42 resultados para STRINGS
Resumo:
To realistically simulate the motion of flexible objects such as ropes, strings, snakes, or human hair,one strategy is to discretise the object into a large number of small rigid links connected by rotary or spherical joints. The discretised system is highly redundant and the rotations at the joints (or the motion of the other links) for a desired Cartesian motion of the end of a link cannot be solved uniquely. In this paper, we propose a novel strategy to resolve the redundancy in such hyper-redundant systems.We make use of the classical tractrix curve and its attractive features. For a desired Cartesian motion of the `head'of a link, the `tail' of the link is moved according to a tractrix,and recursively all links of the discretised objects are moved along different tractrix curves. We show that the use of a tractrix curve leads to a more `natural' motion of the entire object since the motion is distributed uniformly along the entire object with the displacements tending to diminish from the `head' to the `tail'. We also show that the computation of the motion of the links can be done in real time since it involves evaluation of simple algebraic, trigonometric and hyperbolic functions. The strategy is illustrated by simulations of a snake, tying of knots with a rope and a solution of the inverse kinematics of a planar hyper-redundant manipulator.
Resumo:
We present a new approach to spoken language modeling for language identification (LID) using the Lempel-Ziv-Welch (LZW) algorithm. The LZW technique is applicable to any kind of tokenization of the speech signal. Because of the efficiency of LZW algorithm to obtain variable length symbol strings in the training data, the LZW codebook captures the essentials of a language effectively. We develop two new deterministic measures for LID based on the LZW algorithm namely: (i) Compression ratio score (LZW-CR) and (ii) weighted discriminant score (LZW-WDS). To assess these measures, we consider error-free tokenization of speech as well as artificially induced noise in the tokenization. It is shown that for a 6 language LID task of OGI-TS database with clean tokenization, the new model (LZW-WDS) performs slightly better than the conventional bigram model. For noisy tokenization, which is the more realistic case, LZW-WDS significantly outperforms the bigram technique
Resumo:
Ceramic/Porcelain suspension disc insulators are widely used in power systems to provide electrical insulation and mechanically support for high-voltage transmission lines. These insulators are subjected to a variety of stresses, including mechanical, electrical and environmental. These stresses act in unison. The exact nature and magnitude of these stresses vary significantly and depends on insulator design, application and its location. Due to various reasons the insulator disc can lose its electrical insulation properties without any noticeable mechanical failure. Such a condition while difficult to recognize, can enhance the stress on remaining healthy insulator discs in the string further may lead to a flashover. To understand the stress enhancement due to faulty discs in a string, attempt has been made to simulate the potential and electric field profiles for various disc insulators presently used in the country. The results of potential and electric filed stress obtained for normal and strings with faulty insulator discs are presented.
Resumo:
Network Intrusion Detection Systems (NIDS) intercept the traffic at an organization's network periphery to thwart intrusion attempts. Signature-based NIDS compares the intercepted packets against its database of known vulnerabilities and malware signatures to detect such cyber attacks. These signatures are represented using Regular Expressions (REs) and strings. Regular Expressions, because of their higher expressive power, are preferred over simple strings to write these signatures. We present Cascaded Automata Architecture to perform memory efficient Regular Expression pattern matching using existing string matching solutions. The proposed architecture performs two stage Regular Expression pattern matching. We replace the substring and character class components of the Regular Expression with new symbols. We address the challenges involved in this approach. We augment the Word-based Automata, obtained from the re-written Regular Expressions, with counter-based states and length bound transitions to perform Regular Expression pattern matching. We evaluated our architecture on Regular Expressions taken from Snort rulesets. We were able to reduce the number of automata states between 50% to 85%. Additionally, we could reduce the number of transitions by a factor of 3 leading to further reduction in the memory requirements.
Resumo:
Ceramic/Porcelain insulators are widely used in power transmission lines to provide mechanical support for High voltage conductors in addition to withstand electrical stresses. As a result of lightning, switching or temporary over voltages that could initiate flashover under worst weather conditions, and to operate within interference limits. Given that the useful life in service of the individual insulator elements making up the insulator strings is hard to predict, they must be verified periodically to ensure that adequate line reliability is maintained at all times. Over the years utilities have adopted few methods to detect defective discs in a string, subsequently replacement of the faulty discs are being carried out for smooth operation. But, if the insulator is found to be defective in a string at some location that may not create any changes in the field configuration, there is no need to replace to avoid manpower and cost of replacement. Due to deficiency of electric field data for the existing string configuration, utilities are forced to replace the discs which may not be essentially required. Hence, effort is made in the present work to simulate the potential and electric field along the normal and with faults induced discs in a string up to 765 kV system voltages using Surface Charge Simulation Method (SCSM). A comparison is made between simulated results, experimental and field data and it was found that the computed results are quite acceptable and useful.
Resumo:
Integrability of classical strings in the BTZ black hole enables the construction and study of classical string propagation in this background. We first apply the dressing method to obtain classical string solutions in the BTZ black hole. We dress time like geodesics in the BTZ black hole and obtain open string solutions which are pinned on the boundary at a single point and whose end points move on time like geodesics. These strings upon regularising their charge and spins have a dispersion relation similar to that of giant magnons. We then dress space like geodesics which start and end on the boundary of the BTZ black hole and obtain minimal surfaces which can penetrate the horizon of the black hole while being pinned at the boundary. Finally we embed the giant gluon solutions in the BTZ background in two different ways. They can be embedded as a spiral which contracts and expands touching the horizon or a spike which originates from the boundary and touches the horizon.
