1,756 research outputs found

    A Note On Line Graphs

    Get PDF
    In this note we define two generalizations of the line graph and obtain some results. Also, we mark some open problems

    Manipulation of entanglement sudden death in an all-optical setup

    Get PDF
    The unavoidable and irreversible interaction between an entangled quantum system and its environment causes decoherence of the individual qubits as well as degradation of the entanglement between them. Entanglement sudden death (ESD) is the phenomenon wherein disentanglement happens in finite time even when individual qubits decohere only asymptotically in time due to noise. Prolonging the entanglement is essential for the practical realization of entanglement-based quantum information and computation protocols. For this purpose, the local NOT operation in the computational basis on one or both qubits has been proposed. Here, we formulate an all-optical experimental set-up involving such NOT operations that can hasten, delay, or completely avert ESD, all depending on when it is applied during the process of decoherence. Analytical expressions for these are derived in terms of parameters of the initial state's density matrix, whether for pure or mixed entangled states. After a discussion of the schematics of the experiment, the problem is theoretically analyzed, and simulation results of such manipulations of ESD are presented

    Information Quality Structure Framework In Developing An Information Security Management System (ISMS)

    Get PDF
    Organisations are progressively aware that information security is an important aspect of their business strategy. The awareness make organisations to achieve an ideal level of management system to establish and maintain a secure information environment. Hence, organisations are currently applying for information security management system (ISMS) to effectively manage their information assets. ISMS will ensure that the right people, processes and technologies are in place, and facilitates a proactive approach to manage security and risk. Unfortunately, limited scholarly investigation has been undertaken to present a need of properly defined steps of process approach in which a structured way of managing ISMS within an organisation is provided. This is due to the well-known process approach, “Plan-Do-Check-Act” lifecycle model which is unable to give information on how organisations should develop security objectives and ISMS strategies. Also, there are no recognized and standard ISMS frameworks for action. The lack of standardized and trustable ISMS methods, and complexity of ISMS standards has caused practitioners to face difficulties in understanding the ISMS requirements. However, after the daunting task on choosing one preferred methods, practitioners are also required to gather information to complete all the ISMS requirement planning. Practically, practitioners gather information in a surveillance mode rather than in decision mode. Hence, practitioners are required to evaluate the collected information resource in order to eliminate all the “garbage” information. Therefore, this research aims to provide an Information Quality Structure Framework for ISMS. This study adopts a mixed method and explanatory sequential approaches to achieve the research objectives. After an extensive literature review, the quantitative study begins with descriptive study in order to determine components of information structure. Then Likert structured questionnaire was distributed and the findings have been analyzed using Rasch Measurement Model (RMM) and SEM-PLS. Qualitative analysis was done by validating the framework on ensuring the proposed framework conforms to real working ISMS specification and its usefulness for organisations. Semi-structured interview among six expert panel in ISMS industry were conducted. The results from this study, managed to develop Information Quality Structure Framework for ISMS. The proposed framework consists of (1) information structure focuses on providing layout of information which is organized in a way, in which the components are put together to form a meaningful structure which can be navigated at any time and (2) quality dimensions: accuracy, objective, completeness, reliability and verifiability ensure the quality of information and (3) provide a synthesis of information quality dimensions parameters to ensure the quality of information is emphasized throughout the ISMS process. The proposed framework contributes to the field of ISMS, certification area and also contributes information quality theory in ISMS field. The proposed framework provides an awareness on knowing beforehand what to do and to what extent they are already conquering the quality information needed for getting clear direction and to develop ISMS

    ANALYSIS OF MULTIVARIABLE CONTROLLER FOR FLUID CATALYTIC CRACKING UNIT IN A PETROLEUM REFINERY

    Get PDF
    The projected paper has been scrutinized and revised the circulated experimental results related to reactor-regenerator structure of fluid catalytic cracking unit (FCCU). It correspondingly focuses the limitations of existing methods for controlling the heat in the reactor-regenerator system. Now the extant study, complex dynamic model of the reactor–regenerator system has been industrialized and successively castoff with the controller. FCC process is considered as a primary conversion unit in a incorporated refinery and epitome FCC operation can have a significant impact on the refinery profitability. Control of the FCC continues to be a stimulating and momentous problem due to interaction between the loops. So there is a tangible requisite for a control logic that effectively utilizes the available process measurements and archetypal information representative of the process. Internal Model Controller (IMC) discloses the set point tracking Stabilization can be succeeded through simulated implementation of a model predictive control (MPC)

    Performance and Improvement of Various Antennas in Modern Wireless Communication System

    Get PDF
    Today, the importance of wireless communication is known around the world. To achieve better communication, many techniques and methods have been introduced. Among these techniques, intelligent / adaptive antennas are a hot topic in the field of research. Smart antennas consist of several antenna arrays and are able to optimize the radiation and reception of dynamically desired signals. In order to avoid or mitigate interference, smart antennas may also introduce zero values towards the receivers by adaptively updating the weights associated with each antenna element. Smart antennas can also improve reception quality and reduce missed calls. The various existing surveys are also discussed to identify the research deficit for the scope of future research

    Client managment on house projects : faciliating client learning for successful architect-client relationships

    Full text link
    This paper reports the findings of a study which examined architect-client relationships on house projects with a focus on the supportive role of architects in helping clients deal with project issues. Habitus theory explains that the nature of architecture as a specialised activity places architects within an architectural habitus, distinguishing them from clients who are not trained in the field, which is at the heart of the problematic architect-client relationship. An underlying premise was that habitus shock, that is, a mismatch between the architect and client\u27s habituses Occurs as they enter into a relationship on the house project. Using the qualitative approach underpinned by the constructivist perspective for data collection and analysis, eight in-depth interviews were conducted across five case studies of successful architect-client relationships. The narrative inquiry approach was used to establish the extent to which habitus shock occurred and to describe the stages involved in the client\u27s adjustment process during habitus shock. The findings indicate that habitus shock occurred on all five case studies, which resulted in client learning, enabling clients to function with competency in the unfamiliar environment. Client learning achieved during habitus shock was directly linked to the amount of difficulty experienced. This study has refined our understanding of the architect-client relationship on house projects by exploring more deeply client behaviour and the ways in which clients successfully deal with difficulties on house projects rather than simply identifying the uncertainties and conflicts that occur on projects. The findings demonstrate that client learning during habitus shock is a characteristic of successful relationships. One of the most significant outcomes of thi s study is that it demonstrated the potential to facilitate client learning during habitus shock to contribute to the development of successful architect-client relationships.<br /

    Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm

    Get PDF
    Cloud computing is a structure for rendering service to the user for free or paid basis through internet facility where we can access to a bulk of shared resources which results in saving managing cost and time for large companies, The data which are stored in the data center may incur various security, damage and threat issues which may result in data leakage, insecure interface and inside attacks. This paper will demonstrate the implementation of hybrid cryptography security in public cloud by a combination of Elliptical Curve Cryptography and Twofish algorithm, which provides an innovative solution to enhance the security features of the cloud so that we can improve the service thus results in increasing the trust over the technology.   
    • …
    corecore