2,801 research outputs found

    Interplay of octahedral rotations and breathing distortions in charge ordering perovskite oxides

    Full text link
    We investigate the structure--property relationships in ABABO3_3 perovskites exhibiting octahedral rotations and cooperative octahedral breathing distortions (CBD) using group theoretical methods. Rotations of octahedra are ubiquitous in the perovskite family, while the appearance of breathing distortions -- oxygen displacement patterns that lead to approximately uniform dilation and contraction of the BBO6_6 octahedra -- are rarer in compositions with a single, chemically unique BB-site. The presence of a CBD relies on electronic instabilities of the BB-site cations, either orbital degeneracies or valence-state fluctuations, and often appear concomitant with charge order metal--insulator transitions or BB-site cation ordering. We enumerate the structural variants obtained from rotational and breathing lattice modes and formulate a general Landau functional describing their interaction. We use this information and combine it with statistical correlation techniques to evaluate the role of atomic scale distortions on the critical temperatures in representative charge ordering nickelate and bismuthate perovskites. Our results provide new microscopic insights into the underlying structure--property interactions across electronic and magnetic phase boundaries, suggesting plausible routes to tailor the behavior of functional oxides by design.Comment: 14 pages, 8 figure

    Stego-Image Generator (SIG) - Building Steganography Image Database

    Full text link
    Any Universal Steganalysis algorithm developed should be tested with various stego-images to prove its efficiency. This work is aimed to build the stego-image database which is obtained by implementing various RGB Least Significant Bit Steganographic algorithms. Though there are many stego-images sources available on the internet it lacks in the information such as how many rows has been infected by the steganography algorithms, how many bits have been modified and which channel has been affected. These parameters are important for Steganalysis algorithms and it helps to rate its efficiency. Images are chosen from board categories such as animals, nature, person to produce variety of Stego-Image.Comment: First International Conference on Digital Image Processing and Pattern Recognition, Springer (LNCS) in Communications in Computer and Information Science (CCIS) Series, ISSN: 1865:0929, September 201

    Two loop QCD corrections for the process Pseudo-scalar Higgs →3\rightarrow 3 partons

    Full text link
    We present virtual contributions up to two loop level in perturbative Quantum Chromodynamic (QCD) to the decay of pseudo-scalar Higgs boson (AA) to three gluons (gg) and also to quark (qq), anti-quark (q‾\overline q) and a gluon. With appropriate crossing, they are well suited for predicting the differential distribution of AA in association with a jet in hadron colliders up to next-to-next-to-leading order (NNLO) in strong coupling constant and also for the subsequent decay of AA to hadrons. We use effective field theory approach to integrate out the top quarks in the heavy top limit. The resulting theory involves two pseudo-scalar composite operators describing the interaction of AA with gluons as well as with quark and anti-quark. We perform our computation in dimensional regularisation and use minimal subtraction (MS‾\overline{MS}) scheme to renormalise strong coupling constant as well as the composite operators. The ultraviolet (UV) finite amplitudes contain infrared (IR) divergences that are found to be in agreement with the predictions by Catani. For both the amplitudes namely A→gggA \rightarrow g g g and A→qq‾gA \rightarrow q \overline q g, the leading transcendental terms at one and two loops are found to be identical to those in a three point form factor (FF) of the half-BPS operator in N=4{\cal N}=4 Supersymmetric Yang Mills (SYM) theory when the QCD color factors are adjusted in a specific way. We present our results in terms of harmonic polylogs well suited for further numerical study.Comment: 29 page

    Pixastic: Steganography based Anti-Phihsing Browser Plug-in

    Full text link
    In spite of existence of many standard security mechanisms for ensuring secure e-Commerce business, users still fall prey for online attacks. One such simple but powerful attack is 'Phishing'. Phishing is the most alarming threat in the e-Commerce world and effective anti-phishing technique is the need of the hour. This paper focuses on a novel anti-phishing browser plug-in which uses information hiding technique - Steganography. A Robust Message based Image Steganography (RMIS) algorithm has been proposed. The same has been incorporated in the form of a browser plug-in (safari) called Pixastic. Pixastic is tested in an online banking scenario and it is compared with other well-known anti-phishing plug-in methods in practice. Various parameters such as robustness, usability and its behavior on various attacks have been analysed. From experimental results, it is evident that our method Pixastic performs well compared to other anti-phishing plug-ins.Comment: Thiyagarajan P, Aghila G, Prasanna Venkatesan V, "Pixastic: Steganography based Anti-Phishing Browser Plug-in", Journal of Internet Banking and Commerce, April 2012, Vol. 17, no. 1, ISSN: 1204-535

