990 resultados para Nadir Shah, Sha de Persia 1688-1747
Resumo:
Evaluating the hazard potential of the Makran subduction zone requires understanding the previous records of the large earthquakes and tsunamis. We address this problem by searching for earthquake and tectonic proxies along the Makran Coast and linking those observations with the available constraints on historical seismicity and the tell-tale characteristics of sea floor morphology. The earthquake of Mw 8.1 of 1945 and the consequent tsunami that originated on the eastern part of the Makran are the only historically known hazardous events in this region. The seismic status of the western part of the subduction zone outside the rupture area of the 1945 earthquake remains an enigma. The near-shore shallow stratigraphy of the central part of Makran near Chabahar shows evidence of seismically induced liquefaction that we attribute to the distant effects of the 1945 earthquake. The coastal sites further westward around Jask are remarkable for the absence of liquefaction features, at least at the shallow level. Although a negative evidence, this possibly implies that the western part of Makran Coast region may not have been impacted by near-field large earthquakes in the recent past-a fact also supported by the analysis of historical data. On the other hand, the elevated marine terraces on the western Makran and their uplift rates are indicative of comparable degree of long-term tectonic activity, at least around Chabahar. The offshore data suggest occurrences of recently active submarine slumps on the eastern part of the Makran, reflective of shaking events, owing to the great 1945 earthquake. The ocean floor morphologic features on the western segment, on the contrary, are much subdued and the prograding delta lobes on the shelf edge also remain intact. The coast on the western Makran, in general, shows indications of progradation and uplift. The various lines of evidence thus suggest that although the western segment is potentially seismogenic, large earthquakes have not occurred there in the recent past, at least during the last 600 years. The recurrence period of earthquakes may range up to 1,000 years or more, an assessment based on the age of the youngest dated coastal ridge. The long elapsed time points to the fact that the western segment may have accumulated sufficient slip to produce a major earthquake.
Resumo:
In submitted research; nanocrystalline powders having elements Ni0.5Cu0.25Zn0.25Fe2 xInxO4 with varied amounts of indium ( x = 0.0, 0.1, 0.2, 0.3 and 0.4) were grown-up by modified citrate to nitrate alchemy. The realism of single phase cubic spinel creation of the synthesized ferrite samples was studied by the DTA-TGA, XRD, SEM, EDX, FT-IR, VSM and dielectric measurements. SEM was applied to inspect the morphological variations and EDX was used to determine the compositional mass ratios. The studies on the dielectric constant (epsilon'), dielectric loss (epsilon `'), loss tangent (tan delta), ac conductivity (sigma(ac)), resistive and reactive parts of the impedance analysis (Z' and Z `') at room temperature were also carried out. The saturation magnetizations (Ms) were determined using the vibrating sample magnetometer (VSM). Ms. decreased with the increase In3+ doping content, as Fe3+ of 5(mu B) ions are replaced by In3+ of 5 mu(B) ions. (C) 2012 Elsevier B. V. All rights reserved.
Resumo:
Phase equilibria in the system Tm-Rh-O at 1200 K is established by isothermal equilibration of selected compositions and phase identification after quenching to room temperature. Six intermetallic phases (Tm3Rh, Tm7Rh3, Tm5Rh3, Tm3Rh2, TmRh, TmRh2 +/-delta) and a ternary oxide TmRhO3 are identified. Based on experimentally determined phase relations, a solid-state electrochemical cell is devised to measure the standard free energy of formation of orthorhombic perovskite TmRhO3 from cubic Tm2O3 and beta-Rh2O3 in the temperature range from (900 to 1300) K. The results can be summarized as: Delta G(f,ox)(o) +/- 104/J.mol(-1) = -46474 + 3.925(T/K). Invoking the Neumann-Kopp rule, the standard enthalpy of formation of TmRhO3 from its constituent elements at 298.15 K is estimated as -1193.89 (+/- 2.86) kJ.mol(-1). The standard entropy of TmRhO3 at 298.15 K is evaluated as 103.8 (+/- 1.6) J.mol(-1).K-1. The oxygen potential-composition diagram and three-dimensional chemical potential diagram at 1200 K and temperature-composition diagrams at constant partial pressures of oxygen are computed from thermodynamic data. The compound TmRhO3 decomposes at 1688 (+/- 2) K in pure oxygen and at 1583 (+/- 2) K in air at standard pressure.
