1,416 research outputs found
Emission of neutrino-antineutrino pairs by hadronic bremsstrahlung processes
We review our recent calculations of neutrino-antineutrino pair production
from bremsstrahlung processes in hadronic collisions at temperature and
densities relevant for core-collapse supernovae. We focus on neutron-neutron
and neutron-alpha collisions.Comment: 8 pages, 4 figures, proceedings of the NN2015 conference, Catania,
21-26 June, 201
On positivity and roots in operator algebras
In earlier papers the second author and Charles Read have introduced and
studied a new notion of positivity for operator algebras, with an eye to
extending certain C*-algebraic results and theories to more general algebras.
The present paper consists of complements to some facts in the just mentioned
papers, concerning this notion of positivity. For example we prove a result on
the numerical range of products of the roots of commuting operators with
numerical range in a sector.Comment: 11 pages, to appear Integral Equations Operator Theor
Meter Data Acquisition System
Meter data acquisition is critical to determining consumption and baseline data. However, as the meters can be geographically dispersed over a large area, meter communication infrastructure is a core part of this total system.CMS provides MDAS with a comprehensive communication infrastructure for data acquisition from various meters. The options for the communication infrastructure are GPRS, CDMA or PSTN. CMS provides the entire suite of products (modems, gateways, data concentrators, front-end processors, etc) for acquiring the data from various meters. MDAS is to acquire meter data from meters within the distribution system and consumer meters for: System performance monitoring and decision support. Monitoring and collecting data of consumer energy usage, billing, CRM, tamper, outage detection and notification. Monitoring energy flows in the energy supply chain to provide information for energy auditing. Reeling under an average AT & C losses of around 33%, it is quite impossible for power distribution sector to keep up the desired economic pace without major reforms in the Power sector, especially in Distribution. System Integrator has been working closely in Power distribution sector to address AT & C loss reduction, bring transparency, improve customer satisfaction and increase employee productivity through right convergence of IT & Automation. Technology innovation can only benefit the sector and system integration has major role to play in empowering the power distribution utilities. There is a huge need for specialized, customized and upgraded system solution for the power sector and System Integration Power solutions can help utilities to make a significant leap in Field Automation and reducing their Aggregate Technical and Commercial losses. The objective of Meter Data Acquisition Solution Provider is to collect meter data of DT and consumer meters at desired frequencies remotely and make available for DISCOM operations
Quad Tree: New Approach of Representing and Traversing
As we know the computers are widely used in every field either it is of geography, medical, pharmacy, astrology. Astronomy and so on. The ongoing advancements in all these fields require a big database and the place from where this data is retrieved easily to use. The data is some time is in hierarchal format. But the array of memory that we use to save information is in only in 2-D, we have trees for such information in data structure. Q- Tree or Quad tree one of the ways of representing data in the memory. The problem is of representing data in this tree so that one can do searching, insertion and deletion in a fastest manner. With the increase in traversing and searching the performance of the computer too increases.
DOI: 10.17762/ijritcc2321-8169.15051
Robust Analysis for AODV Protocol in Vehicular Adhoc Network under Black Hole Attack in NS 2
Security is one of biggest challenges in implementing adhoc network like VANET and MANET and it is due to changing behavior of topology of adhoc network. There are possibilities of various attacks like active and passive attack in network to change the real data or to steal the data. There are diverse types of passive attacks which are very dangerous for communication. Black hole attack in Vehicular Ad Hoc Network is major problem related with the field of computer networking. In this paper we present the performance analysis of the black hole attack in Vehicular Ad Hoc Network. We elaborate the different types of attacks and their depth in ad hoc network. The performance metric is taken for the evaluation of attack which depends on a packet end to end delay, network throughput and network load. In our base work black hole attack used in network communication using AODV protocol. As we know there are many issues in VANET and specially security issues. Therefore in our research work we proposed a new protocol which is known as GPSR which has superior result as compared to base work in term of end to end delay, energy consumption, packet delivery ratio, throughput and overhead. Besides this a security algorithm also implemented so that unauthorized person cannot access the authenti
- …