951 resultados para code coupling
Resumo:
Article
Resumo:
Cet article a précédemment été publié par la Revue du Barreau.
Resumo:
Blends of nitrile rubber and reclaimed rubber containing different levels of a coupling agent, Si 69 (bis(3- triethoxysilyl propyl)(tetrasulphide) were prepared and the cure characteristic's and mechanical properties were studied. Optimum loading of Si-69 was found to be a function of blend ratio. 3 phi- of Si 69 in a 70:30. Blend was found to be the optimum combination with respect to the mechanical properties. The rate and state of cure were also affected bv the conp/ing agent. Tensile strength, tear strength and abrasion resistance were improved in the presence of coupling agent. While the state of cure improved, the cure rate and scorch time decreased with increasing silane content. Ageing studies showed that the blends containing the coupling agent were inferior to the unmodified blends.
Resumo:
Chloroprene rubber was blended with whole tire reclaimed rubber (WTR) in presence of different levels of a coupling agent Si69 [bis- (3-(triethoxysilyl)propy1)tetrasuIfide] and the cure characteristics and mechanical properties were studied. The rate and state of cure were also affected by the coupling agent. While the cure time was increased, the cure rate and scorch time were decreased with increasing silane content. Tensile strength, tear strength, and abrasion resistance were improved in the presence of coupling agent. Compression set and resilience were adversely affected in presence of silane-coupling agent.Aging studies showed that the blends containing the coupling agent were inferior to the unmodified blends.
Resumo:
This thesis is shows the result of the research work on the inherent Powers of the High Court in criminal jurisdiction. The criminal justice system in India recognizes inherent powers only of the High Court. The Theory and Philosophy of inherent powers are concerned the Distinction between civil and Criminal laws are of very little consequence. In formulating the research programme the confusion created by the concept of inherent powers and its application by High Court form the central point. How fully the concept is understood, how correctly the power is used, and how far it has enhanced the rationale of the administration of criminal justice, what is its importance and what are the solutions for the inherent power to earn a permanent status in the province of criminal jurisprudence are the themes of this study. The precipitation of new dimensions is the yardstick to acknowledge the inherent powers of the High Court and Supreme Court. It is of instant value in criminal justice system. This study concludes innovativeness provided by the inherent powers has helped the justice administration draw inspiration from the Constitution. A jurisprudence of inherent powers has developed with the weilding of inherent powers of the Supreme Court and the High Court. It is to unravel mystery of jurisprudence caused by the operation of the concept of inherent powers this research work gives emphasis. Its significance is all the more relevant when the power is exercised in the administration of criminal justice. Application or non application of inherent powers in a given case would tell upon the maturity and perfection of the standard of justice
Resumo:
Cryptosystem using linear codes was developed in 1978 by Mc-Eliece. Later in 1985 Niederreiter and others developed a modified version of cryptosystem using concepts of linear codes. But these systems were not used frequently because of its larger key size. In this study we were designing a cryptosystem using the concepts of algebraic geometric codes with smaller key size. Error detection and correction can be done efficiently by simple decoding methods using the cryptosystem developed. Approach: Algebraic geometric codes are codes, generated using curves. The cryptosystem use basic concepts of elliptic curves cryptography and generator matrix. Decrypted information takes the form of a repetition code. Due to this complexity of decoding procedure is reduced. Error detection and correction can be carried out efficiently by solving a simple system of linear equations, there by imposing the concepts of security along with error detection and correction. Results: Implementation of the algorithm is done on MATLAB and comparative analysis is also done on various parameters of the system. Attacks are common to all cryptosystems. But by securely choosing curve, field and representation of elements in field, we can overcome the attacks and a stable system can be generated. Conclusion: The algorithm defined here protects the information from an intruder and also from the error in communication channel by efficient error correction methods.
Resumo:
The present research problem is to study the existing encryption methods and to develop a new technique which is performance wise superior to other existing techniques and at the same time can be very well incorporated in the communication channels of Fault Tolerant Hard Real time systems along with existing Error Checking / Error Correcting codes, so that the intention of eaves dropping can be defeated. There are many encryption methods available now. Each method has got it's own merits and demerits. Similarly, many crypt analysis techniques which adversaries use are also available.
Resumo:
The performance of circular, rectangular and cross irises for the coupling of microwave power to rectangular waveguide cavity resonators is discussed. For the measurement of complex permittivity of materials using cavity perturbation techniques, rectangular cavities with high Q-factors are required. Compared to the conventional rectangular and circular irises, the cross Iris coupling structure provides very high loaded quality factor for all the resonant frequencies. The proposes cross iris coupling structure enhances the accuracy of complex permittivity measurements.
