The accurate monitoring of optical thin-film thickness is a key technique for depositing optical thin-film. For existing coating equipments, which are low precision and automation level on monitoring thin-film thickne...The accurate monitoring of optical thin-film thickness is a key technique for depositing optical thin-film. For existing coating equipments, which are low precision and automation level on monitoring thin-film thickness, a new photoelectric control and analysis system has been developed. In the new system, main techniques include a photoelectric system with dual-light path, a dual-lock-phase circuit system and a comprehensive digital processing-control-analysis system.The test results of new system show that the static and dynamic stabilities and the control precision of thin-film thickness are extremely increased. The standard deviation of thin-film thickness, which indicates the duplication of thin-film thickness monitoring, is equal to or less than 0.72%. The display resolution limit on reflectivity is 0.02 %. In the system, the linearity of drift is very high, and the static drift ratio approaches zero.展开更多
In this short survey, we give a complete list of the most important results obtained by El Naschie’s E-infinity Cantorian space-time theory in the realm of quantum physics and cosmology. Special attention is paid to ...In this short survey, we give a complete list of the most important results obtained by El Naschie’s E-infinity Cantorian space-time theory in the realm of quantum physics and cosmology. Special attention is paid to his recent result on dark energy and revising Einstein’s famous formula .展开更多
In this paper, the asymptotical p-moment stability of stochastic impulsive differential equations is studied and a comparison theory to ensure the asymptotical p-moment stability of the trivial solution is established...In this paper, the asymptotical p-moment stability of stochastic impulsive differential equations is studied and a comparison theory to ensure the asymptotical p-moment stability of the trivial solution is established, which is important for studying the impulsive control and synchronization in stochastic systems. As an application of this theory, we study the problem of chaos synchronization in the Chen system excited by parameter white-noise excitation, by using the impulsive method. Numerical simulations verify the feasibility of this method.展开更多
The hydrological models and simpli?ed methods of Saint-venant equations are used extensively in hydrological modeling, in particular for the simulation of the ?ood routing. These models require speci?c and extensive d...The hydrological models and simpli?ed methods of Saint-venant equations are used extensively in hydrological modeling, in particular for the simulation of the ?ood routing. These models require speci?c and extensive data that usually makes the study of ?ood propagation an arduous practice. We present in this work a new model, based on a transfer function, this function is a function of parametric probability density, having a physical meaning with respect to the propagation of a hydrological signal. The inversion of the model is carried out by an optimization technique called Genetic Algorithm. It consists of evolving a population of parameters based primarily on genetic recombination operators and natural selection to?nd the minimum of an objective function that measures the distance between observed and simulated data. The precision of the simulations of the proposed model is compared with the response of the Hayami model and the applicability of the model is tested on a real case, the N'Fis basin river, located in the High Atlas Occidental, which presents elements that appear favorable to the study of the propagation. The results obtained are very satisfactory and the simulation of the proposed model is very close to the response of the Hayami model.展开更多
We use the distance sum rule method to constrain the spatial curvature of the Universe with a large sample of 161strong gravitational lensing systems,whose distances are calibrated from the Pantheon compilation of typ...We use the distance sum rule method to constrain the spatial curvature of the Universe with a large sample of 161strong gravitational lensing systems,whose distances are calibrated from the Pantheon compilation of typeⅠa supernovae using deep learning.To investigate the possible influence of mass model of the lens galaxy on constraining the curvature parameterΩ_(k),we consider three different lens models.Results show that a flat Universe is supported in the singular isothermal sphere(SIS)model with the parameterΩ_(k)=0.049_(-0.125)^(+0.147).While in the power-law(PL)model,a closed Universe is preferred at the~3σconfidence level,with the parameterΩ_(k)=-0.245_(-0.071)^(+0.075).In the extended PL model,the 95%confidence level upper limit ofΩ_(k)is<0.011.As for the parameters of the lens models,constraints on the three models indicate that the mass profile of the lens galaxy could not be simply described by the standard SIS model.展开更多
Doped graphite GBST1308, mechanically jointed to CuCrZr alloys, will be applied on EAST superconducting as plasma facing material (PFM). Two joint structures called joint-1 and joint-2 were evaluated by means of the...Doped graphite GBST1308, mechanically jointed to CuCrZr alloys, will be applied on EAST superconducting as plasma facing material (PFM). Two joint structures called joint-1 and joint-2 were evaluated by means of thermal response tests using electron beam facility. The experimental results showed that the temperature differences of two joints were not significant, and the maximum surface temperature was about 1055℃ at a load of 4 MW/m^2, which had a good agreement with the simulated results by ANSYS code. The results indicated that the doped graphite GBST1308/CuCrZr mock-up can withstand heat flux deposition of 4 MW/m^2 except at the screw-fastened region, and joint-2 could be more suitable to higher heat flux region such as divertor target. But under the higher heat flux, both joints are unacceptable, an advanced PFM and its integration with the heat sink have to be developed, for example, vacuum plasma spraying tungsten coatings on the CuCrZr might be a good choice.展开更多
