2,653 research outputs found
Recommended from our members
A Heuristic Screening Aid for Consequential Life Cycle Assessment
Consequential life cycle assessment (CLCA) is envisioned as a framework that combines the technological richness of attributional life cycle assessment (ALCA) with basic economic intuition to assess the potential environmental impact of an innovation. However, despite a growing literature, CLCA still lacks general guidelines for system boundary definition. Toward filling this gap, this article invents a new index of vulnerability of the life cycle impact of a product (or activity) to emissions arising from the impact of its large-scale adoption on market prices. Using corn ethanol as an example, it is illustrated how such an index might aid in the selection of a small set of affected activities for formal consideration in a CLCA. The application to corn ethanol reveals that in addition to land-cover change, there exist other sources of vulnerability that have not received attention in the context of biofuels. A general procedure for utilizing the vulnerability index as a screening aid for CLCA is outlined. The utility of the vulnerability index is independent of the type of modeling framework (such as multimarket partial equilibrium or computable general equilibrium) that might be employed for a formal CLCA. Finally, this work illustrates how the vulnerability index approach bridges ALCA and CLCA
Inhomogeneous phase of a Gluon Plasma at finite temperature and density
By considering the non-perturbative effects associated with the fundamental
modular region, a new phase of a Gluon Plasma at finite density is proposed. It
corresponds to the transition from glueballs to non-perturbative gluons which
condense at a non vanishing momentum. In this respect the proposed phase is
analogous to the color superconducting LOFF phase for fermionic systems.Comment: 5 pages, 2 figure
Temperature dependence in random matrix models with pairing condensates
We address a number of issues raised by a manuscript of Klein, Toublan, and
Verbaarschot (hep-ph/0405180) in which the authors introduce a random matrix
model for QCD with two colors, two flavors, and fermions in the fundamental
representation. Their inclusion of temperature terms differs from the approach
adopted in previous work on this problem (Phys. Rev. D 64, 074016 (2001).) We
demonstrate that the two approaches are related by a transformation that leaves
the thermodynamic potential invariant and which therefore has no effect on
physical observables.Comment: 8 pages, revtex4. v2: typos corrected in reference
A 5.0 Ghz Active Inductor Current Controlled Oscillator
The demand for wireless communications in the field of voice and data has rapidly grown. The integration level of Radio Frequency (RF) transceiver systems have become very intricate and efforts to deal with this has risen almost exponentially. Communications nowadays require system with extreme speeds to cater for high speed applications such as 4G and 5G, wider tuning range to cater for variety of applications, minimal timing errors and lower cost. Oscillators play the key role in determining the quality of the RF communications system. Most oscillators are voltage based and known as Voltage Controlled Oscillator (VCO) and comes mainly in two types, which are LC Tank Oscillators and Non LC-Tank Oscillators. The former is very good for lower phase noise due the usage of passive inductor. The latter such as ring oscillators are much smaller in size than LC-Tank, thus lower cost, but exhibit much higher phase noise. However, current sources are becoming more popular and employed in oscillator to form Current Controlled Oscillator (CCO) due to its higher frequency as compared to voltage source. Hence the goal has been put forth to design a CCO that produces 5 GHz center frequency, tuning range of 500 MHz and with phase noise better than -110 dBc/Hz by employing active inductor. To demonstrate the proposed concept, 5-stage ring oscillator with active inductor design controlled by a current-mode circuit, were designed and ran through simulation using 180 nm CMOS technology provided by Silterra. The work proceeds to validate and make improvements to the fundamental performance parameters of a local oscillator design that incorporates dual delay path, negative skewed delay, current source, cross-coupled transistors and active inductor. Analysis were done on how the cross-coupled transistors play a role in affecting the distinctive frequency operation pattern. Results from the simulation show that the oscillator’s maximum frequency obtained without distortion is 5.81 GHz. The cross coupled MOS transistors and active inductor controlled by current source aided well in improving the oscillator’s phase noise and frequency. Various simulation results show that the frequency range of this 5-stage oscillator runs between 3.87 GHz to 5.81 GHz. The critical parameter of any oscillator, which is the phase noise, is -113.2 dBc/Hz at 1 MHz offset with a center frequency of 5.81 GHz. The performance of this new design has improved, in general, about 36% on the frequency while 8% on the phase noise as compared with the non-LC Tank topology. Apart from the frequency and phase noise, the output power and size of this design is 9.41 dBm and 0.22 mm2 respectively. This is an improvement of 53% on the output power and 33% on the size when comparing with the non-LC Tank topology. Conclusively this design has successfully achieved the goals set forth for this research
