184 research outputs found

    Error estimators and their analysis for CG, Bi-CG and GMRES

    Full text link
    We present an analysis of the uncertainty in the convergence of iterative linear solvers when using relative residue as a stopping criterion, and the resulting over/under computation for a given tolerance in error. This shows that error estimation is indispensable for efficient and accurate solution of moderate to high conditioned linear systems (κ>100\kappa>100), where κ\kappa is the condition number of the matrix. An O(1)\mathcal{O}(1) error estimator for iterations of the CG (Conjugate Gradient) algorithm was proposed more than two decades ago. Recently, an O(k2)\mathcal{O}(k^2) error estimator was described for the GMRES (Generalized Minimal Residual) algorithm which allows for non-symmetric linear systems as well, where kk is the iteration number. We suggest a minor modification in this GMRES error estimation for increased stability. In this work, we also propose an O(n)\mathcal{O}(n) error estimator for A-norm and l2l_{2} norm of the error vector in Bi-CG (Bi-Conjugate Gradient) algorithm. The robust performance of these estimates as a stopping criterion results in increased savings and accuracy in computation, as condition number and size of problems increase

    A Survey on Image Encryption and Decryption using Blowfish & Watermarking

    Get PDF
    Internet means International Network. In the present era, to send and receive information, the internet is the main media. This information may be text, audio, graphics and video etc. There are many advantages of internet. Internet provides quickest data delivery services, security of data is major concern for all internet users. There is always a sense of insecurity amongst internet user after sending data or image until he gets an acknowledgment from the opposite side informing that they have received the data safely, that too without any manipulation in its content. The confidentiality, non-repudiation, validation, reliability, of the information (data or image) should be checked properly otherwise data manipulation can have big problem. We can get these objectives with cryptography which is simply the science of securing sensitive and confidential information as it is stored on media or transmitted through communication network paths. Here, images are considered with an aim to secure them during its storage and transmission. Blowfish Algorithm, a type of symmetric key cryptography is the best solution for this. The two processes, encryption and decryption together form the cryptographic process. For ensuring security, the images are encrypted by the sender before transmitting them and are decrypted by the receiver after receiving them so that only the sender and the intended person can see the content in the image. The blowfish algorithm is safe against unauthorized attack and runs faster than the popular accessible algorithms. For double protection, after the blowfish process, the encrypted image tends to go through a water marking process which is used to hide a secret or personal message to protect a products copyright or to demonstrate data integrity Watermarking is the process of embedding new data into image, audio or video. We perform watermarking on different types of images say JPEG, BMP etc. The anticipated work is designed and implemented using MATLAB. DOI: 10.17762/ijritcc2321-8169.150516

    A Survey on Energy Efficient Routing In MANETs Using Multi-Objective Genetic Algorithm

    Get PDF
    Mobile ad hoc networks (MANET) are self-establishing network that contains short radio range and limited bandwidth and they do not have any specified infrastructure. The ad hoc network changes its topology suddenly. In such this type of situation, establishing correct and efficient routes from source to destination is an important design issue in mobile ad hoc networks and its challenging goal is to provide energy efficient routing protocol. For finding the shortest path between the sources to destination, the routing technique genetic algorithm (GA) plays an important role. Such type of routing technique will reduce in finding the route again and again when any failure occurs in the path. Hence, it will take less time in sending again the packet to the destination and therefore it results in increasing throughput in the Mobile Ad hoc Network. In this paper, we have discussed the routing protocols, its classifications, advantage and disadvantages of the routing protocols and taxonomy of energy efficient routing protocols in Mobile Ad hoc network. DOI: 10.17762/ijritcc2321-8169.160411

    Hemimegalencephaly: Seizure outcome in an infant after hemispherectomy

    Get PDF
    Isolated hemimegalencephaly (iHME) is a rare form of congenital malformation of cortical development characterized by enlargement of all or part of one cerebral hemisphere. It typically presents with intractable seizures, developmental delay, contralateral hemiparesis, and hemianopia. We report a case of an 18-month-old girl who presented first with focal seizures at tenth day of life, with no other physical or behavioral abnormality. Initial EEG showed excessive sharp EEG transients more over the right hemisphere; repeated EEG showed spikes, polyspikes, sharps, and slow wave discharges predominately over the right hemisphere. MRI of the brain showed asymmetric enlargement of the right cerebral hemisphere, suggestive of hemimegalencephaly. Initial treatment with antiepileptic drugs (AEDs) was successful in controlling her seizures, but later on the seizures became intractable even on polytherapy of AEDs; finally, functional hemispherectomy was performed and she became seizure free. Identification of this and similar cases of iHME can help us to better understand this disorder and eventually to provide better treatment options for it

    Kaluza–Klein gluon + jets associated production at the Large Hadron Collider

    Get PDF
    AbstractThe Kaluza–Klein excitations of gluons offer the exciting possibility of probing bulk Randall–Sundrum (RS) models. In these bulk models either a custodial symmetry or a deformation of the metric away from AdS is invoked in order to deal with electroweak precision tests. Addressing both these models, we suggest a new channel in which to study the production of KK-gluons (gKK): one where it is produced in association with one or more hard jets. The cross-section for the gKK + jets channel is significant because of several contributing sub-processes. In particular, the 1-jet and the 2-jet associated processes are important because at these orders in QCD the qg and the gg initial states respectively come into play. We have performed a hadron-level simulation of the signal and present strategies to effectively extract the signal from what could potentially be a huge background. We present results for the kinematic reach of the LHC Run-II for different gKK masses in bulk-RS models

    Three siblings with Charcot-Marie-tooth Disease with no other family history

    Get PDF
    Charcot-Marie-Tooth (CMT) disease is one of the most common inherited disorders of the peripheral nervous system. Patients diagnosed with CMT disease have axonal degeneration which results in muscle wasting, sensory loss and weakness. These patients have a very characteristic walking gait and shape of hands, along with other changes. Despite many common visible changes, no singular common genetic mutation for this disease or its cure has been identified. Therefore more case series for this disease needs to be identified so that future studies increase our knowledge about this disease. Here, we present a case series of 3 out of 4 siblings who have been diagnosed with CMT disease. Based on their age, these siblings show the different developmental stages of this disease. More of such case series need to be identified and reported so that we can identify the true genetic cause of this disease and develop a definitive cure for it

    Fatal case of chickenpox in an adult: a case report

    Get PDF
    corecore