232 resultados para Pseudo-Kahler metric
Resumo:
Space shift keying (SSK) is a special case of spatial modulation (SM), which is a relatively new modulation technique that is getting recognized to be attractive in multi-antenna communications. Our new contribution in this paper is an analytical derivation of exact closed-form expression for the end-to-end bit error rate (BER) performance of SSK in decode-and-forward (1)1,) cooperative relaying. An incremental relaying (IR) scheme with selection combining (SC) at the destination is considered. In SSK, since the information is carried by the transmit antenna index, traditional selection combining methods based on instantaneous SNRs can not be directly used. To overcome this problem, we propose to do selection between direct and relayed paths based on the Euclidean distance between columns of the channel matrix. With this selection metric, an exact analytical expression for the end-to-end BER is derived in closed-form. Analytical results are shown to match with simulation results.
Resumo:
Energy harvesting sensor (EHS) nodes provide an attractive and green solution to the problem of limited lifetime of wireless sensor networks (WSNs). Unlike a conventional node that uses a non-rechargeable battery and dies once it runs out of energy, an EHS node can harvest energy from the environment and replenish its rechargeable battery. We consider hybrid WSNs that comprise of both EHS and conventional nodes; these arise when legacy WSNs are upgraded or due to EHS deployment cost issues. We compare conventional and hybrid WSNs on the basis of a new and insightful performance metric called k-outage duration, which captures the inability of the nodes to transmit data either due to lack of sufficient battery energy or wireless fading. The metric overcomes the problem of defining lifetime in networks with EHS nodes, which never die but are occasionally unable to transmit due to lack of sufficient battery energy. It also accounts for the effect of wireless channel fading on the ability of the WSN to transmit data. We develop two novel, tight, and computationally simple bounds for evaluating the k-outage duration. Our results show that increasing the number of EHS nodes has a markedly different effect on the k-outage duration than increasing the number of conventional nodes.
Resumo:
A necessary step for the recognition of scanned documents is binarization, which is essentially the segmentation of the document. In order to binarize a scanned document, we can find several algorithms in the literature. What is the best binarization result for a given document image? To answer this question, a user needs to check different binarization algorithms for suitability, since different algorithms may work better for different type of documents. Manually choosing the best from a set of binarized documents is time consuming. To automate the selection of the best segmented document, either we need to use ground-truth of the document or propose an evaluation metric. If ground-truth is available, then precision and recall can be used to choose the best binarized document. What is the case, when ground-truth is not available? Can we come up with a metric which evaluates these binarized documents? Hence, we propose a metric to evaluate binarized document images using eigen value decomposition. We have evaluated this measure on DIBCO and H-DIBCO datasets. The proposed method chooses the best binarized document that is close to the ground-truth of the document.
Resumo:
A composite electrode made up of exfoliated graphite (EG) and diamond was prepared for the electrochemical oxidation of trichloroethylene (TCE). The SEM images of the EG-diamond material showed that diamond powders were dispersed on the surface of EG materials. The N-2 adsorption-desorption isotherm of EG-diamond material resulted in a poor adsorption capability due to the insertion of diamond powders into the porous matrix of EG. Raman spectroscopy revealed the presence of characteristic sp(3) bands of diamond confirming good interaction of diamond with EG. Electrochemical characterisation of EG-diamond in 0.1 M Na2SO4 resulted in an enhanced working potential window. The EG-diamond electrode was employed for the electrochemical oxidation of trichloroethylene (0.2 mM) in a Na2SO4 supporting electrolyte. The EG-diamond, in comparison to the pristine EG electrode, exhibited a higher removal efficiency of 94% (EG was 57%) and faster degradation kinetics of 25.3 x 10(-3) min(-1) showing pseudo first order kinetic behaviour. Under the optimised conditions, 73% total organic content (TOC) removal was achieved after 4 h of electrolysis. The degradation of TCE was also monitored with gas chromatography-mass spectrometry. Dichloroacetic acid (DCAA) was identified as a major intermediate product during the electrochemical oxidation of TCE. The electrochemical degradation of TCE at the EG-diamond electrode represents a cost effective method due to the ease of preparation of EG-diamond composite material without the necessity of diamond activation which is normally achieved through doping.
Resumo:
For the purpose of water purification, novel and low-cost adsorbents which are promising replacements for activated carbon are being actively pursued. However, a single-phase material that adsorbs both cationic and anionic species remains elusive. Hence, a low-cost, multiphase adsorbent bed that purifies water containing both anionic and cationic pollutants is a desirable alternative. We choose anionic (Congo red, Orange G) and cationic (methylene blue, malachite green) dyes as model pollutants. These dyes are chosen since they are widely found in effluents from textile, leather, fishery, and pharmaceutical industries, and their carcinogenic, mutagenic, genotoxic, and cytotoxic impact on mammalian cells is well-established. We show that ZnO, (Zn0.24Cu0.76)O and cobalt ferrite based multiphase fixed adsorbent bed efficiently adsorbs model anionic (Congo red, Orange G) and cationic (methylene blue and malachite green) pollutants, and their complex mixtures. All adsorbent phases are synthesized using room-temperature, high-yield (similar to 96-100%), green chemical processes. The nanoadsorbents are characterized by using X-ray powder diffraction (XRD), scanning electron microscopy (SEM), Brunauer-Emmett-Teller (BET) surface area analysis, and zeta potential measurements. The constituent nanophases are deliberately chosen to be beyond 50 nm, in order to avoid the nanotoxic size regime of oxides. Adsorption characteristics of each of the phases are examined. Isotherm based analysis shows that adsorption is both spontaneous and highly favorable. zeta potential measurements indicate that electrostatic interactions are the primary driving force for the observed adsorption behavior. The isotherms obtained are best described using a composite Langmuir-Freundlich model. Pseudo-first-order, rapid kinetics is observed (with adsorption rate constants as high as 0.1-0.2 min(-1) in some cases). Film diffusion is shown to be the primary mechanism of adsorption.
Resumo:
The curvature (T)(w) of a contraction T in the Cowen-Douglas class B-1() is bounded above by the curvature (S*)(w) of the backward shift operator. However, in general, an operator satisfying the curvature inequality need not be contractive. In this paper, we characterize a slightly smaller class of contractions using a stronger form of the curvature inequality. Along the way, we find conditions on the metric of the holomorphic Hermitian vector bundle E-T corresponding to the operator T in the Cowen-Douglas class B-1() which ensures negative definiteness of the curvature function. We obtain a generalization for commuting tuples of operators in the class B-1() for a bounded domain in C-m.
Resumo:
A356 and 6061 aluminum alloys were joined by friction stir welding at constant tool rotational rate with different tool-traversing speeds. Thermomechanical data of welding showed that increment in tool speed reduced the pseudo heat index and temperature at weld nugget (WN). On the other hand, volume of material within extrusion zone, strain rate, and Zenner Hollomon parameter were reduced with decrease in tool speed. Optical microstructure of WN exhibited nearly uniform dispersion of Si-rich particles, fine grain size of 6061 Al alloy, and disappearance of second phase within 6061 Al alloy. With enhancement in welding speed, matrix grain size became finer, yet size of Si-rich particles did not reduce incessantly. Size of Si-rich particles was governed by interaction time between tool and substrate. Mechanical property of WN was evaluated. It has been found that the maximum joint efficiency of 116% with respect to that of 6061 alloy was obtained at an intermediate tool-traversing speed, where matrix grain size was significantly fine and those of Si-rich particles were substantially small.
Resumo:
Background: During female reproductive cycles, a rapid fall in circulating progesterone (P4) levels is one of the earliest events that occur during induced luteolysis in mammals. In rodents, it is well recognized that during luteolysis, P4 is catabolized to its inactive metabolite, 20alpha-hydroxyprogesterone (20alpha-OHP) by the action of 20alpha-hydroxysteroid dehydrogenase (20alpha-HSD) enzyme and involves transcription factor, Nur77. Studies have been carried out to examine expression of 20alpha-HSD and its activity in the corpus luteum (CL) of buffalo cow. Methods: The expression of 20alpha-HSD across different bovine tissues along with CL was examined by qPCR analysis. Circulating P4 levels were monitored before and during PGF2alpha treatment. Expression of 20alpha-HSD and Nur77 mRNA was determined in CL at different time points post PGF2alpha treatment in buffalo cows. The chromatographic separation of P4 and its metabolite, 20alpha-OHP, in rat and buffalo cow serum samples were performed on reverse phase HPLC system. To further support the findings, 20alpha-HSD enzyme activity was quantitated in cytosolic fraction of CL of both rat and buffalo cow. Results: Circulating P4 concentration declined rapidly in response to PGF2alpha treatment. HPLC analysis of serum samples did not reveal changes in circulating 20alpha-OHP levels in buffalo cows but serum from pseudo pregnant rats receiving PGF2alpha treatment showed an increased 20alpha-OHP level at 24 h post treatment with accompanying decrease in P4 concentration. qPCR expression of 20alpha-HSD in CL from control and PGF2alpha-treated buffalo cows showed higher expression at 3 and 18 h post treatment, but its specific activity was not altered at different time points post PGF2alpha treatment. The Nur77 expression increased several fold 3 h post PGF2alpha treatment similar to the increased expression observed in the PGF2alpha-treated pseudo pregnant rats which perhaps suggest initiation of activation of apoptotic pathways in response to PGF2alpha treatment. Conclusions: The results taken together suggest that synthesis of P4 appears to be primarily affected by PGF2alpha treatment in buffalo cows in contrast to increased metabolism of P4 in rodents.
Resumo:
In this paper, we propose a novel authentication protocol for MANETs requiring stronger security. The protocol works on a two-tier network architecture with client nodes and authentication server nodes, and supports dynamic membership. We use an external membership granting server (MGS) to provide stronger security with dynamic membership. However, the external MGS in our protocol is semi-online instead of being online, i.e., the MGS cannot initiate a connection with a network node but any network node can communicate with the MGS whenever required. To ensure efficiency, the protocol uses symmetric key cryptography to implement the authentication service. However, to achieve storage scalability, the protocol uses a pseudo random function (PRF) to bind the secret key of a client to its identity using the secret key of its server. In addition, the protocol possesses an efficient server revocation mechanism along with an efficient server re-assignment mechanism, which makes the protocol robust against server node compromise.
Resumo:
The distributed, low-feedback, timer scheme is used in several wireless systems to select the best node from the available nodes. In it, each node sets a timer as a function of a local preference number called a metric, and transmits a packet when its timer expires. The scheme ensures that the timer of the best node, which has the highest metric, expires first. However, it fails to select the best node if another node transmits a packet within Delta s of the transmission by the best node. We derive the optimal metric-to-timer mappings for the practical scenario where the number of nodes is unknown. We consider two cases in which the probability distribution of the number of nodes is either known a priori or is unknown. In the first case, the optimal mapping maximizes the success probability averaged over the probability distribution. In the second case, a robust mapping maximizes the worst case average success probability over all possible probability distributions on the number of nodes. Results reveal that the proposed mappings deliver significant gains compared to the mappings considered in the literature.
Resumo:
This paper presents a second order sliding mode observer (SOSMO) design for discrete time uncertain linear multi-output system. The design procedure is effective for both matched and unmatched bounded uncertainties and/or disturbances. A second order sliding function and corresponding sliding manifold for discrete time system are defined similar to the lines of continuous time counterpart. A boundary layer concept is employed to avoid switching across the defined sliding manifold and the sliding trajectory is confined to a boundary layer once it converges to it. The condition for existence of convergent quasi-sliding mode (QSM) is derived. The observer estimation errors satisfying given stability conditions converge to an ultimate finite bound (within the specified boundary layer) with thickness O(T-2) where T is the sampling period. A relation between sliding mode gain and boundary layer is established for the existence of second order discrete sliding motion. The design strategy is very simple to apply and is demonstrated for three examples with different class of disturbances (matched and unmatched) to show the effectiveness of the design. Simulation results to show the robustness with respect to the measurement noise are given for SOSMO and the performance is compared with pseudo-linear Kalman filter (PLKF). (C) 2013 Published by Elsevier Ltd. on behalf of The Franklin Institute
Resumo:
This work analyses the unique spatio-temporal alteration of the deposition pattern of evaporating nanoparticle laden droplets resting on a hydrophobic surface through targeted low frequency substrate vibrations. External excitation near the lowest resonant mode (n = 2) of the droplet initially de-pins and then subsequently re-pins the droplet edge creating pseudo-hydrophilicity (low contact angle). Vibration subsequently induces droplet shape oscillations (cyclic elongation and flattening) resulting in strong flow recirculation. This strong radially outward liquid flow augments nanoparticle transport, vaporization, and agglomeration near the pinned edge resulting in much reduced drying time under certain characteristic frequency of oscillations. The resultant deposit exhibits a much flatter structure with sharp, defined peripheral wedge topology as compared to natural drying. Such controlled manipulation of transport enables tailoring of structural and topological morphology of the deposits and offers possible routes towards controlling the formation and drying timescales which are crucial for applications ranging from pharmaceutics to surface patterning. (C) 2014 AIP Publishing LLC.
Resumo:
Load and resistance factor design (LRFD) approach for the design of reinforced soil walls is presented to produce designs with consistent and uniform levels of risk for the whole range of design applications. The evaluation of load and resistance factors for the reinforced soil walls based on reliability theory is presented. A first order reliability method (FORM) is used to determine appropriate ranges for the values of the load and resistance factors. Using pseudo-static limit equilibrium method, analysis is conducted to evaluate the external stability of reinforced soil walls subjected to earthquake loading. The potential failure mechanisms considered in the analysis are sliding failure, eccentricity failure of resultant force (or overturning failure) and bearing capacity failure. The proposed procedure includes the variability associated with reinforced backfill, retained backfill, foundation soil, horizontal seismic acceleration and surcharge load acting on the wall. Partial factors needed to maintain the stability against three modes of failure by targeting component reliability index of 3.0 are obtained for various values of coefficients of variation (COV) of friction angle of backfill and foundation soil, distributed dead load surcharge, cohesion of the foundation soil and horizontal seismic acceleration. A comparative study between LRFD and allowable stress design (ASD) is also presented with a design example. (C) 2014 Elsevier Ltd. All rights reserved.
Resumo:
The structural and magnetic study of the pseudo-binary multiferroic (1 x)BiFeO3 (x)SrTiO3 has been investigated as a function of composition and temperature. In contrary to the previous studies, detailed examination revealed that the reported anomaly in the magnetization at x-0.30 does not occur at the composition induced rhombohedral-cubic phase boundary, but within the rhombohedral phase itself. The rhombohedral to cubic transition occurs at x > 0.4. Evidence of magneto-elastic coupling near the Neel temperature and nucleation-growth mode of the rhombohedral-cubic transformation, with both the phases coexisting over a range of temperature was found. (C) 2014 Elsevier B.V. All rights reserved.
Self-organized public key management in MANETs with enhanced security and without certificate-chains
Resumo:
In the self-organized public key management approaches, public key verification is achieved through verification routes constituted by the transitive trust relationships among the network principals. Most of the existing approaches do not distinguish among different available verification routes. Moreover, to ensure stronger security, it is important to choose an appropriate metric to evaluate the strength of a route. Besides, all of the existing self-organized approaches use certificate-chains for achieving authentication, which are highly resource consuming. In this paper, we present a self-organized certificate-less on-demand public key management (CLPKM) protocol, which aims at providing the strongest verification routes for authentication purposes. It restricts the compromise probability for a verification route by restricting its length. Besides, we evaluate the strength of a verification route using its end-to-end trust value. The other important aspect of the protocol is that it uses a MAC function instead of RSA certificates to perform public key verifications. By doing this, the protocol saves considerable computation power, bandwidth and storage space. We have used an extended strand space model to analyze the correctness of the protocol. The analytical, simulation, and the testbed implementation results confirm the effectiveness of the proposed protocol. (c) 2014 Elsevier B.V. All rights reserved.