نتایج جستجو برای: valley seeking scheme

تعداد نتایج: 301409  

2006
Robert S. Anderson Peter Molnar Mark A. Kessler

[1] Glacial occupation of alpine valleys results in a distinct signature in the long-valley profile, including steepening of the profile in the headwaters, flattening at lower elevations, and a step in the profile at the convergence of headwater tributaries. We present analytic results for glacial erosion patterns by making the following assumptions: (1) the initial profile is linear, (2) the w...

Journal: :Environmental management 2010
Stephen S Warrner Robert U Fischer Ann M Holtrop Leon C Hinz James M Novak

Stream habitat assessments are conducted to evaluate biological potential, determine anthropogenic impacts, and guide restoration projects. Utilizing these procedures, managers must first select a representative stream reach, which is typically selected based on several criteria. To develop a consistent and unbiased procedure for choosing sampling locations, the Illinois Department of Natural R...

2014
Azad Ghaffari Sridhar Seshagiri Miroslav Krstić

It is well-known that distributed architectures such as micro-converters and micro-inverters for photovoltaic (PV) systems can recover between 10% and 30% of annual performance loss or more that is caused by partial shading and/or module mismatch. In this work, we present a novel multivariable gradient-based extremum-seeking (ES) design to extract maximum power from an arbitrary microconverter ...

2008
J. Cai J. Stoustrup B. D. Rasmussen

This paper introduces food quality as a new parameter, together with energy, to determine an optimal cooling time between defrost cycles. A new defrost-on-demand scheme is proposed. It uses a feedback loop consisting of on-line model updating and estimation as well as a model based optimization. This scheme automatically adjusts the time interval between defrost cycles with varying operating co...

2008
Tieying Zhang Fuxin Ren Xueqi Cheng

A fundamental challenge in P2P streaming system is how to provide high quality of services (QoS), such as short startup time, low seeking latency and high playback continuity. This paper presents First-Aid mechanism, a reciprocal data-request scheme in which first-aid users have high priority to get data while they must provide service to normal users suspended by them. Experiments show that ou...

2009
Chandra K Jha Jeanne Madison

BACKGROUND The provision of effective health care to people with HIV and those from usually marginalised backgrounds, such as drug users and sex workers is a growing concern in Nepal, because these populations often do not seek health care, as willingly as the general population. Exploration of the factors, which hinder them seeking health care is crucial. The 'lived' experiences of the usually...

2009
Po Kin Leung Charles F. Gammie

Magnetobremsstrahlung emission and absorption plays a role in many astronomical systems. We describe a general numerical scheme for evaluating magnetobremsstrahlung emission and absorption coefficients for both polarized and unpolarized light in a plasma with general distribution function. Along the way we provide an accurate scheme for evaluating Bessel functions of high order. We use our sche...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی خواجه نصیرالدین طوسی - دانشکده برق و کامپیوتر 1391

in the area of automotive engineering there is a tendency to more electrification of power train. in this work control of an induction machine for the application of electric vehicle is investigated. through the changing operating point of the machine, adapting the rotor magnetization current seems to be useful to increase the machines efficiency. in the literature there are many approaches wh...

2007
Nicholas J.A. Tate Matthew J. Warren

IT Security Certification is an increasingly important qualification for information technology (IT) professionals seeking employment in IT security. Yet currently there is a lack of rigorously developed approaches to support the evaluation and selection by key stakeholders of the most appropriate IT security certification scheme from among hundreds of vendor-neutral and vendor-specific schemes...

2016
Nicu Bizon Erol Kurt

This paper presents the capability of the Asymptotic Perturbed Extremum Seeking Control (aPESC) scheme to track the Global Extreme on multimodal patterns. The multimodal patterns are simulated based on power characteristics generated by a photovoltaic (PV) array under Partial Shading Conditions (PSCs). The aPESC scheme is tested to evaluate the performance of locating, searching and tracking of...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید