938 resultados para Quasi-analytical algorithms
Resumo:
An attempt is made to determine the relative power distribution in a step-index parabolic cylindrical waveguide (PCW) with high deformation across the direction of propagation. The guide is assumed to be made of silica. The scalar field approximation is employed for the analysis under which a vanishing refractive-index (RI) difference in the waveguide materials is considered. Further, no approximation for folds- is used in the analytical treatment. Due to the geometry of such waceguides, PCWs lose the well-defined modal discreteness, and a kind of mode bunching is observed instead, which becomes much more prominent in PCWs with high bends. However, with the increase in cross-sectional size, the mode-bunching tendency is slightly reduced. The general expressions for power in the guiding and nonguiding sections are obtained, and the fractional power patterns in all of the sections are presented for PCWs of various cross-sectional dimensions. It is observed that the confinement of power in the core section is increased for PCWs of larger cross-sectional size. Moreover, a fairly uniform distribution of power is seen over the modes having intermediate values of propagation constants
Resumo:
The question of stability of black hole was first studied by Regge and Wheeler who investigated linear perturbations of the exterior Schwarzschild spacetime. Further work on this problem led to the study of quasi-normal modes which is believed as a characteristic sound of black holes. Quasi-normal modes (QNMs) describe the damped oscillations under perturbations in the surrounding geometry of a black hole with frequencies and damping times of oscillations entirely fixed by the black hole parameters.In the present work we study the influence of cosmic string on the QNMs of various black hole background spacetimes which are perturbed by a massless Dirac field.
Resumo:
Extensive use of the Internet coupled with the marvelous growth in e-commerce and m-commerce has created a huge demand for information security. The Secure Socket Layer (SSL) protocol is the most widely used security protocol in the Internet which meets this demand. It provides protection against eaves droppings, tampering and forgery. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL. But recent attacks against RC4 and HMAC have raised questions in the confidence on these algorithms. Hence two novel cryptographic algorithms MAJE4 and MACJER-320 have been proposed as substitutes for them. The focus of this work is to demonstrate the performance of these new algorithms and suggest them as dependable alternatives to satisfy the need of security services in SSL. The performance evaluation has been done by using practical implementation method.
Resumo:
Submarine hull structure is a watertight envelope, under hydrostatic pressure when in operation. Stiffened cylindrical shells constitute the major portion of these submarine hulls and these thin shells under compression are susceptible to buckling failure. Normally loss of stability occurs at the limit point rather than at the bifurcation point and the stability analysis has to consider the change in geometry at each load step. Hence geometric nonlinear analysis of the shell forms becomes. a necessity. External hydrostatic pressure will follow the deformed configuration of the shell and hence follower force effect has to be accounted for. Computer codes have been developed based on all-cubic axisymmetric cylindrical shell finite element and discrete ring stiffener element for linear elastic, linear buckling and geometric nonIinear analysis of stiffened cylindrical shells. These analysis programs have the capability to treat hydrostatic pressure as a radial load and as a follower force. Analytical investigations are carried out on two attack submarine cylindrical hull models besides standard benchmark problems. In each case, the analysis has been carried out for interstiffener, interdeepframe and interbulkhead configurations. The shell stiffener attachment in each of this configuration has been represented by the simply supported-simply supported, clamped-clamped and fixed-fixed boundary conditions in this study. The results of the analytical investigations have been discussed and the observations and conclusions are described. Rotation restraint at the ends is influential for interstiffener and interbulkhead configurations and the significance of axial restraint becomes predominant in the interbulkhead configuration. The follower force effect of hydrostatic pressure is not significant in interstiffener and interdeepframe configurations where as it has very high detrimental effect on buckling pressure on interbulkhead configuration. The geometric nonlinear interbulkhead analysis incorporating follower force effect gives the critical value of buckling pressure and this analysis is recommended for the determination of collapse pressure of stiffened cylindrical submarine shells.
