Search results for: L. Herojit Singh
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 401

Search results for: L. Herojit Singh

251 Mobile Ad Hoc Networks and It’s Routing Protocols

Authors: Rakesh Kumar, Piush Verma, Yaduvir Singh

Abstract:

A mobile ad hoc network (MANET) is a self configuring network, without any centralized control. The topology of this network is not always defined. The main objective of this paper is to introduce the fundamental concepts of MANETs to the researchers and practitioners, who are involved in the work in the area of modeling and simulation of MANETs. This paper begins with an overview of mobile ad hoc networks. Then it proceeds with the overview of routing protocols used in the MANETS, their properties and simulation methods. A brief tabular comparison between the routing protocols is also given in this paper considering different routing protocol parameters. This paper introduces a new routing scheme developed by the use of evolutionary algorithms (EA) and analytical hierarchy process (AHP) which will be used for getting the optimized output of MANET. In this paper cryptographic technique, ceaser cipher is also employed for making the optimized route secure.

Keywords: AHP, AODV, Cryptography, EA, MANET, Optimized output.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4020
250 Memristor: The Missing Circuit Element and its Application

Authors: Vishnu Pratap Singh Kirar

Abstract:

Memristor is also known as the fourth fundamental passive circuit element. When current flows in one direction through the device, the electrical resistance increases and when current flows in the opposite direction, the resistance decreases. When the current is stopped, the component retains the last resistance that it had, and when the flow of charge starts again, the resistance of the circuit will be what it was when it was last active. It behaves as a nonlinear resistor with memory. Recently memristors have generated wide research interest and have found many applications. In this paper we survey the various applications of memristors which include non volatile memory, nanoelectronic memories, computer logic, neuromorphic computer architectures low power remote sensing applications, crossbar latches as transistor replacements, analog computations and switches.

Keywords: Memristor, non-volatile memory, arithmatic operation, programmable resistor.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3997
249 Simulation Study of Lateral Trench Gate Power MOSFET on 4H-SiC

Authors: Yashvir Singh, Mayank Joshi

Abstract:

A lateral trench-gate power metal-oxide-semiconductor on 4H-SiC is proposed. The device consists of two separate trenches in which two gates are placed on both sides of P-body region resulting two parallel channels. Enhanced current conduction and reduced-surface-field effect in the structure provide substantial improvement in the device performance. Using two dimensional simulations, the performance of proposed device is evaluated and compare of with that of the conventional device for same cell pitch. It is demonstrated that the proposed structure provides two times higher output current, 11% decrease in threshold voltage, 70% improvement in transconductance, 70% reduction in specific ON-resistance, 52% increase in breakdown voltage, and nearly eight time improvement in figure-of-merit over the conventional device.

Keywords: 4H-SiC, lateral, trench-gate, power MOSFET.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2139
248 System Reduction Using Modified Pole Clustering and Modified Cauer Continued Fraction

Authors: Jay Singh, C. B. Vishwakarma, Kalyan Chatterjee

Abstract:

A mixed method by combining modified pole clustering technique and modified cauer continued fraction is proposed for reducing the order of the large-scale dynamic systems. The denominator polynomial of the reduced order model is obtained by using modified pole clustering technique while the coefficients of the numerator are obtained by modified cauer continued fraction. This method generated 'k' number of reduced order models for kth order reduction. The superiority of the proposed method has been elaborated through numerical example taken from the literature and compared with few existing order reduction methods.

Keywords: Modified Pole Clustering, Modified Cauer Continued Fraction, Order Reduction, Stability, Transfer Function.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1966
247 Artificial Neural Networks for Cognitive Radio Network: A Survey

Authors: Vishnu Pratap Singh Kirar

Abstract:

The main aim of a communication system is to achieve maximum performance. In Cognitive Radio any user or transceiver has ability to sense best suitable channel, while channel is not in use. It means an unlicensed user can share the spectrum of a licensed user without any interference. Though, the spectrum sensing consumes a large amount of energy and it can reduce by applying various artificial intelligent methods for determining proper spectrum holes. It also increases the efficiency of Cognitive Radio Network (CRN). In this survey paper we discuss the use of different learning models and implementation of Artificial Neural Network (ANN) to increase the learning and decision making capacity of CRN without affecting bandwidth, cost and signal rate.

