection that is resistant to sudden illumination changes. It then applies a particle filter for tracking that uses color histograms and Bhattacharyya distance to track objects across frames.
3) The key innovation is that the tracking algorithm is only initiated after a shot change is detected, reducing computational costs by discarding unneeded frames and triggering tracking only when needed. This provides a more efficient solution for tracking large video datasets with minimal preprocessing.
The document discusses trends in online and mobile commerce. It notes that e-commerce has grown faster than non-e-commerce retail in recent years. Mobile commerce is also growing rapidly, with mobile devices accounting for over half of retail website traffic and nearly a quarter of online sales over Thanksgiving weekend. Retailers are increasingly investing in mobile optimization, omnichannel integration, personalization, and testing. B2B e-commerce is also growing significantly. The document advocates for creating reusable content that can be published across multiple channels to provide a consistent customer experience.
Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...IOSR Journals
This document describes a study that uses fuzzy clustering and software metrics to predict faults in large industrial software systems. The study uses fuzzy c-means clustering to group software components into faulty and fault-free clusters based on various software metrics. The study applies this method to the open-source JEdit software project, calculating metrics for 274 classes and identifying faults using repository data. The results show 88.49% accuracy in predicting faulty classes, demonstrating that fuzzy clustering can be an effective technique for fault prediction in large software systems.
What have your learned from your audience feedbackkkkkkkTemibaybee
The document summarizes feedback received from peers on a horror trailer and accompanying poster and magazine. For the trailer, feedback praised the lighting, transitions, and camera movements but noted that the acting and pacing could be improved. Feedback on the poster liked the dark colors but said the model's expression could be more exaggerated. Feedback on the magazine said the typography did not match the poster or trailer and the white font clashed with the background color. Overall the feedback was mostly positive but identified some inconsistencies to address for future projects.
Effects of SIP in Interoperable LMR/Cellular Heterogeneous Mobile Wireless N...IOSR Journals
This document discusses the effects of using Session Initiation Protocol (SIP) for handoffs between Land Mobile Radio (LMR) networks and cellular networks in a heterogeneous wireless network environment for disaster responder communications. It first provides background on LMR and cellular networks and their differences. It then discusses previous work on vertical handoff algorithms and decision mechanisms. Next, it explains how traditional SIP uses a "break-before-make" approach to reduce handoff delay but does not achieve seamless handoff. Finally, it notes that radio resource utilization must also be considered in the design of a disaster responder communication network due to the challenges of supporting multimedia applications.
Control of Grid- Interfacing Inverters with Integrated Voltage Unbalance Corr...IOSR Journals
This document describes a control scheme for grid-interfacing inverters to correct voltage unbalance at the point of common coupling (POC). It proposes adding a function to intentionally regulate negative sequence currents in order to minimize negative sequence voltage at the POC. The control scheme uses symmetric sequence decomposition with a multi-variable filter to detect positive and negative sequence voltages. It then determines the desired negative sequence current based on the voltage unbalance factor. Experimental results on a laboratory prototype show the inverter is able to reduce the negative sequence voltage at the POC by absorbing a small negative sequence current from the grid.
Text Extraction of Colour Images using Mathematical Morphology & HAAR TransformIOSR Journals
This document summarizes a research paper that proposes a method to extract text from color images using the Haar discrete wavelet transform (DWT) and mathematical morphology. It begins with an introduction to text extraction challenges and prior approaches. The proposed method detects text edges using the Haar DWT and removes non-text edges with thresholding. Morphological dilation is then used to connect isolated candidate text edges. Mathematical morphology and templates are also used to extract characters from images. The simulation was carried out using MATLAB for image processing.
3D Spherical Harmonics Deformation Visualization of Intraoperative OrganIOSR Journals
This document provides a literature review of recent experiments on real-time 3D visualization of intraoperative organ deformations. It describes several techniques used for real-time 3D visualization, including 3D echocardiography, intraoperative MRI, intraoperative MRI at 3 Tesla, laparoscopic radiofrequency ablation of liver tumors, magneto-optic tracking, navigation in endoscopic soft tissue surgery, adaptive 4D imaging, radiofrequency ablation of liver tumors, and intraoperative fast 3D shape recovery. It provides details on the features, advantages, and disadvantages of each technique. The document concludes by introducing a new approach for real-time 3D visualization using spherical harmonics deformation modeling to reconstruct organ shapes from sparse surface samples
"Предпринимательский образ мышления" Часть 7. Бизнес-модели и визуализацияAngel Relations Group
Седьмое занятие факультива "Предпринимательский образ мышления" в НИУ ВШЭ.
