2,801 research outputs found
Interplay of octahedral rotations and breathing distortions in charge ordering perovskite oxides
We investigate the structure--property relationships in O perovskites
exhibiting octahedral rotations and cooperative octahedral breathing
distortions (CBD) using group theoretical methods. Rotations of octahedra are
ubiquitous in the perovskite family, while the appearance of breathing
distortions -- oxygen displacement patterns that lead to approximately uniform
dilation and contraction of the O octahedra -- are rarer in compositions
with a single, chemically unique -site. The presence of a CBD relies on
electronic instabilities of the -site cations, either orbital degeneracies
or valence-state fluctuations, and often appear concomitant with charge order
metal--insulator transitions or -site cation ordering. We enumerate the
structural variants obtained from rotational and breathing lattice modes and
formulate a general Landau functional describing their interaction. We use this
information and combine it with statistical correlation techniques to evaluate
the role of atomic scale distortions on the critical temperatures in
representative charge ordering nickelate and bismuthate perovskites. Our
results provide new microscopic insights into the underlying
structure--property interactions across electronic and magnetic phase
boundaries, suggesting plausible routes to tailor the behavior of functional
oxides by design.Comment: 14 pages, 8 figure
Stego-Image Generator (SIG) - Building Steganography Image Database
Any Universal Steganalysis algorithm developed should be tested with various
stego-images to prove its efficiency. This work is aimed to build the
stego-image database which is obtained by implementing various RGB Least
Significant Bit Steganographic algorithms. Though there are many stego-images
sources available on the internet it lacks in the information such as how many
rows has been infected by the steganography algorithms, how many bits have been
modified and which channel has been affected. These parameters are important
for Steganalysis algorithms and it helps to rate its efficiency. Images are
chosen from board categories such as animals, nature, person to produce variety
of Stego-Image.Comment: First International Conference on Digital Image Processing and
Pattern Recognition, Springer (LNCS) in Communications in Computer and
Information Science (CCIS) Series, ISSN: 1865:0929, September 201
Two loop QCD corrections for the process Pseudo-scalar Higgs partons
We present virtual contributions up to two loop level in perturbative Quantum
Chromodynamic (QCD) to the decay of pseudo-scalar Higgs boson () to three
gluons () and also to quark (), anti-quark () and a gluon.
With appropriate crossing, they are well suited for predicting the differential
distribution of in association with a jet in hadron colliders up to
next-to-next-to-leading order (NNLO) in strong coupling constant and also for
the subsequent decay of to hadrons. We use effective field theory approach
to integrate out the top quarks in the heavy top limit. The resulting theory
involves two pseudo-scalar composite operators describing the interaction of
with gluons as well as with quark and anti-quark. We perform our
computation in dimensional regularisation and use minimal subtraction
() scheme to renormalise strong coupling constant as well as the
composite operators. The ultraviolet (UV) finite amplitudes contain infrared
(IR) divergences that are found to be in agreement with the predictions by
Catani. For both the amplitudes namely and , the leading transcendental terms at one and two loops are
found to be identical to those in a three point form factor (FF) of the
half-BPS operator in Supersymmetric Yang Mills (SYM) theory when
the QCD color factors are adjusted in a specific way. We present our results in
terms of harmonic polylogs well suited for further numerical study.Comment: 29 page
Pixastic: Steganography based Anti-Phihsing Browser Plug-in
In spite of existence of many standard security mechanisms for ensuring
secure e-Commerce business, users still fall prey for online attacks. One such
simple but powerful attack is 'Phishing'. Phishing is the most alarming threat
in the e-Commerce world and effective anti-phishing technique is the need of
the hour. This paper focuses on a novel anti-phishing browser plug-in which
uses information hiding technique - Steganography. A Robust Message based Image
Steganography (RMIS) algorithm has been proposed. The same has been
incorporated in the form of a browser plug-in (safari) called Pixastic.
