82 resultados para Discovery (Law)
Resumo:
The systems formalism is used to obtain the interfacial concentration transients for power-law current input at an expanding plane electrode. The explicit results for the concentration transients obtained here pertain to arbitrary homogeneous reaction schemes coupled to the oxidant and reductant of a single charge-transfer step and the power-law form without and with a preceding blank period (for two types of power-law current profile, say, (i) I(t) = I0(t−t0)q for t greater-or-equal, slanted t0, I(t) = 0 for t < t0; and (ii) I(t) = I0tq for t greater-or-equal, slanted t0, I(t) = 0 for t < t0). Finally the potential transients are obtained using Padé approximants. The results of Galvez et al. (for E, CE, EC, aC) (J. Electroanal. Chem., 132 (1982) 15; 146 (1983) 221, 233, 243), Molina et al. (for E) (J. Electroanal. Chem., 227 (1987) 1 and Kies (for E) (J. Electroanal. Chem., 45 (1973) 71) are obtained as special cases.
Resumo:
We evaluate the commutator of the Gauss law constraints starting from the chirally gauged Wess-Zumino-Witten action. The calculations are done at tree level, i.e. by evaluating corresponding Poisson brackets. The results are compared with commutators obtained by others directly from the gauged fermionic theory, and with Faddeev's results based on cohomology.
Resumo:
Given an n x n complex matrix A, let mu(A)(x, y) := 1/n vertical bar{1 <= i <= n, Re lambda(i) <= x, Im lambda(i) <= y}vertical bar be the empirical spectral distribution (ESD) of its eigenvalues lambda(i) is an element of C, i = l, ... , n. We consider the limiting distribution (both in probability and in the almost sure convergence sense) of the normalized ESD mu(1/root n An) of a random matrix A(n) = (a(ij))(1 <= i, j <= n), where the random variables a(ij) - E(a(ij)) are i.i.d. copies of a fixed random variable x with unit variance. We prove a universality principle for such ensembles, namely, that the limit distribution in question is independent of the actual choice of x. In particular, in order to compute this distribution, one can assume that x is real or complex Gaussian. As a related result, we show how laws for this ESD follow from laws for the singular value distribution of 1/root n A(n) - zI for complex z. As a corollary, we establish the circular law conjecture (both almost surely and in probability), which asserts that mu(1/root n An) converges to the uniform measure on the unit disc when the a(ij) have zero mean.
Resumo:
This paper proposes a differential evolution based method of improving the performance of conventional guidance laws at high heading errors, without resorting to techniques from optimal control theory, which are complicated and suffer from several limitations. The basic guidance law is augmented with a term that is a polynomial function of the heading error. The values of the coefficients of the polynomial are found by applying the differential evolution algorithm. The results are compared with the basic guidance law, and the all-aspect proportional navigation laws in the literature. A scheme for online implementation of the proposed law for application in practice is also given. (c) 2010 Elsevier Ltd. All rights reserved.
Resumo:
Kocks' formalism for analysing steady state deformation data for the case where Cottrell-Stokes law is valid is extended to incorporate possible back stresses from solution and/or precipitation hardening, and dependence of pre-exponential factor on the applied stress. A simple graphical procedure for exploiting these equations is demonstrated by analyzing tensile steady state data for a type 316 austentic stainless steel for the temperature range 1023 to 1223 K. In this instance, the computed back stress values turned out to be negative, a physically meaningless result. This shows that for SS 316, deformation in this temperature regime can not be interpreted in terms of a mechanism that obeys Cottrell-Stokes law.
Resumo:
The problem of combined convection from vertical surfaces in a porous medium saturated with a power-law type non-Newtonian fluid is investigated. The transformed conservation laws are solved numerically for the case of variable surface heat flux conditions. Results for the details of the velocity and temperature fields as well as the Nusselt number have been presented. The viscosity index ranged from 0.5 to 2.0.
Resumo:
Considering cement based composites as chemically bonded ceramics (CBC) the consequent strength development with age is essentially a constant volume solidification process, such that the hydrated gel particles fill the space resulting in the compatible gel space ratios. Analysis has been done of the extensively used graphical method of mix design (British method of mix design) i.e., the relation between the compressive strength and the free water - cement ratio. By considering the strength (S) at w/c 0.5 (S-0.5) as the reference state to reflect the synergetic effects between constituents of concrete a generalized relationship obtained is of the form {S/S-0.5} = a + b {1/(w/c)}.
Resumo:
Numerical results are presented for the free-convection boundary-layer equations of the Ostwald de-Waele non-Newtonian power-law type fluids near a three-dimensional (3-D) stagnation point of attachment on an isothermal surface. The existence of dual solutions that are three-dimensional in nature have been verified by means of a numerical procedure. An asymptotic solution for very large Prandtl numbers has also been derived. Solutions are presented for a range of values of the geometric curvature parameter c, the power-law index n, and the Prandtl number Pr.
Resumo:
During the last decade, developing countries such as India have been exhibiting rapid increase in human population and vehicles, and increase in road accidents. Inappropriate driving behaviour is considered one of the major causes of road accidents in India as compared to defective geometric design of pavement or mechanical defects in vehicles. It can result in conditions such as lack of lane discipline, disregard to traffic laws, frequent traffic violations, increase in crashes due to self-centred driving, etc. It also demotivates educated drivers from following good driving practices. Hence, improved driver behaviour can be an effective countermeasure to reduce the vulnerability of road users and inhibit crash risks. This article highlights improved driver behaviour through better driver education, driver training and licensing procedures along with good on-road enforcement; as an effective countermeasure to ensure road safety in India. Based on the review and analysis, the article also recommends certain measures pertaining to driver licensing and traffic law enforcement in India aimed at improving road safety.
Resumo:
Service discovery is vital in ubiquitous applications, where a large number of devices and software components collaborate unobtrusively and provide numerous services without user intervention. Existing service discovery schemes use a service matching process in order to offer services of interest to the users. Potentially, the context information of the users and surrounding environment can be used to improve the quality of service matching. To make use of context information in service matching, a service discovery technique needs to address certain challenges. Firstly, it is required that the context information shall have unambiguous representation. Secondly, the devices in the environment shall be able to disseminate high level and low level context information seamlessly in the different networks. And thirdly, dynamic nature of the context information be taken into account. We propose a C-IOB(Context-Information, Observation and Belief) based service discovery model which deals with the above challenges by processing the context information and by formulating the beliefs based on the observations. With these formulated beliefs the required services will be provided to the users. The method has been tested with a typical ubiquitous museum guide application over different cases. The simulation results are time efficient and quite encouraging.
Resumo:
Recent studies on the Portevin-Le Chatelier effect report an intriguing crossover phenomenon from low-dimensional chaotic to an infinite-dimensional scale-invariant power law regime in experiments on CuAl single crystals and AlMg polycrystals, as function of strain rate. We devise fully dynamical model which reproduces these results. At low and medium strain rates, the model is chaotic with the structure of the attractor resembling the reconstructed experimental attractor. At high strain rates, power law statistics for the magnitudes and durations of the stress drops emerge as in experiments and concomitantly, the largest Lyapunov exponent is zero.
Resumo:
An understanding of application I/O access patterns is useful in several situations. First, gaining insight into what applications are doing with their data at a semantic level helps in designing efficient storage systems. Second, it helps create benchmarks that mimic realistic application behavior closely. Third, it enables autonomic systems as the information obtained can be used to adapt the system in a closed loop.All these use cases require the ability to extract the application-level semantics of I/O operations. Methods such as modifying application code to associate I/O operations with semantic tags are intrusive. It is well known that network file system traces are an important source of information that can be obtained non-intrusively and analyzed either online or offline. These traces are a sequence of primitive file system operations and their parameters. Simple counting, statistical analysis or deterministic search techniques are inadequate for discovering application-level semantics in the general case, because of the inherent variation and noise in realistic traces.In this paper, we describe a trace analysis methodology based on Profile Hidden Markov Models. We show that the methodology has powerful discriminatory capabilities that enable it to recognize applications based on the patterns in the traces, and to mark out regions in a long trace that encapsulate sets of primitive operations that represent higher-level application actions. It is robust enough that it can work around discrepancies between training and target traces such as in length and interleaving with other operations. We demonstrate the feasibility of recognizing patterns based on a small sampling of the trace, enabling faster trace analysis. Preliminary experiments show that the method is capable of learning accurate profile models on live traces in an online setting. We present a detailed evaluation of this methodology in a UNIX environment using NFS traces of selected commonly used applications such as compilations as well as on industrial strength benchmarks such as TPC-C and Postmark, and discuss its capabilities and limitations in the context of the use cases mentioned above.