Resumo:
Text segmentation and localization algorithms are proposed for the born-digital image dataset. Binarization and edge detection are separately carried out on the three colour planes of the image. Connected components (CC's) obtained from the binarized image are thresholded based on their area and aspect ratio. CC's which contain sufficient edge pixels are retained. A novel approach is presented, where the text components are represented as nodes of a graph. Nodes correspond to the centroids of the individual CC's. Long edges are broken from the minimum spanning tree of the graph. Pair wise height ratio is also used to remove likely non-text components. A new minimum spanning tree is created from the remaining nodes. Horizontal grouping is performed on the CC's to generate bounding boxes of text strings. Overlapping bounding boxes are removed using an overlap area threshold. Non-overlapping and minimally overlapping bounding boxes are used for text segmentation. Vertical splitting is applied to generate bounding boxes at the word level. The proposed method is applied on all the images of the test dataset and values of precision, recall and H-mean are obtained using different approaches.
Resumo:
We study the collapse of a fuzzy sphere, that is a spherical membrane built out of D0-branes, in the Banks-Fischler-Shenker-Susskind model. At weak coupling, as the sphere shrinks, open strings are produced. If the initial radius is large then open string production is not important and the sphere behaves classically. At intermediate initial radius the backreaction from open string production is important but the fuzzy sphere retains its identity. At small initial radius the sphere collapses to form a black hole. The crossover between the later two regimes is smooth and occurs at the correspondence point of Horowitz and Polchinski.
Resumo:
We study the structure constants of the N = 1 beta deformed theory perturbatively and at strong coupling. We show that the planar one loop corrections to the structure constants of single trace gauge invariant operators in the scalar sector is determined by the anomalous dimension Hamiltonian. This result implies that 3 point functions of the chiral primaries of the theory do not receive corrections at one loop. We then study the structure constants at strong coupling using the Lunin-Maldacena geometry. We explicitly construct the supergravity mode dual to the chiral primary with three equal U(1) R-charges in the Lunin-Maldacena geometry. We show that the 3 point function of this supergravity mode with semi-classical states representing two other similar chiral primary states but with large U(1) charges to be independent of the beta deformation and identical to that found in the AdS(5) x S-5 geometry. This together with the one-loop result indicate that these structure constants are protected by a non-renormalization theorem. We also show that three point function of U(1) R-currents with classical massive strings is proportional to the R-charge carried by the string solution. This is in accordance with the prediction of the R-symmetry Ward identity.
Resumo:
This paper presents the design technique that has been adopted for packaging of Polyvinylidene fluoride (PVDF) nasal sensor for biomedical applications. The PVDF film with the dimension of length 10mm, width 5mm and thickness 28 mu m was firmly adhered on one end of plastic base (8mmx5mmx30 mu m) in such a way that it forms a cantilever configuration leaving the other end free for deflection. Now with the leads attached on the surface of the PVDF film, the cantilever configuration becomes the PVDF nasal sensor. For mounting a PVDF nasal sensor, a special headphone was designed, that can fit most of the human head sizes. Two flexible strings are soldered on either side of the headphone. Two identical PVDF nasal sensors were then connected to either side of flexible string of the headphone in such a way that they are placed below the right and left nostrils respectively without disturbing the normal breathing. When a subject wares headphone along with PVDF nasal sensors, two voltage signals due to the piezoelectric property of the PVDF film were generated corresponding to his/her nasal airflow from right and left nostril. The entire design was made compact, so that PVDF nasal sensors along with headphone can be made portable. No special equipment or machines are needed for mounting the PVDF nasal sensors. The time required for packaging of PVDF nasal sensors was less and the approximate cost of the entire assembly (PVDF nasal sensors + headphone) was very nominal.
Resumo:
Conformational changes in proteins are extremely important for their biochemical functions. Correlation between inherent conformational variations in a protein and conformational differences in its homologues of known structure is still unclear. In this study, we have used a structural alphabet called Protein Blocks (PBs). PBs are used to perform abstraction of protein 3-D structures into a 1-D strings of 16 alphabets (a-p) based on dihedral angles of overlapping pentapeptides. We have analyzed the variations in local conformations in terms of PBs represented in the ensembles of 801 protein structures determined using NMR spectroscopy. In the analysis of concatenated data over all the residues in all the NMR ensembles, we observe that the overall nature of inherent local structural variations in NMR ensembles is similar to the nature of local structural differences in homologous proteins with a high correlation coefficient of .94. High correlation at the alignment positions corresponding to helical and beta-sheet regions is only expected. However, the correlation coefficient by considering only the loop regions is also quite high (.91). Surprisingly, segregated position-wise analysis shows that this high correlation does not hold true to loop regions at the structurally equivalent positions in NMR ensembles and their homologues of known structure. This suggests that the general nature of local structural changes is unique; however most of the local structural variations in loop regions of NMR ensembles do not correlate to their local structural differences at structurally equivalent positions in homologues.
Resumo:
User authentication is essential for accessing computing resources, network resources, email accounts, online portals etc. To authenticate a user, system stores user credentials (user id and password pair) in system. It has been an interested field problem to discover user password from a system and similarly protecting them against any such possible attack. In this work we show that passwords are still vulnerable to hash chain based and efficient dictionary attacks. Human generated passwords use some identifiable patterns. We have analysed a sample of 19 million passwords, of different lengths, available online and studied the distribution of the symbols in the password strings. We show that the distribution of symbols in user passwords is affected by the native language of the user. From symbol distributions we can build smart and efficient dictionaries, which are smaller in size and their coverage of plausible passwords from Key-space is large. These smart dictionaries make dictionary based attacks practical.