Онлайн площадка для обсуждения и выполнения Home Work http://vkontakte.ru/club30450858
В презентации использованы слайды и конструктор бизнес-моделей Александра Остервальдера, слайды Стива Бланка и перевод Алены Чередниченко.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
An Overview of Harmonic Sources in Power SystemIOSR Journals
This document discusses the various sources of harmonics in power systems. It defines harmonics as multiples of the fundamental power system frequency that distort voltages and currents. The main sources described include transformers, rotating machines, power converters such as large and medium power converters and variable frequency drives, fluorescent lamps, and arcing devices like electric arc furnaces. Power converters are identified as the most widespread source due to their use of electronic switching to rectify and vary AC power frequencies and voltages. The impacts of increasing non-linear loads on power quality are also noted.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help boost serotonin and endorphins, which can positively impact mood.
This document analyzes the mastheads of three magazines - Q Magazine, Rolling Stones, and NME. It finds that Q Magazine establishes an important and trendy style with its round, clear font and single letter title. Rolling Stones has a calm and relaxed feel from its curved, joint font and two-word attached title. NME establishes a serious and independent tone with its sharp, bold font and capitalized three-letter title. All three magazines' color schemes support the ideas of individuality and ownership represented by the image of blood.
Challenging Retrieval Scenarios: Social Media and Linked Open DataThomas Gottron
Invited talk given in April 2012 at USI in Lugano at the IR research group of Fabio Crestani. Review of the work on Interestingness on Twitter and schema based indices on Linked Open Data (SchemEX).
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...IOSR Journals
This document summarizes and compares four medium access control (MAC) protocols for wireless sensor networks: T-MAC, B-MAC, S-MAC, and DSMAC. It discusses the key constraints and characteristics of wireless sensor networks that impact MAC protocol design, including limited energy resources. For each protocol, it describes the protocol's operation, analyzes its power consumption and latency performance, and compares the protocols. It finds that T-MAC is more energy efficient than S-MAC due to its adaptive active period, but S-MAC has lower latency. DSMAC achieves lower power consumption than B-MAC through adaptive duty cycling.
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...IOSR Journals
This document describes a proposed energy efficient and secure trusted network discovery framework for wireless sensor networks called TARF. The framework aims to secure routing against attacks like sinkhole, wormhole, and Sybil attacks by evaluating the trustworthiness of neighboring nodes. It identifies untrustworthy nodes and routes around them. TARF also aims to be energy efficient. It uses elliptic curve cryptography for encryption and maintains a neighborhood table with trust and energy cost values to select low-cost, trusted next hop nodes for routing. The framework generates network certificates, starts sensor nodes, creates a trusted center, and has nodes find neighbors to select routing paths while avoiding attackers. Simulation results show certificate generation, node interfaces, the trusted center, and a node finding
The document discusses methods for calculating the Debye temperature from experimental data for mixed Na x K 1−x Cl crystals grown from aqueous solution. It describes growing 14 crystals with different compositions and doping some with ZnS. The Debye temperature was calculated using four methods: 1) from melting point data, 2) from Debye-Waller factor measurements from X-ray diffraction, 3) from microhardness values, and 4) from the Kopp-Neumann relation. The results from the first three methods were compared to the Kopp-Neumann relation to assess the accuracy of the different calculation techniques.
Survey of different Web Application Attacks & Its Preventive MeasuresIOSR Journals
This document summarizes different types of web application attacks and proposed preventative measures. It discusses denial of service (DOS) attacks, cross-site scripting (XSS) attacks, SQL injection attacks, and request encoding attacks that have occurred from 2012-2014. Statistics on the financial impact of these attacks on various industries are provided. The document then proposes solutions to prevent DOS attacks, XSS attacks, SQL injection attacks, and request encoding attacks. These include implementing input validation, output encoding, access control, and encryption. Overall, the document aims to survey common web application attacks and identify best practices for building secure applications.
The NEW New West: Strategic Approach to Community Building Lisa Spitaleinvestnewwest
The document summarizes the City of New Westminster's strategic approach to community building since the 1990s. It involved taking a three-pronged approach of enforcement against criminal elements, social planning to address root causes of issues like poverty, and civic leadership in economic development. This included initiatives like cracking down on problematic housing and businesses, addressing homelessness, and reducing liquor licenses. It resulted in significant declines in crime. The city has focused on growth around SkyTrain stations, developing amenities like Westminster Pier Park, and partnerships with major institutions. Population and development have increased substantially under this approach.
This document discusses using a virtual machine monitor (VMM) to provide resilient execution of critical applications even when the operating system is corrupted. The VMM monitors application execution and memory to detect corruption and uses error recovery techniques like Luby Transform and Reed-Solomon codes to repair corruption and allow continued application execution. Experimental results show the VMM approach imposes reasonable memory and performance overhead. The VMM protects applications from memory corruption attacks and denial of service attacks by repairing corruption and preventing termination.