In this paper, we are going to derive four numerical methods for solving the Modified Kortweg-de Vries (MKdV) equation using fourth Pade approximation for space direction and Crank Nicolson in the time direction. Two ...In this paper, we are going to derive four numerical methods for solving the Modified Kortweg-de Vries (MKdV) equation using fourth Pade approximation for space direction and Crank Nicolson in the time direction. Two nonlinear schemes and two linearized schemes are presented. All resulting schemes will be analyzed for accuracy and stability. The exact solution and the conserved quantities are used to highlight the efficiency and the robustness of the proposed schemes. Interaction of two and three solitons will be also conducted. The numerical results show that the interaction behavior is elastic and the conserved quantities are conserved exactly, and this is a good indication of the reliability of the schemes which we derived. A comparison with some existing is presented as well.展开更多
In this paper, we solve chiral nonlinear Schrodinger equation (CNSE) numerically. Two numerical methods are derived using the explicit Runge-Kutta method of order four and the linear multistep method (Predictor-Correc...In this paper, we solve chiral nonlinear Schrodinger equation (CNSE) numerically. Two numerical methods are derived using the explicit Runge-Kutta method of order four and the linear multistep method (Predictor-Corrector method of fourth order). The resulting schemes of fourth order accuracy in spatial and temporal directions. The CNSE is non-integrable and has two kinds of soliton solutions: bright and dark soliton. The exact solutions and the conserved quantities of CNSE are used to display the efficiency and robustness of the numerical methods we derived. Interaction of two bright solitons for different parameters is also displayed.展开更多
A Mobile Ad Hoc Network (MANET) is a self-governing network of mobile nodes without the inclusion of any wired links. Each node can move in an ad hoc manner and therefore, such a network should consist of routing prot...A Mobile Ad Hoc Network (MANET) is a self-governing network of mobile nodes without the inclusion of any wired links. Each node can move in an ad hoc manner and therefore, such a network should consist of routing protocols which can adapt to dynamically changing topologies. Numerous protocols have been proposed for the same. However, the trajectories followed by the individual nodes have not been distinctly dealt with. This paper presents a meticulous study on QoS parameters of proactive (OLSR) and reactive (DSR) protocols of MANETs for uniform as well as dissimilar trajectories of individual nodes in a small network of about 20 nodes. Also an examination of partial node failures for both the above mentioned protocols has been done. The performance metrics utilized in this study are average throughput and average delay. OPNET modeler has been utilized for this study. This assessment shows that for uniform trajectories, OLSR has almost same average delay but a higher average throughput as compared to DSR. Also it is seen that, as compared to uniform trajectories, non-uniform trajectories deliver a much higher average throughput. Node failures only reduce average throughputs whereas average delays remain unchanged.展开更多
This paper presents a new method for obtaining network properties from incomplete data sets. Problems associated with missing data represent well-known stumbling blocks in Social Network Analysis. The method of “esti...This paper presents a new method for obtaining network properties from incomplete data sets. Problems associated with missing data represent well-known stumbling blocks in Social Network Analysis. The method of “estimating connectivity from spanning tree completions” (ECSTC) is specifically designed to address situations where only spanning tree(s) of a network are known, such as those obtained through respondent driven sampling (RDS). Using repeated random completions derived from degree information, this method forgoes the usual step of trying to obtain final edge or vertex rosters, and instead aims to estimate network-centric properties of vertices probabilistically from the spanning trees themselves. In this paper, we discuss the problem of missing data and describe the protocols of our completion method, and finally the results of an experiment where ECSTC was used to estimate graph dependent vertex properties from spanning trees sampled from a graph whose characteristics were known ahead of time. The results show that ECSTC methods hold more promise for obtaining network-centric properties of individuals from a limited set of data than researchers may have previously assumed. Such an approach represents a break with past strategies of working with missing data which have mainly sought means to complete the graph, rather than ECSTC’s approach, which is to estimate network properties themselves without deciding on the final edge set.展开更多
Hospital facilities use a collection of heterogeneous devices, produced by many different vendors, to monitor the state of patient vital signs. The limited interoperability of current devices makes it difficult to syn...Hospital facilities use a collection of heterogeneous devices, produced by many different vendors, to monitor the state of patient vital signs. The limited interoperability of current devices makes it difficult to synthesize multivariate monitoring data into a unified array of real-time information regarding the patients state. Without an infrastructure for the integrated evaluation, display, and storage of vital sign data, one cannot adequately ensure that the assignment of caregivers to patients reflects the relative urgency of patient needs. This is an especially serious issue in critical care units (CCUs). We present a formal mathematical model of an operational critical care unit, together with metrics for evaluating the systematic impact of caregiver scheduling decisions on patient care. The model is rich enough to capture the essential features of device and patient diversity, and so enables us to test the hypothesis that integration of vital sign data could realistically yield a significant positive impact on the efficacy of critical care delivery outcome. To test the hypothesis, we employ the model within a computer simulation. The simulation enables us to compare the current scheduling processes in widespread use within CCUs, against a new scheduling algorithm that makes use of an integrated array of patient information collected by an (anticipated) vital sign data integration infrastructure. The simulation study provides clear evidence that such an infrastructure reduces risk to patients and lowers operational costs, and in so doing reveals the inherent costs of medical device non-interoperability.展开更多
Serum samples from all 23 extant crocodilian species were tested for phospholipase A2 (PLA2) activity against nine different bacterial species. The data were used?to generate a PLA2 activity profile for each crocodili...Serum samples from all 23 extant crocodilian species were tested for phospholipase A2 (PLA2) activity against nine different bacterial species. The data were used?to generate a PLA2 activity profile for each crocodilian species, and the data were used to compare the activities of the three main lineages (Alligatoridae,?Crocodylidae, and Gavialidae), the seven different genera, and to compare all?of the 23 individual species. The data revealed that the three lineages ofcrocodilians (Alligatoridae, Crocodylidae, and Gavialidae) exhibited PLA2 activities toward nine species of bacteria that were statistically?distinguishable. In?addition,?the PLA2 activities of crocodilians in a specific genus tended to be more similar to other?members in their genus than to members of other crocodilian genera.展开更多
<div style="text-align:justify;"> <span style="font-family:Verdana;">A graph is said to be cordial if it has 0 - 1 labeling which satisfies particular conditions. In this paper, we cons...<div style="text-align:justify;"> <span style="font-family:Verdana;">A graph is said to be cordial if it has 0 - 1 labeling which satisfies particular conditions. In this paper, we construct the corona between paths and second power of fan graphs and explain the necessary and sufficient conditions for this construction to be cordial.</span> </div>展开更多
A study was conducted at PAU Regional Research Station, Gurdaspur (Punjab) to investigate the design and operational parameters of threshing mechanism of conventional combine harvester for basmati crop. This study was...A study was conducted at PAU Regional Research Station, Gurdaspur (Punjab) to investigate the design and operational parameters of threshing mechanism of conventional combine harvester for basmati crop. This study was aimed to investigate the suitable changes required in the self-propelled conventional combine harvester for harvesting the basmati crop with minimum grain losses. Field evaluation of experiment was carried out to assess the influence of independent design variable <em>i.e.</em>, arrangement of spikes (AS) and independent operational parameters such as concave clearance (CC) and cylinder speed (CS). The study was aimed to enumerate various combining losses<em> viz</em>., extent of visible and invisible grain damage and threshing efficiency at different AS, CC and CS levels. The first year data recorded during 2017 were processed for the optimization during 2018. The results of the present study revealed that during 2017, maximum visible and invisible losses was 5.49% ± 0.33% and 28.07% ± 3.21%, respectively whereas after modification, these losses remained only 4.00% ± 0.80% and 24.07% ± 2.86%, respectively. The threshing efficiency remained above 99.31% ± 0.47%, for both years. Thus, optimization of combine harvester was able to save the visible grain damage by 60% to 83% and invisible grain damage by 6% to 16%, respectively during 2018 than the year 2017.展开更多
M_(p)-Sequences or M-Sequence over Fp not used so much in current time as binary M-Sequences and it is pending with the difficult to construct there coders and decoders of M_(p)-Sequences further these reasons there i...M_(p)-Sequences or M-Sequence over Fp not used so much in current time as binary M-Sequences and it is pending with the difficult to construct there coders and decoders of M_(p)-Sequences further these reasons there is expensive values to construct them but the progress in the technical methods will be lead to fast using these sequences in different life’s ways,and these sequences give more collection of information and distribution them on the input and output links of the communication channels,building new systems with more complexity,larger period,and security.In current article we will study the construction of the multiplication M_(p)-Sequence{z_(n)}and its linear equivalent,this sequences are as multiple two sequences,the first sequence{Sn}is an arbitrary M_(p)-Sequence and the second sequence{ζ_(n)}reciprocal sequence of the first sequence{S_(n)},length of the sequence{z_(n)},period,orthogonal and the relations between the coefficients and roots of the characteristic polynomial of f(x)and it’s reciprocal polynomial g(x)and compare these properties with corresponding properties in M-Sequences.展开更多
