The effect of Co addition on the formation of Ni-Ti clusters in maraging stainless steel was studied by three dimensional atom probe (3DAP) and first-principles calculation. The cluster analysis based on the maximum separation approach showed an increase in size but a decrease in density of Ni-Ti clusters with increasing the Co content. The first-principles calculation indicated weaker Co-Ni (Co-Ti) interactions than Co-Ti (Fe-Ti) interactions, which should be the essential reason for the change of distribution characteristics of Ni-Ti clusters in bcc Fe caused by Co addition. 相似文献
Thin films of cadmium sulphide and cadmium telluride have been prepared by thermal evaporation under various conditions of deposition. These films have been characterized optically. electrically and for structure determination. The results of these characterizations along with the initial results of all thin film CdS/CdTe solar cells are presented in this paper 相似文献
The Journal of Supercomputing - Agile software development (ASD) and software product line (SPL) have shown significant benefits for software engineering processes and practices. Although both... 相似文献
A mobile ad hoc network (MANET) is dynamic in nature and is composed of wirelessly connected nodes that perform hop-by-hop routing without the help of any fixed infrastructure. One of the important requirements of a MANET is the efficiency of energy, which increases the lifetime of the network. Several techniques have been proposed by researchers to achieve this goal and one of them is clustering in MANETs that can help in providing an energy-efficient solution. Clustering involves the selection of cluster-heads (CHs) for each cluster and fewer CHs result in greater energy efficiency as these nodes drain more power than noncluster-heads. In the literature, several techniques are available for clustering by using optimization and evolutionary techniques that provide a single solution at a time. In this paper, we propose a multi-objective solution by using multi-objective particle swarm optimization (MOPSO) algorithm to optimize the number of clusters in an ad hoc network as well as energy dissipation in nodes in order to provide an energy-efficient solution and reduce the network traffic. In the proposed solution, inter-cluster and intra-cluster traffic is managed by the cluster-heads. The proposed algorithm takes into consideration the degree of nodes, transmission power, and battery power consumption of the mobile nodes. The main advantage of this method is that it provides a set of solutions at a time. These solutions are achieved through optimal Pareto front. We compare the results of the proposed approach with two other well-known clustering techniques; WCA and CLPSO-based clustering by using different performance metrics. We perform extensive simulations to show that the proposed approach is an effective approach for clustering in mobile ad hoc networks environment and performs better than the other two approaches. 相似文献
Multimedia Tools and Applications - Conventional steganography focuses on invisibility and undetectability, as the main concern is to make the algorithms immune to steganalysis. Zero-steg-anography... 相似文献
In the design phase of business and IT system development, it is desirable to predict the properties of the system-to-be. A number of formalisms to assess qualities such as performance, reliability and security have therefore previously been proposed. However, existing prediction systems do not allow the modeler to express uncertainty with respect to the design of the considered system. Yet, in contemporary business, the high rate of change in the environment leads to uncertainties about present and future characteristics of the system, so significant that ignoring them becomes problematic. In this paper, we propose a formalism, the Predictive, Probabilistic Architecture Modeling Framework (P2AMF), capable of advanced and probabilistically sound reasoning about business and IT architecture models, given in the form of Unified Modeling Language class and object diagrams. The proposed formalism is based on the Object Constraint Language (OCL). To OCL, P2AMF adds a probabilistic inference mechanism. The paper introduces P2AMF, describes its use for system property prediction and assessment and proposes an algorithm for probabilistic inference. 相似文献
Multimedia Tools and Applications - The advancement in communication and computation technologies has paved a way for connecting large number of heterogeneous devices to offer specified services.... 相似文献
Visual Cryptography (VC) is gaining attraction during the past few years to secure the visual information in the transmission network. It enables the visual data i.e. handwritten notes, photos, printed text, etc. to encrypt in such a way that their decryption can be done through the human visual framework. Hence, no computational assistance is required for the decryption of the secret images they can be seen through naked eye. In this paper, a novel enhanced halftoning-based VC scheme is proposed that works for both binary and color images. Fake share is generated by the combination of random black and white pixels. The proposed algorithm consists of 3 stages i.e., detection, encryption, and decryption. Halftoning, Encryption, (2, 2) visual cryptography and the novel idea of fake share, make it even more secure and improved. As a result, it facilitates the original restored image to the authentic user, however, the one who enters the wrong password gets the combination of fake share with any real share. Both colored and black images can be processed with minimal capacity using the proposed scheme.
Software product prone to continuous evolution due to increase in the use of technology. Therefore, more stakeholders are involved in software evolution increases the cost and complexity. This required optimization of resources and cost to handle evolution with Global Software Development (GSD) to utilize time zones efficiently. The significance challenge of GSD reports: time zone difference, geographical location, communication delays, knowledge sharing, control among stakeholders and development team. Because of these challenges, the requirements for development in GSD environment are also challenge as compared to on site development. Different requirement engineering methods have been used to improve the requirements analysis to deal with ambiguities and inconsistency in large set of requirements. The customization and tailoring of requirements according to changing project’s situations required to improve project development with reusing existing agile methods during requirement engineering phase. Moreover, complex information systems where heterogeneity is inevitable that implies the involvement of divergent stakeholders and necessitate a comprehensive framework to capture multidimensional viewpoints and fulfill aforementioned issues. Therefore, a situational multi-dimensional agile requirement engineering method has been proposed to support team and stakeholders’ viewpoints. The schema of the proposed method is based on challenges recognized by performing Literature Review. Then proposed method has been evaluated via experimental approach and statistical analysis conducted to validated reliability of data collected. This result is significant approved both practically and statistically that the proposed approach ease to use, implement, trained and increased productivity and performance. Hence, the experimental study for the evaluation of the proposed approach results concluded that, proposed approach is the important multimedia tool for supporting organization and distributed development team for information sharing, collaboration, product development.