Resumo:
The main objective of the study is to examine the accuracy of and differences among simulated streamflows driven by rainfall estimates from a network of 22 rain gauges spread over a 2,170 km2 watershed, NEXRAD Stage III radar data, and Tropical Rainfall Measuring Mission (TRMM) 3B42 satellite data. The Gridded Surface Subsurface Hydrologic Analysis (GSSHA), a physically based, distributed parameter, grid-structured, hydrologic model, was used to simulate the June-2002 flooding event in the Upper Guadalupe River watershed in south central Texas. There were significant differences between the rainfall fields estimated by the three types of measurement technologies. These differences resulted in even larger differences in the simulated hydrologic response of the watershed. In general, simulations driven by radar rainfall yielded better results than those driven by satellite or rain-gauge estimates. This study also presents an overview of effects of land cover changes on runoff and stream discharge. The results demonstrate that, for major rainfall events similar to the 2002 event, the effect of urbanization on the watershed in the past two decades would not have made any significant effect on the hydrologic response. The effect of urbanization on the hydrologic response increases as the size of the rainfall event decreases.
Resumo:
High performance video standards use prediction techniques to achieve high picture quality at low bit rates. The type of prediction decides the bit rates and the image quality. Intra Prediction achieves high video quality with significant reduction in bit rate. This paper presents novel area optimized architecture for Intra prediction of H.264 decoding at HDTV resolution. The architecture has been validated on a Xilinx Virtex-5 FPGA based platform and achieved a frame rate of 64 fps. The architecture is based on multi-level memory hierarchy to reduce latency and ensure optimum resources utilization. It removes redundancy by reusing same functional blocks across different modes. The proposed architecture uses only 13% of the total LUTs available on the Xilinx FPGA XC5VLX50T.
Resumo:
An industrial base oil, a blend of different paraffin fractions, is heated to 130 degrees C (1) in the ambient and (2) for use as a lubricant in a steel pin on a steel disk sliding experiment. The base oil was tested with and without test antioxidants: dimethyl disulfide (DMDS) and alkylated diphenylamine (ADPA). Primary and secondary oxidation products were monitored continuously by FTIR over a 100 h period. In addition, friction and wear of the steel pin were monitored over the same period and the chemical transformation of the pin surface was monitored by XPS. The objective of this work is to observe the catalytic action of the steel components on the oil aging process and the efficacy of the antioxidant to reduce oxidation of oil used in tribology as a lubricant. Possible mechanistic explanations of the aging process as well as its impact on friction and wear are discussed.
Resumo:
Regenerating codes are a class of codes for distributed storage networks that provide reliability and availability of data, and also perform efficient node repair. Another important aspect of a distributed storage network is its security. In this paper, we consider a threat model where an eavesdropper may gain access to the data stored in a subset of the storage nodes, and possibly also, to the data downloaded during repair of some nodes. We provide explicit constructions of regenerating codes that achieve information-theoretic secrecy capacity in this setting.
Resumo:
Erasure codes are an efficient means of storing data across a network in comparison to data replication, as they tend to reduce the amount of data stored in the network and offer increased resilience in the presence of node failures. The codes perform poorly though, when repair of a failed node is called for, as they typically require the entire file to be downloaded to repair a failed node. A new class of erasure codes, termed as regenerating codes were recently introduced, that do much better in this respect. However, given the variety of efficient erasure codes available in the literature, there is considerable interest in the construction of coding schemes that would enable traditional erasure codes to be used, while retaining the feature that only a fraction of the data need be downloaded for node repair. In this paper, we present a simple, yet powerful, framework that does precisely this. Under this framework, the nodes are partitioned into two types and encoded using two codes in a manner that reduces the problem of node-repair to that of erasure-decoding of the constituent codes. Depending upon the choice of the two codes, the framework can be used to avail one or more of the following advantages: simultaneous minimization of storage space and repair-bandwidth, low complexity of operation, fewer disk reads at helper nodes during repair, and error detection and correction.
Resumo:
Erasure codes are an efficient means of storing data across a network in comparison to data replication, as they tend to reduce the amount of data stored in the network and offer increased resilience in the presence of node failures. The codes perform poorly though, when repair of a failed node is called for, as they typically require the entire file to be downloaded to repair a failed node. A new class of erasure codes, termed as regenerating codes were recently introduced, that do much better in this respect. However, given the variety of efficient erasure codes available in the literature, there is considerable interest in the construction of coding schemes that would enable traditional erasure codes to be used, while retaining the feature that only a fraction of the data need be downloaded for node repair. In this paper, we present a simple, yet powerful, framework that does precisely this. Under this framework, the nodes are partitioned into two types and encoded using two codes in a manner that reduces the problem of node-repair to that of erasure-decoding of the constituent codes. Depending upon the choice of the two codes, the framework can be used to avail one or more of the following advantages: simultaneous minimization of storage space and repair-bandwidth, low complexity of operation, fewer disk reads at helper nodes during repair, and error detection and correction.
