1000 resultados para Asymmetrical space
Resumo:
The authors study the trajectories of charged particles in Ernst's space-time representing a static black hole immersed in a magnetic field. They find bound orbits always exist for realistic magnetic field strengths. A similar investigation is carried out for the case of Melvin's magnetic universe and for a corresponding test field superposed on a flat space-time.
Resumo:
An algorithm to generate a minimal spanning tree is presented when the nodes with their coordinates in some m-dimensional Euclidean space and the corresponding metric are given. This algorithm is tested on manually generated data sets. The worst case time complexity of this algorithm is O(n log2n) for a collection of n data samples.
Resumo:
The dissertation examines aspects of asymmetrical warfare in the war-making of the German military entrepreneur Ernst von Mansfeld during his involvement in the Thirty Years War. Due to the nature of the inquiry, which combines history with military-political theory, the methodological approach of the dissertation is interdisciplinary. The theoretical framework used is that of asymmetrical warfare. The primary sources used in the dissertation are mostly political pamphlets and newsletters. Other sources include letters, documents, and contemporaneous chronicles. The secondary sources are divided into two categories, literature on the history of the Thirty Years War and textbooks covering the theory of asymmetrical warfare. The first category includes biographical works on Ernst von Mansfeld, as well as general histories of the Thirty Years War and seventeenth-century warfare. The second category combines military theory and political science. The structure of the dissertation consists of eight lead chapters, including an introduction and conclusion. The introduction covers the theoretical approach and aims of the dissertation, and provides a brief overlook of the sources and previous research on Ernst von Mansfeld and asymmetrical warfare in the Thirty Years War. The second chapter covers aspects of Mansfeld s asymmetrical warfare from the perspective of operational art. The third chapter investigates the illegal and immoral aspects of Mansfeld s war-making. The fourth chapter compares the differing methods by which Mansfeld and his enemies raised and financed their armies. The fifth chapter investigates Mansfeld s involvement in indirect warfare. The sixth chapter presents Mansfeld as an object and an agent of image and information war. The seventh chapter looks into the counter-reactions, which Mansfeld s asymmetrical warfare provoked from his enemies. The eighth chapter offers a conclusion of the findings. The dissertation argues that asymmetrical warfare presented itself in all the aforementioned areas of Mansfeld s conduct during the Thirty Years War. The operational asymmetry arose from the freedom of movement that Mansfeld enjoyed, while his enemies were constrained by the limits of positional warfare. As a non-state operator Mansfeld was also free to flout the rules of seventeenth-century warfare, which his enemies could not do with equal ease. The raising and financing of military forces was another source of asymmetry, because the nature of early seventeenth-century warfare favoured private military entrepreneurs rather than embryonic fiscal-military states. The dissertation also argues that other powers fought their own asymmetrical and indirect wars against the Habsburgs through Mansfeld s agency. Image and information were asymmetrical weapons, which were both aimed against Mansfeld and utilized by him. Finally, Mansfeld s asymmetrical threat forced the Habsburgs to adapt to his methods, which ultimately lead to the formation of a subcontracted Imperial Army under the management and leadership of Albrecht von Wallenstein. Therefore Mansfeld s asymmetrical warfare ultimately paved way for the kind of state-monopolized, organised, and symmetrical warfare that has prevailed from 1648 onwards. The conclusion is that Mansfeld s conduct in the Thirty Years War matched the criteria for asymmetrical warfare. While traditional historiography treated Mansfeld as an anomaly in the age of European state formation, his asymmetrical warfare has begun to bear resemblance to the contemporary conflicts, where nation states no longer hold the monopoly of violence.
Resumo:
Some texts and a performance story. All motivated by the author’s interest in space, in this that surrounds, and that interest, in turn, originating from the author’s earlier studies in cultural anthropology, in observing and experiencing the surrounding animate and inanimate world. The texts in this thesis are alternating between academic and creative writing. They are texts written on a specific site on Suomenlinna island in Helsinki, Finland, as part of the performance ”Beyond the Wind in Front of Me / A Space Ship Journey” story or prologues to that, and the more academic ones supporting them or growing out of them, being accompanied also by the thoughts and practices of others. The main research questions and themes being How to perceive this that surrounds me? What is space, what does it consist of? Is it something that simply surrounds me? Am I a part of it or is it a part of me? How can a space be researched? How to activate a space? What kind of mental images do spaces/places create/uncover/open up in us? How to animate/make alive those images? Body giving meaning to space via actions created by the body. Physical environment contra emotional, imaginary, visionary one. Presence in a space/place. Physical and mental presence. Presence in memories.
