Neural Computing and Applications - With the onset of the new technological age, the distractions caused due to handheld devices have been a major cause of traffic accidents as they affect the... 相似文献
In this paper, we report the control of important hysteresis parameters, which are useful for memory devices, viz. Ms, Hc and Mr/Ms, by changing the particle size/calcination temperature. An investigation of SrFe12O19 nanopowder from the structural and magnetic aspect is performed using X-ray diffraction (XRD), High Resolution Transmission
Electron Microscopy (HRTEM), Scanning Electron Microscopy (SEM) and Vibrating Sample Magnetometer (VSM). The average particle
size (APS) of SrFe12O19(nanopowder) increases from 26 to 600 nm with calcination temperatures of 400 and 1100 °C in air, respectively. With the increase
in calcination temperature, saturation magnetization (Ms) increases with the decrease in coercivity for the respective sample. The change in saturation magnetization and coercive
field are explained on the basis of transition from single domain structure to multi-domain geometry with an increase in the
heating temperature. The sample heated at 1000 °C shows a minimum coercive field (2.71 kOe) and an appropriate squareness
ratio (Mr/Ms) compared to other calcined samples. 相似文献
We study properties of relational structures, such as graphs, that are decided by families of Boolean circuits. Circuits that decide such properties are necessarily invariant to permutations of the elements of the input structures. We focus on families of circuits that are symmetric, i.e., circuits whose invariance is witnessed by automorphisms of the circuit induced by the permutation of the input structure. We show that the expressive power of such families is closely tied to definability in logic. In particular, we show that the queries defined on structures by uniform families of symmetric Boolean circuits with majority gates are exactly those definable in fixed-point logic with counting. This shows that inexpressibility results in the latter logic lead to lower bounds against polynomial-size families of symmetric circuits.
Multimedia Tools and Applications - Decomposition of an image into its cartoon part and texture part has been an interesting area of research. It is an important pre-processing step in many... 相似文献
The second-order method using a Newton step is a suitable technique in online learning to guarantee a regret bound. The large data are a challenge in the Newton method to store second-order matrices such as the hessian. In this article, we have proposed a modified online Newton step that stores first- and second-order matrices of dimension m (classes) by d (features). We have used elementwise arithmetic operations to maintain the size of matrices. The modified second-order matrix size results in faster computations. Also, the mistake rate is on par with respect to popular methods in the literature. The experimental outcome indicates that proposed method could be helpful to handle large multiclass datasets on common desktop machines using second-order method as the Newton step. 相似文献
Journal of Materials Science - In this work, the electromagnetic interference (EMI) shielding performance of epoxy composites containing barium hexaferrite (BaM) nanoparticles and graphene... 相似文献
The present work investigates the novel route for the synthesis of Fe-Cu alloy using electric discharge machining (EDM). The Synthesis of Fe-Cu alloy is difficult by equilibrium processes because of their immiscible nature. An attempt was made to investigate the synthesis of Fe-Cu alloy by EDM process where the discharge can lead to a very high temperature and subsequent quenching to result in alloy formation. The electrode was made up of copper and die steel was used as workpiece. The characterization of generated debris was carried out by X-ray diffraction analysis, scanning electron microscopy (SEM), energy dispersive spectroscopy (EDS) and transmission electron microscopy (TEM). The nano-phase granular particles of Fe-Cu alloy were confirmed by TEM and selected area diffraction pattern analysis. SEM morphology results reveal that the generated particles were both, spherical and non-spherical shape and size ranging between 50?nm and 30?µm. The EDS analysis indicates that the spherical particles were Fe-rich and non-spherical particles were Cu-rich. 相似文献
We present a framework for incorporating prior information about high-probability shapes in the process of contour extraction
and object recognition in images. Here one studies shapes as elements of an infinite-dimensional, non-linear quotient space,
and statistics of shapes are defined and computed intrinsically using differential geometry of this shape space. Prior models
on shapes are constructed using probability distributions on tangent bundles of shape spaces. Similar to the past work on
active contours, where curves are driven by vector fields based on image gradients and roughness penalties, we incorporate
the prior shape knowledge in the form of vector fields on curves. Through experimental results, we demonstrate the use of
prior shape models in the estimation of object boundaries, and their success in handling partial obscuration and missing data.
Furthermore, we describe the use of this framework in shape-based object recognition or classification. 相似文献
To ensure the safety of nuclear power plants (NPPs), nuclear regulatory agencies set technical specifications (TSs). TSs define the safety‐related operational measures and specify essential requirements and set specific limitations that is necessarily be followed by a nuclear industry to meet the requirements for the safety of an NPP. One of the important bases for the setting of TSs is the estimates of the availability and reliability of various systems and costs associated with an NPP. In this work, authors have presented a framework based upon a hodiernal nature‐inspired metaheuristic called multiobjective gray wolf optimizer (MOGWO) algorithm, which mimic the hierarchal and hunting behavior of gray wolves (Canis lupus), for technical specifications optimization of residual heat removal system (RHRS) of an NPP safety system. The efficiency of MOGWO in optimizing the TSs is demonstrated by comparing its results with a very popular swarm‐based optimization technique named multiobjective particle swarm optimization (MOPSO). 相似文献
In theoretical cryptography, one formalizes the notion of an adversary's success probability being ``too small to matter'
by asking that it be a negligible function of the security parameter. We argue that the issue that really arises is what it
might mean for a collection of functions to be ``negligible.' We consider (and define) two such notions, and prove them equivalent. Roughly, this enables
us to say that any cryptographic primitive has a specific associated ``security level.' In particular we say this for any one-way function. We also reconcile different definitions
of negligible error arguments and computational proofs of knowledge that have appeared in the literature. Although the motivation
is cryptographic, the main result is purely about negligible functions. 相似文献