Melting Pattern of Diquark Condensates in Quark Matter
Thermal color superconducting phase transitions in high density three-flavor
quark matter are investigated in the Ginzburg-Landau approach. Effects of
nonzero strange quark mass, electric and color charge neutrality, and direct
instantons are considered. Weak coupling calculations show that an interplay
between the mass and electric neutrality effects near the critical temperature
gives rise to three successive second-order phase transitions as the
temperature increases: a modified color-flavor locked (mCFL) phase (ud, ds, and
us pairings) -> a ``dSC'' phase (ud and ds pairings) -> an isoscalar pairing
phase (ud pairing) -> a normal phase (no pairing). The dSC phase is novel in
the sense that while all eight gluons are massive as in the mCFL phase, three
out of nine quark quasiparticles are gapless.Comment: minor changes in the text, fig.2 modifie
Prioritizing electric miles over electric vehicles will deliver greater benefits at lower cost
PROFICIENT CONSTITUTION FOR ONLINE EDUCATIONAL ENVIRONMENT USING FEEDBACK ANALYSIS
Modern world learners want to get more knowledge about their respective field which they like. The Learner just has to implement the knowledge using which they are learnt. This implementation has been used in the modern world. Learners are like to study in within the term they like to learn supplementary bunch. This requirement has been fulfilled by the online education system. The online Educational System provides the Notes, Books, Audio and Video Lectures, Manuals, Presentations etc., learners are expecting more apart from the contents or the learners are not willing to study which were provided by the online Educational System. The online Educational system provider has to know about the Learners satisfaction level, which has been evaluated by the Learners feedback. The feedback analysis has been evaluated by the selected criteria. Each criterion has some scoring options. Using this option, the learners will give the feedback to the particular subject trainer through the scoring options. Finally, feedback scores are evaluated and give the advice to the trainer to implement the new techniques for giving the training. This operation is instructing the trainer to implement and update their teaching skills
Proficient Approach for Intrusion Detection using Behaviour Profiling Algorithm and Prevention Using Statistical Model in Cloud Networks
Objectives:
The objective of the paper is to discuss the proposed dynamic software model to detect and prevent intrusion in the cloud network.
Methods:
The Behavior Profiling Algorithm (BPA) has been used to detect the intrusion in cloud network. For finding the intruder in the network the Event Log Entries and the network Unique Identification Address (UIA) has been fetched from the server and then the collected attribute values have been transferred to prevention module. In the prevention module the dynamic statistical approach model has been used to prevent the network systems and data which are available in the Cloud Network.
Findings:
For testing the proposed model the 100 cloud network systems were taken and based on the loss of packets (in MB) ranges the samples were classified as 0-100, 101-200, 201-300, 301-400, 401-500, 501-600, 601-700 respectively. The range of data loss is assumed to be an interval of 100 Mbps. It is assumed that the higher the data loss ranges, the more data is lost. The mean, variance, and standard deviation were calculated to verify the data loss ranges. The mean (average) of the data loss in the ranges 0-100 is 060.77 and the mean in the ranges 101-200 is 144.714 data losses, which gradually increases in proportion to the data loss ranges, and in the ranges 601-700 it is 665.769 data losses. From the statistical approach model, the differences between mean and variance indicated that the intruder attacked the files during the data transformation in the network. Therefore, the administrator has to monitor the warning message from the proposed IPS model and get data packet losses in the transformation. If the frequency of data loss is low, the administrator can assume that the data flow is low due to network problems. On the other hand, if the frequency of data loss in the network system is high, he can block the transformation and protect the data file. This paper concludes that the behavioral profiling algorithm combined with a statistical model achieves an efficiency of over 96% in wired networks, over 97.6% in wireless networks, and over 98.7% in cloud networks.
Novelty:
In the previous paper discussed the approach which has been implemented with 40 nodes and the result of the proposed algorithm produced above 90%, 96% and 98% in the wired, wireless and cloud network respectively. Now, the model has been implemented with 100 nodes the result has been increased. This study concluded that, the efficient algorithm to detect the intrusion is behaviour profiling algorithm, while join with the statistical approach model, it produces efficient result
- …