A Novel Approach for Tracking with Implicit Video Shot DetectionIOSR Journals
1) The document presents a novel approach that combines video shot detection and object tracking using a particle filter to create an efficient tracking algorithm with implicit shot detection.
2) It uses a robust pixel difference method for shot detection that is resistant to sudden illumination changes. It then applies a particle filter for tracking that uses color histograms and Bhattacharyya distance to track objects across frames.
3) The key innovation is that the tracking algorithm is only initiated after a shot change is detected, reducing computational costs by discarding unneeded frames and triggering tracking only when needed. This provides a more efficient solution for tracking large video datasets with minimal preprocessing.
The document discusses trends in online and mobile commerce. It notes that e-commerce has grown faster than non-e-commerce retail in recent years. Mobile commerce is also growing rapidly, with mobile devices accounting for over half of retail website traffic and nearly a quarter of online sales over Thanksgiving weekend. Retailers are increasingly investing in mobile optimization, omnichannel integration, personalization, and testing. B2B e-commerce is also growing significantly. The document advocates for creating reusable content that can be published across multiple channels to provide a consistent customer experience.
Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...IOSR Journals
This document describes a study that uses fuzzy clustering and software metrics to predict faults in large industrial software systems. The study uses fuzzy c-means clustering to group software components into faulty and fault-free clusters based on various software metrics. The study applies this method to the open-source JEdit software project, calculating metrics for 274 classes and identifying faults using repository data. The results show 88.49% accuracy in predicting faulty classes, demonstrating that fuzzy clustering can be an effective technique for fault prediction in large software systems.
What have your learned from your audience feedbackkkkkkkTemibaybee
The document summarizes feedback received from peers on a horror trailer and accompanying poster and magazine. For the trailer, feedback praised the lighting, transitions, and camera movements but noted that the acting and pacing could be improved. Feedback on the poster liked the dark colors but said the model's expression could be more exaggerated. Feedback on the magazine said the typography did not match the poster or trailer and the white font clashed with the background color. Overall the feedback was mostly positive but identified some inconsistencies to address for future projects.
Effects of SIP in Interoperable LMR/Cellular Heterogeneous Mobile Wireless N...IOSR Journals
This document discusses the effects of using Session Initiation Protocol (SIP) for handoffs between Land Mobile Radio (LMR) networks and cellular networks in a heterogeneous wireless network environment for disaster responder communications. It first provides background on LMR and cellular networks and their differences. It then discusses previous work on vertical handoff algorithms and decision mechanisms. Next, it explains how traditional SIP uses a "break-before-make" approach to reduce handoff delay but does not achieve seamless handoff. Finally, it notes that radio resource utilization must also be considered in the design of a disaster responder communication network due to the challenges of supporting multimedia applications.
Control of Grid- Interfacing Inverters with Integrated Voltage Unbalance Corr...IOSR Journals
This document describes a control scheme for grid-interfacing inverters to correct voltage unbalance at the point of common coupling (POC). It proposes adding a function to intentionally regulate negative sequence currents in order to minimize negative sequence voltage at the POC. The control scheme uses symmetric sequence decomposition with a multi-variable filter to detect positive and negative sequence voltages. It then determines the desired negative sequence current based on the voltage unbalance factor. Experimental results on a laboratory prototype show the inverter is able to reduce the negative sequence voltage at the POC by absorbing a small negative sequence current from the grid.
Text Extraction of Colour Images using Mathematical Morphology & HAAR TransformIOSR Journals
This document summarizes a research paper that proposes a method to extract text from color images using the Haar discrete wavelet transform (DWT) and mathematical morphology. It begins with an introduction to text extraction challenges and prior approaches. The proposed method detects text edges using the Haar DWT and removes non-text edges with thresholding. Morphological dilation is then used to connect isolated candidate text edges. Mathematical morphology and templates are also used to extract characters from images. The simulation was carried out using MATLAB for image processing.
3D Spherical Harmonics Deformation Visualization of Intraoperative OrganIOSR Journals
This document provides a literature review of recent experiments on real-time 3D visualization of intraoperative organ deformations. It describes several techniques used for real-time 3D visualization, including 3D echocardiography, intraoperative MRI, intraoperative MRI at 3 Tesla, laparoscopic radiofrequency ablation of liver tumors, magneto-optic tracking, navigation in endoscopic soft tissue surgery, adaptive 4D imaging, radiofrequency ablation of liver tumors, and intraoperative fast 3D shape recovery. It provides details on the features, advantages, and disadvantages of each technique. The document concludes by introducing a new approach for real-time 3D visualization using spherical harmonics deformation modeling to reconstruct organ shapes from sparse surface samples
"Предпринимательский образ мышления" Часть 7. Бизнес-модели и визуализацияAngel Relations Group
Седьмое занятие факультива "Предпринимательский образ мышления" в НИУ ВШЭ.
