36 research outputs found

    Nucleation Behaviour of Iodide and Iodate Systems in the Presence of soluble salts

    No full text

    Reply

    No full text

    Ice-forming Nuclei and Their Dominant Source Region

    No full text

    Utility of natural generalised inverse technique in the interpretation of dyke structures

    No full text
    285-298Forward and Inverse methods of magnetic interpretation have been used to estimate the parameters of dyke like intrusion over the eastern continental shelf of India. In the forward problem, the tentative parameters of the causative source are assumed and anomalies are calculated using the anomaly equation, while inverse problem refers to methods of tracing the boundaries or outlines of anomalous bodies using an iterative approach. While solving the inverse problem, data kernel has been generated through the model (i.e. partial derivatives of magnetic anomaly function with respect to model parameters at each station forming the kernel). In solving the coupled eigenvalue problem of covariance matrices of data kernel, Singular Value Decomposition (SVD) has been performed to build Generalised Inverse Operator (GIO). This GIO is operated on the observed anomaly (with reference to the calculated) to yield improved model parameters. Data and model resolution matrices are computed to check the correctness of the solution and further analysis. The marine magnetic total field anomaly of continental shelf of Visakhapatnam is interpreted using GI technique, which revealed the causative source of the anomaly as a dyke model at a depth of 120 m below seabed

    Symbolic Verification with Periodic Sets

    Full text link
    peer reviewedSymbolic approaches attack the state explosion problem by introducing implicit representations that allow the simultaneous manipulation of large sets of states. The most commonly used representation in this context is the Binary Decision Diagram (BDD). This paper takes the point of view that other structures than BDD's can be useful for representing sets of values, and that combining implicit and explicit representations can be fruitful. It introduces a representation of complex periodic sets of integer values, shows how this representation can be manipulated, and describes its application to the state-space exploration of protocols. Preliminary experimental results indicate that the method can dramatically reduce the resources required for state-space exploration
    corecore