4 resultados para In-Session Behaviours
em Indian Institute of Science - Bangalore - Índia
Resumo:
Two heterometallic coordination polymers (CPs) have been prepared using (NiL)-L-II](2)Co-II (where H2L = N,N'-bis(salicylidene)-1,3-propanediamine) as nodes and dicyanamido spacers by varying the solvent for synthesis. Structural characterizations revealed that methanol assisted the formation of a two-dimensional (4,4) connected rhombic grid network of (NiL)(2)Co(NCNCN)2](infinity) (1a) whereas relatively less polar acetonitrile afforded a different superstructure {(NiL)(2)Co(NCNCN)(2)]center dot CH3CN}(infinity) (1b) with a two-dimensional (4,4) connected square grid network. The presence of acetonitrile molecules in the structure of 1b seems to change the spatial orientation of the terminal metalloligands NiL] from pseudo-eclipsed in 1a to staggered-like in 1b around the central Co(II). These structural changes in the nodes together with the conformationally flexible dicyanamido spacers, which are cis coordinated to the Co(II) in both trinuclear units, led to the differences in the final 2D network. Variable-temperature magnetic susceptibility measurements revealed that this supramolecular isomerism led to a drastic transition from spin-frustrated antiferromagnetism for 1a to a dominant ferromagnetic behaviour for 1b. The geometrical differences in Ni2Co coordination clusters (CCs) which are scalene triangular in 1a but nearly linear in 1b, are held responsible for the changes of the magnetic properties. The DFT calculations of exchange interactions between metal centres provide a clear evidence of the role played by the fundamental geometrical factors on the nature and magnitude of the magnetic coupling in these pseudo-polymorphic CPs.
Resumo:
We consider multicast flow problems where either all of the nodes or only a subset of the nodes may be in session. Traffic from each node in the session has to be sent to every other node in the session. If the session does not consist of all the nodes, the remaining nodes act as relays. The nodes are connected by undirected edges whose capacities are independent and identically distributed random variables. We study the asymptotics of the capacity region (with network coding) in the limit of a large number of nodes, and show that the normalized sum rate converges to a constant almost surely. We then provide a decentralized push-pull algorithm that asymptotically achieves this normalized sum rate.
Resumo:
The phase separation in fluids close to a critical point can be observed in the form of either an interconnected pattern (critical case) or a disconnected pattern (off-critical case). These two regimes have been investigated in different ways. First, a sharp change in pattern is shown to occur very close to the critical point when the composition is varied. No crossover has been observed between the t1 behaviour (interconnected) and a t1/3 behaviour (disconnected), where t is time. This latter growth law, which occurs in the case of compact droplets, will be discussed. Second, it has been observed that a growing interconnected pattern leaves a signature in the form of small droplets. The origin of such a distribution will be discussed in terms of coalescence of domains. No distribution of this kind is observed in the off-critical case.
Resumo:
A link failure in the path of a virtual circuit in a packet data network will lead to premature disconnection of the circuit by the end-points. A soft failure will result in degraded throughput over the virtual circuit. If these failures can be detected quickly and reliably, then appropriate rerouteing strategies can automatically reroute the virtual circuits that use the failed facility. In this paper, we develop a methodology for analysing and designing failure detection schemes for digital facilities. Based on errored second data, we develop a Markov model for the error and failure behaviour of a T1 trunk. The performance of a detection scheme is characterized by its false alarm probability and the detection delay. Using the Markov model, we analyse the performance of detection schemes that use physical layer or link layer information. The schemes basically rely upon detecting the occurrence of severely errored seconds (SESs). A failure is declared when a counter, that is driven by the occurrence of SESs, reaches a certain threshold.For hard failures, the design problem reduces to a proper choice;of the threshold at which failure is declared, and on the connection reattempt parameters of the virtual circuit end-point session recovery procedures. For soft failures, the performance of a detection scheme depends, in addition, on how long and how frequent the error bursts are in a given failure mode. We also propose and analyse a novel Level 2 detection scheme that relies only upon anomalies observable at Level 2, i.e. CRC failures and idle-fill flag errors. Our results suggest that Level 2 schemes that perform as well as Level 1 schemes are possible.