Онлайн площадка для обсуждения и выполнения Home Work http://vkontakte.ru/club30450858
В презентации использованы слайды и конструктор бизнес-моделей Александра Остервальдера, слайды Стива Бланка и перевод Алены Чередниченко.
Маркетинг в IT: как избавиться от иллюзии "серебряной пули"Kraftblick
Многие IT компании подозревают, что существует одно элегантное решение быстро и дешево получать лиды. Эта иллюзия слишком прекрасна, чтобы перестать верить в нее. А что если серебряной пули нет?
Малый бизнес и стратегия развития, особенности, специфика (для Фермы)Dmitry Zorkin
Для отличных ребят из Фермы http://farmcreative.ru/
Выступление про особенности малого бизнеса в сравнении с большими брендами. Специфика, отличия и что схожего. Главное, что надо знать хорошо можно делать и для больших брендов и для маленького бизнеса. Главное желание.
I design guru. My string of clientele across board trusts my skills and expertise to help them reach their target audiences.
SKILLS & PROFICIENCIES
• Experience in designing logos, corporate identity, advertisements, magazines, catalogs, presentations, newsletters, etc.
• Ability to bring fresh perspective to the brand without losing original intent
• Excellent communication skills and ability to interact with clients and understand their requirements
• Brainstorming and developing new concepts and ideas to boost the brand
I always get the great results and work until the client is 100% satisfied.
Feel free to contact me if you have any questions.
SOLOMOTO_ТОП-10 максимально эффективных способов продвижения малого бизнеса в...SOLOMOTO_RU
Презентация с конференции "День интернет-рекламы 2016".
Доклад будет очень полезен предпринимателям, не имеющим опыта продвижения в соцсетях.
После просмотра презентации вы получите представление о всех основных возможностях и сможете выбрать инструменты для правильного старта.
Если вы уже имеете опыт маркетинга в соцсетях, то сможете сделать продвижение своего бизнеса ещё более эффективным, а также узнать о последних новинках рынка.
10. Футбольный клуб! Но какой???
Отгадайте сферу деятельности этой компании по логотипу
Никакой. Это аббревиатура от «Финансовый клуб»
11. «Финансовый клуб»? WTF?
Отгадайте сферу деятельности этой компании по логотипу
Да, Джекки. Это тот случай, когда клиент получает
просто знак. Он не связан с бизнесом и в нем нет
философии компании. Еще он может подойти под
любую сферу деятельности. Универсальный такой.
12. А как должно быть? Есть альтернатива?
Отгадайте сферу деятельности этой компании по логотипу
Напомним, что к нам приходил этот клиент с
запросом, но потом выбрал других
подрядчиков. Мы сделали этот проект для
себя. Сравни сам и сделай выводы, Джекки.
13.
14.
15.
16. Кажется я начинаю понимать. Вы использовали
стилистику денежных знаков для связи со сферой
деятельности. А в качестве «объектов с купюр»
взяли достопримечательности Новосибирска,
ведь «Финансовый клуб» из этого города.
Отгадайте сферу деятельности этой компании по логотипу
Поразительное наблюдение для актера
боевиков, Джекки!
17. Получается, если бы клиент выбрал вас, то
получил бы айдентику. Смог бы формировать
образ и выстраивать коммуникацию с
потребителями. Но он выбрал просто картинку,
которая не может решать задачи?
Отгадайте сферу деятельности этой компании по логотипу
Второй раз за день, Джекки! Ты удивляешь нас.
18. Погодите. У Nike и Apple тоже просто картинки, но
это не мешает им эффективно вести свой бизнес.
Отгадайте сферу деятельности этой компании по логотипу
Ты прав, Джекки. Но не забывай, что в эти
картинки вложены миллиарды долларов на
протяжении десятилетий. Медийный вес этих
компаний может позволить им делать все, что
угодно. У «Финансового клуба» таких ресурсов нет.
19. То есть вот в чем задача брендинга и айдентики.
Можно создавать свой образ и отстраиваться от
конкурентов даже при минимальных вложениях в
медийку?
Отгадайте сферу деятельности этой компании по логотипу
Джеки, ты уже начинаешь есть чужой хлеб.
Продолжай радовать нас своими фильмами, а мы
будем создавать креативные решения. Ок?