8 resultados para Planzen-Tier Interaktion, Lebensgemeinschaft

em Indian Institute of Science - Bangalore - Índia


Relevância:

10.00% 10.00%

Publicador:

Resumo:

An intelligent computer aided defect analysis (ICADA) system, based on artificial intelligence techniques, has been developed to identify design, process or material parameters which could be responsible for the occurrence of defective castings in a manufacturing campaign. The data on defective castings for a particular time frame, which is an input to the ICADA system, has been analysed. It was observed that a large proportion, i.e. 50-80% of all the defective castings produced in a foundry, have two, three or four types of defects occurring above a threshold proportion, say 10%. Also, a large number of defect types are either not found at all or found in a very small proportion, with a threshold value below 2%. An important feature of the ICADA system is the recognition of this pattern in the analysis. Thirty casting defect types and a large number of causes numbering between 50 and 70 for each, as identified in the AFS analysis of casting defects-the standard reference source for a casting process-constituted the foundation for building the knowledge base. Scientific rationale underlying the formation of a defect during the casting process was identified and 38 metacauses were coded. Process, material and design parameters which contribute to the metacauses were systematically examined and 112 were identified as rootcauses. The interconnections between defects, metacauses and rootcauses were represented as a three tier structured graph and the handling of uncertainty in the occurrence of events such as defects, metacauses and rootcauses was achieved by Bayesian analysis. The hill climbing search technique, associated with forward reasoning, was employed to recognize one or several root causes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The integration of different wireless networks, such as GSM and WiFi, as a two-tier hybrid wireless network is more popular and economical. Efficient bandwidth management, call admission control strategies and mobility management are important issues in supporting multiple types of services with different bandwidth requirements in hybrid networks. In particular, bandwidth is a critical commodity because of the type of transactions supported by these hybrid networks, which may have varying bandwidth and time requirements. In this paper, we consider such a problem in a hybrid wireless network installed in a superstore environment and design a bandwidth management algorithm based on the priority level, classification of the incoming transactions. Our scheme uses a downlink transaction scheduling algorithm, which decides how to schedule the outgoing transactions based on their priority level with efficient use of available bandwidth. The transaction scheduling algorithm is used to maximize the number of transaction-executions. The proposed scheme is simulated in a superstore environment with multi Rooms. The performance results describe that the proposed scheme can considerably improve the bandwidth utilization by reducing transaction blocking and accommodating more essential transactions at the peak time of the business.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Spectral efficiency is a key characteristic of cellular communications systems, as it quantifies how well the scarce spectrum resource is utilized. It is influenced by the scheduling algorithm as well as the signal and interference statistics, which, in turn, depend on the propagation characteristics. In this paper we derive analytical expressions for the short-term and long-term channel-averaged spectral efficiencies of the round robin, greedy Max-SINR, and proportional fair schedulers, which are popular and cover a wide range of system performance and fairness trade-offs. A unified spectral efficiency analysis is developed to highlight the differences among these schedulers. The analysis is different from previous work in the literature in the following aspects: (i) it does not assume the co-channel interferers to be identically distributed, as is typical in realistic cellular layouts, (ii) it avoids the loose spectral efficiency bounds used in the literature, which only considered the worst case and best case locations of identical co-channel interferers, (iii) it explicitly includes the effect of multi-tier interferers in the cellular layout and uses a more accurate model for handling the total co-channel interference, and (iv) it captures the impact of using small modulation constellation sizes, which are typical of cellular standards. The analytical results are verified using extensive Monte Carlo simulations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a detailed study on the seismic pattern of the state of Karnataka and also quantifies the seismic hazard for the entire state. In the present work, historical and instrumental seismicity data for Karnataka (within 300 km from Karnataka political boundary) were compiled and hazard analysis was done based on this data. Geographically, Karnataka forms a part of peninsular India which is tectonically identified as an intraplate region of Indian plate. Due to the convergent movement of the Indian plate with the Eurasian plate, movements are occurring along major intraplate faults resulting in seismic activity of the region and hence the hazard assessment of this region is very important. Apart from referring to seismotectonic atlas for identifying faults and fractures, major lineaments in the study area were also mapped using satellite data. The earthquake events reported by various national and international agencies were collected until 2009. Declustering of earthquake events was done to remove foreshocks and aftershocks. Seismic hazard analysis was done for the state of Karnataka using both deterministic and probabilistic approaches incorporating logic tree methodology. The peak ground acceleration (PGA) at rock level was evaluated for the entire state considering a grid size of 0.05A degrees x 0.05A degrees. The attenuation relations proposed for stable continental shield region were used in evaluating the seismic hazard with appropriate weightage factors. Response spectra at rock level for important Tier II cities and Bangalore were evaluated. The contour maps showing the spatial variation of PGA values at bedrock are presented in this work.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Energy and energy services are the backbone of growth and development in India and is increasingly dependent upon the use of fossil based fuels that lead to greenhouse gases (GHG) emissions and related concerns. Algal biofuels are being evolved as carbon (C)-neutral alternative biofuels. Algae are photosynthetic microorganisms that convert sunlight, water and carbon dioxide (CO2) to various sugars and lipids Tri-Acyl-Glycols (TAG) and show promise as an alternative, renewable and green fuel source for India. Compared to land based oilseed crops algae have potentially higher yields (5-12 g/m(2)/d) and can use locations and water resources not suited for agriculture. Within India, there is little additional land area for algal cultivation and therefore needs to be carried out in places that are already used for agriculture, e.g. flooded paddy lands (20 Mha) with village level technologies and on saline wastelands (3 Mha). Cultivating algae under such conditions requires novel multi-tier, multi-cyclic approaches of sharing land area without causing threats to food and water security as well as demand for additional fertilizer resources by adopting multi-tier cropping (algae-paddy) in decentralized open pond systems. A large part of the algal biofuel production is possible in flooded paddy crop land before the crop reaches dense canopies, in wastewaters (40 billion litres per day), in salt affected lands and in nutrient/diversity impoverished shallow coastline fishery. Mitigation will be achieved through avoidance of GHG, C-capture options and substitution of fossil fuels. Estimates made in this paper suggest that nearly half of the current transportation petro-fuels could be produced at such locations without disruption of food security, water security or overall sustainability. This shift can also provide significant mitigation avenues. The major adaptation needs are related to socio-technical acceptance for reuse of various wastelands, wastewaters and waste-derived energy and by-products through policy and attitude change efforts.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

