A high-precision method to study the dynamics of two-fluid interfaces using an optical tweezer and a phase-sensitive detection technique are described. The disturbances set up at the interface are studied by analyzing the motion of an optically trapped particle in the bulk of the fluid, i.e., away from the interface. The usefulness of the technique is demonstrated for the well-known problem of a horizontally vibrated sessile liquid drop. The vibrational modes of the liquid drop excited by sinusoidally vibrating the support in a horizontal plane appear as resonances in the motion of the trapped particle. The nature of the resonance is studied in detail by measuring the real part, the imaginary part, and the phase response of the motion of the particle as a function of the "effective" size of the liquid drop. Excellent quantitative agreement with the theoretically predicted values of the eigenfrequencies and damping of the surface modes is obtained. 相似文献
Electrodeposited composites are gaining importance for their advantages including low cost, ease and simplicity of operation
to tailor made coatings for tribological applications. Generally, composites containing carbides (like SiC) are preferred
for high wear resistance along with increased hardness, improved corrosion resistance, and high temperature oxidation resistance
as compared to alloy and pure metal electroplating. In the present work, electrolytic codeposition technique was adopted in
the deposition of Ni-Co-SiC composite coating on mild steel substrate, using nickel alloyed with cobalt as the binder phase
with SiC as dispersed particles. To improve the properties of coating further, Cr plating was also performed. Since the particle
size and volume percent variation of dispersoid have great importance in codeposition, so the effect of these two variables
on the process of codeposition and properties was observed. Morphological studies of Ni-Co-SiC coating were carried out with
scanning electron microscopy and X-ray diffraction analysis to correlate the mechanical and corrosion behaviour of the coating. 相似文献
A novel split-step finite-difference method for wide-angle beam propagation is presented. The formulation allows solution of the second-order scalar wave equation without having to make the slowly varying envelope and one-way propagation approximations. The method is highly accurate and numerically efficient requiring only simple matrix multiplication for propagation. 相似文献
Two-dimensional discrete cosine transforms are used in the core transformations in all profiles of the H.264/Advanced video coding (AVC) standard. In this paper, implementing the resource sharing of high throughput 4 × 4 and 8 × 8 forward and inverse integer transforms for high definition H.264 is presented. It is shown that the 4 × 4 forward/inverse transform can be obtained from 8 × 8 forward/inverse transform using selective data input and data arrangement at intermediate stages. Fast 8 × 8 forward and inverse transform is implemented using matrix decomposition and matrix operation such as Kronecker product and direct sum. The proposed implementation does not require any transpose memory and has a dual clocked pipeline structure. Compared with existing designs, the gate count is reduced by 27.7% in the proposed design. The maximum operating frequency of the proposed system is approx. 1.3 GHz, while the throughput is 7 G and 18.7 G pixels/s for 4 × 4 and 8 × 8 forward integer transforms, respectively. The proposed design can be used for real time H.264/AVC high definition processing owing to its high throughput and low hardware cost. 相似文献
Wireless Personal Communications - In the present scenario, there is a boom in the demand of the users to achieve increased capacity, high data, low latency, and high-performance rates. 5G New... 相似文献
Wireless communication networks have much data to sense, process, and transmit. It tends to develop a security mechanism to care for these needs for such modern-day systems. An intrusion detection system (IDS) is a solution that has recently gained the researcher’s attention with the application of deep learning techniques in IDS. In this paper, we propose an IDS model that uses a deep learning algorithm, conditional generative adversarial network (CGAN), enabling unsupervised learning in the model and adding an eXtreme gradient boosting (XGBoost) classifier for faster comparison and visualization of results. The proposed method can reduce the need to deploy extra sensors to generate fake data to fool the intruder 1.2–2.6%, as the proposed system generates this fake data. The parameters were selected to give optimal results to our model without significant alterations and complications. The model learns from its dataset samples with the multiple-layer network for a refined training process. We aimed that the proposed model could improve the accuracy and thus, decrease the false detection rate and obtain good precision in the cases of both the datasets, NSL-KDD and the CICIDS2017, which can be used as a detector for cyber intrusions. The false alarm rate of the proposed model decreases by about 1.827%.
In this paper, we propose to use Artificial Bee Colony (ABC) optimization to solve the joint mode selection, channel assignment, and power allocation (JMSCPA) problem to maximize system throughput and spectral efficiency. JMSCPA is a problem where the allocation of channel and power depends on the mode selection. Such problems require two step solution and are called bi-level optimization problems. As bi-level optimization increases the complexity and computational time, we propose a modified version of single-level ABC algorithm aided with the adaptive transmission mode selection algorithm to allocate the cellular, reuse, and dedicated modes to the DUs along with channel and power allocation based on the network traffic load scenarios. A single variable, represented by the users (CUs and DUs) is used to allocate mode selection, and channel allocation to solve the JMSCPA problem, leading to a simpler solution with faster convergence, and significant reduction in the computational complexity which scales linearly with the number of users. Further, the proposed solution avoids premature stagnation of conventional ABC into local minima by incorporating a modification in its update procedure. The efficacy of the ABC-aided approach, as compared to the results reported in the literature, is validated by extensive numerical investigations under different simulation scenarios.