996 resultados para Trä
Resumo:
The design and development of nonresonant edge slot antenna for phased array applications has been presented. The radiating element is a slot cut on the narrow wall of rectangular waveguide (edge slot). The admittance characteristics of the edge slot have been rigorously studied using a novel hybrid method. Nonresonant arrays have been fabricated using the present slot characterization data and the earlier published data. The experimentally measured electrical characteristics of the antenna are presented which clearly brings out the accuracy of the present method.
Resumo:
A high speed photographic technique has been employed to measure the Sauter mean diameter of bubbles experimentally in a gas liquid ejector using a sodium chloride-air system. The measured values are compared with the theoretically predicted maximum bubble size diameter using Sprow's correlation. Bubble size as a function of the liquid flow rate and also of its distance from the throat of the ejector has been reported in this paper. The results obtained for this non-reactive system are also compared with those obtained earlier for the air-water system.
Resumo:
The oscillating flow and temperature field in an open tube subjected to cryogenic temperature at the cold end and ambient temperature at the hot end is studied numerically. The flow is driven by a time-wise sinusoidally varying pressure at the cold end. The conjugate problem takes into account the interaction of oscillatory flow with the heat conduction in the tube wall. The full set of compressible flow equations with axisymmetry assumption are solved with a pressure correction algorithm. Parametric studies are conducted with frequencies of 5-15 Hz, with one end maintained at 100 K and other end at 300 K. The flow and temperature distributions and the cooldown characteristics are obtained. The frequency and pressure amplitude have negligible effect on the time averaged Nusselt number. Pressure amplitude is an important factor determining the enthalpy flow through the solid wall. The frequency of operation has considerable effect on penetration of temperature into the tube. The density variation has strong influence on property profiles during cooldown. The present study is expected to be of interest in applications such as pulse tube refrigerators and other cryocoolers, where oscillatory flows occur in open tubes. (C) 2011 Elsevier Ltd. All rights reserved.
Resumo:
A method for the preparation of acicular hydrogoethite (alpha -FeOOH.xH(2)O, 0.1 < x < 0.22) particles of 0.3-1 mm length has been optimized by air oxidation of Fe( II) hydroxide gel precipitated from aqueous (NH4)(2)Fe(SO4)(2) solutions containing 0.005-0.02 atom% of cationic Pt, Pd or Rh additives as morphology controlling agents. Hydrogoethite particles are evolved from the amorphous ferrous hydroxide gel by heterogeneous nucleation and growth. Preferential adsorption of additives on certain crystallographic planes thereby retarding the growth in the perpendicular direction, allows the particles to acquire acicular shapes with high aspect ratios of 8-15. Synthetic hydrogoethite showed a mass loss of about 14% at similar to 280 degreesC, revealing the presence of strongly coordinated water of hydration in the interior of the goethite crystallites. As evident from IR spectra, excess H2O molecules (0.1- 0.22 per formula unit) are located in the strands of channels formed in between the double ribbons of FeO6 octahedra running parallel to the c- axis. Hydrogoethite particles constituted of multicrystallites are formed with Pt as additive, whereas single crystallite particles are obtained with Pd (or Rh). For both dehydroxylation as well as H-2 reduction, a lower reaction temperature (similar to 220 degreesC) was observed for the former (Pt treated) compared to the latter (Pd or Rh) (similar to 260 degreesC). Acicular magnetite (Fe3O4) was prepared either by reducing hydrogoethite (magnetite route) or dehydroxylating hydrogoethite to hematite and then reducing it to magnetite (hematite- magnetite route). According to TEM studies, preferential dehydroxylation of hydrogoethite along < 010 > leads to microporous hematite. Maghemite (gamma -Fe2O3 (-) (delta), 0 <
Resumo:
A wet chemical route is developed for the preparation of Sr2CeO4 denoted the carbonate-gel composite technique. This involves the coprecipitation of strontium as fine particles of carbonates within hydrated gels of ceria (CeO2.xH(2)O, 40
Resumo:
Titanium dioxide films have been deposited using DC magnetron sputtering technique onto well-cleaned p-silicon substrates at an oxygen partial pressure of 7 x 10(-5) mbar and at a sputtering pressure (Ar + O-2) Of I X 10(-3) mbar. The deposited films were calcinated at 673 and 773 K. The composition of the films as analyzed using Auger electron spectroscopy reveals the stoichiometry with an 0 and Ti ratio 2.08. The influence of post-deposition annealing at 673 and 773 K on the structural properties of the titanium dioxide thin films have been studied using XRD and Raman scattering. The structure of the films deposited at the ambient was found to be amorphous and the films annealed at temperature 673 K and above were crystalline with anatase structure. The lattice constants, grain size, microstrain and the dislocation density of the film are calculated and correlated with annealing temperature. The Raman scattering study was performed on the as-deposited and annealed samples and the existence of Raman active modes A(1g), B-1g and E-g corresponding to the Raman shifts are studied and reported. The improvement of crystallinity of the TiO2 films was also studied using Raman scattering studies. (C) 2003 Elsevier Ltd. All rights reserved.
