1,037 research outputs found

    Structural and Optical Properties of Pulse Laser Deposited Ag_2O Thin Films

    Full text link
    We deposited Ag_2O films in PLD system on glass substrate for a fixed partial oxygen gas pressure (70 mili Torr) with the variation of laser energy from 75 to 215 mJ/Pulse. The XRD patterns confirm that the films have well crystallinity and deposited as hexagonal lattice and the crystalline size increases from 26.38 nm to 27.27 nm. The FESEM images show that the particle size of the films increases from 34.84 nm to 65.83 nm. The composition of the films is analyzed from EDX spectra which show that the percentage of oxygen increases from 41.03% to 48.38% with the increment of laser energy. From the optical characterization, it is observed that the optical band gap appears in the visible optical range in an increasing order from 0.87 to 0.98 eV with the increment of laser energy. Our analysis concludes that the Ag_2O thin films, deposited with these parameters, can be considered as a good absorbent layer for solar photovoltaic application.Comment: 8 pages, 4 figures, 2 table

    On the coincidence of the Prenucleolus and the Shapley Value

    Get PDF
    We identify a sufficient class of coalitional form games with transferable utility for which prenucleolus coincides with the Shapley value. We then apply our result to simple games and to generalized queueing games.

    Ovarian Cancer Metastasis: A Unique Mechanism of Dissemination

    Get PDF
    Ovarian cancer is the most lethal of all gynecologic malignancies and has witnessed minimal improvements in patient outcomes in the past three decades. About 70% of ovarian cancer patients present with disseminated disease at the time of diagnosis. The standard of care remains a combination of debulking surgery and platinum‐ and taxanes‐based cytotoxic chemotherapy. Even though metastasis is the leading cause of ovarian cancer related fatalities, our understanding of the process remains limited. Ovarian cancer has a unique pattern of metastasis where the hematogenous spread is less common. Ovarian cancer cells mainly metastasize within the peritoneal cavity, which involves exfoliation from the primary tumor, survival, and transport in the peritoneal fluid followed by metastatic colonization of the organs within the peritoneal cavity. A key step for successful metastasis is their attachment and productive interactions with the mesothelial cells covering the metastatic organs for the establishment of metastatic tumors. This chapter provides an overview of ovarian cancer metastasis highlighting the unique dissemination and the underlying mechanisms of regulation of the steps involved. The role of the microenvironment in the process of metastasis will also be reviewed

    Implications of an Economic Theory of Conflict: Hindu-Muslim Violence in India

    Get PDF
    We model intergroup conflict driven by economic changes within groups. We show that if group incomes are low, increasing group incomes raises violence against that group and lowers violence generated by it. We then apply the model to data on Hindu-Muslim violence in India. Our main result is that an increase in per capita Muslim expenditures generates a large and significant increase in future religious conflict. An increase in Hindu expenditures has a negative or no effect. These findings speak to the origins of Hindu-Muslim violence in post-Independence India

    Studying Security Issues in HPC (Super Computer) Environment

    Get PDF
    HPC has evolved from being a buzzword to becoming one of the most exciting areas in the field of Information Technology & Computer Science. Organizations are increasingly looking to HPC to improve operational efficiency, reduce expenditure over time and improve the computational power. Using Super Computers hosted on a particular location and connected with the Internet can reduce the installation of computational power and making it centralise. However, centralise system has some advantages and disadvantages over the distributed system, but we avoid discussing those issues and focusing more on the HPC systems. HPC can also be used to build web and file server and for applications of cloud computing. Due to cluster type architecture and high processing speed, we have experienced that it works far better and handles the loads in much more efficient manner then series of desktop with normal configuration connected together for application of cloud computing and network applications. In this paper we have discussed on issues re lated to security of data and information on the context of HPC. Data and information are vanurable to security and safety. It is the purpose of this paper to present some practical security issues related to High Performance Computing Environment. Based on our observation on security requirements of HPC we have discuss some existing security technologies used in HPC. When observed to various literatures, we found that the existing techniques are not enough. We have discussed, some of the key issues relating to this context. Lastly, we have made an approach to find an appropriate solution using Blowfish encryption and decryption algorithm. We hope that, with our proposed concepts, HPC applications to perform better and in safer way. At the end, we have proposed a modified blow fish algorithmic technique by attaching random number generator algorithm to make the encryption decryption technique more appropriate for our own HPC environment
    • 

    corecore