57 resultados para Schemes
Resumo:
One of the fastest expanding areas of computer exploitation is in embedded systems, whose prime function is not that of computing, but which nevertheless require information processing in order to carry out their prime function. Advances in hardware technology have made multi microprocessor systems a viable alternative to uniprocessor systems in many embedded application areas. This thesis reports the results of investigations carried out on multi microprocessors oriented towards embedded applications, with a view to enhancing throughput and reliability. An ideal controller for multiprocessor operation is developed which would smoothen sharing of routines and enable more powerful and efficient code I data interchange. Results of performance evaluation are appended.A typical application scenario is presented, which calls for classifying tasks based on characteristic features that were identified. The different classes are introduced along with a partitioned storage scheme. Theoretical analysis is also given. A review of schemes available for reducing disc access time is carried out and a new scheme presented. This is found to speed up data base transactions in embedded systems. The significance of software maintenance and adaptation in such applications is highlighted. A novel scheme of prov1d1ng a maintenance folio to system firmware is presented, alongwith experimental results. Processing reliability can be enhanced if facility exists to check if a particular instruction in a stream is appropriate. Likelihood of occurrence of a particular instruction would be more prudent if number of instructions in the set is less. A new organisation is derived to form the basement for further work. Some early results that would help steer the course of the work are presented.
Resumo:
Sharing of information with those in need of it has always been an idealistic goal of networked environments. With the proliferation of computer networks, information is so widely distributed among systems, that it is imperative to have well-organized schemes for retrieval and also discovery. This thesis attempts to investigate the problems associated with such schemes and suggests a software architecture, which is aimed towards achieving a meaningful discovery. Usage of information elements as a modelling base for efficient information discovery in distributed systems is demonstrated with the aid of a novel conceptual entity called infotron.The investigations are focused on distributed systems and their associated problems. The study was directed towards identifying suitable software architecture and incorporating the same in an environment where information growth is phenomenal and a proper mechanism for carrying out information discovery becomes feasible. An empirical study undertaken with the aid of an election database of constituencies distributed geographically, provided the insights required. This is manifested in the Election Counting and Reporting Software (ECRS) System. ECRS system is a software system, which is essentially distributed in nature designed to prepare reports to district administrators about the election counting process and to generate other miscellaneous statutory reports.Most of the distributed systems of the nature of ECRS normally will possess a "fragile architecture" which would make them amenable to collapse, with the occurrence of minor faults. This is resolved with the help of the penta-tier architecture proposed, that contained five different technologies at different tiers of the architecture.The results of experiment conducted and its analysis show that such an architecture would help to maintain different components of the software intact in an impermeable manner from any internal or external faults. The architecture thus evolved needed a mechanism to support information processing and discovery. This necessitated the introduction of the noveI concept of infotrons. Further, when a computing machine has to perform any meaningful extraction of information, it is guided by what is termed an infotron dictionary.The other empirical study was to find out which of the two prominent markup languages namely HTML and XML, is best suited for the incorporation of infotrons. A comparative study of 200 documents in HTML and XML was undertaken. The result was in favor ofXML.The concept of infotron and that of infotron dictionary, which were developed, was applied to implement an Information Discovery System (IDS). IDS is essentially, a system, that starts with the infotron(s) supplied as clue(s), and results in brewing the information required to satisfy the need of the information discoverer by utilizing the documents available at its disposal (as information space). The various components of the system and their interaction follows the penta-tier architectural model and therefore can be considered fault-tolerant. IDS is generic in nature and therefore the characteristics and the specifications were drawn up accordingly. Many subsystems interacted with multiple infotron dictionaries that were maintained in the system.In order to demonstrate the working of the IDS and to discover the information without modification of a typical Library Information System (LIS), an Information Discovery in Library Information System (lDLIS) application was developed. IDLIS is essentially a wrapper for the LIS, which maintains all the databases of the library. The purpose was to demonstrate that the functionality of a legacy system could be enhanced with the augmentation of IDS leading to information discovery service. IDLIS demonstrates IDS in action. IDLIS proves that any legacy system could be augmented with IDS effectively to provide the additional functionality of information discovery service.Possible applications of IDS and scope for further research in the field are covered.
