169 resultados para Analytical expressions
Resumo:
It is shown that a method based on the principle of analytic continuation can be used to solve a set of infinite simultaneous equations encountered in solving for the electric field of a periodic electrode structure.
Resumo:
The motion of a bore over a sloping beach, earlier considered numerically by Keller, Levine & Whitham (1960), is studied by an approximate analytic technique. This technique is an extension of Whitham's (1958) approach for the propagation of shocks into a non-uniform medium. It gives the entire flow behind the bore and is shown to be equivalent to the theory of modulated simple waves of Varley, Ventakaraman & Cumberbatch (1971).
Resumo:
Particle filters find important applications in the problems of state and parameter estimations of dynamical systems of engineering interest. Since a typical filtering algorithm involves Monte Carlo simulations of the process equations, sample variance of the estimator is inversely proportional to the number of particles. The sample variance may be reduced if one uses a Rao-Blackwell marginalization of states and performs analytical computations as much as possible. In this work, we propose a semi-analytical particle filter, requiring no Rao-Blackwell marginalization, for state and parameter estimations of nonlinear dynamical systems with additively Gaussian process/observation noises. Through local linearizations of the nonlinear drift fields in the process/observation equations via explicit Ito-Taylor expansions, the given nonlinear system is transformed into an ensemble of locally linearized systems. Using the most recent observation, conditionally Gaussian posterior density functions of the linearized systems are analytically obtained through the Kalman filter. This information is further exploited within the particle filter algorithm for obtaining samples from the optimal posterior density of the states. The potential of the method in state/parameter estimations is demonstrated through numerical illustrations for a few nonlinear oscillators. The proposed filter is found to yield estimates with reduced sample variance and improved accuracy vis-a-vis results from a form of sequential importance sampling filter.
Resumo:
We extend the modeling heuristic of (Harsha et al. 2006. In IEEE IWQoS 06, pp 178 - 187) to evaluate the performance of an IEEE 802.11e infrastructure network carrying packet telephone calls, streaming video sessions and TCP controlled file downloads, using Enhanced Distributed Channel Access (EDCA). We identify the time boundaries of activities on the channel (called channel slot boundaries) and derive a Markov Renewal Process of the contending nodes on these epochs. This is achieved by the use of attempt probabilities of the contending nodes as those obtained from the saturation fixed point analysis of (Ramaiyan et al. 2005. In Proceedings ACM Sigmetrics, `05. Journal version accepted for publication in IEEE TON). Regenerative analysis on this MRP yields the desired steady state performance measures. We then use the MRP model to develop an effective bandwidth approach for obtaining a bound on the size of the buffer required at the video queue of the AP, such that the streaming video packet loss probability is kept to less than 1%. The results obtained match well with simulations using the network simulator, ns-2. We find that, with the default IEEE 802.11e EDCA parameters for access categories AC 1, AC 2 and AC 3, the voice call capacity decreases if even one streaming video session and one TCP file download are initiated by some wireless station. Subsequently, reducing the voice calls increases the video downlink stream throughput by 0.38 Mbps and file download capacity by 0.14 Mbps, for every voice call (for the 11 Mbps PHY). We find that a buffer size of 75KB is sufficient to ensure that the video packet loss probability at the QAP is within 1%.
