Results and Discussions Sample Clauses

Results and Discussions. To investigate the accuracy of the presented formulations, an example is chosen from Ref. [4], where the coupled thermoelasticity of a disk is analyzed using the finite element method. In this example, a stationary disk made of aluminum, with the Lamè constants λ = 40.4 GPa, μ = 27 GPa and α = 23 × 10−6 K−1, ρ = 2707 kg/m3, κ = 204 W/m·K and c = 903 J/kg·K is considered. The nondimensional inner and outer radii of the disk is given as a = 1 and b = 2, respectively. The inside boundary of the disk is assumed to be radially fixed, but exposed to a step function heat flux. The outside boundary is traction free with zero temperature change. The initial conditions for the displacement, velocity, temperature, and the rate of temperature are assumed to be zero. In the case of zero angular velocity, assuming that C = 0.02 and tˆ0 = 0.64, the time
AutoNDA by SimpleDocs
Results and Discussions. In the present work we consider the effect of different impurities on the morphology of cementite nanowires. We have performed our modeling for both pure and doped nanowires oriented along different crystallographic axes. Mn and Si were chosen as the most common impurities (of course, apart from carbon) in ordinary steels, V is also used in the high-strength low-alloy steels [29] and P, S and V were experimentally found in DS [27, 28, 34]. The calculations were performed first for the ferromagnetic ground state of cementite. However, the morphology of cementite in steels at high enough temperature (in particular, above the Xxxxx temperature) is also of great interest. To study the effects of changes in magnetic state induced by the temperature, we have also performed calculations for disordered magnetic configurations [42, 43]. More specifically, calculations for three different randomly chosen spin configurations with the total magnetic moments equal to zero, which models the high-temperature paramagnetic state, have been performed for the bulk cementite and the nanowires. During the optimization of atomic structure we keep the chosen magnetic configuration. In all studied disordered configurations we have found a decrease of formation energies of cementite nanowires. For the smallest (1.24 nm) width of the nanowire oriented along the c axis it changes from 5.10 to 4.95 eV/Fe3C for the pure case, from 4.95 to 4.70 eV/Fe3C for P-doped J. Phys.: Condens. Matter 24 (2012) 395001 X X Xxxxxxxxxx et al and from 5.21 to 5.13 eV/Fe3C for Mn-doped cases, in comparison with the ferromagnetic states. Thus, the degree of magnetic order of cementite plays an insignificant role in the energetics of the formation of pure and doped cementite nanowires. In contrast to elemental iron, the crystal structure of cementite is strictly anisotropic and can be described as a layered system with alternation of two iron and one carbon layers perpendicular to the crystallographic b axis (see figure 1). The axes in the cementite are chosen according to the standard denomination of the axes in the cementite lattice used in the previous works [28]. This special crystal structure determines the anisotropy of lattice distortions in the presence of impurities. Our calculations demonstrate that all impurities (Mn, V, Si, P, S) studied in this work produce an expansion of cementite along the a and c axes and an insignificant compression along the b axis. Substitution of a iron atom by silic...
Results and Discussions. A. How is the Mutual Legal Assistance agreement applied in eradicating transnational crimes? Transnational crime is a crime that is defined as an act that is prohibited by international law regulated in international conventions or customs and has a special characteristic, namely the application of universal principles to perpetrators of transnational crimes. The universal principle can be said to be a principle that contains Indonesian criminal law regulations that apply to the existence of a crime whether committed within the country or abroad and also the perpetrators are Indonesian citizens or foreign citizens. The existence of this universal principle is also to protect international interests and the implementation of world law or world order (Xxxxxxxxx, 2013). With the enactment of this universal principle, every country has the right and authority to arrest, detain and prosecute the perpetrators of transnational crimes. Transnational crime has several elements, namely:
Results and Discussions. The above system is implemented using Java Platform. The program contains a GUI as shown in the figure below. IT contains a key sharing program which demonstrates the key sharing protocol mentioned above.
