930 resultados para Source and sink
Resumo:
Lead telluride micro and nanostructures have been grown on silicon and glass substrates by a simple thermal evaporation of PbTe in high vacuum of 3 x 10(-5) mbar. Growth was carried out for two different distances between the evaporation source and the substrates. Synthesized products consist of nanorods and micro towers for 2.4 cm and 3.4 cm of distance between the evaporation source and the substrates respectively. X-ray diffraction and transmission electron microscopy studies confirmed crystalline nature of the nanorods and micro towers. Nanorods were grown by vapor solid mechanism. Each micro tower consists of nano platelets and is capped with spherical catalyst particle at their end, suggesting that the growth proceeds via vapor-liquid-solid (VLS) mechanism. EDS spectrum recorded on the tip of the micro tower has shown the presence of Pb and Te confirming the self catalytic VLS growth of the micro towers. These results open up novel synthesis methods for PbTe nano and microstructures for various applications.
Resumo:
In this letter, we compute the secrecy rate of decode-and-forward (DF) relay beamforming with finite input alphabet of size M. Source and relays operate under a total power constraint. First, we observe that the secrecy rate with finite-alphabet input can go to zero as the total power increases, when we use the source power and the relay weights obtained assuming Gaussian input. This is because the capacity of an eavesdropper can approach the finite-alphabet capacity of 1/2 log(2) M with increasing total power, due to the inability to completely null in the direction of the eavesdropper. We then propose a transmit power control scheme where the optimum source power and relay weights are obtained by carrying out transmit power (source power plus relay power) control on DF with Gaussian input using semi-definite programming, and then obtaining the corresponding source power and relay weights which maximize the secrecy rate for DF with finite-alphabet input. The proposed power control scheme is shown to achieve increasing secrecy rates with increasing total power with a saturation behavior at high total powers.
Resumo:
Given the significant gains that relay-based cooperation promises, the practical problems of acquisition of channel state information (CSI) and the characterization and optimization of performance with imperfect CSI are receiving increasing attention. We develop novel and accurate expressions for the symbol error probability (SEP) for fixed-gain amplify-and-forward relaying when the destination acquires CSI using the time-efficient cascaded channel estimation (CCE) protocol. The CCE protocol saves time by making the destination directly estimate the product of the source-relay and relay-destination channel gains. For a single relay system, we first develop a novel SEP expression and a tight SEP upper bound. We then similarly analyze an opportunistic multi-relay system, in which both selection and coherent demodulation use imperfect estimates. A distinctive aspect of our approach is the use of as few simplifying approximations as possible, which results in new results that are accurate at signal-to-noise-ratios as low as 1 dB for single and multi-relay systems. Using insights gleaned from an asymptotic analysis, we also present a simple, closed-form, nearly-optimal solution for allocation of energy between pilot and data symbols at the source and relay(s).
Resumo:
In this paper, we study the diversity-multiplexing-gain tradeoff (DMT) of wireless relay networks under the half-duplex constraint. It is often unclear what penalty if any, is imposed by the half-duplex constraint on the DMT of such networks. We study two classes of networks; the first class, called KPP(I) networks, is the class of networks with the relays organized in K parallel paths between the source and the destination. While we assume that there is no direct source-destination path, the K relaying paths can interfere with each other. The second class, termed as layered networks, is comprised of relays organized in layers, where links exist only between adjacent layers. We present a communication scheme based on static schedules and amplify-and-forward relaying for these networks. We also show that for KPP(I) networks with K >= 3, the proposed schemes can achieve full-duplex DMT performance, thus demonstrating that there is no performance hit on the DMT due to the half-duplex constraint. We also show that, for layered networks, a linear DMT of d(max)(1 - r)(+) between the maximum diversity d(max) and the maximum MG, r(max) = 1 is achievable. We adapt existing DMT optimal coding schemes to these networks, thus specifying the end-to-end communication strategy explicitly.
Resumo:
In this paper, we evaluate secrecy rates in cooperative relay beamforming in the presence of imperfect channel state information (CSI) and multiple eavesdroppers. A source-destination pair aided by.. out of.. relays, 1 <= k <= M, using decode-and-forward relay beamforming is considered. We compute the worst case secrecy rate with imperfect CSI in the presence of multiple eavesdroppers, where the number of eavesdroppers can be more than the number of relays. We solve the optimization problem for all possible relay combinations to find the secrecy rate and optimum source and relay weights subject to a total power constraint. We relax the rank-1 constraint on the complex semi-definite relay weight matrix and use S-procedure to reformulate the optimization problem that can be solved using convex semi-definite programming.
