631 research outputs found

    Energy transfers and magnetic energy growth in small-scale dynamo

    Full text link
    In this letter we investigate the dynamics of magnetic energy growth in small-scale dynamo by studying energy transfers, mainly energy fluxes and shell-to-shell energy transfers. We perform dynamo simulations for magnetic Prandtl number Pm=20\mathrm{Pm}=20 on 102431024^3 grid using pseudospectral method. We demonstrate that the magnetic energy growth is caused by nonlocal energy transfers from the large-scale or forcing-scale velocity field to small-scale magnetic field. The peak of these energy transfers move towards lower wavenumbers as dynamo evolves, which is the reason why the integral scale of the magnetic field increases with time. The energy transfers U2UU2U (velocity to velocity) and B2BB2B (magnetic to magnetic) are forward and local.Comment: 6 pages, 8 figure

    Mapping the Indian Contribution in Pathogen Research during 2008-2017: A Scientometric Analysis

    Get PDF
    The present study mainly examines the growth rate of publications in the field of Pathogen research in India during the period of 2008-2017. The study based on Scopus databases and using scientometric tools. It reveals that a total 13070 of publications were published from the marked period of study. our analysis includes the year wise publications output, annual growth rate, compound annual growth rate, relative growth rate and doubling time, most productive authors, documents wise distribution of publications etc., and found that the maximum 1925 (14.73%) of research papers were published in the year 2016, followed by 1896 (14.51%) of publication in 2017. The maximum 36.541 annual growth rate was recorded in the year 2011, and 0.1189 CAGR was recorded in the year 2009. The maximum RGR 0.82 was recorded in the year 2009, and the highest doubling time 4.414 was recorded in the year 2017. The highest 69 publications were contributed by Dhama, K. and the maximum 10909 documents were ‘Article’ type

    Bioinformatics Research in India during 2009-2018: A Scientometric Analysis

    Get PDF
    The aim of the present study is to analyze the productivity growth of Bioinformatics research publications in India during the period (2009-2018). The primary data was collected from the Scopus database. The study examine scientific productivity on various scientometrics parameters i.e. year wise growth rate of publications, most productive authors name and their no. of publications, subject wise distribution of publications, source title, significant keywords, affiliations, funding agencies, after the analysis it has been found that the highest number of 348 research papers were published in the year 2018 and Chakraborty, C. was most productive author with 20 contribution and got the first rank. In the field of Biochemistry, genetics and molecular biology, the highest 1269 research papers were published and the highest 98 articles were published in PloS one journal while the most significant keyword was ‘Bioinformatics’ which was used in 1604 research papers. The most productive organization is the Vellore Institute of technology which has contributed 89 research papers during the period of study. The most popular funding agency was the Council of Scientific and Industrial Research (CSIR) who have funded 144 research papers in bioinformatics subject area in India from the marked period of study

    Mapping the Research Publications Pattern of Faculties of Library and Information Science Department, Mizoram University, Aizawl From 2008-2017: A Bibliometric Study

    Get PDF
    The paper focuses on the mapping of library and information science research publication output of the faculty member of the department of library and information science (DLIS), Mizoram University (MZU) during the period of ten years i.e. (2008-2017). The detailed curriculum vitae of faculty members of DLIS were obtained and bibliographic information of their papers was recorded. The study deals with 279 publications of DLIS, MZU. The present study examines and analysis that the DLIS output by different patterns such as the form of publication, the relative growth rate of publications, doubling time for publications, annual growth rate (AGR) of the publications and compound AGR of publications during the period of study

    Magnetic Properties of Fe and Ni Doped SnO2 Nanoparticles

    Get PDF
    In this work, we report the room temperature ferromagnetism in Sn1‐xFexO2 and Sn1‐xNixO2 (x = 0.00, 0.03 and 0.05) nano‐crystalline powders. All the samples were prepared using co‐precipitation method. X‐Ray Diffraction (XRD), transmission electron microscopy (TEM), energy dispersive x‐ray analysis (EDAX), UV‐ visible absorption spectroscopy and room temperature magnetization measurements were performed to study the crystal structure, morphology, elemental analysis, optical band gap and magnetic properties of Fe and Ni doped SnO2. TEM results depict the formation of spherically shaped and small sized nanoparticles of the diameter of ~ 3 nm.  The band gap energy of the Fe and Ni doped samples found to decrease with increasing their concentrations. The higher saturation magnetization was observed in low concentration Fe and Ni doped tin oxide

    Magnetic Properties of Fe and Ni Doped SnO2 Nanoparticles

    Get PDF
    In this work, we report the room temperature ferromagnetism in Sn1‐xFexO2 and Sn1‐xNixO2 (x = 0.00, 0.03 and 0.05) nano‐crystalline powders. All the samples were prepared using co‐precipitation method. X‐Ray Diffraction (XRD), transmission electron microscopy (TEM), energy dispersive x‐ray analysis (EDAX), UV‐ visible absorption spectroscopy and room temperature magnetization measurements were performed to study the crystal structure, morphology, elemental analysis, optical band gap and magnetic properties of Fe and Ni doped SnO2. TEM results depict the formation of spherically shaped and small sized nanoparticles of the diameter of ~ 3 nm.  The band gap energy of the Fe and Ni doped samples found to decrease with increasing their concentrations. The higher saturation magnetization was observed in low concentration Fe and Ni doped tin oxide

    Monopole Cavity Resonator Antenna with AMC and Superstrate for 5G WiMAX Applications

    Get PDF
    For 5G and WiMAX applications, a coplanar waveguide (CPW)-fed monopole antenna sandwiched between an artificial magnetic conductor (AMC) and a superstrate is investigated. Because traditional planar antennas have low gains, they are unsuitable for a wide range of applications. This paper explores scientific strategies for increasing radiation gain in low-gain antennas such as planar monopoles. We use AMC in conjunction with superstrate to achieve a high gain antenna, with the monopole antenna serving as the primary radiator. However, a superstate like this demands the use of materials with high permittivity, and most of such materials are not readily available on the market. Even if such materials are available, they are mostly expensive and unsuitable for commercial systems. We investigate various superstrates and elaborate on which way these superstrates can be used interchangeably without compromising antenna performance. In the end, we fabricate one of these three superstrates. The antenna, which also employs AMC in tandem with the superstrate, has an impedance bandwidth ranging from 3.2 GHz to 3.75 GHz with 7 dBi gain, so it can be a viable candidate for 5G and WiMAX application

    A Review on Secure Access to Cloud Storage by using ABE

    Get PDF
    Cloud computing is going to be very famous technology in IT enterprises. For an enterprise, the data stored is huge and it is very precious. All tasks are performed through networks. Hence, it becomes very important to have the secured use of data. In cloud computing, the most important concerns of security are data security and privacy. For access control, being one of the classic research topics, many schemes have been proposed and implemented. In this paper, various schemes for encryption that consist of Attribute based encryption (ABE) and its types KP-ABE, CP-ABE is explored. Public Key Encryption acts as the basic technique for ABE where it provides one to many encryptions, here, the private key of users & the cipher-text both rely on attributes such that, when the set of the attributes of users key matches set of attributes of cipher-text with its corresponding access policy, only then decryption is possible
    • 

    corecore