Results and Discussions. A borrow-to-use agreement is an agreement in which one of the parties (the creditor) benefits from the performance. The owner of the object or the one lending it does not gain any profits from the borrower during a borrow-to-use agreement. The willingness to help or to lend other party is possibly derived from an agreement, volunteering, solidarity, or a social sense of the object owner. Such things are every day occurences in Indonesian societies. The provisions regarding the a borrow-to-use agreement can be found in the Civil Code. The Provisions Regarding the Borrow-to-use Agreements Governed in the Civil Code and their Relevance in the Lives of the Society The provisions regarding the borrow-to-use agreements can be found in the paragraph 1753 of the Civil Code. A borrow-to-use agreement is an agreement in which the lender hands in the object to be “used” until the agreed time is due. By then, the borrower must return the object to the lender. From the characteristic point of view, a borrow-to-use agreement in real, in which the lender hands in the object an object to the borrower and it is received by the borrower. Only then is the contract effective.
Results and Discussions. Here the result shows the service which ordered from the cloud service provider via Service Level Agreements for the client. The result shows that the availability of datacenter on the client- side machine. It contains different information just like how much service outage, how much is violated, satisfactory and updates the service. The promised availability of the service value of 99.99% divided into the following results. According to the results, the client-side measuring, and monitoring can provide this report to the cloud service provider according to their agreement among them. The promised result 99.999% on the SLA the following results displays on the client-side machine of one week’s measuring datacenter. The service outage 0.192%, violation 2.154%, satisfactory 93.531% and configuration update 4.122%. Using the result which runs on the client-side machine the customer has the right to terminate the service or to compensate the service form the provider again. Besides that, the consumer can pay as use. Fig 5.2: The value of Service Level Agreements of datacenter runs on client-side machine. According to the results obtained on the client-side machine the user may ask or provide the above report to the service provider either compensate the service or to terminate the service. So, the above result gives control and negotiation power to the client. The Service Provider promised 99.99% of availability and the system reported around 93.531% satisfactory, violated result 2.154%, service outage 0.192% and configuration update 4.122%. According to the above report, the customer negotiates with the provider to compensate the service or to terminate the agreement between them. After obtained result of the datacenter we can order other service from the Amazon web service providers. The following result shows the ordered application from the service providers.
Results and Discussions. 5.2.1. Exciton band broadening in absorption spectra. PbS QDs were prepared following a literature procedure.5 The visible-NIR absorption spectrum of the QDs in heptane (Figure 5.1A) shows the first (1S) exciton absorption band at 936 nm. The corresponding QD diameter and energy of the 1S electron level were estimated to be 3.6 nm and -3.7 eV (vs vacuum), respectively.7, 31 The CB edge of the TiO2 nanocrystalline thin films is pH dependent32 and was estimated to be -4.2 ± 0.15 eV for films that were exposed to air. 8, 33 Therefore, photo-induced electron injection from PbS QDs to TiO2 is energetically allowed. Nanocrystalline TiO2 films on sapphire windows were prepared according to a reported method.34 Sapphire windows were used in this study for their transparency in the mid-IR region (3-5 µm). The PbS QDs were attached on TiO2 thin films by bi-functional linkers, 3- mercaptopropionic acid (MPA), following literature procedures.20 Briefly, the TiO2 film was immersed in a 5% (volume) methanol solution of MPA for 6 hours, followed by thorough rinsing with methanol to remove any weakly adsorbed MPAs. This process leads to the chemisorbed MPA molecules bound on the TiO2 film through the carboxylic acid moiety and with the thiolate groups oriented outward for coupling with the PbS QDs. The functionalized TiO2 films were then immersed into PbS heptane solutions for ~ 0.5 – 1.0 hours to attach the QDs. Finally, the QD- sensitized films were thoroughly rinsed with excess heptane to remove any weakly adsorbed PbS QDs. As seen in Figure 5.1 B, the PbS sensitized TiO2 absorption spectrum shows a significant increase of absorption in the spectral range of 450-1100 nm, indicating the presence of PbS QDs. However, the PbS 1S exciton band, which is clearly present for QDs in heptane solution, can no longer be observed. There are three possible reasons for the observed spectral broadening of exciton bands: increased inhomogeneous distribution of QD sizes, strong QD-QD coupling and strong QD-TiO2 interaction. The occurrence of both oxidation (decreasing the dots size) and Xxxxxx ripening (increasing the dots size) can broaden the heterogeneous distribution of QDs size, causing the broadening of the exciton bands.35-38 However, previous study has shown that smaller PbS QDs (with band gap of ~ 1.3 eV and similar to the ones used in the current experiment) are stable for over six days under ambient conditions, as evidenced by the lack of change in their absorption spectra.3...
