7 resultados para Unified operations (Military science)

em Cochin University of Science


Relevância:

30.00% 30.00%

Publicador:

Resumo:

This study is about the analysis of some queueing models related to N-policy.The optimal value the queue size has to attain in order to turn on a single server, assuming that the policy is to turn on a single server when the queue size reaches a certain number, N, and turn him off when the system is empty.The operating policy is the usual N-policy, but with random N and in model 2, a system similar to the one described here.This study analyses “ Tandem queue with two servers”.Here assume that the first server is a specialized one.In a queueing system,under N-policy ,the server will be on vacation until N units accumulate for the first time after becoming idle.A modified version of the N-policy for an M│M│1 queueing system is considered here.The novel feature of this model is that a busy service unit prevents the access of new customers to servers further down the line.It is deals with a queueing model consisting of two servers connected in series with a finite intermediate waiting room of capacity k.Here assume that server I is a specialized server.For this model ,the steady state probability vector and the stability condition are obtained using matrix – geometric method.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The thesis is the outcome of the experimental and theoretical investigations carried out on a novel slotted microstrip antenna.The antenna excites two resonance frequencies and provides orthogonal polarization. The radiation characteristics of the antenna are studied in detail. The antenna design is optimized using IE3D electromagnetic simulation tool. The frequency-Difference Time-Domain (FDTD) method is employed for the analysis of the antenna.The antenna can be used for personal and satellite communication applications.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

n the recent years protection of information in digital form is becoming more important. Image and video encryption has applications in various fields including Internet communications, multimedia systems, medical imaging, Tele-medicine and military communications. During storage as well as in transmission, the multimedia information is being exposed to unauthorized entities unless otherwise adequate security measures are built around the information system. There are many kinds of security threats during the transmission of vital classified information through insecure communication channels. Various encryption schemes are available today to deal with information security issues. Data encryption is widely used to protect sensitive data against the security threat in the form of “attack on confidentiality”. Secure transmission of information through insecure communication channels also requires encryption at the sending side and decryption at the receiving side. Encryption of large text message and image takes time before they can be transmitted, causing considerable delay in successive transmission of information in real-time. In order to minimize the latency, efficient encryption algorithms are needed. An encryption procedure with adequate security and high throughput is sought in multimedia encryption applications. Traditional symmetric key block ciphers like Data Encryption Standard (DES), Advanced Encryption Standard (AES) and Escrowed Encryption Standard (EES) are not efficient when the data size is large. With the availability of fast computing tools and communication networks at relatively lower costs today, these encryption standards appear to be not as fast as one would like. High throughput encryption and decryption are becoming increasingly important in the area of high-speed networking. Fast encryption algorithms are needed in these days for high-speed secure communication of multimedia data. It has been shown that public key algorithms are not a substitute for symmetric-key algorithms. Public key algorithms are slow, whereas symmetric key algorithms generally run much faster. Also, public key systems are vulnerable to chosen plaintext attack. In this research work, a fast symmetric key encryption scheme, entitled “Matrix Array Symmetric Key (MASK) encryption” based on matrix and array manipulations has been conceived and developed. Fast conversion has been achieved with the use of matrix table look-up substitution, array based transposition and circular shift operations that are performed in the algorithm. MASK encryption is a new concept in symmetric key cryptography. It employs matrix and array manipulation technique using secret information and data values. It is a block cipher operated on plain text message (or image) blocks of 128 bits using a secret key of size 128 bits producing cipher text message (or cipher image) blocks of the same size. This cipher has two advantages over traditional ciphers. First, the encryption and decryption procedures are much simpler, and consequently, much faster. Second, the key avalanche effect produced in the ciphertext output is better than that of AES.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This study mainly deals with the structure of the motorised and mechanised trawl fishing fleet of Kerala, and assess the availability of resources and its extent of exploitation. The study is conducted by observing the performance of small motorised boats operating trawl nets from selected centers along the Kerala coast. The Study also deals with the type and material of construction of the propellers used in selected crafts and the efficiency of the propeller. The fuel consumption pattern of selected medium sized trawlers economics of operation of selected fishing crafts are analyzed through this study. The thesis also Suggest methods for reducing fuel consumption in trawling

Relevância:

30.00% 30.00%

Publicador:

Resumo:

NABARD has completed 14 years of operation.ln the light of its experiences and achievements, the performance ev.ilu.ilion of the National Bank need to be looked into.This could provide certain criteria for its strength and weakness which may help in consolidating the institution for better utilisation of its potentialities. It is also noteworthy that no evaluative study on the National Bank has been conducted in Kerala. The Major objective of this study is to evaluate the role of NABARD in catering to the long-term agricultural requirements of Kerala for 1982 to 1992.This is done by analysing the quantum and quality of NABARD's schematic refinance. The qualitative indices like (1) the efficiency of loan recovery, (2) the impact or financial viability of NABARD refinanced schemes, (3) the credit gap, (4) the commitment-disbursement gap, and (5) the imbalances in the NABARD refinance form the core of the study.Hypotheses were formulated inorder to study and analyse these qualitative indices. The study is presented in eight chapters

Relevância:

30.00% 30.00%

Publicador:

Resumo:

When simulation modeling is used for performance improvement studies of complex systems such as transport terminals, domain specific conceptual modeling constructs could be used by modelers to create structured models. A two stage procedure which includes identification of the problem characteristics/cluster - ‘knowledge acquisition’ and identification of standard models for the problem cluster – ‘model abstraction’ was found to be effective in creating structured models when applied to certain logistic terminal systems. In this paper we discuss some methods and examples related the knowledge acquisition and model abstraction stages for the development of three different types of model categories of terminal systems

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The renewable energy sources (RES) will play a vital role in the future power needs in view of the increasing demand of electrical energy and depletion of fossil fuel with its environmental impact. The main constraints of renewable energy (RE) generation are high capital investment, fluctuation in generation and requirement of vast land area. Distributed RE generation on roof top of buildings will overcome these issues to some extent. Any system will be feasible only if it is economically viable and reliable. Economic viability depends on the availability of RE and requirement of energy in specific locations. This work is directed to examine the economic viability of the system at desired location and demand.