The quantum efficiency of CZTSSe (copper zinc tin sulphur selenium) thin film solar cells is numerically simulated at different temperatures and under a set of bias conditions about the efficiency limiting factors. ...The quantum efficiency of CZTSSe (copper zinc tin sulphur selenium) thin film solar cells is numerically simulated at different temperatures and under a set of bias conditions about the efficiency limiting factors. A systematic methodology is developed and integrated into the proposed model to simulate the characteristics in the quantum efficiency. The proposed model is demonstrated with respect to an ideal device model under a set of bias conditions to selectively deactivate performance limiting parameters under light and voltage biased conditions. Under particular wavelength regions and bias conditions, a particular type of defects near the heterojunction interface significantly impact the carrier collection of devices. This deep acceptor type defect distribution is located in the band of +/- 0.3 eV from the midgap. These defect states influence CZTSSe spectral responses of red and IR light wavelength regions in quantum efficiency caused by affected depletion width toward the back contact. Therefore, the quantum efficiency of CZTSSe devices is altered disproportionally at biased conditions.展开更多
A network intrusion detection system is critical for cyber security against llegitimate attacks.In terms of feature perspectives,network traffic may include a variety of elements such as attack reference,attack type,a...A network intrusion detection system is critical for cyber security against llegitimate attacks.In terms of feature perspectives,network traffic may include a variety of elements such as attack reference,attack type,a subcategory of attack,host information,malicious scripts,etc.In terms of network perspectives,network traffic may contain an imbalanced number of harmful attacks when compared to normal traffic.It is challenging to identify a specific attack due to complex features and data imbalance issues.To address these issues,this paper proposes an Intrusion Detection System using transformer-based transfer learning for Imbalanced Network Traffic(IDS-INT).IDS-INT uses transformer-based transfer learning to learn feature interactions in both network feature representation and imbalanced data.First,detailed information about each type of attack is gathered from network interaction descriptions,which include network nodes,attack type,reference,host information,etc.Second,the transformer-based transfer learning approach is developed to learn detailed feature representation using their semantic anchors.Third,the Synthetic Minority Oversampling Technique(SMOTE)is implemented to balance abnormal traffic and detect minority attacks.Fourth,the Convolution Neural Network(CNN)model is designed to extract deep features from the balanced network traffic.Finally,the hybrid approach of the CNN-Long Short-Term Memory(CNN-LSTM)model is developed to detect different types of attacks from the deep features.Detailed experiments are conducted to test the proposed approach using three standard datasets,i.e.,UNsWNB15,CIC-IDS2017,and NSL-KDD.An explainable AI approach is implemented to interpret the proposed method and develop a trustable model.展开更多
This paper presents an alternate graphical procedure (Method 2), to that presented in earlier publications entitled, “A Procedure for Trisecting an Acute Angle” and “A Key to Solving the Angle Trisection Problem”....This paper presents an alternate graphical procedure (Method 2), to that presented in earlier publications entitled, “A Procedure for Trisecting an Acute Angle” and “A Key to Solving the Angle Trisection Problem”. The procedure, when applied to the 30˚ and 60˚ angles that have been “proven” to be nottrisectable and the 45˚ benchmark angle that is known to be trisectable, in each case produced a construction having an identical angular relationship with Archimedes’ Construction, as in Section 2 on THEORY of this paper, where the required trisection angle was found to be one-third of its respective angle (i.e. DE’MA = 1/3 DE’CG). For example, the trisection angle for the 30˚, 45˚ and 60˚ angles were 10.00000˚, 15.00000˚, and 20.00000˚, respectively, and Section 5 on PROOF in this paper. Therefore, based on this identical angular relationship and the numerical results (i.e. to five decimal places), which represent the highest degree of accuracy and precision attainable by The Geometer’s Sketch Pad software, one can only conclude that not only the geometric requirements for arriving at an exact trisection of the 30˚ and 60˚ angle (which have been “proven” to be not-trisectable) have been met, but also, the construction is valid for any arbitrary acute angle, despite theoretical proofs to the contrary by Wantzel, Dudley, and others.展开更多