Pixastic is tested in an online banking scenario and it is compared with other
well-known anti-phishing plug-in methods in practice. Various parameters such
as robustness, usability and its behavior on various attacks have been
analysed. From experimental results, it is evident that our method Pixastic
performs well compared to other anti-phishing plug-ins.Comment: Thiyagarajan P, Aghila G, Prasanna Venkatesan V, "Pixastic:
Steganography based Anti-Phishing Browser Plug-in", Journal of Internet
Banking and Commerce, April 2012, Vol. 17, no. 1, ISSN: 1204-535
Visitor Pattern: Implementation of Enquiry Pattern for Internet Banking
This paper brings out the design patterns according to the various services
involved in internet banking. The Pattern oriented Software Architecture uses
the pattern which eliminates the difficulty of reusability in a particular
context. The patterns are to be designed using BPM (Business Process Model) for
effective cross cutting on process level. For implementing the above said BPM,
the Internet banking has been taken to implement the pattern into it. The
Analysis and identification of various processes in Internet Banking have been
done, to identify the effective cross cutting features. With this process the
pattern has been designed, as a reusability component to be used by the
Software Architect. The pattern help us to resolve recurring problems
constructively and based on proven solutions and also support us in
understanding the architecture of a given software system. Once the model is
finalized by analyzing we found enquiry pattern as the visitor pattern and
implement the pattern.Comment: 8 page
Strategy pattern: payment pattern for Internet banking
This paper brings out the design patterns according to the various services
involved in internet banking. The Pattern oriented Software Architecture uses
the pattern which eliminates the difficulty of reusability in a particular
context. The patterns are to be designed using BPM (Business Process Model) for
effective cross cutting on process level. For implementing the above said BPM,
the Internet banking has been taken to implement the pattern into it. The
Analysis and identification of various processes in Internet Banking have been
done, to identify the effective cross cutting features. With this process the
pattern has been designed, as a reusability component to be used by the
Software Architect. The pattern help us to resolve recurring problems
constructively and based on proven solutions and also support us in
understanding the architecture of a given software system. Once the model is
finalized by analyzing, we found payment in the process of internet banking has
a strategy pattern.Comment: 6 page
A Comprehensive Model to achieve Service Reusability for Multi level stakeholders using Non-Functional attributes of Service Oriented Architecture
SOA is a prominent paradigm for accomplishing reuse of services. Service
reusability is one dominant factor which has a greater influence on achieving
quality in SOA systems. There exists sufficient research in this area and
researchers have contributed many works towards achieving quality in SOA
systems but much emphasis was not provided on service reusability [1] [2] [3].
Few authors have addressed reusability factor with limited non-functional
attributes. Our study focuses on identifying the non-functional attributes
which have major or greater influence towards obtaining reusability in SOA
systems. The objective of this study goes into the next level, to categorize
the non-functional attributes on multi stakeholder's perspective i.e. Service
Consumer, Service Provider and Service Developer which paves the way to build a
comprehensive quality model for achieving Service Reusabilit
Divergence Condition for the novel Scaled Boundary Finite Element Method in Computational Electromagnetics
The divergence condition is reformulated in the scaled boundary coordinates
so as to prevent the spurious solutions in the finite element formulation
A Business Intelligence Model to Predict Bankruptcy using Financial Domain Ontology with Association Rule Mining Algorithm
Today in every organization financial analysis provides the basis for
understanding and evaluating the results of business operations and delivering
how well a business is doing. This means that the organizations can control the
operational activities primarily related to corporate finance. One way that
doing this is by analysis of bankruptcy prediction. This paper develops an
ontological model from financial information of an organization by analyzing
the Semantics of the financial statement of a business. One of the best
bankruptcy prediction models is Altman Z-score model. Altman Z-score method
uses financial rations to predict bankruptcy. From the financial ontological
model the relation between financial data is discovered by using data mining
algorithm. By combining financial domain ontological model with association
rule mining algorithm and Zscore model a new business intelligence model is
developed to predict the bankruptcy.Comment: Bankruptcy, Financial domain Ontology, Data Mining, Z-Score Model,
Business Intelligence, Altman Bankruptcy mode
Pattern Based Adaptive Architecture for Internet Banking
Pattern plays a vital role in software architecture and it is a general
reusable solution to commonly occurring problem. Software architecture of a
system is the set of structures needed to reason about the system, which
comprise software elements, relations among them, and properties of both.
Patterns can be implemented at run-time; they identify key resource constraints
and best practices. Architecture Pattern expresses a fundamental structural
organization or schema for software systems. Patterns in software architecture,
offer the promise of helping the architect to identify combinations of
Architecture or Solution Building Blocks that have been proven to deliver
effective solutions. In Internet banking, we analyzed some attributes such as
reliability, security, availability, load balancing and so on. The use of
patterns, which is of a reusable component, is a good tool to help designers
build load balancing systems. In this paper we are going to propose pattern
based adaptive architecture for internet banking system and so the above
attributes can be improved by the usage of patterns
- …