Resumo:
Before installation, a voltage source converter is usually subjected to heat-run test to verify its thermal design and performance under load. For heat-run test, the converter needs to be operated at rated voltage and rated current for a substantial length of time. Hence, such tests consume huge amount of energy in case of high-power converters. Also, the capacities of the source and loads available in the research and development (R&D) centre or the production facility could be inadequate to conduct such tests. This paper proposes a method to conduct heat-run tests on high-power, pulse width modulated (PWM) converters with low energy consumption. The experimental set-up consists of the converter under test and another converter (of similar or higher rating), both connected in parallel on the ac side and open on the dc side. Vector-control or synchronous reference frame control is employed to control the converters such that one draws certain amount of reactive power and the other supplies the same; only the system losses are drawn from the mains. The performance of the controller is validated through simulation and experiments. Experimental results, pertaining to heat-run tests on a high-power PWM converter, are presented at power levels of 25 kVA to 150 kVA.
Resumo:
We consider proper holomorphic mappings of equidimensional pseudoconvex domains in complex Euclidean space, where both source and target can be represented as Cartesian products of smoothly bounded domains. It is shown that such mappings extend smoothly up to the closures of the domains, provided each factor of the source satisfies Condition R. It also shown that the number of smoothly bounded factors in the source and target must be the same, and the proper holomorphic map splits as a product of proper mappings between the factor domains. (C) 2013 Elsevier Inc. All rights reserved.
Resumo:
In this paper, we propose FeatureMatch, a generalised approximate nearest-neighbour field (ANNF) computation framework, between a source and target image. The proposed algorithm can estimate ANNF maps between any image pairs, not necessarily related. This generalisation is achieved through appropriate spatial-range transforms. To compute ANNF maps, global colour adaptation is applied as a range transform on the source image. Image patches from the pair of images are approximated using low-dimensional features, which are used along with KD-tree to estimate the ANNF map. This ANNF map is further improved based on image coherency and spatial transforms. The proposed generalisation, enables us to handle a wider range of vision applications, which have not been tackled using the ANNF framework. We illustrate two such applications namely: 1) optic disk detection and 2) super resolution. The first application deals with medical imaging, where we locate optic disks in retinal images using a healthy optic disk image as common target image. The second application deals with super resolution of synthetic images using a common source image as dictionary. We make use of ANNF mappings in both these applications and show experimentally that our proposed approaches are faster and accurate, compared with the state-of-the-art techniques.
Resumo:
India's energy demand is increasing rapidly with the intensive growth of economy. The electricity demand in India exceeded the availability, both in terms of base load energy and peak availability. The efficient use of energy source and its conversion and utilizations are the viable alternatives available to the utilities or industry. There are essentially two approaches to electrical energy management. First at the supply / utility end (Supply Side Management or SSM) and the other at the consumer end (Demand Side Management or DSM). This work is based on Supply Side Management (SSM) protocol and consists of design, fabrication and testing of a control device that will be able to automatically regulate the power flow to an individual consumer's premise. This control device can monitor the overuse of electricity (above the connected load or contracted demand) by the individual consumers. The present project work specially emphasizes on contract demand of every consumer and tries to reduce the use beyond the contract demand. This control unit design includes both software and hardware work and designed for 0.5 kW contract demand. The device is tested in laboratory and reveals its potential use in the field.
Resumo:
We address the problem of passive eavesdroppers in multi-hop wireless networks using the technique of friendly jamming. The network is assumed to employ Decode and Forward (DF) relaying. Assuming the availability of perfect channel state information (CSI) of legitimate nodes and eavesdroppers, we consider a scheduling and power allocation (PA) problem for a multiple-source multiple-sink scenario so that eavesdroppers are jammed, and source-destination throughput targets are met while minimizing the overall transmitted power. We propose activation sets (AS-es) for scheduling, and formulate an optimization problem for PA. Several methods for finding AS-es are discussed and compared. We present an approximate linear program for the original nonlinear, non-convex PA optimization problem, and argue that under certain conditions, both the formulations produce identical results. In the absence of eavesdroppers' CSI, we utilize the notion of Vulnerability Region (VR), and formulate an optimization problem with the objective of minimizing the VR. Our results show that the proposed solution can achieve power-efficient operation while defeating eavesdroppers and achieving desired source-destination throughputs simultaneously. (C) 2015 Elsevier B.V. All rights reserved.
