990 research outputs found

    Nonlinear dynamic intertwining of rods with self-contact

    Get PDF
    Twisted marine cables on the sea floor can form highly contorted three-dimensional loops that resemble tangles. Such tangles or hockles are topologically equivalent to the plectomenes that form in supercoiled DNA molecules. The dynamic evolution of these intertwined loops is studied herein using a computational rod model that explicitly accounts for dynamic self-contact. Numerical solutions are presented for an illustrative example of a long rod subjected to increasing twist at one end. The solutions reveal the dynamic evolution of the rod from an initially straight state, through a buckled state in the approximate form of a helix, through the dynamic collapse of this helix into a near-planar loop with one site of self-contact, and the subsequent intertwining of this loop with multiple sites of self-contact. This evolution is controlled by the dynamic conversion of torsional strain energy to bending strain energy or, alternatively by the dynamic conversion of twist (Tw) to writhe (Wr). KEY WORDS Rod Dynamics, Self-contact, Intertwining, DNA Supercoiling, Cable HocklingComment: 35 pages, 9 figures, submitted to Proceedings of the Royal Society A: Mathematical, Physical and Engineering Science

    Current-induced phase control in charged-ordered Nd0.5Ca0.5MnO3 and Pr0.6Ca0.4MnO3 crystals

    Full text link
    Single crystals of Nd0.5Ca0.5MnO3 and Pr0.6Ca0.4MnO3 show current-induced insulator-metal transitions at low temperatures. In addition, the charge-ordering transition temperature decreases with increasing current. The electroresistive ratio, defined as r0.5/rI where r0.5 is the resistivity at a current of 0.5 mA and rI the resistivity at a given applied current, I, varies markedly with temperature and the value of I. Thermal hysteresis observed in Nd0.5Ca0.5MnO3 and Pr0.6Ca0.4MnO3 at the insulator-metal transition indicates that the transition is first-order. The current-induced changes are comparable to those induced by magnetic fields, and the insulator-metal transition in Pr0.6Ca0.4MnO3 is accordingly associated with a larger drop in resistivity.Comment: 12 pages, 3 figures, first submitted to submitted to J. Phys. D; applied physics on 18th march 200

    CLINICAL EVALUATION OF AGNIKARMA IN THE MANAGEMENT OF KADARA W.S.R TO CORN

    Get PDF
    Kadara is a Kshudra Roga. It does not cause any threat to life but can trouble person a lot. Initially Kadara is a painless condition but with its progress it can become painful. On the basis of clinical presentation the disease Kadara can be compared with Corn in modern medicine. Corn is a localized hyperkeratosis of skin in cone shape with inwardly pointed apex and outwardly placed base it is palpable as a nodule due to horny induration with a hard center. Histologically it is composed of keratin masses with intact basal layers. Even though, there are varieties of modalities aiming at cure of Kadara viz., Ointments , Corn Caps, Surgical Excision etc, but none of them are complete and devoid of recurrences. When the condition of Kadara is Surgically Excised, recurrences have been reported as it is having recurrence tendency. Hence, to overcome the recurrence ‘Agni Karma’ can be the ideal procedure. With this ideology, in the present study an effort has been made to assess the efficacy of ‘Agni Karma’ after Shastra Karma in the management of Kadara vis-à-vis Corn.Comparative efficacy of the therapies in Group A and Group B showed statistically highly Significant (p<0.001) results in the parameters of assessment of pain and tenderness with ‘t’ value of 3.99 and 5.32 respectively.            Comparative efficacy of the therapies in Group A and Group B showed statistically Significant (p<0.001) results in the parameters of assessment of itching and recurrence with ‘t’ value of 3.46 and 2.62 respectively. Comparative efficacy of the therapies in Group A and Group B showed statistically non Significant (p<0.001) results in the parameters of assessment of Size of Corn and Infection with ‘t’ value of 1.58 and 1.01 respectively

    Configurational Entropy of Self Propelled Glass Formers

    Full text link
    The configurational entropy is an indispensable tool to describe super-cooled liquids near the glass transition. Its calculation requires the enumeration of the basins in the potential energy landscape and when available, it reveals a direct connection with the relaxation time of the liquid. While there are several reports on the measurement of configurational entropy in passive liquids, very little is understood about its role in active liquids which have a propensity to undergo a glass transition at low temperatures. In this paper, we report a careful calculation of the configurational entropy in a model glass former where the constituent units are self propelled. We show that unlike passive liquids, the anharmonic contribution to the glass entropy in these self-propelled liquids can be of the same order as the harmonic contribution, and therefore must be included in the calculation of the configurational entropy. Our extracted configurational entropy is in good agreement with the generalized Adam-Gibbs relation predicted by the random first order transition theory enabling us to deduce a scaling relation between the configurational entropy and the point-to-set length scale in these active systems. Our findings could be of great utility in conventional active systems such as self-propelled granules, Janus particles and dense bacterial suspensions, to mention a few