Resumo:
Large amplitude local density fluctuations in a thin superfluid He film is considered. It is shown that these large amplitude fluctuations travel and behave like "quasi-solitons" under collision, even when the full nonlinearity arising from the Van der Waals potential is taken into account.
Resumo:
Internet today has become a vital part of day to day life, owing to the revolutionary changes it has brought about in various fields. Dependence on the Internet as an information highway and knowledge bank is exponentially increasing so that a going back is beyond imagination. Transfer of critical information is also being carried out through the Internet. This widespread use of the Internet coupled with the tremendous growth in e-commerce and m-commerce has created a vital need for infonnation security.Internet has also become an active field of crackers and intruders. The whole development in this area can become null and void if fool-proof security of the data is not ensured without a chance of being adulterated. It is, hence a challenge before the professional community to develop systems to ensure security of the data sent through the Internet.Stream ciphers, hash functions and message authentication codes play vital roles in providing security services like confidentiality, integrity and authentication of the data sent through the Internet. There are several ·such popular and dependable techniques, which have been in use widely, for quite a long time. This long term exposure makes them vulnerable to successful or near successful attempts for attacks. Hence it is the need of the hour to develop new algorithms with better security.Hence studies were conducted on various types of algorithms being used in this area. Focus was given to identify the properties imparting security at this stage. By making use of a perception derived from these studies, new algorithms were designed. Performances of these algorithms were then studied followed by necessary modifications to yield an improved system consisting of a new stream cipher algorithm MAJE4, a new hash code JERIM- 320 and a new message authentication code MACJER-320. Detailed analysis and comparison with the existing popular schemes were also carried out to establish the security levels.The Secure Socket Layer (SSL) I Transport Layer Security (TLS) protocol is one of the most widely used security protocols in Internet. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL I TLS. But recent attacks on RC4 and HMAC have raised questions about the reliability of these algorithms. Hence MAJE4 and MACJER-320 have been proposed as substitutes for them. Detailed studies on the performance of these new algorithms were carried out; it has been observed that they are dependable alternatives.
Resumo:
A compact, planar, wideband antenna designed by modifying the coplanar waveguide is presented in this letter. The proposed antenna finds a wide range of applications including advanced wireless systems (AWS), DCS-1800, DCS-1900/PCS/PHS, WiBro, BlueTooth/WLAN/WiBree/ZigBee, DMB, Global Star Satellite Phones, and digital cordless phones. Wide bandwidth > 75% centered at 2.50 GHz, quasi-omnidirectional radiation coverage along with moderate gain and efficiency are the salient features of the antenna. A prototype fabricated on a substrate with dielectric constant 4.4 and thickness 1.6 mm occupies an area of (31times 64) mm2. Details of antenna design and discussions on the effect of various antenna parameters on the radiation characteristics are presented.
Resumo:
To ensure quality of machined products at minimum machining costs and maximum machining effectiveness, it is very important to select optimum parameters when metal cutting machine tools are employed. Traditionally, the experience of the operator plays a major role in the selection of optimum metal cutting conditions. However, attaining optimum values each time by even a skilled operator is difficult. The non-linear nature of the machining process has compelled engineers to search for more effective methods to attain optimization. The design objective preceding most engineering design activities is simply to minimize the cost of production or to maximize the production efficiency. The main aim of research work reported here is to build robust optimization algorithms by exploiting ideas that nature has to offer from its backyard and using it to solve real world optimization problems in manufacturing processes.In this thesis, after conducting an exhaustive literature review, several optimization techniques used in various manufacturing processes have been identified. The selection of optimal cutting parameters, like depth of cut, feed and speed is a very important issue for every machining process. Experiments have been designed using Taguchi technique and dry turning of SS420 has been performed on Kirlosker turn master 35 lathe. Analysis using S/N and ANOVA were performed to find the optimum level and percentage of contribution of each parameter. By using S/N analysis the optimum machining parameters from the experimentation is obtained.Optimization algorithms begin with one or more design solutions supplied by the user and then iteratively check new design solutions, relative search spaces in order to achieve the true optimum solution. A mathematical model has