The goal of this study was to quantify the relation between the surface area of the current-limiting electrode of a microbial fuel cell (MFC) and the power density generated by the MFC. Shewanella oneidensis (MR-1) wa...
详细信息
The goal of this study was to quantify the relation between the surface area of the current-limiting electrode of a microbial fuel cell (MFC) and the power density generated by the MFC. Shewanella oneidensis (MR-1) was grown anaerobically in the anodic compartment of an MFC utilizing lactate as the electron donor. Graphite plate electrodes of various sizes were used as anodes. Commercially available air electrodes, composed of manganese-based catalyzed carbon bonded to a current-collecting screen made of platinum mesh, were used as cathodes, and dissolved oxygen was used as the cathodic reactant The surface area of the cathode was always significantly larger than that of the anode, to ensure that the anode was the current-limiting electrode. The power density generated by the MFC decreased as the surface area of the anode increased, which fits well with the trend we detected comparing various published results. Thus, our findings bring into question the assertion that the overall power density generated by an MFC with large electrodes can be estimated by extrapolating from an electrode with a small surface area. Our results indicate that the maximum power density generated by an MFC is not directly proportional to the surface area of the anode, but is instead proportional to the logarithm of the surface area of the anode.
We apply LU decomposition of matrices to present an anonymous bilateral authentication scheme. This paper aims at improving security and providing more excellent performances for remote user authentication scheme. The...
详细信息
We apply LU decomposition of matrices to present an anonymous bilateral authentication scheme. This paper aims at improving security and providing more excellent performances for remote user authentication scheme. The proposed scheme can provide bilateral authentication and session key agreement, can quickly check the validity of the input password, and can really protect the user anonymity. The security of the proposed scheme is based on the discrete logarithm problem (DLP), Diffie- Hellman problem (DHP), and the one- way hash function. It can resist various attacks such as insider attack, impersonation attack, server spoofing attack, and stolen smart card attack. Moreover, the presented scheme is computationally efficient for real-life implementation.
An accident with 'rupture of steam line' as the initial event was studied for a reactor facility with VVER-1000. A computational analysis was performed of different flow scenarios of an accident with singular ...
详细信息
An accident with 'rupture of steam line' as the initial event was studied for a reactor facility with VVER-1000. A computational analysis was performed of different flow scenarios of an accident with singular and multiple failures of the safety systems. The realization probability and the consequences were evaluated for each accident sequence. The consequences of the accidents are ranked and the most instructive combinations of failures of systems and blockings are determined from the standpoint of risk. The presented method is based on multivariate calculations and an integrated combination of deterministic and probabilistic approaches to safety validation.
We propose a method for speech signal preprocessing based on band filtering of the logarithmic amplitude spectrum with a filter with odd impulse characteristic. With such filtering, we can detect local nonuniformities...
详细信息
We propose a method for speech signal preprocessing based on band filtering of the logarithmic amplitude spectrum with a filter with odd impulse characteristic. With such filtering, we can detect local nonuniformities in the spectrum of a speech signal caused by abrupt inclinations of the vocal tract frequency characteristic, which represent useful features for speech recognition. We show examples of using the proposed approach on natural speech signals.
We give sufficient robust stability conditions for matrix polytopes of linear systems with impulsive influence. The methods of our study are based on logarithmic matrix measure theory and linear operator theory in Ban...
详细信息
We give sufficient robust stability conditions for matrix polytopes of linear systems with impulsive influence. The methods of our study are based on logarithmic matrix measure theory and linear operator theory in Banach spaces. Our results reduce the robust stability problem to the feasibility problem for a system of linear matrix inequalities in the class of positive definite matrices.
A new prediction model for estimating luminance degradation of an OLED subjected to varied combinations of forward and reverse biases is proposed. To this end, the known increase in the voltage of OLEDs under long-tim...
详细信息
A new prediction model for estimating luminance degradation of an OLED subjected to varied combinations of forward and reverse biases is proposed. To this end, the known increase in the voltage of OLEDs under long-time operation versus degraded emitted luminance is first-time ever considered to identify the degradation exponent as logarithm functions of elapsed time. With the identified degradation versus time, the degraded OLED luminance can be well predicted even subjected to varied combinations of forward and reverse biases. The established model is particularly useful for achieving required lifetime of modern AMOLED displays. Based on the model in terms of equations, the OLED parameters including forward, reverse bias stresses, and initial luminance can be applied to the model to accurately estimate the luminance variation during long-time operation. The estimation error between model predictions and experimental measurements is less than 1.6 %.