AutoNDA by SimpleDocs
Results and Discussions. 3.2.1 Time in a day of disturbance and type of annoying noise Answers to the questions (ref. Appendix A/ Question C5) asking about the time of a day when the residents are disturbed by the aircraft noise from the bases are analysed. In Figure 3.2 are presented the time of a day the residents around Kadena Air Base (Figure 3.2(a)) and Futenma Air Station (Figure 3.2(b)) are disturbed much by the aircraft noise from the bases for the different levels of noise exposure. The most disturbing time is basically daytime as can be seen in the figure, but even in the midnight and very early in the morning over 40% of the subjects living in the areas of WECPNL of 90 and over 95 in the Kadena Air Base’s surroundings complain disturbed. In Figure 3.3 are plotted the percentage of the response on the type of the noises from the bases the respondents are particularly annoyed by (ref. Appendix A/ Question C6). The difference between the two airfields is shown in the rate of helicopter noise which about 60% of the population around Futenma Air Station report annoying, while those around Kadena Air Base report much less except in the area of WECPNL of 75. Around Kadena Air Base the noise is basically due to jet aircraft. As will be described below the difference of the type of aircraft used could be a factor of the difference in the response rates between the two airfields. WECPNL : 95– : 90–95 : 85–90 : 80–85 : 75–80 Early in the morning Morning Daytime Late afternoon Evening Nighttime Not disturbed 20 40 60 80 100 Percentage (a) Around Kadena Air Base. WECPNL : 80–85 : 75–80 : –75 Early in the morning Morning Daytime Late afternoon Evening Nighttime Not disturbed 20 40 60 80 100 Percentage
Results and Discussions. Results of the experiment are organized in the following three sections: (1) verification of adjustment methods, (2) color agreement testing by paired comparison, and (3) further color agreement testing using different colorants. Subsequent discussions are also included to reflect key findings in the research. Verification of Adjustment Methods Let’s begin with the before-and-after comparison of to gradation adjustment method. Figure 5 shows the adjusted NexPress print (dotted line) and the initial print (solid line). The left-hand side of Figure 5 is the overall gradation, expressed as % digital dot area vs. density; and the right-hand side of Figure 5 shows the density differences relative to the offset reference (x-axis). There are two observations: (1) the gradation difference is quite small to begin with (something that we did not envision beforehand), and (2) the experimental error is very small, i.e., we implemented the gradation adjustment well.
Results and Discussions. The results of this proposed model basically carries based on two measurements such as amount signaling message traffic and cost computation. The expected scheme may reduce the signaling cost in terms sending the messages through MTTD device. Fig 3 depicts the comparison between other proposed methods. This was the sample performance evaluation considered based on various networks such as edge network, access network and main network. The evaluated performance metrics can be based on the signaling message exchanges. We have considered this networking scenario based on n number of MTTD devices cells. We assumed that all other schemes require n number of times of total signaling message exchanging per unit time. Moreover, we have different number of groups for generating and distributing keys for cryptographic function and verification of the user as well. In order to increase the performance of various groups in terms of various networks namely edge, aces and main network signaling. Figure 3: Message traffic in MTTD In this paper the table 2 depicts the performances of various methods comparing with our proposed method to evaluate the total number of messages exchanged. Table 2: No of Messages exchanging Sch eme Edge N/W Access N/W Main N/W Total Lao Xx Xxx our According the details included in fig 3 the performance of the proposed model is expensive when compared with some other models. However, this perform better when compared with traditional models but not with light weight models because light weight protocols uses hash functions for reducing the over heads and increasing the performances. Therefore the future work will carry based on the comparison
Time is Money Join Law Insider Premium to draft better contracts faster.