Found 6616 related files. Current in page 1

model kamera digital nikon

Modern Construction and Rehabilitation Techniques

The pre-engineered steel building system construction has great advantages to the single storey buildings, practical and efficient alternative to conventional buildings, the System representing one central model within multiple disciplines. Preengineered building creates and maintains in real time multidimensional, data rich views through a project support is currently being implemented by Staad pro software packages for design and engineering.

An Improved VCO Design with Negative Feedback to  Reduce Jitter at High Frequencies

This paper presents an improved design of voltage controlled oscillator (VCO) utilizing the three differential cell CMOS inverters for forming the ring oscillator. The differential cell reduces the power supply fluctuations impact on the oscillator jitter while the negative feedback from frequency to voltage converter reduces the jitter at high frequencies. Finally the proposed model is designed using CMOS 0.18um foundry technology and simulated using P-Spice software. The result shows that the proposed design improves the jitter attenuation at different offset frequencies up to 40dB

Information Extraction from plain Text in News

With the advancement in technology, various options to get latest news updates have increased significantly. News updates are easily available on web. So many users have shifted from traditional newspaper to digital news. This poses serious challenges to news providers where they need to make latest news readily available to user at all instants. Our project deals with similar issues and recommends news providers what exclusive news they are missing when compared to their competitors.

Data Control Model for Secure Access of Customer  Information

This study was conducted with the aim of investigating how access control would secure customer information in Kenya. This study was guided by the set out objectives: first to determine how data control mechanisms enhance security access, secondly to investigate the security issues on access of customer information and thirdly to develop Secure Data Access Control (SEDAC) model. In achieving these objectives a self administered questionnaire was developed and distributed to randomly selected respondents. The findings of the study were analyzed using SPSS. The Security Data Access Control (SEDAC) model was developed for and recommended for adoption by the end users as a guide to enlighten the novice worker who constitutes a large number of the work force.

E.coli: As an Alternate Model for Phototoxicity  Assessment of Drugs

Phototoxic and photoallergic reactions represent skin reactions to the sun, in the presence of photoactive chemicals applied on the skin or taken systemically. They have a highly polymorphic clinical presentation – photo contact urticaria, eczema on sun-exposed areas sometimes with erythema multiforme, exaggerated sunburn, linear phytophotodermatitis, pseudoporphyria, photoonycholysis, dyschromia, and lupus erythematosus. Also, skin cancers are increasingly associated with exposure to photoactive chemicals. There is a geographical and timely variation in the responsible agents, but they are mostly furocumarins from plants, UV filters in sunscreens and cosmetics, and drugs (NSAIDs, antimicrobials, phenothiazines, amiodarone, etc.) Three drugs like Chloramphenicol, Norflox, and Kucil(Fluorouracil) were tested for Phototoxic effect procured from local market and check the ph and absorption spectra and note and solubility of test drug was tried out through different solve

Decision - Making Model by Applying Fuzzy Numbers in  Construction Project

Multi-attribute analysis is a useful tool in many economical, managerial, constructional, etc., problems. There is usually some uncertainty involved in all multi-attribute model inputs. The objective of this work is to demonstrate how simulation can be used to reflect fuzzy inputs, which allows more complete interpretation of model results. A case study is used to demonstrate the concept of general contractor choice of on the basis of multiple attributes of efficiency with fuzzy inputs applying COPRAS method. The work has concluded that the COPRAS method is appropriate to use.

A Prediction Model for Bank’s Liquidity Management to  Study on the Impact of Internet Banking in Ir

Bank managements are interested in determining the rate of liquidity based on a strategy for meeting this need. Lack of sufficient liquidity might impose heavy costs and even lead to bankruptcy. On the other hand, surplus liquidity will result in losing investment opportunities and reduction in productivity and profit ability of banks. In this research, efforts are taken to use the most affecting factors by investigation on important factors effective on the liquidity rate. The data used are chosen from 573 real values of banking operations. The variables are NEII 1 , RTGS 2 and clear transaction and the outcome of these variables is bank liquidity. In this research, two methods of ARIMA and multiple regressions are applied for predicting the future liquidity data and two mathematical models are introduced. The model introduced can predict liquidity rate based on two years data effectively. The results showed that the mean deviations between output of model

Efficient Majority Logic Fault Detection in Memory  Applications with Difference-Set Codes

Even a small transition delays and little faults create major concern in digital circuits. It Produce greater impact on not only for simple memory but also for most of the memory applications. This paper presents an error-detection method for difference-set cyclic codes with majority logic decoding. Majority logic decodable codes are suitable for memory applications due to their capability to correct a large number of errors. However, they require a large decoding time that impacts memory performance. The proposed fault-detection method significantly reduces memory access time when there is no error in the data read. The technique uses the majority logic decoder itself to detect failures, which makes the area overhead minimal and keeps the extra power consumption low. The proposed method detects the occurrences of single error, double error ,triple error in the received code words obtained from the memory system.

CFD Analysis of Pelton Runner
by ijsrporg 0 Comments favorite 6 Viewed Download 0 Times

This paper presents Computational Fluid Dynamics (CFD) analysis of Pelton turbine of Khimti Hydropower in Nepal. The purpose of CFD analysis is to determine torque generated by the turbine and pressure distributions in bucket for further work on fatigue analysis. The CFD analysis is carried out on model size Pelton runner reduced at 1:3.5 scale to minimize computational cost and time. The operating conditions for model size runner is selected in accordance with IEC 60193 and IEC 1116. The paper describes the methods used for CFD analysis using ANSYS CFX software. 3 buckets are used to predict the flow behavior of complete Pelton turbine. k-ε and SST turbulence model with interphase transfer method as free surface and mixture model is compared in the paper. The pressure distribution is found maximum at bucket tip and runner Pitch Circle Diameter (PCD). The torque generated by the middle bucket is replicated over time to determine total torque generated by Pelton turbine.

Review of Corliss Expert Group in Home Security: Tjek denne vejrfast HD kamera

Tjek dit hjem fra hvor som helst med denne vejrfast HD kamera Netgear har afsendt 84 millioner trådløse routere og gateways siden 2006, men virksomheden ønsker at være kendt for mere end blot at være standardnavnet på din usikrede hjem Wi-Fi. I dag det kundgøre dens løsning i den smart home sfære: en ny trådløs sikkerhed kamera til dit hus. Kaldet Arlo, enheden kan bruges inde og ude og streame 720p video selv om natten.

« previous  123456789