991 resultados para Numerical scheme


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Results of a numerical study of synchronisation of two directly modulated semiconductor lasers, using bi-directional coupling, are presented. The effect of stepwise increase in the coupling strength (C) on the synchronisation of the chaotic outputs of two such lasers is studied, with the help of parameter space plots, synchronisation error plots, phase diagrams and time series outputs. Numerical results indicate that as C increases, the system achieves synchronisation as well as stability together with an increase in the output power. The stability of the synchronised states is checked by applying a perturbation to the system after it becomes synchronised and then noting the time it takes to regain synchronisation. For lower values of C the system does not regain synchronisation. But, with higher values synchronisation is regained within a very short time.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Frames are the most widely used structural system for multistorey buildings. A building frame is a three dimensional discrete structure consisting of a number of high rise bays in two directions at right angles to each other in the vertical plane. Multistorey frames are a three dimensional lattice structure which are statically indeterminate. Frames sustain gravity loads and resist lateral forces acting on it. India lies at the north westem end of the Indo-Australian tectonic plate and is identified as an active tectonic area. Under horizontal shaking of the ground, horizontal inertial forces are generated at the floor levels of a multistorey frame. These lateral inertia forces are transferred by the floor slab to the beams, subsequently to the columns and finally to the soil through the foundation system. There are many parameters that affect the response of a structure to ground excitations such as, shape, size and geometry of the structure, type of foundation, soil characteristics etc. The Soil Structure Interaction (SS1) effects refer to the influence of the supporting soil medium on the behavior of the structure when it is subjected to different types of loads. Interaction between the structure and its supporting foundation and soil, which is a complete system, has been modeled with finite elements. Numerical investigations have been carried out on a four bay, twelve storeyed regular multistorey frame considering depth of fixity at ground level, at characteristic depth of pile and at full depth. Soil structure interaction effects have been studied by considering two models for soil viz., discrete and continuum. Linear static analysis has been conducted to study the interaction effects under static load. Free vibration analysis and further shock spectrum analysis has been conducted to study the interaction effects under time dependent loads. The study has been extended to four types of soil viz., laterite, sand, alluvium and layered.The structural responses evaluated in the finite element analysis are bending moment, shear force and axial force for columns, and bending moment and shear force for beams. These responses increase with increase in the founding depth; however these responses show minimal increase beyond the characteristic length of pile. When the soil structure interaction effects are incorporated in the analysis, the aforesaid responses of the frame increases upto the characteristic depth and decreases when the frame has been analysed for the full depth. It has been observed that shock spectrum analysis gives wide variation of responses in the frame compared to linear elastic analysis. Both increase and decrease in responses have been observed in the interior storeys. The good congruence shown by the two finite element models viz., discrete and continuum in linear static analysis has been absent in shock spectrum analysis.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