Intensive agricultural practices have undeniably reduced soil fertility and crop productivity.Furthermore,alkaline calcareous soils represent a significant challenge for agricultural production,particularly durum whea...Intensive agricultural practices have undeniably reduced soil fertility and crop productivity.Furthermore,alkaline calcareous soils represent a significant challenge for agricultural production,particularly durum wheat,which is vital for ensuring food security.It is therefore essential to explore new cereal management strategies to maintain food production and promote crop sustainability.The application of soil microorganisms,particularly plant growth–promoting rhizobacteria(PGPR),as inoculants to enhance crop production is a growing area of interest.This study investigates the effects of the rhizobacteria Paenibacillus polymyxa SGH1 and SGK2,applied both individually and in combination,on the growth and productivity of durum wheat in alkaline calcareous soil.We conducted field experiments over two growing seasons using a randomized complete block design with three blocks,considering four treatments:non-inoculated wheat grains(T0),inoculation with the P.polymyxa SGH1 strain(T1),inoculation with the P.polymyxa SGK2 strain(T2),and co-inoculation with both strains(T3).The results clearly showed that SGH1 and SGK2 inoculation improved the morphometric characteristics of wheat plants,with co-inoculation of both strains that induced more pronounced improvements compared to T0 in terms of collar diameter(+16.9%),tillers plant-1(+89.8%),and SA/RA ratio(+35.5%).Co-inoculation was also the most effective treatment for improving the wheat grain yield(+41.1%in season I and+16.6%in season Ⅱ).In addition,T3 significantly increased the grain starch content(+220%).T1 determined the highest grain protein content in both seasons(9.5%in season Ⅰand 9.66%DW in season Ⅱ).This study demonstrated that bacterial inoculation and co-inoculation strategies can significantly enhance wheat productivity and grain quality in alkaline calcareous soils while reducing at the same time the ecological footprint of agriculture.展开更多
基金Sponsored by the Ordnance Industry Scientific Research Fund(ZZ9682-3).
文摘The accurate monitoring of optical thin-film thickness is a key technique for depositing optical thin-film. For existing coating equipments, which are low precision and automation level on monitoring thin-film thickness, a new photoelectric control and analysis system has been developed. In the new system, main techniques include a photoelectric system with dual-light path, a dual-lock-phase circuit system and a comprehensive digital processing-control-analysis system.The test results of new system show that the static and dynamic stabilities and the control precision of thin-film thickness are extremely increased. The standard deviation of thin-film thickness, which indicates the duplication of thin-film thickness monitoring, is equal to or less than 0.72%. The display resolution limit on reflectivity is 0.02 %. In the system, the linearity of drift is very high, and the static drift ratio approaches zero.
文摘In this short survey, we give a complete list of the most important results obtained by El Naschie’s E-infinity Cantorian space-time theory in the realm of quantum physics and cosmology. Special attention is paid to his recent result on dark energy and revising Einstein’s famous formula .
基金Project supported by the National Natural Science Foundation of China (Grant No. 10872165)
文摘In this paper, the asymptotical p-moment stability of stochastic impulsive differential equations is studied and a comparison theory to ensure the asymptotical p-moment stability of the trivial solution is established, which is important for studying the impulsive control and synchronization in stochastic systems. As an application of this theory, we study the problem of chaos synchronization in the Chen system excited by parameter white-noise excitation, by using the impulsive method. Numerical simulations verify the feasibility of this method.
文摘The hydrological models and simpli?ed methods of Saint-venant equations are used extensively in hydrological modeling, in particular for the simulation of the ?ood routing. These models require speci?c and extensive data that usually makes the study of ?ood propagation an arduous practice. We present in this work a new model, based on a transfer function, this function is a function of parametric probability density, having a physical meaning with respect to the propagation of a hydrological signal. The inversion of the model is carried out by an optimization technique called Genetic Algorithm. It consists of evolving a population of parameters based primarily on genetic recombination operators and natural selection to?nd the minimum of an objective function that measures the distance between observed and simulated data. The precision of the simulations of the proposed model is compared with the response of the Hayami model and the applicability of the model is tested on a real case, the N'Fis basin river, located in the High Atlas Occidental, which presents elements that appear favorable to the study of the propagation. The results obtained are very satisfactory and the simulation of the proposed model is very close to the response of the Hayami model.
文摘We use the distance sum rule method to constrain the spatial curvature of the Universe with a large sample of 161strong gravitational lensing systems,whose distances are calibrated from the Pantheon compilation of typeⅠa supernovae using deep learning.To investigate the possible influence of mass model of the lens galaxy on constraining the curvature parameterΩ_(k),we consider three different lens models.Results show that a flat Universe is supported in the singular isothermal sphere(SIS)model with the parameterΩ_(k)=0.049_(-0.125)^(+0.147).While in the power-law(PL)model,a closed Universe is preferred at the~3σconfidence level,with the parameterΩ_(k)=-0.245_(-0.071)^(+0.075).In the extended PL model,the 95%confidence level upper limit ofΩ_(k)is<0.011.As for the parameters of the lens models,constraints on the three models indicate that the mass profile of the lens galaxy could not be simply described by the standard SIS model.