Resumo:
Embedded systems are usually designed for a single or a specified set of tasks. This specificity means the system design as well as its hardware/software development can be highly optimized. Embedded software must meet the requirements such as high reliability operation on resource-constrained platforms, real time constraints and rapid development. This necessitates the adoption of static machine codes analysis tools running on a host machine for the validation and optimization of embedded system codes, which can help meet all of these goals. This could significantly augment the software quality and is still a challenging field.Embedded systems are usually designed for a single or a specified set of tasks. This specificity means the system design as well as its hardware/software development can be highly optimized. Embedded software must meet the requirements such as high reliability operation on resource-constrained platforms, real time constraints and rapid development. This necessitates the adoption of static machine codes analysis tools running on a host machine for the validation and optimization of embedded system codes, which can help meet all of these goals. This could significantly augment the software quality and is still a challenging field.Embedded systems are usually designed for a single or a specified set of tasks. This specificity means the system design as well as its hardware/software development can be highly optimized. Embedded software must meet the requirements such as high reliability operation on resource-constrained platforms, real time constraints and rapid development. This necessitates the adoption of static machine codes analysis tools running on a host machine for the validation and optimization of embedded system codes, which can help meet all of these goals. This could significantly augment the software quality and is still a challenging field.Embedded systems are usually designed for a single or a specified set of tasks. This specificity means the system design as well as its hardware/software development can be highly optimized. Embedded software must meet the requirements such as high reliability operation on resource-constrained platforms, real time constraints and rapid development. This necessitates the adoption of static machine codes analysis tools running on a host machine for the validation and optimization of embedded system codes, which can help meet all of these goals. This could significantly augment the software quality and is still a challenging field.This dissertation contributes to an architecture oriented code validation, error localization and optimization technique assisting the embedded system designer in software debugging, to make it more effective at early detection of software bugs that are otherwise hard to detect, using the static analysis of machine codes. The focus of this work is to develop methods that automatically localize faults as well as optimize the code and thus improve the debugging process as well as quality of the code.Validation is done with the help of rules of inferences formulated for the target processor. The rules govern the occurrence of illegitimate/out of place instructions and code sequences for executing the computational and integrated peripheral functions. The stipulated rules are encoded in propositional logic formulae and their compliance is tested individually in all possible execution paths of the application programs. An incorrect sequence of machine code pattern is identified using slicing techniques on the control flow graph generated from the machine code.An algorithm to assist the compiler to eliminate the redundant bank switching codes and decide on optimum data allocation to banked memory resulting in minimum number of bank switching codes in embedded system software is proposed. A relation matrix and a state transition diagram formed for the active memory bank state transition corresponding to each bank selection instruction is used for the detection of redundant codes. Instances of code redundancy based on the stipulated rules for the target processor are identified.This validation and optimization tool can be integrated to the system development environment. It is a novel approach independent of compiler/assembler, applicable to a wide range of processors once appropriate rules are formulated. Program states are identified mainly with machine code pattern, which drastically reduces the state space creation contributing to an improved state-of-the-art model checking. Though the technique described is general, the implementation is architecture oriented, and hence the feasibility study is conducted on PIC16F87X microcontrollers. The proposed tool will be very useful in steering novices towards correct use of difficult microcontroller features in developing embedded systems.
Resumo:
The origin of magnetic coupling in KNiF3 and K2 NiF4 is studied by means of an ab initio cluster model approach. By a detailed study of the mapping between eigenstates of the exact nonrelativistic and spin model Hamiltonians it is possible to obtain the magnetic coupling constant J and to compare ab initio cluster-model values with those resulting from ab initio periodic Hartree-Fock calculations. This comparison shows that J is strongly determined by two-body interactions; this is a surprising and unexpected result. The importance of the ligands surrounding the basic metal-ligand-metal interacting unit is reexamined by using two different partitions and the constrained space orbital variation method of analysis. This decomposition enables us to show that this effect is basically environmental. Finally, dynamical electronic correlation effects have found to be critical in determining the final value of the magnetic coupling constant.
Resumo:
Magnetic interactions in ionic solids are studied using parameter-free methods designed to provide accurate energy differences associated with quantum states defining the Heisenberg constant J. For a series of ionic solids including KNiF3, K2NiF4, KCuF3, K2CuF4, and high- Tc parent compound La2CuO4, the J experimental value is quantitatively reproduced. This result has fundamental implications because J values have been calculated from a finite cluster model whereas experiments refer to infinite solids. The present study permits us to firmly establish that in these wide-gap insulators, J is determined from strongly local electronic interactions involving two magnetic centers only thus providing an ab initio support to commonly used model Hamiltonians.
Resumo:
CuF2 is known to be an antiferromagnetic compound with a weak ferromagnetism due to the anisotropy of its monoclinic unit cell (Dzialoshinsky-Moriya mechanism). We investigate the magnetic ordering of this compound by means of ab initio periodic unrestricted Hartree-Fock calculations and by cluster calculations which employ state-of-the-art configuration interaction expansions and modern density functional theory techniques. The combined use of periodic and cluster models permits us to firmly establish that the antiferromagnetic order arises from the coupling of one-dimensional subunits which themselves exhibit a very small ferromagnetic coupling between Cu neighbor cations. This magnetic order could be anticipated from the close correspondence between CuF2 and rutile crystal structures.