Keywords: Artificial Neural Network, Cognitive Radio, Cognitive Radio Networks, Back Propagation, Spectrum Sensing.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4106
246 Electrochemical Corrosion of Steels in Distillery Effluent

Authors: A. K. Singh, Chhotu Ram

Abstract:

The present work relates to the corrosivity of distillery effluent and corrosion performance of mild steel and stainless steels SS304L, SS316L, and 2205. The report presents the results and conclusions drawn on the basis of (i) electrochemical polarization tests performed in distillery effluent and laboratory prepared solutions having composition similar to that of the effluent (ii) the surface examination by scanning electron microscope (SEM) of the corroded steel samples. It is observed that pH and presence of chloride, phosphate, calcium, nitrite and nitrate in distillery effluent enhance corrosion, whereas presence of sulphate and potassium inhibits corrosion. Among the materials tested, mild steel is observed to experience maximum corrosion followed by stainless steels SS304L, SS316L, and 2205.

Keywords: Steel, distillery effluent, electrochemical polarization, corrosion.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1086
245 Unsteady Transient Free Convective Flow of an Incompressible Viscous Fluid under Influence of Uniform Transverse Magnetic Field

Authors: Praveen Saraswat, Vipin Kumar Verma, Rudraman Singh

Abstract:

The unsteady transient free convection flow of an incompressible dissipative viscous fluid between parallel plates at different distances have been investigated under porous medium. Due to presence of heat flux under the influence of uniform transverse magnetic field the velocity distribution and the temperature distribution, is shown graphically. Since exact solution is not possible so we find parametrical solution by perturbation technique. The result is shown in graph for different parameters. We notice that heat generation effects fluid velocity keeping in which of free convection which cools.

Keywords: Transient, Convection, MHD, Viscous, Porous.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1491
244 Neuron-Based Control Mechanisms for a Robotic Arm and Hand

Authors: Nishant Singh, Christian Huyck, Vaibhav Gandhi, Alexander Jones

Abstract:

A robotic arm and hand controlled by simulated neurons is presented. The robot makes use of a biological neuron simulator using a point neural model. The neurons and synapses are organised to create a finite state automaton including neural inputs from sensors, and outputs to effectors. The robot performs a simple pick-and-place task. This work is a proof of concept study for a longer term approach. It is hoped that further work will lead to more effective and flexible robots. As another benefit, it is hoped that further work will also lead to a better understanding of human and other animal neural processing, particularly for physical motion. This is a multidisciplinary approach combining cognitive neuroscience, robotics, and psychology.

Keywords: Robot, neuron, cell assembly, spiking neuron, force sensitive resistor.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1975
243 Imposter Detection Based on Location in Vehicular Ad-Hoc Network

Authors: Sanjoy Das, Akash Arya, Rishi Pal Singh

Abstract:

Vehicular Ad hoc Network is basically the solution of several problems associated while vehicles are plying on the road. In this paper, we have focused on the detection of imposter node while it has stolen the ID's of the authenticated vehicle in the network. The purpose is to harm the network through imposter messages. Here, we have proposed a protocol namely Imposter Detection based on Location (IDBL), which will store the location coordinate of the each vehicle as the key of the authenticity of the message so that imposter node can be detected. The imposter nodes send messages from a stolen ID and show that it is from an authentic node ID. So, to detect this anomaly, the first location is checked and observed different from original vehicle location. This node is known as imposter node. We have implemented the algorithm through JAVA and tested various types of node distribution and observed the detection probability of imposter node.

