904 resultados para Missouri valley authority (Proposed)
Resumo:
A high resolution quantitative granulometric record for site Uchediya 21A degrees 43'2.22aEuro(3) N, 73A degrees 6'26.22aEuro(3) E; 10 m a. s. l.] gives understanding towards accretion history of the late Holocene flood plain in the lower reaches of Narmada River. Two sediment facies (sandy and muddy) and seven subfacies (sandy subfacies: St(MS+FS+CS), SmFS+MS, Sl(FS+VFS), and St(MS + CS); muddy subfacies: FmSILT+VFS+FS, FmSILT+VFS (O) and FmSILT+VFS (T)) are identified based on cluster analysis supplemented with sedimentary structures observed in field and other laboratory data. Changes in hydrodynamics are further deduced based on various sedimentological parameters and their ratios leading to arrive at a depositional model.
Resumo:
In graphene, the valleys represent spinlike quantities and can act as a physical resource in valley-based electronics to produce novel quantum computation schemes. Here we demonstrate a direct route to tune and read the valley quantum states of disordered graphene by measuring the mesoscopic conductance fluctuations. We show that the conductance fluctuations in graphene at low temperatures are reduced by a factor of 4 when valley triplet states are gapped in the presence of short-range potential scatterers at high carrier densities. We also show that this implies a gate tunable universal symmetry class that outlines a fundamental feature arising from graphene's unique crystal structure.
Resumo:
Mobile ad hoc networks (MANETs) is one of the successful wireless network paradigms which offers unrestricted mobility without depending on any underlying infrastructure. MANETs have become an exciting and im- portant technology in recent years because of the rapid proliferation of variety of wireless devices, and increased use of ad hoc networks in various applications. Like any other networks, MANETs are also prone to variety of attacks majorly in routing side, most of the proposed secured routing solutions based on cryptography and authentication methods have greater overhead, which results in latency problems and resource crunch problems, especially in energy side. The successful working of these mechanisms also depends on secured key management involving a trusted third authority, which is generally difficult to implement in MANET environ-ment due to volatile topology. Designing a secured routing algorithm for MANETs which incorporates the notion of trust without maintaining any trusted third entity is an interesting research problem in recent years. This paper propose a new trust model based on cognitive reasoning,which associates the notion of trust with all the member nodes of MANETs using a novel Behaviors-Observations- Beliefs(BOB) model. These trust values are used for detec- tion and prevention of malicious and dishonest nodes while routing the data. The proposed trust model works with the DTM-DSR protocol, which involves computation of direct trust between any two nodes using cognitive knowledge. We have taken care of trust fading over time, rewards, and penalties while computing the trustworthiness of a node and also route. A simulator is developed for testing the proposed algorithm, the results of experiments shows incorporation of cognitive reasoning for computation of trust in routing effectively detects intrusions in MANET environment, and generates more reliable routes for secured routing of data.
Resumo:
We demonstrate that the universal conductance fluctuations (UCF) can be used as a direct probe to study the valley quantum states in disordered graphene. The UCF magnitude in graphene is suppressed by a factor of four at high carrier densities where the short-range disorder essentially breaks the valley degeneracy of the K and K' valleys, leading to a density dependent crossover of symmetry class from symplectic near the Dirac point to orthogonal at high densities.
Resumo:
This paper describes two new Gomphonema species from the lesser Himalayas, India, with their valve morphology using light and scanning electron microscopy. The two species, Gomphonema juettnerii sp. nov. and G. doonensis sp. nov., were found in Nalota stream in Doon Valley of Uttarakhand State. Main features of G. juettnerii are valve outline, shape of the areolae and striae pattern and presence of stigma. Main features of G. doonensis are rounded headpole, striae made by doubly punctate striae and features in central area. A detailed discussion on doubly punctate striae in members of gomphonemoid diatoms is presented.
