3 resultados para 1781
em Indian Institute of Science - Bangalore - Índia
Resumo:
Dry sliding wear behavior of die-cast ADC12 aluminum alloy composites reinforced with short alumina fibers were investigated by using a pin-on-disk wear tester. The Al2O3 fibers were 4 mu m in diameter and were present in volume fractions (T-f)ranging from 0.03 to 0.26, The length of the fiber varied from 40 to 200 mu m. Disks of aluminum-alumina composites were rubbed against a pin of nitrided stainless steel SUS440B with a load of 10 N at a sliding velocity of 0.1 m/s. The unreinforced ADC 12 aluminum alloy and their composites containing low volume fractions of alumina (V-f approximate to 0.05) showed a sliding-distance-dependent transition from severe to mild wear. However, composites containing high volume fractions of alumina ( V-f > 0.05) exhibited only mild wear for all sliding distances. The duration of occurrence of the severe wear regime and the wear rate both decrease with increasing volume fraction. In MMCs the wear rate in the mild wear regime decreases with increase in volume fraction: reaching a minimum value at V-f = 0.09 Beyond V-f = 0.09 the wear rate increasesmarginally. On the other hand, the wear rate of the counterface (steel pin) was found to increase moderately with increase in V-f. From the analysis of wear data and detailed examination of (a) worn surfaces, (b) their cross-sections and (c) wear debris, two modes of wear mechanisms have been identified to be operative, in these materials and these are: (i) adhesive wear in the case of unreinforced matrix material and in MMCs with low Vf and (ii) abrasive wear in the case of MMCs with high V-f. (C) 2000 Elsevier Science Ltd. All rights reserved.
Resumo:
In this study, we investigated nonlinear measures of chaos of QT interval time series in 28 normal control subjects, 36 patients with panic disorder and 18 patients with major depression in supine and standing postures. We obtained the minimum embedding dimension (MED) and the largest Lyapunov exponent (LLE) of instantaneous heart rate (HR) and QT interval series. MED quantifies the system's complexity and LLE predictability. There was a significantly lower MED and a significantly increased LLE of QT interval time series in patients. Most importantly, nonlinear indices of QT/HR time series, MEDqthr (MED of QT/HR) and LLEqthr (LLE of QT/HR), were highly significantly different between controls and both patient groups in either posture. Results remained the same even after adjusting for age. The increased LLE of QT interval time, series in patients with anxiety and depression is in line with our previous findings of higher QTvi (QT variability index, a log ratio of QT variability corrected for mean QT squared divided by heart rate variability corrected for mean heart rate squared) in these patients, using linear techniques. Increased LLEqthr (LLE of QT/HR) may be a more sensitive tool to study cardiac repolarization and a valuable addition to the time domain measures such as QTvi. This is especially important in light of the finding that LLEqthr correlated poorly and nonsignificantly with QTvi. These findings suggest an increase in relative cardiac sympathetic activity and a decrease in certain aspects of cardiac vagal function in patients with anxiety as well as depression. The lack of correlation between QTvi and LLEqthr suggests that this nonlinear index is a valuable addition to the linear measures. These findings may also help to explain the higher incidence of cardiovascular mortality in patients with anxiety and depressive disorders. (C) 2002 Elsevier Science Ireland Ltd. All rights reserved.
Resumo:
The information-theoretic approach to security entails harnessing the correlated randomness available in nature to establish security. It uses tools from information theory and coding and yields provable security, even against an adversary with unbounded computational power. However, the feasibility of this approach in practice depends on the development of efficiently implementable schemes. In this paper, we review a special class of practical schemes for information-theoretic security that are based on 2-universal hash families. Specific cases of secret key agreement and wiretap coding are considered, and general themes are identified. The scheme presented for wiretap coding is modular and can be implemented easily by including an extra preprocessing layer over the existing transmission codes.