基金supported by National Natural Science Foundation of China(No.10475080)
文摘Doped graphite GBST1308, mechanically jointed to CuCrZr alloys, will be applied on EAST superconducting as plasma facing material (PFM). Two joint structures called joint-1 and joint-2 were evaluated by means of thermal response tests using electron beam facility. The experimental results showed that the temperature differences of two joints were not significant, and the maximum surface temperature was about 1055℃ at a load of 4 MW/m^2, which had a good agreement with the simulated results by ANSYS code. The results indicated that the doped graphite GBST1308/CuCrZr mock-up can withstand heat flux deposition of 4 MW/m^2 except at the screw-fastened region, and joint-2 could be more suitable to higher heat flux region such as divertor target. But under the higher heat flux, both joints are unacceptable, an advanced PFM and its integration with the heat sink have to be developed, for example, vacuum plasma spraying tungsten coatings on the CuCrZr might be a good choice.
文摘In this paper, we are going to derive four numerical methods for solving the Modified Kortweg-de Vries (MKdV) equation using fourth Pade approximation for space direction and Crank Nicolson in the time direction. Two nonlinear schemes and two linearized schemes are presented. All resulting schemes will be analyzed for accuracy and stability. The exact solution and the conserved quantities are used to highlight the efficiency and the robustness of the proposed schemes. Interaction of two and three solitons will be also conducted. The numerical results show that the interaction behavior is elastic and the conserved quantities are conserved exactly, and this is a good indication of the reliability of the schemes which we derived. A comparison with some existing is presented as well.
文摘In this paper, we solve chiral nonlinear Schrodinger equation (CNSE) numerically. Two numerical methods are derived using the explicit Runge-Kutta method of order four and the linear multistep method (Predictor-Corrector method of fourth order). The resulting schemes of fourth order accuracy in spatial and temporal directions. The CNSE is non-integrable and has two kinds of soliton solutions: bright and dark soliton. The exact solutions and the conserved quantities of CNSE are used to display the efficiency and robustness of the numerical methods we derived. Interaction of two bright solitons for different parameters is also displayed.
文摘A Mobile Ad Hoc Network (MANET) is a self-governing network of mobile nodes without the inclusion of any wired links. Each node can move in an ad hoc manner and therefore, such a network should consist of routing protocols which can adapt to dynamically changing topologies. Numerous protocols have been proposed for the same. However, the trajectories followed by the individual nodes have not been distinctly dealt with. This paper presents a meticulous study on QoS parameters of proactive (OLSR) and reactive (DSR) protocols of MANETs for uniform as well as dissimilar trajectories of individual nodes in a small network of about 20 nodes. Also an examination of partial node failures for both the above mentioned protocols has been done. The performance metrics utilized in this study are average throughput and average delay. OPNET modeler has been utilized for this study. This assessment shows that for uniform trajectories, OLSR has almost same average delay but a higher average throughput as compared to DSR. Also it is seen that, as compared to uniform trajectories, non-uniform trajectories deliver a much higher average throughput. Node failures only reduce average throughputs whereas average delays remain unchanged.
文摘This paper presents a new method for obtaining network properties from incomplete data sets. Problems associated with missing data represent well-known stumbling blocks in Social Network Analysis. The method of “estimating connectivity from spanning tree completions” (ECSTC) is specifically designed to address situations where only spanning tree(s) of a network are known, such as those obtained through respondent driven sampling (RDS). Using repeated random completions derived from degree information, this method forgoes the usual step of trying to obtain final edge or vertex rosters, and instead aims to estimate network-centric properties of vertices probabilistically from the spanning trees themselves. In this paper, we discuss the problem of missing data and describe the protocols of our completion method, and finally the results of an experiment where ECSTC was used to estimate graph dependent vertex properties from spanning trees sampled from a graph whose characteristics were known ahead of time. The results show that ECSTC methods hold more promise for obtaining network-centric properties of individuals from a limited set of data than researchers may have previously assumed. Such an approach represents a break with past strategies of working with missing data which have mainly sought means to complete the graph, rather than ECSTC’s approach, which is to estimate network properties themselves without deciding on the final edge set.