Resumo:
The outer atmosphere of the sun called the corona has been observed during total solar eclipse for short periods (typically <6 min), from as early as the eighteenth century. In the recent past, space-based instruments have permitted us to study the corona uninterruptedly. In spite of these developments, the dynamic corona and its high temperature (1-2 million K) are yet to be Ally understood. It is conjectured that their dynamic nature and associated energetic events are possible reasons behind the high temperature. In order to study these in detail, a visible emission line space solar coronagraph is being proposed as a payload under the small-satellite programme of the Indian Space Research Organisation. The satellite is named as Aditya-1 and the scientific objectives of this payload are to study: (i) the existence of intensity oscillations for the study of wave-driven coronal heating; (ii) the dynamics and formation of coronal loops and temperature structure of the coronal features; (iii) the origin, cause and acceleration of coronal mass ejections (CMEs) and other solar active features, and (iv) coronal magnetic field topology and three-dimensional structures of CMEs using polarization information. The uniqueness of this payload compared to previously flown space instruments is as follows: (a) observations in the visible wavelength closer to the disk (down to 1.05 solar radii); (b) high time cadence capability (better than two-images per second), and (c) simultaneous observations of at least two spectral windows all the time and three spectral windows for short durations.
Resumo:
In this paper, we show a method of obtaining general and orthogonal moments, specifically Legendre and Zernicke moments, from the Radon Transform data of a two-dimensional function. The regular or geometric moments are first evaluated directly from the projection data and the orthogonal moments are derived from these regular moments.
Resumo:
This paper addresses the problem of determining an optimal (shortest) path in three dimensional space for a constant speed and turn-rate constrained aerial vehicle, that would enable the vehicle to converge to a rectilinear path, starting from any arbitrary initial position and orientation. Based on 3D geometry, we propose an optimal and also a suboptimal path planning approach. Unlike the existing numerical methods which are computationally intensive, this optimal geometrical method generates an optimal solution in lesser time. The suboptimal solution approach is comparatively more efficient and gives a solution that is very close to the optimal one. Due to its simplicity and low computational requirements this approach can be implemented on an aerial vehicle with constrained turn radius to reach a straight line with a prescribed orientation as required in several applications. But, if the distance between the initial point and the straight line to be followed along the vertical axis is high, then the generated path may not be flyable for an aerial vehicle with limited range of flight path angle and we resort to a numerical method for obtaining the optimal solution. The numerical method used here for simulation is based on multiple shooting and is found to be comparatively more efficient than other methods for solving such two point boundary value problem.
Resumo:
Large MIMO systems with tens of antennas in each communication terminal using full-rate non-orthogonal space-time block codes (STBC) from Cyclic Division Algebras (CDA) can achieve the benefits of both transmit diversity as well as high spectral efficiencies. Maximum-likelihood (ML) or near-ML decoding of these large-sized STBCs at low complexities, however, has been a challenge. In this paper, we establish that near-ML decoding of these large STBCs is possible at practically affordable low complexities. We show that the likelihood ascent search (LAS) detector, reported earlier by us for V-BLAST, is able to achieve near-ML uncoded BER performance in decoding a 32x32 STBC from CDA, which employs 32 transmit antennas and sends 32(2) = 1024 complex data symbols in 32 time slots in one STBC matrix (i.e., 32 data symbols sent per channel use). In terms of coded BER, with a 16x16 STBC, rate-3/4 turbo code and 4-QAM (i.e., 24 bps/Hz), the LAS detector performs close to within just about 4 dB from the theoretical MIMO capacity. Our results further show that, with LAS detection, information lossless (ILL) STBCs perform almost as good as full-diversity ILL (FD-ILL) STBCs. Such low-complexity detectors can potentially enable implementation of high spectral efficiency large MIMO systems that could be considered in wireless standards.