n the recent years protection of information in digital form is becoming more important. Image and video encryption has applications in various fields including Internet communications, multimedia systems, medical imaging, Tele-medicine and military communications. During storage as well as in transmission, the multimedia information is being exposed to unauthorized entities unless otherwise adequate security measures are built around the information system. There are many kinds of security threats during the transmission of vital classified information through insecure communication channels. Various encryption schemes are available today to deal with information security issues. Data encryption is widely used to protect sensitive data against the security threat in the form of “attack on confidentiality”. Secure transmission of information through insecure communication channels also requires encryption at the sending side and decryption at the receiving side. Encryption of large text message and image takes time before they can be transmitted, causing considerable delay in successive transmission of information in real-time. In order to minimize the latency, efficient encryption algorithms are needed. An encryption procedure with adequate security and high throughput is sought in multimedia encryption applications. Traditional symmetric key block ciphers like Data Encryption Standard (DES), Advanced Encryption Standard (AES) and Escrowed Encryption Standard (EES) are not efficient when the data size is large. With the availability of fast computing tools and communication networks at relatively lower costs today, these encryption standards appear to be not as fast as one would like. High throughput encryption and decryption are becoming increasingly important in the area of high-speed networking. Fast encryption algorithms are needed in these days for high-speed secure communication of multimedia data. It has been shown that public key algorithms are not a substitute for symmetric-key algorithms. Public key algorithms are slow, whereas symmetric key algorithms generally run much faster. Also, public key systems are vulnerable to chosen plaintext attack. In this research work, a fast symmetric key encryption scheme, entitled “Matrix Array Symmetric Key (MASK) encryption” based on matrix and array manipulations has been conceived and developed. Fast conversion has been achieved with the use of matrix table look-up substitution, array based transposition and circular shift operations that are performed in the algorithm. MASK encryption is a new concept in symmetric key cryptography. It employs matrix and array manipulation technique using secret information and data values. It is a block cipher operated on plain text message (or image) blocks of 128 bits using a secret key of size 128 bits producing cipher text message (or cipher image) blocks of the same size. This cipher has two advantages over traditional ciphers. First, the encryption and decryption procedures are much simpler, and consequently, much faster. Second, the key avalanche effect produced in the ciphertext output is better than that of AES.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Doctoral thesis focuses on the factors that influence the weather and climate over Peninsular Indias. The first chapter provides a general introduction about the climatic features over peninsular India, various factors dealt in subsequent chapters, such as solar forcing on climate, SST variability in the northern Indian Ocean and its influence on Indian monsoon, moisture content of the atmosphere and its importance in the climate system, empirical formulation of regression forecast of climate and some aspects of regional climate modeling. Chapter 2 deals with the variability in the vertically integrated moisture (VIM) over Peninsular India on various time scales. The third Chapter discusses the influence of solar activity in the low frequency variability in the rainfall of Peninsular India. The study also investigates the influence of solar activity on the horizontal and vertical components of wind and the difference in the forcing before and after the so-called regime shift in the climate system before and after mid-1970s.In Chapter 4 on Peninsular Indian Rainfall and its association with meteorological and oceanic parameters over adjoining oceanic region, a linear regression model was developed and tested for the seasonal rainfall prediction of Peninsular India.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Even though Bergey '5 Manual has been recognized globally as the guide to bacterial systematics, it has to be emphasized that descriptions given to a large extent are based on studies made with temperate isolates This leads one to conclude that any attempt to identify the tropical isolates with identification keys and tables generated from this information may lead to erroneous conclusions. And there is every possibility of the existence of genotypic and phenotypic variants or even nev. species in this part ofthe aquatic ecosystem. Applications ofa polythetic scheme of classification based on the principles of Numerical Taxonomy opens up exciting avenues for bringing to light, this possibility which otherwise would have been masked by the unidirectional approach as in monothetic schemes. Another added advantage of clustering a ‘natural’ bacterial population by numerical taxonomy, is the ease by which genotypic characterization could be performed on the clusters by selecting a representative from each cluster This helps overcome the practical impossibility of analyzing all the isolates in a pani:'_lar cluster. The genotypic characteizarion would either be mole °/o G-'rC. DNA-D.\_-X hybridization, DNA-RNA hybridization or DNA fingerprinting. Considering the requirement creating a broad base in the understanding of the family Vibrionaceae associated with the larvae ofM rosenbergii, the present work was undertaken to channelize every new information generated for developing appropriate managerial measures to protect the larvae from vibriosis during the unusually prolonged larval phase.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Health insurance has become a necessity for the common man, next to food, clothing and shelter. The financing of health expense is either catastrophic or sometimes even frequently contracted illnesses, is a major cause of mental agony for the common man. The cost of care may sometimes result in the complete erosion of the family savings or may even lead to indebtedness as many studies on causes of rural indebtedness bear testimony (Jayalakshmi, 2006). A suitable cover by way of health insurance is all that is required to cope with such situations. Health care insurance rightly provides the mechanism for both individuals and families to mitigate the financial burden of medical expenses in the present context. Hence a well designed affordable health insurance policy is the need of the hour.Therefore, it is very significant to study the extent to which the beneficiaries in Kerala make use of the benefits provided by a social health insurance scheme like RSBY-CHIS. Based on the above pertinent points, this study assumes national relevance even though the geographical area of the study is limited to two districts of Kerala. The findings of the study will bring forth valuable inputs on the services availed by the beneficiaries of RSBYCHIS and take appropriate measures to improve the effectiveness of the scheme whereby maximum quality benefit could be availed by the poorest of the poor and develop the scheme as a real dawn of the new era of health for them