文摘Hospital facilities use a collection of heterogeneous devices, produced by many different vendors, to monitor the state of patient vital signs. The limited interoperability of current devices makes it difficult to synthesize multivariate monitoring data into a unified array of real-time information regarding the patients state. Without an infrastructure for the integrated evaluation, display, and storage of vital sign data, one cannot adequately ensure that the assignment of caregivers to patients reflects the relative urgency of patient needs. This is an especially serious issue in critical care units (CCUs). We present a formal mathematical model of an operational critical care unit, together with metrics for evaluating the systematic impact of caregiver scheduling decisions on patient care. The model is rich enough to capture the essential features of device and patient diversity, and so enables us to test the hypothesis that integration of vital sign data could realistically yield a significant positive impact on the efficacy of critical care delivery outcome. To test the hypothesis, we employ the model within a computer simulation. The simulation enables us to compare the current scheduling processes in widespread use within CCUs, against a new scheduling algorithm that makes use of an integrated array of patient information collected by an (anticipated) vital sign data integration infrastructure. The simulation study provides clear evidence that such an infrastructure reduces risk to patients and lowers operational costs, and in so doing reveals the inherent costs of medical device non-interoperability.
文摘Serum samples from all 23 extant crocodilian species were tested for phospholipase A2 (PLA2) activity against nine different bacterial species. The data were used?to generate a PLA2 activity profile for each crocodilian species, and the data were used to compare the activities of the three main lineages (Alligatoridae,?Crocodylidae, and Gavialidae), the seven different genera, and to compare all?of the 23 individual species. The data revealed that the three lineages ofcrocodilians (Alligatoridae, Crocodylidae, and Gavialidae) exhibited PLA2 activities toward nine species of bacteria that were statistically?distinguishable. In?addition,?the PLA2 activities of crocodilians in a specific genus tended to be more similar to other?members in their genus than to members of other crocodilian genera.
文摘<div style="text-align:justify;"> <span style="font-family:Verdana;">A graph is said to be cordial if it has 0 - 1 labeling which satisfies particular conditions. In this paper, we construct the corona between paths and second power of fan graphs and explain the necessary and sufficient conditions for this construction to be cordial.</span> </div>
文摘A study was conducted at PAU Regional Research Station, Gurdaspur (Punjab) to investigate the design and operational parameters of threshing mechanism of conventional combine harvester for basmati crop. This study was aimed to investigate the suitable changes required in the self-propelled conventional combine harvester for harvesting the basmati crop with minimum grain losses. Field evaluation of experiment was carried out to assess the influence of independent design variable <em>i.e.</em>, arrangement of spikes (AS) and independent operational parameters such as concave clearance (CC) and cylinder speed (CS). The study was aimed to enumerate various combining losses<em> viz</em>., extent of visible and invisible grain damage and threshing efficiency at different AS, CC and CS levels. The first year data recorded during 2017 were processed for the optimization during 2018. The results of the present study revealed that during 2017, maximum visible and invisible losses was 5.49% ± 0.33% and 28.07% ± 3.21%, respectively whereas after modification, these losses remained only 4.00% ± 0.80% and 24.07% ± 2.86%, respectively. The threshing efficiency remained above 99.31% ± 0.47%, for both years. Thus, optimization of combine harvester was able to save the visible grain damage by 60% to 83% and invisible grain damage by 6% to 16%, respectively during 2018 than the year 2017.
文摘M_(p)-Sequences or M-Sequence over Fp not used so much in current time as binary M-Sequences and it is pending with the difficult to construct there coders and decoders of M_(p)-Sequences further these reasons there is expensive values to construct them but the progress in the technical methods will be lead to fast using these sequences in different life’s ways,and these sequences give more collection of information and distribution them on the input and output links of the communication channels,building new systems with more complexity,larger period,and security.In current article we will study the construction of the multiplication M_(p)-Sequence{z_(n)}and its linear equivalent,this sequences are as multiple two sequences,the first sequence{Sn}is an arbitrary M_(p)-Sequence and the second sequence{ζ_(n)}reciprocal sequence of the first sequence{S_(n)},length of the sequence{z_(n)},period,orthogonal and the relations between the coefficients and roots of the characteristic polynomial of f(x)and it’s reciprocal polynomial g(x)and compare these properties with corresponding properties in M-Sequences.
文摘The quantum efficiency of CZTSSe (copper zinc tin sulphur selenium) thin film solar cells is numerically simulated at different temperatures and under a set of bias conditions about the efficiency limiting factors. A systematic methodology is developed and integrated into the proposed model to simulate the characteristics in the quantum efficiency. The proposed model is demonstrated with respect to an ideal device model under a set of bias conditions to selectively deactivate performance limiting parameters under light and voltage biased conditions. Under particular wavelength regions and bias conditions, a particular type of defects near the heterojunction interface significantly impact the carrier collection of devices. This deep acceptor type defect distribution is located in the band of +/- 0.3 eV from the midgap. These defect states influence CZTSSe spectral responses of red and IR light wavelength regions in quantum efficiency caused by affected depletion width toward the back contact. Therefore, the quantum efficiency of CZTSSe devices is altered disproportionally at biased conditions.