been developed using response surface analysis for surface roughness and the model was validated using published results from literature.Methodologies in optimization such as Simulated annealing (SA), Particle Swarm Optimization (PSO), Conventional Genetic Algorithm (CGA) and Improved Genetic Algorithm (IGA) are applied to optimize machining parameters while dry turning of SS420 material. All the above algorithms were tested for their efficiency, robustness and accuracy and observe how they often outperform conventional optimization method applied to difficult real world problems. The SA, PSO, CGA and IGA codes were developed using MATLAB. For each evolutionary algorithmic method, optimum cutting conditions are provided to achieve better surface finish.The computational results using SA clearly demonstrated that the proposed solution procedure is quite capable in solving such complicated problems effectively and efficiently. Particle Swarm Optimization (PSO) is a relatively recent heuristic search method whose mechanics are inspired by the swarming or collaborative behavior of biological populations. From the results it has been observed that PSO provides better results and also more computationally efficient.Based on the results obtained using CGA and IGA for the optimization of machining process, the proposed IGA provides better results than the conventional GA. The improved genetic algorithm incorporating a stochastic crossover technique and an artificial initial population scheme is developed to provide a faster search mechanism. Finally, a comparison among these algorithms were made for the specific example of dry turning of SS 420 material and arriving at optimum machining parameters of feed, cutting speed, depth of cut and tool nose radius for minimum surface roughness as the criterion. To summarize, the research work fills in conspicuous gaps between research prototypes and industry requirements, by simulating evolutionary procedures seen in nature that optimize its own systems.
Resumo:
This thesis Entitled Internet Utilization and Academic Activities of Faculty Members in the Universities of kerala: an analytical study. Today, scientific research is throwing up new discoveries, inventions and vistas by the hour. We are witnessing a veritable knowledge explosion. It is important for members of university faculty members to keep abreast of it for giving up-t-date information to their students about the new development in the subject of their study. The internet is an invaluable tool for achieving it. Most of the universities have sufficient internet facility, but the accessibility to all the faculty members is not adequate. University Libraries also provides standard supplementary service in the internet area. This study indicates differential level of awareness and utilization of the internet services by the faculty members in the areas of teaching, research and publication. However the overall impression is that the awareness and utilization is inadequate. This point to the urgent need to devise programs and schemes to promote internet utilization among the faculty members. The suggestions indicate the key areas that deserve attention by policy makers and administrators. Thanks to the internet, every new development in every field of study is just a click away for faculty members, research scholars and students.
Resumo:
The study of simple chaotic maps for non-equilibrium processes in statistical physics has been one of the central themes in the theory of chaotic dynamical systems. Recently, many works have been carried out on deterministic diffusion in spatially extended one-dimensional maps This can be related to real physical systems such as Josephson junctions in the presence of microwave radiation and parametrically driven oscillators. Transport due to chaos is an important problem in Hamiltonian dynamics also. A recent approach is to evaluate the exact diffusion coefficient in terms of the periodic orbits of the system in the form of cycle expansions. But the fact is that the chaotic motion in such spatially extended maps has two complementary aspects- - diffusion and interrnittency. These are related to the time evolution of the probability density function which is approximately Gaussian by central limit theorem. It is noticed that the characteristic function method introduced by Fujisaka and his co-workers is a very powerful tool for analysing both these aspects of chaotic motion. The theory based on characteristic function actually provides a thermodynamic formalism for chaotic systems It can be applied to other types of chaos-induced diffusion also, such as the one arising in statistics of trajectory separation. It was noted that there is a close connection between cycle expansion technique and characteristic function method. It was found that this connection can be exploited to enhance the applicability of the cycle expansion technique. In this way, we found that cycle expansion can be used to analyse the probability density function in chaotic maps. In our research studies we have successfully applied the characteristic function method and cycle expansion technique for analysing some chaotic maps. We introduced in this connection, two classes of chaotic maps with variable shape by generalizing two types of maps well known in literature.