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The present study focuses on vibrios especially Vibrio harveyi isolated from shrimp (P. monodon) larval production systems from both east and west coasts during times of mortality. A comprehensive approach has been made to work out their systematics through numerical taxonomy and group them based on RAPD profiling and to segregate the virulent from non- virulent isolates based on the presence of virulent genes as well as their phenotypic expression. The information gathered has helped to develop a simple scheme of identification based on phenotypic characters and segregate the virulent from non virulent strains of V. harveyi.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Tsunamis are water waves generated by a sudden vertical displacement of the water surface. They are waves generated in the ocean by the disturbance associated with seismic activity, under sea volcanic eruptions, submarine landslides, nuclear explosion or meteorite impacts with the ocean. These waves are generated in the ocean and travel into coastal bays, gulfs, estuaries and rivers. These waves travel as gravity waves with a velocity dependent on water depth. The term tsunami is Japanese and means harbour (tsu) and wave (nami). It has been named so because such waves often develop resonant phenomena in harbours after offshore earthquakes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Clustering schemes improve energy efficiency of wireless sensor networks. The inclusion of mobility as a new criterion for the cluster creation and maintenance adds new challenges for these clustering schemes. Cluster formation and cluster head selection is done on a stochastic basis for most of the algorithms. In this paper we introduce a cluster formation and routing algorithm based on a mobility factor. The proposed algorithm is compared with LEACH-M protocol based on metrics viz. number of cluster head transitions, average residual energy, number of alive nodes and number of messages lost

Relevância:

20.00% 20.00%

Publicador:

Resumo:

While channel coding is a standard method of improving a system’s energy efficiency in digital communications, its practice does not extend to high-speed links. Increasing demands in network speeds are placing a large burden on the energy efficiency of high-speed links and render the benefit of channel coding for these systems a timely subject. The low error rates of interest and the presence of residual intersymbol interference (ISI) caused by hardware constraints impede the analysis and simulation of coded high-speed links. Focusing on the residual ISI and combined noise as the dominant error mechanisms, this paper analyses error correlation through concepts of error region, channel signature, and correlation distance. This framework provides a deeper insight into joint error behaviours in high-speed links, extends the range of statistical simulation for coded high-speed links, and provides a case against the use of biased Monte Carlo methods in this setting

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Coded OFDM is a transmission technique that is used in many practical communication systems. In a coded OFDM system, source data are coded, interleaved and multiplexed for transmission over many frequency sub-channels. In a conventional coded OFDM system, the transmission power of each subcarrier is the same regardless of the channel condition. However, some subcarrier can suffer deep fading with multi-paths and the power allocated to the faded subcarrier is likely to be wasted. In this paper, we compute the FER and BER bounds of a coded OFDM system given as convex functions for a given channel coder, inter-leaver and channel response. The power optimization is shown to be a convex optimization problem that can be solved numerically with great efficiency. With the proposed power optimization scheme, near-optimum power allocation for a given coded OFDM system and channel response to minimize FER or BER under a constant transmission power constraint is obtained

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In [4], Guillard and Viozat propose a finite volume method for the simulation of inviscid steady as well as unsteady flows at low Mach numbers, based on a preconditioning technique. The scheme satisfies the results of a single scale asymptotic analysis in a discrete sense and comprises the advantage that this can be derived by a slight modification of the dissipation term within the numerical flux function. Unfortunately, it can be observed by numerical experiments that the preconditioned approach combined with an explicit time integration scheme turns out to be unstable if the time step Dt does not satisfy the requirement to be O(M2) as the Mach number M tends to zero, whereas the corresponding standard method remains stable up to Dt=O(M), M to 0, which results from the well-known CFL-condition. We present a comprehensive mathematical substantiation of this numerical phenomenon by means of a von Neumann stability analysis, which reveals that in contrast to the standard approach, the dissipation matrix of the preconditioned numerical flux function possesses an eigenvalue growing like M-2 as M tends to zero, thus causing the diminishment of the stability region of the explicit scheme. Thereby, we present statements for both the standard preconditioner used by Guillard and Viozat [4] and the more general one due to Turkel [21]. The theoretical results are after wards confirmed by numerical experiments.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article is concerned with the numerical simulation of flows at low Mach numbers which are subject to the gravitational force and strong heat sources. As a specific example for such flows, a fire event in a car tunnel will be considered in detail. The low Mach flow is treated with a preconditioning technique allowing the computation of unsteady flows, while the source terms for gravitation and heat are incorporated via operator splitting. It is shown that a first order discretization in space is not able to compute the buoyancy forces properly on reasonable grids. The feasibility of the method is demonstrated on several test cases.