Keywords: Authentication, detection, IDBL protocol, imposter node, node detection.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 800
242 Autonomous Control of a Mobile Manipulator

Authors: Shonal Singh, Bibhya Sharma, Jito Vanualailai

Abstract:

This paper considers the design of a motion planner that will simultaneously accomplish control and motion planning of a n-link nonholonomic mobile manipulator, wherein, a n-link holonomic manipulator is coupled with a nonholonomic mobile platform, within an obstacle-ridden environment. This planner, derived from the Lyapunov-based control scheme, generates collision-free trajectories from an initial configuration to a final configuration in a constrained environment cluttered with stationary solid objects of different shapes and sizes. We demonstrate the efficiency of the control scheme and the resulting acceleration controllers of the mobile manipulator with results through computer simulations of an interesting scenario.

Keywords: Artificial potential fields, Lyapunov-based control scheme, Lyapunov stability, nonholonomic manipulator, minimum distance technique, kinodynamic constraints.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1415
241 Application of Artificial Neural Network for Predicting Maintainability Using Object-Oriented Metrics

Authors: K. K. Aggarwal, Yogesh Singh, Arvinder Kaur, Ruchika Malhotra

Abstract:

Importance of software quality is increasing leading to development of new sophisticated techniques, which can be used in constructing models for predicting quality attributes. One such technique is Artificial Neural Network (ANN). This paper examined the application of ANN for software quality prediction using Object- Oriented (OO) metrics. Quality estimation includes estimating maintainability of software. The dependent variable in our study was maintenance effort. The independent variables were principal components of eight OO metrics. The results showed that the Mean Absolute Relative Error (MARE) was 0.265 of ANN model. Thus we found that ANN method was useful in constructing software quality model.

Keywords: Software quality, Measurement, Metrics, Artificial neural network, Coupling, Cohesion, Inheritance, Principal component analysis.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2573
240 Diversification of the Monogeneans (Platyhelminthes) in Indian Freshwater Fish Families

Authors: A. Chaudhary, H.S. Singh

Abstract:

Present communication deals with general distribution and diversification of Monogenean families parasitizing different freshwater fish families of India. Levels of monogenean parasitism and their diversity are significantly greater in Indian fishes. The most monogeneans parasitized family of fish is Cyprinidae and most dactylogyrids parasitise cyprinids. The family dactylogyridae has more species than any other monogenean family and frequently associated with cyprinid, silurids and bagrids families. Of the various 52 families of freshwater fishes from India, only the Anguillidae, Balitoridae, Chacidae, Chanidae, Channidae, Cobitidae, Coiidae, Erethistidae, Megalopidae, Pristidae, Psilorhynchidae, Salmonidae, Schileidae, Sparidae, Synodontidae and Terapontidae were found to be free of infection with monogeneans. The present study takes a broad look at monogenean diversity in the freshwater fishes of India.

Keywords: Diversification, fish, India, Monogenea

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1913
239 A Tool for Audio Quality Evaluation Under Hostile Environment

Authors: Akhil Kumar Arya, Jagdeep Singh Lather, Lillie Dewan

Abstract:

In this paper is to evaluate audio and speech quality with the help of Digital Audio Watermarking Technique under the different types of attacks (signal impairments) like Gaussian Noise, Compression Error and Jittering Effect. Further attacks are considered as Hostile Environment. Audio and Speech Quality Evaluation is an important research topic. The traditional way for speech quality evaluation is using subjective tests. They are reliable, but very expensive, time consuming, and cannot be used in certain applications such as online monitoring. Objective models, based on human perception, were developed to predict the results of subjective tests. The existing objective methods require either the original speech or complicated computation model, which makes some applications of quality evaluation impossible.

Keywords: Digital Watermarking, DCT, Speech Quality, Attacks.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1624
238 MHD Unsteady Free Convection of Heat and Mass Transfer Flow through Porous Medium with Time Dependent Suction and Constant Heat Source/Sink

Authors: Praveen Saraswat, Rudraman Singh

Abstract:

In this paper, we have investigated the free convection MHD flow due to heat and mass transfer through porous medium bounded by an infinite vertical non-conducting porous plate with time dependent suction under the influence of uniform transverse magnetic field of strength H0. When Temperature (T) and Concentration (C) at the plate is oscillatory with time about a constant non-zero mean. The velocity distribution, the temperature distribution, co-efficient of skin friction and role of heat transfer is investigated. Here the partial differential equations are involved. Exact solution is not possible so approximate solution is obtained and various graphs are plotted.