Resumo:
In this paper, we consider decode-and-forward (DF) relay beamforming for secrecy with cooperative jamming (CJ) in the presence of multiple eavesdroppers. The communication between a source-destination pair is aided by a multiple-input multiple-output (MIMO) relay. The source has one transmit antenna and the destination and eavesdroppers have one receive antenna each. The source and the MIMO relay are constrained with powers P-S and P-R, respectively. We relax the rank-1 constraint on the signal beamforming matrix and transform the secrecy rate max-min optimization problem to a single maximization problem, which is solved by semidefinite programming techniques. We obtain the optimum source power, signal relay weights, and jamming covariance matrix. We show that the solution of the rank-relaxed optimization problem has rank-1. Numerical results show that CJ can improve the secrecy rate.
Resumo:
In this paper, we consider decode-and-forward (DF) relay beamforming for secrecy with cooperative jamming (CJ) in the presence of multiple eavesdroppers. The communication between a source-destination pair is aided by a multiple-input multiple-output (MIMO) relay. The source has one transmit antenna and the destination and eavesdroppers have one receive antenna each. The source and the MIMO relay are constrained with powers P-S and P-R, respectively. We relax the rank-1 constraint on the signal beamforming matrix and transform the secrecy rate max-min optimization problem to a single maximization problem, which is solved by semidefinite programming techniques. We obtain the optimum source power, signal relay weights, and jamming covariance matrix. We show that the solution of the rank-relaxed optimization problem has rank-1. Numerical results show that CJ can improve the secrecy rate.
Resumo:
Thermal interface materials (TIMs) form a mechanical and thermal link between a heat source and a heat sink. Thus, they should have high thermal conductivity and high compliance to efficiently transfer heat and accommodate any differential strain between the heat source and the sink, respectively. This paper reports on the processing and the characterization of potential metallic TIM composite solders comprising of Cu, a high conductivity phase, uniformly embedded in In matrix, a highly compliant phase. We propose the fabrication of such a material by a two-step fabrication technique comprising of liquid phase sintering (LPS) followed by accumulative roll bonding (ARB). To demonstrate the efficacy of the employed two-step processing technique, an In-40 vol. % Cu composite solder was produced first using LPS with short sintering periods (30 or 60 s at 160 degrees C) followed by ARB up to five passes, each pass imposing a strain of 50%. Mechanical response and electrical and thermal conductivities of the fabricated samples were evaluated. It was observed that processing through ARB homogenizes the distribution of Cu in an In matrix, disintegrates the agglomerates of Cu powders, and also significantly increases thermal and electrical conductivities, almost attaining theoretically predicted values, without significantly increasing the flow stress. Furthermore, the processing technique also allows the insertion of desired foreign species, such as reduced graphene oxide, in In-Cu for further enhancing a target property, such as electrical conductivity.
Resumo:
Micro-indentation tests at scales of the order of sub-micron show that the measured hardness increases strongly with decreasing indent depth or indent size, which is frequently referred to as the size effect. At the same time, at micron or sub-micron scale, another effect, which is referred to as the geometrical size effects such as crystal grain size effect, thin film thickness effect, etc., also influences the measured material hardness. However, the trends are at odds with the size-independence implied by the conventional elastic-plastic theory. In the present research, the strain gradient plasticity theory (Fleck and Hutchinson) is used to model the composition effects (size effect and geometrical effect) for polycrystal material and metal thin film/ceramic substrate systems when materials undergo micro-indenting. The phenomena of the "pile-up" and "sink-in" appeared in the indentation test for the polycrystal materials are also discussed. Meanwhile, the micro-indentation experiments for the polycrystal Al and for the Ti/Si_3N_4 thin film/substrate system are carried out. By comparing the theoretical predictions with experimental measurements, the values and the variation trends of the micro-scale parameter included in the strain gradient plasticity theory are predicted.
Resumo:
This manual presents geographic information by state of occurrence, and descriptions of the socio-economic impact created by the invasion of non-indigenous and native transplanted animal species in the Laurentian Great Lakes and the coastal waters of the United States. It is not a comprehensive literature review, but rather is intended as a primer for those unfamiliar with the socio-economic impacts of invasive aquatic and marine animals. Readers should also note that the information contained in this manual is current as of its publication date. New information and new species are routinely being added to the wider literature base. Most of the information was gathered from a number of web sites maintained by government agencies, commissions, academic institutions and museums. Additional information was taken from the primary and secondary literature. This manual focuses on socio-economic consequences of invasive species. Thus, ecological impacts, when noted in the literature, are not discussed unless a connection to socio-economic factors can be made. For a majority of the species listed, either the impact of their invasion is not understood, or it is not published in sources surveyed. In the species summaries, sources of information are cited except for information from the U.S. Geological Survey’s (USGS) Nonindigenous Aquatic Species Database http://nas.er.usgs.gov. This website formed the base information used in creating tables on geographic distribution, and in many of the species summaries provided. Thus, whenever information is given without specific author/source and date citation, it has come from this comprehensive source. (PDF contains 90 pages)