37,220 research outputs found

    Plane-stress, elastic-plastic states in the vicinity of crack tips

    Get PDF
    Plane stress analysis of elastic-plastic states in vicinity of straight crack tip in thin plat

    Application of multirate digital filter banks to wideband all-digital phase-locked loops design

    Get PDF
    A new class of architecture for all-digital phase-locked loops (DPLL's) is presented in this article. These architectures, referred to as parallel DPLL (PDPLL), employ multirate digital filter banks (DFB's) to track signals with a lower processing rate than the Nyquist rate, without reducing the input (Nyquist) bandwidth. The PDPLL basically trades complexity for hardware-processing speed by introducing parallel processing in the receiver. It is demonstrated here that the DPLL performance is identical to that of a PDPLL for both steady-state and transient behavior. A test signal with a time-varying Doppler characteristic is used to compare the performance of both the DPLL and the PDPLL

    DoWitcher: Effective Worm Detection and Containment in the Internet Core

    Get PDF
    Enterprise networks are increasingly offloading the responsibility for worm detection and containment to the carrier networks. However, current approaches to the zero-day worm detection problem such as those based on content similarity of packet payloads are not scalable to the carrier link speeds (OC-48 and up-wards). In this paper, we introduce a new system, namely DoWitcher, which in contrast to previous approaches is scalable as well as able to detect the stealthiest worms that employ low-propagation rates or polymorphisms to evade detection. DoWitcher uses an incremental approach toward worm detection: First, it examines the layer-4 traffic features to discern the presence of a worm anomaly; Next, it determines a flow-filter mask that can be applied to isolate the suspect worm flows and; Finally, it enables full-packet capture of only those flows that match the mask, which are then processed by a longest common subsequence algorithm to extract the worm content signature. Via a proof-of-concept implementation on a commercially available network analyzer processing raw packets from an OC-48 link, we demonstrate the capability of DoWitcher to detect low-rate worms and extract signatures for even the polymorphic worm

    Redox supercapacitor performance of nanocrystalline molybdenum nitrides obtained by ammonolysis of chloride- and amide-derived precursors

    No full text
    Reactions of MoCl5 or Mo(NMe2)4 with ammonia result in cubic ?-Mo2N or hexagonal ?1-MoN depending on reaction time and temperature. At moderate temperatures the cubic product from Mo(NMe2)4 exhibits lattice distortions. Fairly high surface areas are observed in the porous particles of the chloride-derived materials and high capacitances of up to 275 F g?1 are observed when electrodes made from them are cycled in aqueous H2SO4 or K2SO4 electrolytes. The cyclic voltammograms suggest charge is largely stored in the electrochemical double layer at the surface of these materials. Amide-derived molybdenum nitrides have relatively low surface areas and smaller capacitances, but do exhibit strong redox features in their cyclic voltammograms, suggesting that redox capacitance is responsible for a significant proportion of the charge stored

    A functional description of the Buffered Telemetry Demodulator (BTD)

    Get PDF
    This article gives a functional description of the buffered telemetry demodulator (BTD), which operates on recorded digital samples to extract the symbols from the received signal. The key advantages of the BTD are as follows: (1) its ability to reprocess the signal to reduce acquisition time; (2) its ability to use future information about the signal and to perform smoothing on past samples; and (3) its minimum transmission bandwidth requirement as each sub carrier harmonic is processed individually. The first application of the BTD would be the Galileo S-band contingency mission, where the signal is so weak that reprocessing to reduce the acquisition time is crucial. Moreover, in the event of employing antenna arraying with full spectrum combining, only the sub carrier harmonics need to be transmitted between sites, resulting in significant reduction in data rate transmission requirements. Software implementation of the BTD is described for various general-purpose computers

    Takotsubo Syndrome and COVID-19: Associations and Implications.

    Get PDF
    Incidence of cardiovascular complications has increased during the COVID-19 (Coronavirus disease 2019) pandemic, both population-wide and in patients diagnosed with the disease. This increase has presented complications in patient care, leading to increased hospitalizations, adverse outcomes, and medical costs. A condition of interest is takotsubo syndrome, which may be associated with the novel coronavirus. To understand this connection, a narrative review was performed by analyzing primary studies and case reports available. The findings showed increased incidence of takotsubo cardiomyopathy in both the general population and COVID-19 patients. Proposed mechanisms for the linkage include generalized increases in psychological distress, the cytokine storm, increased sympathetic responses in COVID-19 patients, and microvascular dysfunction. Moreover, natural disasters are noted as likely being associated with increases of takotsubo syndrome. As the pandemic continues, treating COVID-19 as a systemic condition is imperative, with the increase in takotsubo syndrome marking a significant impact of the novel coronavirus

    Covert Ephemeral Communication in Named Data Networking

    Full text link
    In the last decade, there has been a growing realization that the current Internet Protocol is reaching the limits of its senescence. This has prompted several research efforts that aim to design potential next-generation Internet architectures. Named Data Networking (NDN), an instantiation of the content-centric approach to networking, is one such effort. In contrast with IP, NDN routers maintain a significant amount of user-driven state. In this paper we investigate how to use this state for covert ephemeral communication (CEC). CEC allows two or more parties to covertly exchange ephemeral messages, i.e., messages that become unavailable after a certain amount of time. Our techniques rely only on network-layer, rather than application-layer, services. This makes our protocols robust, and communication difficult to uncover. We show that users can build high-bandwidth CECs exploiting features unique to NDN: in-network caches, routers' forwarding state and name matching rules. We assess feasibility and performance of proposed cover channels using a local setup and the official NDN testbed

    Strategic Analyses of the National River Linking Project (NRLP) of India, Series 1. India’s water future: scenarios and issues

    Get PDF
    River basinsEnvironmental flowsDevelopment projectsWater requirementsIrrigated farmingWater demandFood demandGroundwater irrigationIrrigation efficiencyWater harvestingSupplemental irrigationWater productivityWater conservationDrip irrigationSprinkler irrigationRainfed farmingAgricultural policy
    • 

    corecore