Keywords: Time Dependent Suction, Convection, MHD, Porous.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1908
237 Enhanced Character Based Algorithm for Small Parsimony

Authors: Parvinder Singh Sandhu, Sumeet Kaur Sehra, Karmjit Kaur

Abstract:

Phylogenetic tree is a graphical representation of the evolutionary relationship among three or more genes or organisms. These trees show relatedness of data sets, species or genes divergence time and nature of their common ancestors. Quality of a phylogenetic tree requires parsimony criterion. Various approaches have been proposed for constructing most parsimonious trees. This paper is concerned about calculating and optimizing the changes of state that are needed called Small Parsimony Algorithms. This paper has proposed enhanced small parsimony algorithm to give better score based on number of evolutionary changes needed to produce the observed sequence changes tree and also give the ancestor of the given input.

Keywords: Phylogenetic Analysis, Small Parsimony, EnhancedFitch Algorithm, Enhanced Sakoff Algorithm.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1349
236 Development of Solar Poly House Tunnel Dryer (STD) for Medicinal Plants

Authors: N. C. Shahi, Anupama Singh, A. E. Kate

Abstract:

There was a scenario present day that drying of fresh fruits and vegetables by indirect solar drying by using mechanical device; hence, an effort was made to develop a small scale solar tunnel dryer (STD). Drying of spinach is carried out to analyze the performance of the dryer and to study its drying characteristics. To evaluate the performance of dryer the independent variables were selected as air flow rate, loading density and shade net while collector efficiency, drying efficiency, overall efficiency and specific energy consumption were selected as responses during performing the experiments. The spinach was dried from initial moisture content 88.21-94.04% (w.b.) to final moisture content 3.50-5.13% (w.b.). The drying time considerably reduced as compared to open sun drying of spinach as sun drying took 15 h for drying. The average collector efficiency, drying efficiency and overall efficiency were in the range 28.73-61.15%, 11.63% to 22.13%, and 7.61-14.66%, respectively.

Keywords: Solar dryer, collector efficiency, drying efficiency, spinach.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1820
235 Photocatalytic Detoxification Method for Zero Effluent Discharge in Dairy Industry: Effect of Operational Parameters

Authors: Janhavi Inamdar, S.K. Singh

Abstract:

Laboratory experiments have been performed to investigate photocatalytic detoxification by using TiO2 photocatalyst for treating dairy effluent. Various operational parameters such as catalyst concentration, initial concentration, angle of tilt of solar flat plate reactor and flow rate were investigated. Results indicated that the photocatalytic detoxification process can efficiently treat dairy effluent. Experimental runs with dairy wastewater can be used to identify the optimum operational parameters to perform wastewater degradation on large scale for recycling purpose. Also effect of two different types of reactors on degradation process was analyzed.

Keywords: Photocatalytic detoxification, TiO2 photocatalyst, solar flat plate reactor, Zero effluent discharge.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1932
234 Analytical Study of Component Based Software Engineering

Authors: Iqbaldeep Kaur, Parvinder S. Sandhu, Hardeep Singh, Vandana Saini

Abstract:

This paper is a survey of current component-based software technologies and the description of promotion and inhibition factors in CBSE. The features that software components inherit are also discussed. Quality Assurance issues in componentbased software are also catered to. The feat research on the quality model of component based system starts with the study of what the components are, CBSE, its development life cycle and the pro & cons of CBSE. Various attributes are studied and compared keeping in view the study of various existing models for general systems and CBS. When illustrating the quality of a software component an apt set of quality attributes for the description of the system (or components) should be selected. Finally, the research issues that can be extended are tabularized.