Resumo:
In optical character recognition of very old books, the recognition accuracy drops mainly due to the merging or breaking of characters. In this paper, we propose the first algorithm to segment merged Kannada characters by using a hypothesis to select the positions to be cut. This method searches for the best possible positions to segment, by taking into account the support vector machine classifier's recognition score and the validity of the aspect ratio (width to height ratio) of the segments between every pair of cut positions. The hypothesis to select the cut position is based on the fact that a concave surface exists above and below the touching portion. These concave surfaces are noted down by tracing the valleys in the top contour of the image and similarly doing it for the image rotated upside-down. The cut positions are then derived as closely matching valleys of the original and the rotated images. Our proposed segmentation algorithm works well for different font styles, shapes and sizes better than the existing vertical projection profile based segmentation. The proposed algorithm has been tested on 1125 different word images, each containing multiple merged characters, from an old Kannada book and 89.6% correct segmentation is achieved and the character recognition accuracy of merged words is 91.2%. A few points of merge are still missed due to the absence of a matched valley due to the specific shapes of the particular characters meeting at the merges.
Resumo:
An analytical solution for the three-dimensional scattering and diffraction of plane P-waves by a hemispherical alluvial valley with saturated soil deposits is developed by employing Fourier-Bessel series expansion technique. Unlike previous studies, in which the saturated soil deposits were simulated with the single-phase elastic theory, in this paper, they are simulated with Biot's dynamic theory for saturated porous media, and the half space is assumed as a single-phase elastic medium. The effects of the dimensionless frequency, the incidence angle of P-wave and the porosity of soil deposits on the surface displacement magnifications of the hemispherical alluvial valley are investigated. Numerical results show that the existence of a saturated hemispherical alluvial valley has much influence on the surface displacement magnifications. It is more reasonable to simulate soil deposits with Biot's dynamic theory when evaluating the displacement responses of a hemispherical alluvial valley with an incidence of P-waves.
Resumo:
An analytical solution to the three-dimensional scattering and diffraction of plane SV-waves by a saturated hemispherical alluvial valley in elastic half-space is obtained by using Fourier-Bessel series expansion technique. The hemispherical alluvial valley with saturated soil deposits is simulated with Biot's dynamic theory for saturated porous media. The following conclusions based on numerical results can be drawn: (1) there are a significant differences in the seismic response simulation between the previous single-phase models and the present two-phase model; (2) the normalized displacements on the free surface of the alluvial valley depend mainly on the incident wave angles, the dimensionless frequency of the incident SV waves and the porosity of sediments; (3) with the increase of the incident angle, the displacement distributions become more complicated; and the displacements on the free surface of the alluvial valley increase as the porosity of sediments increases.
Resumo:
Potential efficiency gains due to a merger can be used by competition authorities to judge upon proposed mergers. In a world where agents’ efforts, observable or unobservable, affect the success of a production cost reducing project that may be conducted as a stand-alone firm or in a merger, we characterize the merger decision and the type of errors a competition authority may make when it relies on an efficiency defense. In addition, we show that the occurrence of either type of errors is always smaller under the unobservable efforts assumption, than under the observable efforts one.
Resumo:
Leonard Carpenter Panama Canal Collection. Photographs: Dredging, Soldiers, and Ships. [Box 1] from the Special Collections & Area Studies Department, George A. Smathers Libraries, University of Florida.
Resumo:
The Adult Education Services from six local authorities in the North East joined forces to set-up a shared virtual learning environment (VLE) called TeesLearn. It provides their learners with new and inspiring learning opportunities and supports them across a rural and wide geographical area.
Resumo:
Authority files serve to uniquely identify real world ‘things’ or entities like documents, persons, organisations, and their properties, like relations and features. Already important in the classical library world, authority files are indispensable for adequate information retrieval and analysis in the computer age. This is because, even more than humans, computers are poor at handling ambiguity. Through authority files, people tell computers which terms, names or numbers refer to the same thing or have the same meaning by giving equivalent notions the same identifier. Thus, authority files signpost the internet where these identifiers are interlinked on the basis of relevance. When executing a query, computers are able to navigate from identifier to identifier by following these links and collect the queried information on these so-called ‘crosswalks’. In this context, identifiers also go under the name controlled access points. Identifiers become even more crucial now massive data collections like library catalogues or research datasets are releasing their till-now contained data directly to the internet. This development is coined Open Linked Data. The concatenating name for the internet is Web of Data instead of the classical Web of Documents.