Resumo:
In recent work (Int. J. Mass Spec., vol. 282, pp. 112–122) we have considered the effect of apertures on the fields inside rf traps at points on the trap axis. We now complement and complete that work by considering off-axis fields in axially symmetric (referred to as “3D”) and in two dimensional (“2D”) ion traps whose electrodes have apertures, i.e., holes in 3D and slits in 2D. Our approximation has two parts. The first, EnoAperture, is the field obtained numerically for the trap under study with apertures artificially closed. We have used the boundary element method (BEM) for obtaining this field. The second part, EdueToAperture, is an analytical expression for the field contribution of the aperture. In EdueToAperture, aperture size is a free parameter. A key element in our approximation is the electrostatic field near an infinite thin plate with an aperture, and with different constant-valued far field intensities on either side. Compact expressions for this field can be found using separation of variables, wherein the choice of coordinate system is crucial. This field is, in turn, used four times within our trap-specific approximation. The off-axis field expressions for the 3D geometries were tested on the quadrupole ion trap (QIT) and the cylindrical ion trap (CIT), and the corresponding expressions for the 2D geometries were tested on the linear ion trap (LIT) and the rectilinear ion trap (RIT). For each geometry, we have considered apertures which are 10%, 30%, and 50% of the trap dimension. We have found that our analytical correction term EdueToAperture, though based on a classical small-aperture approximation, gives good results even for relatively large apertures.
Resumo:
In this paper, we propose a new security metric for measuring resilience of a symmetric key distribution scheme in wireless sensor network. A polynomial-based and a novel complete connectivity schemes are proposed and an analytical comparison, in terms of security and connectivity, between the schemes is shown. Motivated by the schemes, we derive general expressions for security and connectivity. A number of conclusions are made using these general expressions.
Resumo:
Polarized scattering in spectral lines is governed by a 4; 4 matrix that describes how the Stokes vector is scattered and redistributed in frequency and direction. Here we develop the theory for this redistribution matrix in the presence of magnetic fields of arbitrary strength and direction. This general magnetic field case is called the Hanle- Zeeman regime, since it covers both of the partially overlapping weak- and strong- field regimes in which the Hanle and Zeeman effects dominate the scattering polarization. In this general regime, the angle-frequency correlations that describe the so-called partial frequency redistribution (PRD) are intimately coupled to the polarization properties. We develop the theory for the PRD redistribution matrix in this general case and explore its detailed mathematical properties and symmetries for the case of a J = 0 -> 1 -> 0 scattering transition, which can be treated in terms of time-dependent classical oscillator theory. It is shown how the redistribution matrix can be expressed as a linear superposition of coherent and noncoherent parts, each of which contain the magnetic redistribution functions that resemble the well- known Hummer- type functions. We also show how the classical theory can be extended to treat atomic and molecular scattering transitions for any combinations of quantum numbers.
Resumo:
We provide analytical models for capacity evaluation of an infrastructure IEEE 802.11 based network carrying TCP controlled file downloads or full-duplex packet telephone calls. In each case the analytical models utilize the attempt probabilities from a well known fixed-point based saturation analysis. For TCP controlled file downloads, following Bruno et al. (In Networking '04, LNCS 2042, pp. 626-637), we model the number of wireless stations (STAs) with ACKs as a Markov renewal process embedded at packet success instants. In our work, analysis of the evolution between the embedded instants is done by using saturation analysis to provide state dependent attempt probabilities. We show that in spite of its simplicity, our model works well, by comparing various simulated quantities, such as collision probability, with values predicted from our model. Next we consider N constant bit rate VoIP calls terminating at N STAs. We model the number of STAs that have an up-link voice packet as a Markov renewal process embedded at so called channel slot boundaries. Analysis of the evolution over a channel slot is done using saturation analysis as before. We find that again the AP is the bottleneck, and the system can support (in the sense of a bound on the probability of delay exceeding a given value) a number of calls less than that at which the arrival rate into the AP exceeds the average service rate applied to the AP. Finally, we extend the analytical model for VoIP calls to determine the call capacity of an 802.11b WLAN in a situation where VoIP calls originate from two different types of coders. We consider N-1 calls originating from Type 1 codecs and N-2 calls originating from Type 2 codecs. For G711 and G729 voice coders, we show that the analytical model again provides accurate results in comparison with simulations.