Keywords: Component, COTS, Component based development, Component-based Software Engineering.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2740
233 Effects of Channel Bed Slope on Energy Dissipation of Different Types of Piano Key Weir

Authors: Munendra Kumar, Deepak Singh

Abstract:

The present investigation aims to study the effect of channel bed slopes on energy dissipation across the different types of Piano Key Weir (PK weir or PKW) under the free-flow conditions in rigid rectangular channels. To this end, three different types (type-A, type-B, and type-C) of PKW models were tested and examined. To document and quantify this experimental investigation, a total of 270 tests were performed, including detailed observations of the flow field. The results show that the energy dissipation of all PKW models increases with the bed slopes and decreases with increasing the discharge over the weirs. In addition, the energy dissipation over the PKW varies significantly with the geometry of the weir. The type-A PKW has shown the highest energy dissipation than the other PKWs. As the bottom slope changed from Sb = 0% to 1.25%, the energy dissipation increased by about 8.5%, 9.1%, and 10.55% for type-A, type-B, and type-C, respectively.

Keywords: Piano key weir, bed slope, energy dissipation across PKW, free overfalls.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 520
232 A Complexity Measure for Java Bean based Software Components

Authors: Sandeep Khimta, Parvinder S. Sandhu, Amanpreet Singh Brar

Abstract:

The traditional software product and process metrics are neither suitable nor sufficient in measuring the complexity of software components, which ultimately is necessary for quality and productivity improvement within organizations adopting CBSE. Researchers have proposed a wide range of complexity metrics for software systems. However, these metrics are not sufficient for components and component-based system and are restricted to the module-oriented systems and object-oriented systems. In this proposed study it is proposed to find the complexity of the JavaBean Software Components as a reflection of its quality and the component can be adopted accordingly to make it more reusable. The proposed metric involves only the design issues of the component and does not consider the packaging and the deployment complexity. In this way, the software components could be kept in certain limit which in turn help in enhancing the quality and productivity.

Keywords: JavaBean Components, Complexity, Metrics, Validation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1527
231 The Design, Development, and Optimization of a Capacitive Pressure Sensor Utilizing an Existing 9 DOF Platform

Authors: Andrew Randles, Ilker Ocak, Cheam Daw Don, Navab Singh, Alex Gu

Abstract:

Nine Degrees of Freedom (9 DOF) systems are already in development in many areas. In this paper, an integrated pressure sensor is proposed that will make use of an already existing monolithic 9 DOF inertial MEMS platform. Capacitive pressure sensors can suffer from limited sensitivity for a given size of membrane. This novel pressure sensor design increases the sensitivity by over 5 times compared to a traditional array of square diaphragms while still fitting within a 2 mm x 2 mm chip and maintaining a fixed static capacitance. The improved design uses one large diaphragm supported by pillars with fixed electrodes placed above the areas of maximum deflection. The design optimization increases the sensitivity from 0.22 fF/kPa to 1.16 fF/kPa. Temperature sensitivity was also examined through simulation.

Keywords: Capacitive pressure sensor, 9 DOF, 10 DOF, sensor, capacitive, inertial measurement unit, IMU, inertial navigation system, INS.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2328
230 Genetic Algorithm Approach for Solving the Falkner–Skan Equation

Authors: Indu Saini, Phool Singh, Vikas Malik

Abstract:

A novel method based on Genetic Algorithm to solve the boundary value problems (BVPs) of the Falkner–Skan equation over a semi-infinite interval has been presented. In our approach, we use the free boundary formulation to truncate the semi-infinite interval into a finite one. Then we use the shooting method based on Genetic Algorithm to transform the BVP into initial value problems (IVPs). Genetic Algorithm is used to calculate shooting angle. The initial value problems arisen during shooting are computed by Runge-Kutta Fehlberg method. The numerical solutions obtained by the present method are in agreement with those obtained by previous authors.