Resumo:
Motivation for Speaker recognition work is presented in the first part of the thesis. An exhaustive survey of past work in this field is also presented. A low cost system not including complex computation has been chosen for implementation. Towards achieving this a PC based system is designed and developed. A front end analog to digital convertor (12 bit) is built and interfaced to a PC. Software to control the ADC and to perform various analytical functions including feature vector evaluation is developed. It is shown that a fixed set of phrases incorporating evenly balanced phonemes is aptly suited for the speaker recognition work at hand. A set of phrases are chosen for recognition. Two new methods are adopted for the feature evaluation. Some new measurements involving a symmetry check method for pitch period detection and ACE‘ are used as featured. Arguments are provided to show the need for a new model for speech production. Starting from heuristic, a knowledge based (KB) speech production model is presented. In this model, a KB provides impulses to a voice producing mechanism and constant correction is applied via a feedback path. It is this correction that differs from speaker to speaker. Methods of defining measurable parameters for use as features are described. Algorithms for speaker recognition are developed and implemented. Two methods are presented. The first is based on the model postulated. Here the entropy on the utterance of a phoneme is evaluated. The transitions of voiced regions are used as speaker dependent features. The second method presented uses features found in other works, but evaluated differently. A knock—out scheme is used to provide the weightage values for the selection of features. Results of implementation are presented which show on an average of 80% recognition. It is also shown that if there are long gaps between sessions, the performance deteriorates and is speaker dependent. Cross recognition percentages are also presented and this in the worst case rises to 30% while the best case is 0%. Suggestions for further work are given in the concluding chapter.
Resumo:
As the application of polymeric complexes is enormous, there exists a continuing interest in the synthesis and characterization of these complexes. The synthetic and characterization parts are very important in an academic point of view. Further in an application point of view also polymeric ligands/complexes are gaining attention.The thesis is divided in to six chapters, in which the first chapter gives an introduction along with a brief review on polymeric ligands/ complexes. The second chapter explains the different procedure adopted for the whole work along with the details of the reagents/ instruments used. The third chapter gives a report of the detailed study regarding the synthesis and characterization of eighteen complexes. While the fourth chapter is a report of the ion removal studies using three polymeric ligands, the fifth chapter explains the development of a polymeric complex as ion selective electrode material for the fabrication of a CC ion selective electrode. The sixth chapter presents the summary and tables, figures and references are given separately at the end.
Resumo:
Extensive use of the Internet coupled with the marvelous growth in e-commerce and m-commerce has created a huge demand for information security. The Secure Socket Layer (SSL) protocol is the most widely used security protocol in the Internet which meets this demand. It provides protection against eaves droppings, tampering and forgery. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL. But recent attacks against RC4 and HMAC have raised questions in the confidence on these algorithms. Hence two novel cryptographic algorithms MAJE4 and MACJER-320 have been proposed as substitutes for them. The focus of this work is to demonstrate the performance of these new algorithms and suggest them as dependable alternatives to satisfy the need of security services in SSL. The performance evaluation has been done by using practical implementation method.
Resumo:
An Overview of known spatial clustering algorithms The space of interest can be the two-dimensional abstraction of the surface of the earth or a man-made space like the layout of a VLSI design, a volume containing a model of the human brain, or another 3d-space representing the arrangement of chains of protein molecules. The data consists of geometric information and can be either discrete or continuous. The explicit location and extension of spatial objects define implicit relations of spatial neighborhood (such as topological, distance and direction relations) which are used by spatial data mining algorithms. Therefore, spatial data mining algorithms are required for spatial characterization and spatial trend analysis. Spatial data mining or knowledge discovery in spatial databases differs from regular data mining in analogous with the differences between non-spatial data and spatial data. The attributes of a spatial object stored in a database may be affected by the attributes of the spatial neighbors of that object. In addition, spatial location, and implicit information about the location of an object, may be exactly the information that can be extracted through spatial data mining