6 resultados para Fold and flip bifurcation curves
em Cochin University of Science
Resumo:
The optimum growth requirements of two nitrifying consortia developed from treated sewage by enrichment technique were determined by a series of experiments. There was total inhibition of nitrification at above 2.75 g r' NH/- Nand 2.5g r' N02' - N and the ammonia oxidizing consortium preferred a pH at 8.5 and the nitrite oxidizing consortium a pH of 7.5 as the optima for nitrification. Optimum temperatures were between 20° and 30°C for both the groups. As the rate of airnow was increased from I to 7 Ilmin, the build-up of N02- -N increased 10-fold and the consumption of N02- -N increased by a factor of 28.8 implying that the ammonia oxidizing consortium in a bioreactor required three times more aeration than that for nitrite oxidizers for ex pressing their full nitrifying potential. These data directly contribute for developing a fermentati on process for the mass production of nitrifiers as well as for designing bio reactors for nitrifying sewage.
Resumo:
Analytical expressions for the Green’s function of an annular elliptical ring microstrip antenna (AERMA) are developed and reported. The modal, radiation and input impedance characteristics of the TM, modes are determined from these expressions. The resonant frequencies of odd modes are greater than that of the even modes for all TMnl modes (n = 1, 2, 3, ...) udke elliptical microstrip structures. The radiation pattern and input imedance curves of TMI2 mode on comparison with available experimental result shows good agreement whch provides an independent validation to this technique. The performance of the AERMA is then investigated as a function of thickness and substrate dielectric permittivity.
Resumo:
This thesis is a study of discrete nonlinear systems represented by one dimensional mappings.As one dimensional interative maps represent Poincarre sections of higher dimensional flows,they offer a convenient means to understand the dynamical evolution of many physical systems.It highlighting the basic ideas of deterministic chaos.Qualitative and quantitative measures for the detection and characterization of chaos in nonlinear systems are discussed.Some simple mathematical models exhibiting chaos are presented.The bifurcation scenario and the possible routes to chaos are explained.It present the results of the numerical computational of the Lyapunov exponents (λ) of one dimensional maps.This thesis focuses on the results obtained by our investigations on combinations maps,scaling behaviour of the Lyapunov characteristic exponents of one dimensional maps and the nature of bifurcations in a discontinous logistic map.It gives a review of the major routes to chaos in dissipative systems,namely, Period-doubling ,Intermittency and Crises.This study gives a theoretical understanding of the route to chaos in discontinous systems.A detailed analysis of the dynamics of a discontinous logistic map is carried out, both analytically and numerically ,to understand the route it follows to chaos.The present analysis deals only with the case of the discontinuity parameter applied to the right half of the interval of mapping.A detailed analysis for the n –furcations of various periodicities can be made and a more general theory for the map with discontinuities applied at different positions can be on a similar footing
Resumo:
In this thesis we have presented some aspects of the nonlinear dynamics of Nd:YAG lasers including synchronization, Hopf bifurcation, chaos control and delay induced multistability.We have chosen diode pumped Nd:YAG laser with intracavity KTP crystal operating with two mode and three mode output as our model system.Different types of orientation for the laser cavity modes were considered to carry out the studies. For laser operating with two mode output we have chosen the modes as having parallel polarization and perpendicular polarization. For laser having three mode output, we have chosen them as two modes polarized parallel to each other while the third mode polarized orthogonal to them.
Resumo:
We have studied the bifurcation structure of the logistic map with a time dependant control parameter. By introducing a specific nonlinear variation for the parameter, we show that the bifurcation structure is modified qualitatively as well as quantitatively from the first bifurcation onwards. We have also computed the two Lyapunov exponents of the system and find that the modulated logistic map is less chaotic compared to the logistic map.
Resumo:
Communication is the process of transmitting data across channel. Whenever data is transmitted across a channel, errors are likely to occur. Coding theory is a stream of science that deals with finding efficient ways to encode and decode data, so that any likely errors can be detected and corrected. There are many methods to achieve coding and decoding. One among them is Algebraic Geometric Codes that can be constructed from curves. Cryptography is the science ol‘ security of transmitting messages from a sender to a receiver. The objective is to encrypt message in such a way that an eavesdropper would not be able to read it. A eryptosystem is a set of algorithms for encrypting and decrypting for the purpose of the process of encryption and decryption. Public key eryptosystem such as RSA and DSS are traditionally being prel‘en‘ec| for the purpose of secure communication through the channel. llowever Elliptic Curve eryptosystem have become a viable altemative since they provide greater security and also because of their usage of key of smaller length compared to other existing crypto systems. Elliptic curve cryptography is based on group of points on an elliptic curve over a finite field. This thesis deals with Algebraic Geometric codes and their relation to Cryptography using elliptic curves. Here Goppa codes are used and the curves used are elliptic curve over a finite field. We are relating Algebraic Geometric code to Cryptography by developing a cryptographic algorithm, which includes the process of encryption and decryption of messages. We are making use of fundamental properties of Elliptic curve cryptography for generating the algorithm and is used here to relate both.