    DRec:Multidomain Recommendation System for Social Community

    Get PDF
    The Recommendation System is the software engines and the approaches for consideration proposal to the user which might be most probably matched with the liking of users. Usually, Recommendations system recommends on various fields like what items to buy, which movies to watch even the job recommendations, depending upon the users profile. Instinctively if the domains of users are captured and filtered out accordingly to recommend them will be a very useful idea. In this paper we will be discussing about the research done by us and the limitation of the system.We design a system for recommending domains in social network, using an explicit / offline data. We have tested it on two popular dataset namely Epinions and Ciao. The ratings of items are studied and performance measures are calculated with three different ways 1) MAP (Mean Average Precision) 2)F-measure and 3) nDCG (Normalized Discounted Cumulative Gain) . As well we have compared the results with 5 comparisons methods.All the techniques and methods are explained in paper. DOI: 10.17762/ijritcc2321-8169.15081

    A Computational Analysis of ECC Based Novel Authentication Scheme in VANET

    Get PDF
    A recent development in the adhoc network is a vehicular network called VANET (Vehicular Adhoc Network). Intelligent Transportation System is the Intelligent application of VANET. Due to open nature of VANET attacker can launch various kind of attack. As VANET messages are deal with very crucial information’s which may save the life of passengers by avoiding accidents, save the time of people on a trip, exchange of secret information etc., because of this security is must be in the VANET. To ensure the highest level of security the network should be free from attackers, there by all information pass among nodes in the network must be reliable i.e. should be originated by an authenticated node. Authentication is the first line of security in VANET; it avoids nonregistered vehicle in the network. Previous research come up with some Cryptographic, Trust based, Id based, Group signature based authentication schemes. A speed of authentication and privacy preservation is important parameters in VANET authentication. This paper addresses the computational analysis of authentication schemes based on ECC. We started analysis from comparing plain ECC with our proposed AECC (Adaptive Elliptic Curve Cryptography) and EECC (Enhanced Elliptic Curve Cryptography). The result of analysis shows proposed schemes improve speed and security of authentication. In AECC key size is adaptive i.e. different sizes of keys are generated during key generation phase. Three ranges are specified for key sizes small, large and medium. In EECC we added an extra parameter during transmission of information from the vehicle to RSU for key generation. Schemes of authentications are evaluated by comparative analysis of time required for authentication and key breaking possibilities of keys used in authentication

    Classifying three-character RCFTs with Wronskian index equalling 3 or 4

    Full text link
    In the Mathur-Mukhi-Sen (MMS) classification scheme for rational conformal field theories (RCFTs), a RCFT is identified by a pair of non-negative integers [n,ℓ]\mathbf{[n, \ell]}, with n\mathbf{n} being the number of characters and ℓ\mathbf{\ell} the Wronskian index. The modular linear differential equation (MLDE) that the characters of a RCFT solve are labelled similarly. All RCFTs with a given [n,ℓ]\mathbf{[n, \ell]} solve the modular linear differential equation (MLDE) labelled by the same [n,ℓ]\mathbf{[n, \ell]}. With the goal of classifying [3,3]\mathbf{[3,3]} and [3,4]\mathbf{[3,4]} CFTs, we set-up and solve those MLDEs, each of which is a three-parameter non-rigid MLDE, for character-like solutions. In the former case, we obtain four infinite families and a discrete set of 1515 solutions, all in the range 0<c≤320 < c \leq 32. Amongst these [3,3]\mathbf{[3,3]} character-like solutions, we find pairs of them that form coset-bilinear relations with meromorphic CFTs/characters of central charges 16,24,32,40,48,56,6416, 24, 32, 40, 48, 56, 64. There are six families of coset-bilinear relations where both the RCFTs of the pair are drawn from the infinite families of solutions. There are an additional 2323 coset-bilinear relations between character-like solutions of the discrete set. The coset-bilinear relations should help in identifying the [3,3]\mathbf{[3,3]} CFTs. In the [3,4]\mathbf{[3,4]} case, we obtain nine character-like solutions each of which is a [2,2]\mathbf{[2,2]} character-like solution adjoined with a constant character.Comment: 64 pages, 20 table

    MICROCONTROLLER BASED WASTE SEGREGATOR AND MANAGEMENT OF WET WASTE TO PRODUCE ORGANIC FERTILIZER

    Get PDF
    Industrialization, modernization, rapid advancements and increase in population have led to large generation of waste. It is possible to reuse and recycle the waste effectively by segregation. This paper, proposes an prototype model forwaste separator, which is used to separate the dumped waste spontaneously, leads to the production of fertilizer from food waste recycling. The smart-bin is programmed to give the information aboutandumped waste, so that the respective action would be-taken. Many motors&amp; sensors both are interfaced with the Arduino-board in the system [5]. The smart-bin is divided into 3 sections. Everysection has itsrespective function and waste is segregated into dry, metaland wet waste. The research aims to produce organic fertilizer through providing the suitable environment to decompose the wet waste in to Organic Fertilizer
    • …
    corecore