b12, one of the few broadly neutralizing antibodies against HIV-1, binds to the CD4 binding site (CD4bs) on the gp120 subunit of HIV-1 Env. Two small fragments of HIV-1 gp120, b121a and b122a, which display about 70% of the b12 epitope and include solubility-enhancing mutations, were designed. Bacterially expressed b121a/b122a were partially folded and could bind b12 but not the CD4bs-directed non-neutralizing antibody b6. Sera from rabbits primed with b121a or b122a protein fragments and boosted with full-length gp120 showed broad neutralizing activity in a TZM-bl assay against a 16-virus panel that included nine Tier 2 and 3 viruses as well as in a five-virus panel previously designed to screen for broad neutralization. Using a mean IC50 cut-off of 50, sera from control rabbits immunized with gp120 alone neutralized only one virus of the 14 non-Tier 1 viruses tested (7%), whereas sera from b121a- and b122a-immunized rabbits neutralized seven (50%) and twelve (86%) viruses, respectively. Serum depletion studies confirmed that neutralization was gp120-directed and that sera from animals immunized with gp120 contained lower amounts of CD4bs-directed antibodies than corresponding sera from animals immunized with b121a/b122a. Competition binding assays with b12 also showed that b121a/2a sera contained significantly higher amounts of antibodies directed toward the CD4 binding site than the gp120 sera. The data demonstrate that it is possible to elicit broadly neutralizing sera against HIV-1 in small animals.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A supply chain ecosystem consists of the elements of the supply chain and the entities that influence the goods, information and financial flows through the supply chain. These influences come through government regulations, human, financial and natural resources, logistics infrastructure and management, etc., and thus affect the supply chain performance. Similarly, all the ecosystem elements also contribute to the risk. The aim of this paper is to identify both performances-based and risk-based decision criteria, which are important and critical to the supply chain. A two step approach using fuzzy AHP and fuzzy technique for order of preference by similarity to ideal solution has been proposed for multi-criteria decision-making and illustrated using a numerical example. The first step does the selection without considering risks and then in the next step suppliers are ranked according to their risk profiles. Later, the two ranks are consolidated into one. In subsequent section, the method is also extended for multi-tier supplier selection. In short, we are presenting a method for the design of a resilient supply chain, in this paper.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we propose a novel authentication protocol for MANETs requiring stronger security. The protocol works on a two-tier network architecture with client nodes and authentication server nodes, and supports dynamic membership. We use an external membership granting server (MGS) to provide stronger security with dynamic membership. However, the external MGS in our protocol is semi-online instead of being online, i.e., the MGS cannot initiate a connection with a network node but any network node can communicate with the MGS whenever required. To ensure efficiency, the protocol uses symmetric key cryptography to implement the authentication service. However, to achieve storage scalability, the protocol uses a pseudo random function (PRF) to bind the secret key of a client to its identity using the secret key of its server. In addition, the protocol possesses an efficient server revocation mechanism along with an efficient server re-assignment mechanism, which makes the protocol robust against server node compromise.