Keywords: Boundary Layer Flow, Falkner–Skan equation, Genetic Algorithm, Shooting method.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2509
229 A Comparative Study of Metal Extraction from Spent Catalyst Using Acidithiobacillus ferrooxidans

Authors: Haragobinda Srichandan, Sradhanjali Singh, Dong Jin Kim, Seoung-Won Lee

Abstract:

The recovery of metal values and safe disposal of spent catalyst is gaining interest due to both its hazardous nature and increased regulation associated with disposal methods. Prior to the recovery of the valuable metals, removal of entrained deposits limit the diffusion of lixiviate resulting in low recovery of metals must be taken into consideration. Therefore, petroleum refinery spent catalyst was subjected to acetone washing and roasting at 500oC. The treated samples were investigated for metals bioleaching using Acidithiobacillus ferrooxidans in batch reactors and the leaching efficiencies were compared. It was found out that acetone washed spent catalysts results in better metal recovery compare to roasted spent. About 83% Ni, 20% Al, 50% Mo and 73% V were leached using the acetone washed spent catalyst. In both the cases, Ni, V and Mo was high compared to Al.

Keywords: Acetone wash, At. ferrooxidans, Bioleaching, Calcined, Metal recovery.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2583
228 Design and Optimization of Coplanar Waveguide-Fed Sensing Antennas for ISM Band Applications

Authors: Vivek Bharti, Inderpreet Kaur, Saurabh Verma, Renu Gangwar, Hari Kumar Singh

Abstract:

This work presents a dual-band Coplanar Waveguide (CPW) fed rectangular patch antenna designed for applications in Industrial, Scientific, and Medical (ISM) Band sensing. Fabricated on a cost-effective FR-4 substrate with specific dimensions, the antenna incorporates a rectangular slot and a copper patch, optimized through simulation to achieve desired characteristics, particularly focusing on the reflection coefficient. A unique feature is introduced through the integration of copper cells forming a Partially Reflecting Surface (PRS) to feed the antenna. Dual-band functionality is achieved, covering frequencies of 1.28 GHz-1.3 GHz and 4.9 GHz-5.2 GHz, catering to diverse communication needs within these frequency ranges. The addition of a superstrate enhances the antenna’s gain, resulting in 4.5 dBi at 1.28 GHz-1.3 GHz and 6.5 dBi at 4.9 GHz-5.2 GHz, with an efficiency of 58%.

Keywords: ISM, Coplanar waveguide fed, superstrate, circularly polarized.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 133
227 Shell Closures in Exotic Nuclei

Authors: G. Saxena, D. Singh, M. Kaushik,

Abstract:

Inspired by the recent experiments [1]-[3] indicating unusual doubly magic nucleus 24O which lies just at the neutron drip-line and encouraged by the success of our relativistic mean-field (RMF) plus state dependent BCS approach for the description of the ground state properties of the drip-line nuclei [23]-[27], we have further employed this approach, across the entire periodic table, to explore the unusual shell closures in exotic nuclei. In our RMF+BCS approach the single particle continuum corresponding to the RMF is replaced by a set of discrete positive energy states for the calculations of pairing energy. Detailed analysis of the single particle spectrum, pairing energies and densities of the nuclei predict the unusual proton shell closures at Z = 6, 14, 16, 34, and unusual neutron shell closures at N = 6, 14, 16, 34, 40, 70, 112.

Keywords: Relativistic Mean Field theory, Magic Nucleus, Si isotopes, Shell Closure.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1503
226 Survival of Neutrino Mass Models in Nonthermal Leptogenesis

Authors: Amal Kr Sarma, H Zeen Devi, N Nimai Singh

Abstract:

The Constraints imposed by non-thermal leptogenesis on the survival of the neutrino mass models describing the presently available neutrino mass patterns, are studied numerically. We consider the Majorana CP violating phases coming from right-handed Majorana mass matrices to estimate the baryon asymmetry of the universe, for different neutrino mass models namely quasi-degenerate, inverted hierarchical and normal hierarchical models, with tribimaximal mixings. Considering two possible diagonal forms of Dirac neutrino mass matrix as either charged lepton or up-quark mass matrix, the heavy right-handed mass matrices are constructed from the light neutrino mass matrix. Only the normal hierarchical model leads to the best predictions of baryon asymmetry of the universe, consistent with observations in non-thermal leptogenesis scenario.