Resumo:
It is shown that the asymmetric chiral gauging of the WZW models give rise to consistent string backgrounds. The target space structure of the chiral gauged SL(2,R) WZW model, with the gauging of subgroups SO(1, 1) in the left and U(1) in the right moving sector, is obtained. We then analyze the symmetries of the background and show the presence of a non-trivial isometry in the canonical parametrization of the WZW model. Using these results, the equivalence of the asymmetric models with the symmetric ones is demonstrated.
Resumo:
A geometric invariant is associated to the parabolic moduli space on a marked surface and is related to the symplectic structure of the moduli space.
Resumo:
Analytical solutions of the generalized Bloch equations for an arbitrary set of initial values of the x, y, and z magnetization components are given in the rotating frame. The solutions involve the decoupling of the three coupled differential equations such that a third-order differential equation in each magnetization variable is obtained. In contrast to the previously reported solutions given by Torrey, the present attempt paves the way for more direct physical insight into the behavior of each magnetization component. Special cases have been discussed that highlight the utility of the general solutions. Representative trajectories of magnetization components are given, illustrating their behavior with respect to the values of off-resonance and initial conditions. (C) 1995 Academic Press, Inc.
Resumo:
This paper proposes a sensorless vector control scheme for general-purpose induction motor drives using the current error space phasor-based hysteresis controller. In this paper, a new technique for sensorless operation is developed to estimate rotor voltage and hence rotor flux position using the stator current error during zero-voltage space vectors. It gives a comparable performance with the vector control drive using sensors especially at a very low speed of operation (less than 1 Hz). Since no voltage sensing is made, the dead-time effect and loss of accuracy in voltage sensing at low speed are avoided here, with the inherent advantages of the current error space phasor-based hysteresis controller. However, appropriate device on-state drops are compensated to achieve a steady-state operation up to less than 1 Hz. Moreover, using a parabolic boundary for current error, the switching frequency of the inverter can be maintained constant for the entire operating speed range. Simple sigma L-s estimation is proposed, and the parameter sensitivity of the control scheme to changes in stator resistance, R-s is also investigated in this paper. Extensive experimental results are shown at speeds less than 1 Hz to verify the proposed concept. The same control scheme is further extended from less than 1 Hz to rated 50 Hz six-step operation of the inverter. Here, the magnetic saturation is ignored in the control scheme.
Resumo:
The technique of space vector pulsewidth modulation (SVM) is reviewed. The basic principle of SVM is derived and is compared with sine-triangle PWM. Operation in the overmodulation range is explained. Extension of SVM to other inverter-motor combinations such as three level inverters and split phase motors are discussed.
Resumo:
The problem of sensor-network-based distributed intrusion detection in the presence of clutter is considered. It is argued that sensing is best regarded as a local phenomenon in that only sensors in the immediate vicinity of an intruder are triggered. In such a setting, lack of knowledge of intruder location gives rise to correlated sensor readings. A signal-space view-point is introduced in which the noise-free sensor readings associated to intruder and clutter appear as surfaces f(s) and f(g) and the problem reduces to one of determining in distributed fashion, whether the current noisy sensor reading is best classified as intruder or clutter. Two approaches to distributed detection are pursued. In the first, a decision surface separating f(s) and f(g) is identified using Neyman-Pearson criteria. Thereafter, the individual sensor nodes interactively exchange bits to determine whether the sensor readings are on one side or the other of the decision surface. Bounds on the number of bits needed to be exchanged are derived, based on communication-complexity (CC) theory. A lower bound derived for the two-party average case CC of general functions is compared against the performance of a greedy algorithm. Extensions to the multi-party case is straightforward and is briefly discussed. The average case CC of the relevant greaterthan (CT) function is characterized within two bits. Under the second approach, each sensor node broadcasts a single bit arising from appropriate two-level quantization of its own sensor reading, keeping in mind the fusion rule to be subsequently applied at a local fusion center. The optimality of a threshold test as a quantization rule is proved under simplifying assumptions. Finally, results from a QualNet simulation of the algorithms are presented that include intruder tracking using a naive polynomial-regression algorithm. 2010 Elsevier B.V. All rights reserved.