18 research outputs found

    Thermostatistics of deformed bosons and fermions

    Full text link
    Based on the q-deformed oscillator algebra, we study the behavior of the mean occupation number and its analogies with intermediate statistics and we obtain an expression in terms of an infinite continued fraction, thus clarifying successive approximations. In this framework, we study the thermostatistics of q-deformed bosons and fermions and show that thermodynamics can be built on the formalism of q-calculus. The entire structure of thermodynamics is preserved if ordinary derivatives are replaced by the use of an appropriate Jackson derivative and q-integral. Moreover, we derive the most important thermodynamic functions and we study the q-boson and q-fermion ideal gas in the thermodynamic limit.Comment: 14 pages, 2 figure

    The effects of moisture and micro-structural modifications in drying mortars on vibration-based NDT methods

    Full text link
    In this paper, we investigate the utility of vibration-based NDT tests to detect the subtle microstructural modifications and cracking damage in Portland cement mortars subjected to oven drying treatment. Both linear (resonant mode frequency and damping) and nonlinear (nonlinear hysteretic behavior) vibration test data are reported, collected from samples having a range of water to cement ratios and at two different aggregate contents. All test data are affected by the drying treatments, but it appears that the resonant mode frequency response is dominated by the reduction in internal moisture content with drying and changing aggregate cement ratio of the mixture. On the other hand, the linear mode damping, and more so the nonlinear hysteretic parameter, are more influenced by the microstructural modification and cracking damage caused by drying. In particular it appears that the nonlinear hysteretic parameter is very sensitive to internal damage and microstructural modifications caused by oven drying, but not notably sensitive to pore moisture content, and water to cement and aggregate to cement ratios. (C) 2015 Elsevier Ltd. All rights reserved.The authors want to acknowledge the financial support of the Ministerio de Economia y Competitividad (MINECO), Spain, and FEDER funding (Ondacem Project: BIA 2010-19933). J.N. Eiras wants to acknowledge the financial support provided by Ministerio de Economia y Competitividad (MINECO), Spain, grant BES-2011-044624 and grants EEBB I-13-06609, and EEBB-I-14-08993 for supporting extended visits to the University of Illinois.Eiras Fernández, JN.; Popovics, JS.; Borrachero Rosado, MV.; Monzó Balbuena, JM.; Paya Bernabeu, JJ. (2015). The effects of moisture and micro-structural modifications in drying mortars on vibration-based NDT methods. Construction and Building Materials. 94:565-571. https://doi.org/10.1016/j.conbuildmat.2015.07.078S5655719

    Secure cross-layer routing protocol with authentication key management scheme for manets

    No full text
    MANET (Mobile ad-hoc networks) is typically a no-infrastructure multi-hop network where every node interacts with other network nodes either indirectly or directly via intermediate nodes. A lot of research is being undertaken to save the energy of mobile nodes at different levels. Power-relevant issues can have an effect on every layer of the stack, making the traditional layered approach ineffective. In this work, cross layered routing protocol based on PSO (Particle swarm optimization) with adapted contention window technique is proposed. To form consistent and energy efficient routing paths, PSO algorithm uses Traffic index, Average energy load, data success rate & trust value parameters that are computed from network layer. After establishing routing paths, network's contentions are measured MAC layers for communications and contention with measured contentions and average energy loads. The trust of nodes is computed using the following constraints: group trust-provided by neighbour nodes & quality trust-computed by node QoS. Dual authentications with EnDA (enhanced dual authentication) using key management strategies for enhanced data security and integrity. ECC (Elliptical curve cryptography) and Diffie-Hellman key exchanges with bilinear maps improve security of communications. The suggested protocol when measured in terms of energy usage and secure key agreements during network's transmissions, showed satisfactory performances
    corecore