This paper studies the boundedness and compactness of the following integral-type operator, recently introduced by this author, p(phi)(g)f(z) = integral(1)(0)f(phi(tz))g(tz)dt/t, z is an element of B, where phi is a h...
详细信息
This paper studies the boundedness and compactness of the following integral-type operator, recently introduced by this author, p(phi)(g)f(z) = integral(1)(0)f(phi(tz))g(tz)dt/t, z is an element of B, where phi is a holomorphic self-map of the unit ball B in C-n and g is a holomorphic function on B such that g(0) = 0, from logarithmic Bloch-type and mixed-norm spaces to Bloch-type spaces. (C) 2009 Elsevier Ltd. All rights reserved.
High-temperature tensile deformation of 6082-T4 Al alloy was conducted in the range of 623-773 K at various strain rates in the range of 5 x 10(-5) to 2 x 10(-2) s(-1). Stress dependence of the strain rate revealed a ...
详细信息
High-temperature tensile deformation of 6082-T4 Al alloy was conducted in the range of 623-773 K at various strain rates in the range of 5 x 10(-5) to 2 x 10(-2) s(-1). Stress dependence of the strain rate revealed a stress exponent, n of 7 throughout the ranges of temperatures and strain rates tested. This stress exponent is higher than what is usually observed in Al-Mg alloys under similar experimental conditions, which implies the presence of threshold stress. This behavior results from dislocation interaction with second phase particles (Mg2Si). The experimental threshold stress values were calculated, based on the finding that creep rate is viscous glide controlled, based on creep tests conducted on binary Al-1Mg at 673 K, that gave n a value of 3. The threshold stress (sigma(o)) values were seen to decrease exponentially with temperature. The apparent activation energy for 6082-T4 was calculated to be about 245 kJ mol(-1), which is higher than the activation energy for self-diffusion in Al (Q(d) = 143 kJ mol(-1)) and for the diffusion of Mg in Al (115-130 kJ mol(-1)). By incorporating the threshold stress in the analysis, the true activation energy was calculated to be about 107 kJ mol(-1). Analysis of strain rate dependence in terms of the effective stress (sigma - sigma(o)) using normalized parameters, revealed a single type of deformation behavior. A plot of normalized strain rate ((epsilon)over dotkT/DGb) versus normalized effective stress (sigma - sigma(o))/G, on a double logarithmic scale, gave an n value of 3.
The Hamiltonian describing possible interactions of the Reggeized gluons in the leading logarithmic approximation (LLA) of the multicolor QCD has the properties of conformal invariance, holomorphic separability and du...
详细信息
The Hamiltonian describing possible interactions of the Reggeized gluons in the leading logarithmic approximation (LLA) of the multicolor QCD has the properties of conformal invariance, holomorphic separability and duality. It coincides with the Hamiltonian of the integrable Heisenberg model with the spins being the Mobius group generators. With the use of the Baxter-Sklyanin representation we calculate intercepts of the colorless states constructed from three and four Reggeized gluons and anomalous dimensions of the corresponding high twist operators. The integrability properties of the BFKL equation at a finite temperature are reviewed. Maximal transcendentality is used to construct anomalous dimensions of twist-2 operators up to 4 loops. It is shown that the asymptotic Bethe Ansatz in the 4-loop approximation is not in an agreement with predictions of the BFKL equation in N = 4 SUSY.
In this paper, we formulate an automatic approach to the detection of partial, local, and global symmetries and orbits in arbitrary 3D datasets. We improve upon existing voting-based symmetry detection techniques by l...
详细信息
In this paper, we formulate an automatic approach to the detection of partial, local, and global symmetries and orbits in arbitrary 3D datasets. We improve upon existing voting-based symmetry detection techniques by leveraging the Lie group structure of geometric transformations. In particular, we introduce a logarithmic mapping that ensures that orbits are mapped to linear subspaces, hence unifying and extending many existing mappings in a single Lie-algebra voting formulation. Compared to previous work, our resulting method offers significantly improved robustness as it guarantees that our symmetry detection of an input model is frame, scale, and reflection invariant. As a consequence, we demonstrate that our approach efficiently and reliably discovers symmetries and orbits of geometric datasets without requiring heavy parameter tuning.
暂无评论