Resumo:
In this paper, we outline an approach to the task of designing network codes in a non-multicast setting. Our approach makes use of the concept of interference alignment. As an example, we consider the distributed storage problem where the data is stored across the network in n nodes and where a data collector can recover the data by connecting to any k of the n nodes and where furthermore, upon failure of a node, a new node can replicate the data stored in the failed node while minimizing the repair bandwidth.
Resumo:
Sensor network nodes exhibit characteristics of both embedded systems and general-purpose systems.A sensor network operating system is a kind of embedded operating system, but unlike a typical embedded operating system, sensor network operatin g system may not be real time, and is constrained by memory and energy constraints. Most sensor network operating systems are based on event-driven approach. Event-driven approach is efficient in terms of time and space.Also this approach does not require a separate stack for each execution context. But using this model, it is difficult to implement long running tasks, like cryptographic operations. A thread based computation requires a separate stack for each execution context, and is less efficient in terms of time and space. In this paper, we propose a thread based execution model that uses only a fixed number of stacks. In this execution model, the number of stacks at each priority level are fixed. It minimizes the stack requirement for multi-threading environment and at the same time provides ease of programming. We give an implementation of this model in Contiki OS by separating thread implementation from protothread implementation completely. We have tested our OS by implementing a clock synchronization protocol using it.
Resumo:
A distributed storage setting is considered where a file of size B is to be stored across n storage nodes. A data collector should be able to reconstruct the entire data by downloading the symbols stored in any k nodes. When a node fails, it is replaced by a new node by downloading data from some of the existing nodes. The amount of download is termed as repair bandwidth. One way to implement such a system is to store one fragment of an (n, k) MDS code in each node, in which case the repair bandwidth is B. Since repair of a failed node consumes network bandwidth, codes reducing repair bandwidth are of great interest. Most of the recent work in this area focuses on reducing the repair bandwidth of a set of k nodes which store the data in uncoded form, while the reduction in the repair bandwidth of the remaining nodes is only marginal. In this paper, we present an explicit code which reduces the repair bandwidth for all the nodes to approximately B/2. To the best of our knowledge, this is the first explicit code which reduces the repair bandwidth of all the nodes for all feasible values of the system parameters.
Explicit and Optimal Exact-Regenerating Codes for the Minimum-Bandwidth Point in Distributed Storage
Resumo:
In the distributed storage coding problem we consider, data is stored across n nodes in a network, each capable of storing � symbols. It is required that the complete data can be reconstructed by downloading data from any k nodes. There is also the key additional requirement that a failed node be regenerated by connecting to any d nodes and downloading �symbols from each of them. Our goal is to minimize the repair bandwidth d�. In this paper we provide explicit constructions for several parameter sets of interest.
Resumo:
We consider the problem of compression of a non-Abelian source.This is motivated by the problem of distributed function computation,where it is known that if one is only interested in computing a function of several sources, then one can often improve upon the compression rate required by the Slepian-Wolf bound. Let G be a non-Abelian group having center Z(G). We show here that it is impossible to compress a source with symbols drawn from G when Z(G) is trivial if one employs a homomorphic encoder and a typical-set decoder.We provide achievable upper bounds on the minimum rate required to compress a non-Abelian group with non-trivial center. Also, in a two source setting, we provide achievable upper bounds for compression of any non-Abelian group, using a non-homomorphic encoder.
Resumo:
The e�cient operation of single-source, single-sink wireless network is considered with the diversity-multiplexing gain tradeo� (DMT) as the measure of performance. Whereas in the case of a point-to-point MIMO channel the DMT is determined by the fading statistics, in the case of a network, the DMT is additionally, a function of the time schedule according to which the network is operated, as well as the protocol that dictates the mode of operation of the intermediate relays.In general, it is only possible at present, to provide upper bounds on the DMT of the network in terms of the DMT of the MIMO channel appearing across cuts in the network. This paper presents a tutorial overview on the DMT of half-duplex multi-hop wireless networks that also attempts to identify where possible, codes that achieve the DMT.For example, it is shown how one can construct codes that achieve the DMT of a network under a given schedule and either an amplify-and-forward or decode-and-forward protocol. Also contained in the paper,are discussions on the DMT of the multiple-access channel as well as the impact of feedback on the DMT of a MIMO channel.