Resumo:
The thesis presented the fabrication and characterisation of polymer optical fibers in their applications as optical amplifier and smart sensors.Optical polymers such as PMMA are found to be a very good host material due to their ability to incorporate very high concentration of optical gain media like fluorescent dyes and rare earth compounds. High power and high gain optical amplification in organic dye-doped polymer optical fibers is possible due to extremely large emission cross sections of oyes. Dye doped (Rhodamine 6G) optical fibers were fabricated by using indigenously developed polymer optical fiber drawing tower. Loss characterization of drawn dye doped fibers was carried out using side illumination technique. The advantage of the above technique is that it is a nondestructive method and can also be used for studying the uniformity in fiber diameter and doping. Sensitivity of the undoped polymer fibers to temperature and microbending were also studied in its application in smart sensors.Optical amplification studies using the dye doped polymer optical fibers were carried out and found that an amplification of l8dB could be achieved using a very short fiber of length lOcm. Studies were carried out in fibers with different dye concentrations and diameter and it was observed that gain stability was achieved at relatively high dye concentrations irrespective of the fiber diameter.Due to their large diameter, large numerical aperture, flexibility and geometrical versatility of polymer optical fibers it has a wide range of applications in the field of optical sensing. Just as in the case of conventional silica based fiber optic sensors, sensing techniques like evanescent wave, grating and other intensity modulation schemes can also be efficiently utilized in the case of POF based sensors. Since polymer optical fibers have very low Young's modulus when compared to glass fibers, it can be utilized for sensing mechanical stress and strain efficiently in comparison with its counterpart. Fiber optic sensors have proved themselves as efficient and reliable devices to sense various parameters like aging, crack formation, weathering in civil structures. A similar type of study was carried out to find the setting characteristics of cement paste used for constructing civil structures. It was found that the measurements made by using fiber optic sensors are far more superior than that carried out by conventional methods. More over,POF based sensors were found to have more sensitivity as well.
Resumo:
Non-destructive testing (NDT) is the use of non-invasive techniques to determine the integrity of a material, component, or structure. Engineers and scientists use NDT in a variety of applications, including medical imaging, materials analysis, and process control.Photothermal beam deflection technique is one of the most promising NDT technologies. Tremendous R&D effort has been made for improving the efficiency and simplicity of this technique. It is a popular technique because it can probe surfaces irrespective of the size of the sample and its surroundings. This technique has been used to characterize several semiconductor materials, because of its non-destructive and non-contact evaluation strategy. Its application further extends to analysis of wide variety of materials. Instrumentation of a NDT technique is very crucial for any material analysis. Chapter two explores the various excitation sources, source modulation techniques, detection and signal processing schemes currently practised. The features of the experimental arrangement including the steps for alignment, automation, data acquisition and data analysis are explained giving due importance to details.Theoretical studies form the backbone of photothermal techniques. The outcome of a theoretical work is the foundation of an application.The reliability of the theoretical model developed and used is proven from the studies done on crystalline.The technique is applied for analysis of transport properties such as thermal diffusivity, mobility, surface recombination velocity and minority carrier life time of the material and thermal imaging of solar cell absorber layer materials like CuInS2, CuInSe2 and SnS thin films.analysis of In2S3 thin films, which are used as buffer layer material in solar cells. The various influences of film composition, chlorine and silver incorporation in this material is brought out from the measurement of transport properties and analysis of sub band gap levels.The application of photothermal deflection technique for characterization of solar cells is a relatively new area that requires considerable attention.The application of photothermal deflection technique for characterization of solar cells is a relatively new area that requires considerable attention. Chapter six thus elucidates the theoretical aspects of application of photothermal techniques for solar cell analysis. The experimental design and method for determination of solar cell efficiency, optimum load resistance and series resistance with results from the analysis of CuInS2/In2S3 based solar cell forms the skeleton of this chapter.
Resumo:
We propose and demonstrate the possibility of using a permanently microbent bare optical fiber for detecting chemical species. Two detection schemes, viz., a bright-field detection scheme (for the core modes), and a dark-field detection scheme (for the cladding modes) have been employed to produce a fiber-optic sensor. The sensor described here is sensitive enough to detect concentrations as low as nanomoles per liter of a chemical species, with a dynamic range of more than 6 orders of magnitude.
Resumo:
Optical fiber sensors developed for measuring pH values usually employ an unclad and unstrained section of the fiber. In this paper, we describe the design and fabrication of a microbent fiber optic sensor that can be used for pH sensing. In order to obtain the desired performance, a permanently microbent portion of a plastic optic fiber is coated with a thin film of dye impregnated sol–gel material. The measurements are simultaneously carried out in two independent detection schemes viz., the bright field detection configuration for detecting the core modes and dark field detection configuration, for detecting the cladding modes. The results of measurements of core mode-power and cladding mode-power variation with change in pH of a solution surrounding the coated portion of the fiber is presented. This paper thus demonstrates how a bare plastic fiber can be modified for pH sensing in a simple and cost effective manner.