    Visitor Pattern: Implementation of Enquiry Pattern for Internet Banking

    Full text link
    This paper brings out the design patterns according to the various services involved in internet banking. The Pattern oriented Software Architecture uses the pattern which eliminates the difficulty of reusability in a particular context. The patterns are to be designed using BPM (Business Process Model) for effective cross cutting on process level. For implementing the above said BPM, the Internet banking has been taken to implement the pattern into it. The Analysis and identification of various processes in Internet Banking have been done, to identify the effective cross cutting features. With this process the pattern has been designed, as a reusability component to be used by the Software Architect. The pattern help us to resolve recurring problems constructively and based on proven solutions and also support us in understanding the architecture of a given software system. Once the model is finalized by analyzing we found enquiry pattern as the visitor pattern and implement the pattern.Comment: 8 page

    Strategy pattern: payment pattern for Internet banking

    Full text link
    This paper brings out the design patterns according to the various services involved in internet banking. The Pattern oriented Software Architecture uses the pattern which eliminates the difficulty of reusability in a particular context. The patterns are to be designed using BPM (Business Process Model) for effective cross cutting on process level. For implementing the above said BPM, the Internet banking has been taken to implement the pattern into it. The Analysis and identification of various processes in Internet Banking have been done, to identify the effective cross cutting features. With this process the pattern has been designed, as a reusability component to be used by the Software Architect. The pattern help us to resolve recurring problems constructively and based on proven solutions and also support us in understanding the architecture of a given software system. Once the model is finalized by analyzing, we found payment in the process of internet banking has a strategy pattern.Comment: 6 page

    A Comprehensive Model to achieve Service Reusability for Multi level stakeholders using Non-Functional attributes of Service Oriented Architecture

    Full text link
    SOA is a prominent paradigm for accomplishing reuse of services. Service reusability is one dominant factor which has a greater influence on achieving quality in SOA systems. There exists sufficient research in this area and researchers have contributed many works towards achieving quality in SOA systems but much emphasis was not provided on service reusability [1] [2] [3]. Few authors have addressed reusability factor with limited non-functional attributes. Our study focuses on identifying the non-functional attributes which have major or greater influence towards obtaining reusability in SOA systems. The objective of this study goes into the next level, to categorize the non-functional attributes on multi stakeholder's perspective i.e. Service Consumer, Service Provider and Service Developer which paves the way to build a comprehensive quality model for achieving Service Reusabilit

    Divergence Condition for the novel Scaled Boundary Finite Element Method in Computational Electromagnetics

    Full text link
    The divergence condition is reformulated in the scaled boundary coordinates so as to prevent the spurious solutions in the finite element formulation

    A Business Intelligence Model to Predict Bankruptcy using Financial Domain Ontology with Association Rule Mining Algorithm

    Full text link
    Today in every organization financial analysis provides the basis for understanding and evaluating the results of business operations and delivering how well a business is doing. This means that the organizations can control the operational activities primarily related to corporate finance. One way that doing this is by analysis of bankruptcy prediction. This paper develops an ontological model from financial information of an organization by analyzing the Semantics of the financial statement of a business. One of the best bankruptcy prediction models is Altman Z-score model. Altman Z-score method uses financial rations to predict bankruptcy. From the financial ontological model the relation between financial data is discovered by using data mining algorithm. By combining financial domain ontological model with association rule mining algorithm and Zscore model a new business intelligence model is developed to predict the bankruptcy.Comment: Bankruptcy, Financial domain Ontology, Data Mining, Z-Score Model, Business Intelligence, Altman Bankruptcy mode

    Pattern Based Adaptive Architecture for Internet Banking

    Full text link
    Pattern plays a vital role in software architecture and it is a general reusable solution to commonly occurring problem. Software architecture of a system is the set of structures needed to reason about the system, which comprise software elements, relations among them, and properties of both. Patterns can be implemented at run-time; they identify key resource constraints and best practices. Architecture Pattern expresses a fundamental structural organization or schema for software systems. Patterns in software architecture, offer the promise of helping the architect to identify combinations of Architecture or Solution Building Blocks that have been proven to deliver effective solutions. In Internet banking, we analyzed some attributes such as reliability, security, availability, load balancing and so on. The use of patterns, which is of a reusable component, is a good tool to help designers build load balancing systems. In this paper we are going to propose pattern based adaptive architecture for internet banking system and so the above attributes can be improved by the usage of patterns
    • …
    corecore