Resumo:
The objective of this study was to report the clinical phenotype and genetic analysis of two Indian families with Escobar syndrome (ES). The diagnosis of ES in both families was made on the basis of published clinical features. Blood samples were collected from members of both families and used in genomic DNA isolation. The entire coding regions and intron-exon junctions of the ES gene CHRNG (cholinergic receptor, nicotinic, gamma), and two other related genes, CHRND and CHRNA1, were amplified and sequenced to search for mutations in both families. Both families show a typical form of ES. Sequencing of the entire coding regions including the intron-exon junctions of the three genes did not yield any mutations in these families. In conclusion, it is possible that the mutations in these genes are located in the promoter or deep intronic regions that we failed to identify or the ES in these families is caused by mutations in a different gene. The lack of mutations in CHRNG has also been reported in several families, suggesting the possibility of at least one more gene for this syndrome. Clin Dysmorphol 22:54-58 (C) 2013 Wolters Kluwer Health vertical bar Lippincott Williams & Wilkins.
Resumo:
alpha-Azidoacetophenones were converted into 2-aryl-1,3-oxazole-4-carbaldehydes through rearrangement of the carbon framework upon exposure to DMF/POCl3. The unprecedented rearrangement occurs via alkenyl azides and 2H-azirines. A mechanism for this unusual reaction was proposed and evidenced.
Resumo:
Peer to peer networks are being used extensively nowadays for file sharing, video on demand and live streaming. For IPTV, delay deadlines are more stringent compared to file sharing. Coolstreaming was the first P2P IPTV system. In this paper, we model New Coolstreaming (newer version of Coolstreaming) via a queueing network. We use two time scale decomposition of Markov chains to compute the stationary distribution of number of peers and the expected number of substreams in the overlay which are not being received at the required rate due to parent overloading. We also characterize the end-to-end delay encountered by a video packet received by a user and originated at the server. Three factors contribute towards the delay. The first factor is the mean shortest path length between any two overlay peers in terms of overlay hops of the partnership graph which is shown to be O (log n) where n is the number of peers in the overlay. The second factor is the mean number of routers between any two overlay neighbours which is seen to be at most O (log N-I) where N-I is the number of routers in the internet. Third factor is the mean delay at a router in the internet. We provide an approximation of this mean delay E W]. Thus, the mean end to end delay in New Coolstreaming is shown to be upper bounded by O (log E N]) (log N-I) E (W)] where E N] is the mean number of peers at a channel.
Resumo:
Mountain waves in the stratosphere have been observed over elevated topographies using both nadir-looking and limb-viewing satellites. However, the characteristics of mountain waves generated over the Himalayan Mountain range and the adjacent Tibetan Plateau are relatively less explored. The present study reports on three-dimensional (3-D) properties of a mountain wave event that occurred over the western Himalayan region on 9 December 2008. Observations made by the Atmospheric Infrared Sounder on board the Aqua and Microwave Limb Sounder on board the Aura satellites are used to delineate the wave properties. The observed wave properties such as horizontal (lambda(x), lambda(y)) and vertical (lambda(z)) wavelengths are 276 km (zonal), 289 km (meridional), and 25 km, respectively. A good agreement is found between the observed and modeled/analyzed vertical wavelength for a stationary gravity wave determined using the Modern Era Retrospective Analysis for Research and Applications (MERRA) reanalysis winds. The analysis of both the National Centers for Environmental Prediction/National Center for Atmospheric Research reanalysis and MERRA winds shows that the waves are primarily forced by strong flow across the topography. Using the 3-D properties of waves and the corrected temperature amplitudes, we estimated wave momentum fluxes of the order of similar to 0.05 Pa, which is in agreement with large-amplitude mountain wave events reported elsewhere. In this regard, the present study is considered to be very much informative to the gravity wave drag schemes employed in current general circulation models for this region.
Resumo:
We consider secrecy obtained when one transmits on a Gaussian Wiretap channel above the secrecy capacity. Instead of equivocation, we consider probability of error as the criterion of secrecy. The usual channel codes are considered for transmission. The rates obtained can reach the channel capacity. We show that the “confusion” caused to the Eve when the rate of transmission is above capacity of the Eve's channel is similar to the confusion caused by using the wiretap channel codes used below the secrecy capacity.
Resumo:
Regenerating codes are a class of codes proposed for providing reliability of data and efficient repair of failed nodes in distributed storage systems. In this paper, we address the fundamental problem of handling errors and erasures at the nodes or links, during the data-reconstruction and node-repair operations. We provide explicit regenerating codes that are resilient to errors and erasures, and show that these codes are optimal with respect to storage and bandwidth requirements. As a special case, we also establish the capacity of a class of distributed storage systems in the presence of malicious adversaries. While our code constructions are based on previously constructed Product-Matrix codes, we also provide necessary and sufficient conditions for introducing resilience in any regenerating code.