Resumo:
The fabrication and characterization of a Rhodamine 6G-doped polymer optical fiber amplifier have been carried out. Two different schemes were employed to characterize the optical fiber: the stripe illumination technique to study the fiber as a gain medium and another technique to study its performance as an amplifier. We observed a spectral narrowing from 42 to 7 nm when the pump energy was increased to 6 mJ in the stripe illumination geometry. A gain of 18 dB was obtained in the amplifier configuration. The effects of pump power and dye concentration on the performance of the fiber as an amplifier were also studied.
Resumo:
Microbent optical fibers are potential candidates for evanescent wave sensing. We investigate the behavior of a permanently microbent fiber optic sensor when it is immersed in an absorbing medium. Two distinct detection schemes, namely, bright-field and dark-field detection configuration, are employed for the measurements. The optical power propagating through the sensor is found to vary in a logarithmic fashion with the concentration of the absorbing species in the surrounding medium. We observe that the sensitivity of the setup is dependent on the bending amplitude and length of the microbend region for the bright-field detection scheme, while it is relatively independent of both for the dark-field detection configuration. This feature can be exploited in compact sensor designs where reduction of the sensing region length is possible without sacrificing sensitivity.
Resumo:
In this Letter we numerically investigate the dynamics of a system of two coupled chaotic multimode Nd:YAG lasers with two mode and three mode outputs. Unidirectional and bidirectional coupling schemes are adopted; intensity time series plots, phase space plots and synchronization plots are used for studying the dynamics. Quality of synchronization is measured using correlation index plots. It is found that for laser with two mode output bidirectional direct coupling scheme is found to be effective in achieving complete synchronization, control of chaos and amplification in output intensity. For laser with three mode output, bidirectional difference coupling scheme gives much better chaotic synchronization as compared to unidirectional difference coupling but at the cost of higher coupling strength. We also conclude that the coupling scheme and system properties play an important role in determining the type of synchronization exhibited by the system.
Resumo:
Internet today has become a vital part of day to day life, owing to the revolutionary changes it has brought about in various fields. Dependence on the Internet as an information highway and knowledge bank is exponentially increasing so that a going back is beyond imagination. Transfer of critical information is also being carried out through the Internet. This widespread use of the Internet coupled with the tremendous growth in e-commerce and m-commerce has created a vital need for infonnation security.Internet has also become an active field of crackers and intruders. The whole development in this area can become null and void if fool-proof security of the data is not ensured without a chance of being adulterated. It is, hence a challenge before the professional community to develop systems to ensure security of the data sent through the Internet.Stream ciphers, hash functions and message authentication codes play vital roles in providing security services like confidentiality, integrity and authentication of the data sent through the Internet. There are several ·such popular and dependable techniques, which have been in use widely, for quite a long time. This long term exposure makes them vulnerable to successful or near successful attempts for attacks. Hence it is the need of the hour to develop new algorithms with better security.Hence studies were conducted on various types of algorithms being used in this area. Focus was given to identify the properties imparting security at this stage. By making use of a perception derived from these studies, new algorithms were designed. Performances of these algorithms were then studied followed by necessary modifications to yield an improved system consisting of a new stream cipher algorithm MAJE4, a new hash code JERIM- 320 and a new message authentication code MACJER-320. Detailed analysis and comparison with the existing popular schemes were also carried out to establish the security levels.The Secure Socket Layer (SSL) I Transport Layer Security (TLS) protocol is one of the most widely used security protocols in Internet. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL I TLS. But recent attacks on RC4 and HMAC have raised questions about the reliability of these algorithms. Hence MAJE4 and MACJER-320 have been proposed as substitutes for them. Detailed studies on the performance of these new algorithms were carried out; it has been observed that they are dependable alternatives.