文摘A network intrusion detection system is critical for cyber security against llegitimate attacks.In terms of feature perspectives,network traffic may include a variety of elements such as attack reference,attack type,a subcategory of attack,host information,malicious scripts,etc.In terms of network perspectives,network traffic may contain an imbalanced number of harmful attacks when compared to normal traffic.It is challenging to identify a specific attack due to complex features and data imbalance issues.To address these issues,this paper proposes an Intrusion Detection System using transformer-based transfer learning for Imbalanced Network Traffic(IDS-INT).IDS-INT uses transformer-based transfer learning to learn feature interactions in both network feature representation and imbalanced data.First,detailed information about each type of attack is gathered from network interaction descriptions,which include network nodes,attack type,reference,host information,etc.Second,the transformer-based transfer learning approach is developed to learn detailed feature representation using their semantic anchors.Third,the Synthetic Minority Oversampling Technique(SMOTE)is implemented to balance abnormal traffic and detect minority attacks.Fourth,the Convolution Neural Network(CNN)model is designed to extract deep features from the balanced network traffic.Finally,the hybrid approach of the CNN-Long Short-Term Memory(CNN-LSTM)model is developed to detect different types of attacks from the deep features.Detailed experiments are conducted to test the proposed approach using three standard datasets,i.e.,UNsWNB15,CIC-IDS2017,and NSL-KDD.An explainable AI approach is implemented to interpret the proposed method and develop a trustable model.
文摘This paper presents an alternate graphical procedure (Method 2), to that presented in earlier publications entitled, “A Procedure for Trisecting an Acute Angle” and “A Key to Solving the Angle Trisection Problem”. The procedure, when applied to the 30˚ and 60˚ angles that have been “proven” to be nottrisectable and the 45˚ benchmark angle that is known to be trisectable, in each case produced a construction having an identical angular relationship with Archimedes’ Construction, as in Section 2 on THEORY of this paper, where the required trisection angle was found to be one-third of its respective angle (i.e. DE’MA = 1/3 DE’CG). For example, the trisection angle for the 30˚, 45˚ and 60˚ angles were 10.00000˚, 15.00000˚, and 20.00000˚, respectively, and Section 5 on PROOF in this paper. Therefore, based on this identical angular relationship and the numerical results (i.e. to five decimal places), which represent the highest degree of accuracy and precision attainable by The Geometer’s Sketch Pad software, one can only conclude that not only the geometric requirements for arriving at an exact trisection of the 30˚ and 60˚ angle (which have been “proven” to be not-trisectable) have been met, but also, the construction is valid for any arbitrary acute angle, despite theoretical proofs to the contrary by Wantzel, Dudley, and others.
基金QK22020008(National Agency of Agricultural Research of the Czech Republic)TQ03000234(Technological Agency of the Czech Republic)MZE-RO0123(Ministry of Agriculture,CR).
文摘Intensive agricultural practices have undeniably reduced soil fertility and crop productivity.Furthermore,alkaline calcareous soils represent a significant challenge for agricultural production,particularly durum wheat,which is vital for ensuring food security.It is therefore essential to explore new cereal management strategies to maintain food production and promote crop sustainability.The application of soil microorganisms,particularly plant growth–promoting rhizobacteria(PGPR),as inoculants to enhance crop production is a growing area of interest.This study investigates the effects of the rhizobacteria Paenibacillus polymyxa SGH1 and SGK2,applied both individually and in combination,on the growth and productivity of durum wheat in alkaline calcareous soil.We conducted field experiments over two growing seasons using a randomized complete block design with three blocks,considering four treatments:non-inoculated wheat grains(T0),inoculation with the P.polymyxa SGH1 strain(T1),inoculation with the P.polymyxa SGK2 strain(T2),and co-inoculation with both strains(T3).The results clearly showed that SGH1 and SGK2 inoculation improved the morphometric characteristics of wheat plants,with co-inoculation of both strains that induced more pronounced improvements compared to T0 in terms of collar diameter(+16.9%),tillers plant-1(+89.8%),and SA/RA ratio(+35.5%).Co-inoculation was also the most effective treatment for improving the wheat grain yield(+41.1%in season I and+16.6%in season Ⅱ).In addition,T3 significantly increased the grain starch content(+220%).T1 determined the highest grain protein content in both seasons(9.5%in season Ⅰand 9.66%DW in season Ⅱ).This study demonstrated that bacterial inoculation and co-inoculation strategies can significantly enhance wheat productivity and grain quality in alkaline calcareous soils while reducing at the same time the ecological footprint of agriculture.