Resumo:
Supercritical processes are gaining importance in the last few years in the food, environmental and pharmaceutical product processing. The design of any supercritical process needs accurate experimental data on solubilities of solids in the supercritical fluids (SCFs). The empirical equations are quite successful in correlating the solubilities of solid compounds in SCF both in the presence and absence of cosolvents. In this work, existing solvate complex models are discussed and a new set of empirical equations is proposed. These equations correlate the solubilities of solids in supercritical carbon dioxide (both in the presence and absence of cosolvents) as a function of temperature, density of supercritical carbon dioxide and the mole fraction of cosolvent. The accuracy of the proposed models was evaluated by correlating 15 binary and 18 ternary systems. The proposed models provided the best overall correlations. (C) 2009 Elsevier BA/. All rights reserved.
Resumo:
In wireless ad hoc networks, nodes communicate with far off destinations using intermediate nodes as relays. Since wireless nodes are energy constrained, it may not be in the best interest of a node to always accept relay requests. On the other hand, if all nodes decide not to expend energy in relaying, then network throughput will drop dramatically. Both these extreme scenarios (complete cooperation and complete noncooperation) are inimical to the interests of a user. In this paper, we address the issue of user cooperation in ad hoc networks. We assume that nodes are rational, i.e., their actions are strictly determined by self interest, and that each node is associated with a minimum lifetime constraint. Given these lifetime constraints and the assumption of rational behavior, we are able to determine the optimal share of service that each node should receive. We define this to be the rational Pareto optimal operating point. We then propose a distributed and scalable acceptance algorithm called Generous TIT-FOR-TAT (GTFT). The acceptance algorithm is used by the nodes to decide whether to accept or reject a relay request. We show that GTFT results in a Nash equilibrium and prove that the system converges to the rational and optimal operating point.
Resumo:
We present a simplified yet analytical formulation of the carrier backscattering coefficient for zig-zag semiconducting single walled carbon nanotubes under diffusive regime. The electron-phonon scattering rate for longitudinal acoustic, optical, and zone-boundary phonon emissions for both inter- and intrasubband transition rates have been derived using Kane's nonparabolic energy subband model.The expressions for the mean free path and diffusive resistance have been formulated incorporating the aforementioned phonon scattering. Appropriate overlap function in Fermi's golden rule has been incorporated for a more general approach. The effect of energy subbands on low and high bias zones for the onset of longitudinal acoustic, optical, and zone-boundary phonon emissions and absorption have been analytically addressed. 90% transmission of the carriers from the source to the drain at 400 K for a 5 mu m long nanotube at 105 V m(-1) has been exhibited. The analytical results are in good agreement with the available experimental data. (c) 2010 American Institute of Physics.
Resumo:
A knowledge of the concentration distribution around a burning droplet is essential if accurate estimates are to be made of the transport coefficients in that region which influence the burning rate. There are two aspects of this paper; (1) determination of the concentration profiles, using the simple assumption of constant binary diffusion coefficients for all species, and comparison with experiments; and (2) postulation of a new relation for the therinal conductivity, which takes into account the variations of both temperature and concentrations of various species. First, the theoretical concentration profiles are evaluated and compared with experimental results reported elsewhere [5]. It is found that the agreement between the theory and experiment is fairly satisfactory. Then, by the use of these profiles and the relations proposed in the literature for the thermal conductivity of a mixture of nonpolar gases, a new relation for thermal conductivity: K = (A1 + B1 T) + (A2 + B2 T) xr (21). is suggested for analytical solutions of droplet combustion problems. Equations are presented to evaluate A1, A2, B1, and B2, and values of these terms for a few hydrocarbons are tabulated.
Resumo:
In the context of the IEEE 802.11e standard for WLANs, we provide an analytical model for obtaining the maximum number of VoIP calls that can be supported on HCCA, such that the delay QoS constraint of the accepted calls is met, when TCP downloads are coexistent on EDCA. In this scenario, we derive the TCP download throughput by using an analytical model for the case where only TCP sessions are present in the WLAN. We show that the analytical model for combined voice and TCP transfers provides accurate results in comparison with simulations (using ns-2).