Resumo:
One major component of power system operation is generation scheduling. The objective of the work is to develop efficient control strategies to the power scheduling problems through Reinforcement Learning approaches. The three important active power scheduling problems are Unit Commitment, Economic Dispatch and Automatic Generation Control. Numerical solution methods proposed for solution of power scheduling are insufficient in handling large and complex systems. Soft Computing methods like Simulated Annealing, Evolutionary Programming etc., are efficient in handling complex cost functions, but find limitation in handling stochastic data existing in a practical system. Also the learning steps are to be repeated for each load demand which increases the computation time.Reinforcement Learning (RL) is a method of learning through interactions with environment. The main advantage of this approach is it does not require a precise mathematical formulation. It can learn either by interacting with the environment or interacting with a simulation model. Several optimization and control problems have been solved through Reinforcement Learning approach. The application of Reinforcement Learning in the field of Power system has been a few. The objective is to introduce and extend Reinforcement Learning approaches for the active power scheduling problems in an implementable manner. The main objectives can be enumerated as:(i) Evolve Reinforcement Learning based solutions to the Unit Commitment Problem.(ii) Find suitable solution strategies through Reinforcement Learning approach for Economic Dispatch. (iii) Extend the Reinforcement Learning solution to Automatic Generation Control with a different perspective. (iv) Check the suitability of the scheduling solutions to one of the existing power systems.First part of the thesis is concerned with the Reinforcement Learning approach to Unit Commitment problem. Unit Commitment Problem is formulated as a multi stage decision process. Q learning solution is developed to obtain the optimwn commitment schedule. Method of state aggregation is used to formulate an efficient solution considering the minimwn up time I down time constraints. The performance of the algorithms are evaluated for different systems and compared with other stochastic methods like Genetic Algorithm.Second stage of the work is concerned with solving Economic Dispatch problem. A simple and straight forward decision making strategy is first proposed in the Learning Automata algorithm. Then to solve the scheduling task of systems with large number of generating units, the problem is formulated as a multi stage decision making task. The solution obtained is extended in order to incorporate the transmission losses in the system. To make the Reinforcement Learning solution more efficient and to handle continuous state space, a fimction approximation strategy is proposed. The performance of the developed algorithms are tested for several standard test cases. Proposed method is compared with other recent methods like Partition Approach Algorithm, Simulated Annealing etc.As the final step of implementing the active power control loops in power system, Automatic Generation Control is also taken into consideration.Reinforcement Learning has already been applied to solve Automatic Generation Control loop. The RL solution is extended to take up the approach of common frequency for all the interconnected areas, more similar to practical systems. Performance of the RL controller is also compared with that of the conventional integral controller.In order to prove the suitability of the proposed methods to practical systems, second plant ofNeyveli Thennal Power Station (NTPS IT) is taken for case study. The perfonnance of the Reinforcement Learning solution is found to be better than the other existing methods, which provide the promising step towards RL based control schemes for practical power industry.Reinforcement Learning is applied to solve the scheduling problems in the power industry and found to give satisfactory perfonnance. Proposed solution provides a scope for getting more profit as the economic schedule is obtained instantaneously. Since Reinforcement Learning method can take the stochastic cost data obtained time to time from a plant, it gives an implementable method. As a further step, with suitable methods to interface with on line data, economic scheduling can be achieved instantaneously in a generation control center. Also power scheduling of systems with different sources such as hydro, thermal etc. can be looked into and Reinforcement Learning solutions can be achieved.
Resumo:
The present investigation on “Coconut Phenology and Yield Response to Climate Variability and Change” was undertaken at the experimental site, at the Regional Station, Coconut Development Board, KAU Campus, Vellanikkara. Ten palms each of eight-year-old coconut cultivars viz., Tiptur Tall, Kuttiadi (WCT), Kasaragod (WCT) and Komadan (WCT) were randomly selected.The study therefore, reinforces our traditional knowledge that the coconut palm is sensitive to changing weather conditions during the period from primordium initiation to harvest of nuts (about 44 months). Absence of rainfall from December to May due to early withdrawal of northeast monsoon, lack of pre monsoon showers and late onset of southwest monsoon adversely affect the coconut productivity to a considerable extent in the following year under rainfed conditions. The productivity can be increased by irrigating the coconut palm during the dry periods.Increase in temperature, aridity index, number of severe summer droughts and decline in rainfall and moisture index were the major factors for a marginal decline or stagnation in coconut productivity over a period of time, though various developmental schemes were in operation for sustenance of coconut production in the State of Kerala. It can be attributed to global warming and climate change. Therefore, there is a threat to coconut productivity in the ensuing decades due to climate variability and change. In view of the above, there is an urgent need for proactive measures as a part of climate change adaptation to sustain coconut productivity in the State of Kerala.The coconut productivity is more vulnerable to climate variability such as summer droughts rather than climate change in terms of increase in temperature and decline in rainfall, though there was a marginal decrease (1.6%) in the decade of 1981-2009 when compared to that of 1951-80. This aspect needs to be examined in detail by coconut development agencies such as Coconut Development Board and State Agriculture Department for remedial measures. Otherwise, the premier position of Kerala in terms of coconut production is likely to be lost in the ensuing years under the projected climate change scenario. Among the four cultivars studied, Tiptur Tall appears to be superior in terms of reproduction phase and nut yield. This needs to be examined by the coconut breeders in their crop improvement programme as a part of stress tolerant under rainfed conditions. Crop mix and integrated farming are supposed to be the best combination to sustain development in the long run under the projected climate change scenarios. Increase in coconut area under irrigation during summer with better crop management and protection measures also are necessary measures to increase coconut productivity since the frequency of intensity of summer droughts is likely to increase under projected global warming scenario.
