217 research outputs found

    Porous silicon & titanium dioxide coatings prepared by atmospheric pressure plasma jet chemical vapour deposition technique-a novel coating technology for photovoltaic modules

    Get PDF
    Atmospheric Pressure Plasma Jet (APPJ) is an alternative for wet processes used to make anti reflection coatings and smooth substrate surface for the PV module. It is also an attractive technique because of it’s high growth rate, low power consumption, lower cost and absence of high cost vacuum systems. This work deals with the deposition of silicon oxide from hexamethyldisiloxane (HMDSO) thin films and titanium dioxide from tetraisopropyl ortho titanate using an atmospheric pressure plasma jet (APPJ) system in open air conditions. A sinusoidal high voltage with a frequency between 19-23 kHz at power up to 1000 W was applied between two tubular electrodes separated by a dielectric material. The jet, characterized by Tg ~ 600-800 K, was mostly laminar (Re ~ 1200) at the nozzle exit and became partially turbulent along the jet axis (Re ~ 3300). The spatially resolved emission spectra showed OH, N2, N2+ and CN molecular bands and O, H, N, Cu and Cr lines as well as the NO2 chemiluminescence continuum (450-800 nm). Thin films with good uniformity on the substrate were obtained at high deposition rate, between 800 -1000 nm.s-1, and AFM results revealed that coatings are relatively smooth (Ra ~ 2 nm). The FTIR and SEM analyses were better used to monitor the chemical composition and the morphology of the films in function of the different experimental conditions. When you are citing the document, use the following link http://essuir.sumdu.edu.ua/handle/123456789/2790

    On quantifying fault patterns of the mesh interconnect networks

    Get PDF
    One of the key issues in the design of Multiprocessors System-on-Chip (MP-SoCs), multicomputers, and peerto- peer networks is the development of an efficient communication network to provide high throughput and low latency and its ability to survive beyond the failure of individual components. Generally, the faulty components may be coalesced into fault regions, which are classified into convex and concave shapes. In this paper, we propose a mathematical solution for counting the number of common fault patterns in a 2-D mesh interconnect network including both convex (|-shape, | |-shape, ý-shape) and concave (L-shape, Ushape, T-shape, +-shape, H-shape) regions. The results presented in this paper which have been validated through simulation experiments can play a key role when studying, particularly, the performance analysis of fault-tolerant routing algorithms and measure of a network fault-tolerance expressed as the probability of a disconnection

    A Low-complexity trajectory privacy preservation approach for indoor fingerprinting positioning systems

    Get PDF
    Location fingerprinting is a technique employed when Global Positioning System (GPS) positioning breaks down within indoor environments. Since Location Service Providers (LSPs) would implicitly have access to such information, preserving user privacy has become a challenging issue in location estimation systems. This paper proposes a low-complexity k-anonymity approach for preserving the privacy of user location and trajectory, in which real location/trajectory data is hidden within k fake locations/trajectories held by the LSP, without degrading overall localization accuracy. To this end, three novel location privacy preserving methods and a trajectory privacy preserving algorithm are outlined. The fake trajectories are generated so as to exhibit characteristics of the user’s real trajectory. In the proposed method, no initial knowledge of the environment or location of the Access Points (APs) is required in order for the user to generate the fake location/trajectory. Moreover, the LSP is able to preserve privacy of the fingerprinting database from the users. The proposed approaches are evaluated in both simulation and experimental testing, with the proposed methods outperforming other well-known k-anonymity methods. The method further exhibits a lower implementation complexity and higher movement similarity (of up to 88%) between the real and fake trajectories

    A mathematical model for mechanotransduction at the early steps of suture formation

    Get PDF
    Growth and patterning of craniofacial sutures are subjected to the effects of mechanical stress. Mechanotransduction processes occurring at the margins of the sutures are not precisely understood. Here, we propose a simple theoretical model based on the orientation of collagen fibres within the suture in response to local stress. We demonstrate that fibre alignment generates an instability leading to the emergence of interdigitations. We confirm the appearance of this instability both analytically and numerically. To support our model, we use histology and synchrotron x-ray microtomography and reveal the fine structure of fibres within the sutural mesenchyme and their insertion into the bone. Furthermore, using a mouse model with impaired mechanotransduction, we show that the architecture of sutures is disturbed when forces are not interpreted properly. Finally, by studying the structure of sutures in the mouse, the rat, an actinopterygian (\emph{Polypterus bichir}) and a placoderm (\emph{Compagopiscis croucheri}), we show that bone deposition patterns during dermal bone growth are conserved within jawed vertebrates. In total, these results support the role of mechanical constraints in the growth and patterning of craniofacial sutures, a process that was probably effective at the emergence of gnathostomes, and provide new directions for the understanding of normal and pathological suture fusion

    Source location anonymity for sensor networks,”

    Get PDF
    Abstract-Motivated by applications like sensor, peer to peer networks there has been growing interest in monitoring large scale distributed systems. In these applications, source location anonymity is an attractive and critical security property. Most of prior works assumed a weak adversary model where the adversary sees only local network traffic, but here we consider source anonymity against a global eavesdropper. Attaining location unobservability under global attacker is very difficult and expensive to achieve, because sensor networks are very limited in resources. In this work we propose a distributed algorithm to mix real event traffic with carefully chosen dummy traffic to hide the real event traffic pattern. We assume that we have fixed amount of resources to send dummy traffic and we try to share it among sensors so as to maximize the degree of anonymity of the system. Through simulation, we illustrate that the proposed technique is efficient in protecting location information from the eavesdropper

    The 3D skull 0–4 years: A validated, generative, statistical shape model

    Get PDF
    BACKGROUND: This study aims to capture the 3D shape of the human skull in a healthy paediatric population (0–4 years old) and construct a generative statistical shape model. METHODS: The skull bones of 178 healthy children (55% male, 20.8 ± 12.9 months) were reconstructed from computed tomography (CT) images. 29 anatomical landmarks were placed on the 3D skull reconstructions. Rotation, translation and size were removed, and all skull meshes were placed in dense correspondence using a dimensionless skull mesh template and a non-rigid iterative closest point algorithm. A 3D morphable model (3DMM) was created using principal component analysis, and intrinsically and geometrically validated with anthropometric measurements. Synthetic skull instances were generated exploiting the 3DMM and validated by comparison of the anthropometric measurements with the selected input population. RESULTS: The 3DMM of the paediatric skull 0–4 years was successfully constructed. The model was reasonably compact - 90% of the model shape variance was captured within the first 10 principal components. The generalisation error, quantifying the ability of the 3DMM to represent shape instances not encountered during training, was 0.47 mm when all model components were used. The specificity value was <0.7 mm demonstrating that novel skull instances generated by the model are realistic. The 3DMM mean shape was representative of the selected population (differences <2%). Overall, good agreement was observed in the anthropometric measures extracted from the selected population, and compared to normative literature data (max difference in the intertemporal distance) and to the synthetic generated cases. CONCLUSION: This study presents a reliable statistical shape model of the paediatric skull 0–4 years that adheres to known skull morphometric measures, can accurately represent unseen skull samples not used during model construction and can generate novel realistic skull instances, thus presenting a solution to limited availability of normative data in this field
    corecore