Keywords: Thermal leptogenesis, Non-thermal leptogenesis.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1286
225 Computation of Probability Coefficients using Binary Decision Diagram and their Application in Test Vector Generation

Authors: Ashutosh Kumar Singh, Anand Mohan

Abstract:

This paper deals with efficient computation of probability coefficients which offers computational simplicity as compared to spectral coefficients. It eliminates the need of inner product evaluations in determination of signature of a combinational circuit realizing given Boolean function. The method for computation of probability coefficients using transform matrix, fast transform method and using BDD is given. Theoretical relations for achievable computational advantage in terms of required additions in computing all 2n probability coefficients of n variable function have been developed. It is shown that for n ≥ 5, only 50% additions are needed to compute all probability coefficients as compared to spectral coefficients. The fault detection techniques based on spectral signature can be used with probability signature also to offer computational advantage.

Keywords: Binary Decision Diagrams, Spectral Coefficients, Fault detection

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1465
224 Back Bone Node Based Black Hole Detection Mechanism in Mobile Ad Hoc Networks

Authors: Nidhi Gupta, Sanjoy Das, Khushal Singh

Abstract:

Mobile Ad hoc Network is a set of self-governing nodes which communicate through wireless links. Dynamic topology MANETs makes routing a challenging task. Various routing protocols are there, but due to various fundamental characteristic open medium, changing topology, distributed collaboration and constrained capability, these protocols are tend to various types of security attacks. Black hole is one among them. In this attack, malicious node represents itself as having the shortest path to the destination but that path not even exists. In this paper, we aim to develop a routing protocol for detection and prevention of black hole attack by modifying AODV routing protocol. This protocol is able to detect and prevent the black hole attack. Simulation is done using NS-2, which shows the improvement in network performance.

Keywords: Ad hoc, AODV, Back Bone, routing, Security.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2160
223 DNS of a Laminar Separation Bubble

Authors: N. K. Singh, S. Sarkar

Abstract:

Direct numerical simulation (DNS) is used to study the evolution of a boundary layer that was laminar initially followed by separation and then reattachment owing to generation of turbulence. This creates a closed region of recirculation, known as the laminar-separation bubble. The present simulation emulates the flow environment encountered in a modern LP turbine blade, where a laminar separation bubble may occur on the suction surface. The unsteady, incompressible three-dimensional (3-D) Navier-Stokes (NS) equations have been solved over a flat plate in the Cartesian coordinates. The adverse pressure gradient, which causes the flow to separate, is created by a boundary condition. The separated shear layer undergoes transition through appearance of ╬ø vortices, stretching of these create longitudinal streaks. Breakdown of the streaks into small and irregular structures makes the flow turbulent downstream.

Keywords: Adverse pressure gradient, direct numerical simulation, laminar separation bubble.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2603
222 Potential Field Functions for Motion Planning and Posture of the Standard 3-Trailer System

Authors: K. Raghuwaiya, S. Singh, B. Sharma, J. Vanualailai

Abstract:

This paper presents a set of artificial potential field functions that improves upon, in general, the motion planning and posture control, with theoretically guaranteed point and posture stabilities, convergence and collision avoidance properties of 3-trailer systems in a priori known environment. We basically design and inject two new concepts; ghost walls and the distance optimization technique (DOT) to strengthen point and posture stabilities, in the sense of Lyapunov, of our dynamical model. This new combination of techniques emerges as a convenient mechanism for obtaining feasible orientations at the target positions with an overall reduction in the complexity of the navigation laws. The effectiveness of the proposed control laws were demonstrated via simulations of two traffic scenarios.

Keywords: Artificial potential fields, 3-trailer systems, motion planning, posture, parking and collision-free trajectories.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2129