Resumo:
n the recent years protection of information in digital form is becoming more important. Image and video encryption has applications in various fields including Internet communications, multimedia systems, medical imaging, Tele-medicine and military communications. During storage as well as in transmission, the multimedia information is being exposed to unauthorized entities unless otherwise adequate security measures are built around the information system. There are many kinds of security threats during the transmission of vital classified information through insecure communication channels. Various encryption schemes are available today to deal with information security issues. Data encryption is widely used to protect sensitive data against the security threat in the form of “attack on confidentiality”. Secure transmission of information through insecure communication channels also requires encryption at the sending side and decryption at the receiving side. Encryption of large text message and image takes time before they can be transmitted, causing considerable delay in successive transmission of information in real-time. In order to minimize the latency, efficient encryption algorithms are needed. An encryption procedure with adequate security and high throughput is sought in multimedia encryption applications. Traditional symmetric key block ciphers like Data Encryption Standard (DES), Advanced Encryption Standard (AES) and Escrowed Encryption Standard (EES) are not efficient when the data size is large. With the availability of fast computing tools and communication networks at relatively lower costs today, these encryption standards appear to be not as fast as one would like. High throughput encryption and decryption are becoming increasingly important in the area of high-speed networking. Fast encryption algorithms are needed in these days for high-speed secure communication of multimedia data. It has been shown that public key algorithms are not a substitute for symmetric-key algorithms. Public key algorithms are slow, whereas symmetric key algorithms generally run much faster. Also, public key systems are vulnerable to chosen plaintext attack. In this research work, a fast symmetric key encryption scheme, entitled “Matrix Array Symmetric Key (MASK) encryption” based on matrix and array manipulations has been conceived and developed. Fast conversion has been achieved with the use of matrix table look-up substitution, array based transposition and circular shift operations that are performed in the algorithm. MASK encryption is a new concept in symmetric key cryptography. It employs matrix and array manipulation technique using secret information and data values. It is a block cipher operated on plain text message (or image) blocks of 128 bits using a secret key of size 128 bits producing cipher text message (or cipher image) blocks of the same size. This cipher has two advantages over traditional ciphers. First, the encryption and decryption procedures are much simpler, and consequently, much faster. Second, the key avalanche effect produced in the ciphertext output is better than that of AES.
Resumo:
This thesis Entitled Trace metal speciation in the cochin estuary.Natural waters provide a favourable environment for speciation studies because of the prevailing variable chemical matrix and the variety of metal forms which may exist there.An estuary is a mixing zone of riverine and oceanic waters with widely varying compositions where end members interact both physically and chemically. The trace element chemistry in the estuarine environment has been an area of considerable research in the past decades. The trace metal distribution in the Cochin estuary is considerably influenced by the tropical features of the location and by human activities. The lower Periyar river and the Cochin estuary have been particularly selected for this investigation in view of the impact of trace metals on the estuarine ecosystem as well as in attempt quantify the phenomenon of metal speciation in the waters of a tropical coastal plain waterbody. If the concentration in the water media is very low, then, many of the fractions that could be estimated by speciation schemes for metals will fall below the detection limits, a factor which is undesirable.The study would also delineate the features of metal speciation which modify the chemical regime of ionic elements that traverse natural boundaries in aquatic environments, especally in those tropical areas prone to multivariate geographical settings.
Resumo:
This thesis Entitled Internet Utilization and Academic Activities of Faculty Members in the Universities of kerala: an analytical study. Today, scientific research is throwing up new discoveries, inventions and vistas by the hour. We are witnessing a veritable knowledge explosion. It is important for members of university faculty members to keep abreast of it for giving up-t-date information to their students about the new development in the subject of their study. The internet is an invaluable tool for achieving it. Most of the universities have sufficient internet facility, but the accessibility to all the faculty members is not adequate. University Libraries also provides standard supplementary service in the internet area. This study indicates differential level of awareness and utilization of the internet services by the faculty members in the areas of teaching, research and publication. However the overall impression is that the awareness and utilization is inadequate. This point to the urgent need to devise programs and schemes to promote internet utilization among the faculty members. The suggestions indicate the key areas that deserve attention by policy makers and administrators. Thanks to the internet, every new development in every field of study is just a click away for faculty members, research scholars and students.