We study limit cycle solutions of the forced Van der Pol Duffing oscillator under the condition that the external frequency is equal to the resultant frequency of the nonlinear oscillator. The effects of the damping p...
We study limit cycle solutions of the forced Van der Pol Duffing oscillator under the condition that the external frequency is equal to the resultant frequency of the nonlinear oscillator. The effects of the damping parameter (μ), the nonlinear term (β) and the magnitude of the external forcing (g) are discussed. We use the homotopy analysis method (HAM) to obtain closed form solutions. We note that without forcing we obtain solutions reported previously in the literature. We minimize the square residual error of this problem to obtain solutions by HAM. Finally, a comparison of numerical and analytical solutions has been carried out.
Objective:To assess the virus infection in mosquitoes during different seasons and correlated with various climatic ***:The field collected vectors were screened for Japanese encephalitis(JE) virus after dessication u...
详细信息
Objective:To assess the virus infection in mosquitoes during different seasons and correlated with various climatic ***:The field collected vectors were screened for Japanese encephalitis(JE) virus after dessication using ELISA *** of the positive pools were recorded from Culex tritaeniorhynchus(***) and ***(***) during JE transmission season(winter) and some positive pools were also reported during non JE transmission periods(*** and rainy seasons).Results:The minimum infection rates(MIR) of 1.75 from *** and 0.17 from *** has been reported in the year 2002 at the beginning of the study and the values were found nil at the end of the study(2006) from the study areas of Kurnool ***:From this study it is noted that MTR of *** and *** were modulated by various meteorological *** mosquito vector abundance increases after the monsoon period(winter) and lowest in dry season(summer). Similarly,MIR fluctuated between seasons with higher MIR recorded after monsoon period and lower in the rest of *** of these metrological parameters in JE virus infected mosquitoes is discussed in this paper.
Stream Control Transmission Protocol (SCTP) is a general purpose and relatively new transport layer protocol with several unique features. This paper highlights the concept of feedback protocol and identifies SCTP as ...
详细信息
Stream Control Transmission Protocol (SCTP) is a general purpose and relatively new transport layer protocol with several unique features. This paper highlights the concept of feedback protocol and identifies SCTP as a protocol operating in a closed-loop feedback manner. We conduct an in-depth security analysis of closed-loop feedback operation of SCTP congestion control and present a new attack scenario called feedback manipulation flooding attack (FMFA). We show that standard SCTP senders can be remotely exploited for generation of powerful and sustained Denial-of-Service attack flood by tactically manipulating feedback messages. To ascertain the attack feasibility and its potential impact, we simulate the FMFA scenario using one of the globally well-accepted network simulators (ns2). We also compare the feedback manipulation flooding attack with conventional brute-force flooding attacks and identify some of its exclusive characteristics. Further, we implement the FMFA attack scenario in Linux kernel and present real-world experimental results over the Internet to validate our simulation results.
We quantify the correlation between earthquakes and use the same to extract causally connected earthquake pairs. Our correlation metric is a variation on the one introduced by Baiesi and Paczuski [M. Baiesi and M. Pac...
详细信息
We quantify the correlation between earthquakes and use the same to extract causally connected earthquake pairs. Our correlation metric is a variation on the one introduced by Baiesi and Paczuski [M. Baiesi and M. Paczuski, Phys. Rev. E 69, 066106 (2004)]. A network of earthquakes is then constructed from the time-ordered catalog and with links between the more correlated ones. A list of recurrences to each of the earthquakes is identified employing correlation thresholds to demarcate the most meaningful ones in each cluster. Data pertaining to three different seismic regions (viz., California, Japan, and the Himalayas) are comparatively analyzed using such a network model. The distribution of recurrence lengths and recurrence times are two of the key features analyzed to draw conclusions about the universal aspects of such a network model. We find that the unimodal feature of recurrence length distribution, which helps to associate typical rupture lengths with different magnitude earthquakes, is robust across the different seismic regions. The out-degree of the networks shows a hub structure rooted on the large magnitude earthquakes. In-degree distribution is seen to be dependent on the density of events in the neighborhood. Power laws, with two regimes having different exponents, are obtained with recurrence time distribution. The first regime confirms the Omori law for aftershocks while the second regime, with a faster falloff for the larger recurrence times, establishes that pure spatial recurrences also follow a power-law distribution. The crossover to the second power-law regime can be taken to be signaling the end of the aftershock regime in an objective fashion.
Use of High Performance Computing (HPC) for modelling and simulation in the areas of engineering, geophysics, biotechnology etc. is not new. However, there has been a growing demand for HPC over the past few years in ...
详细信息
Use of High Performance Computing (HPC) for modelling and simulation in the areas of engineering, geophysics, biotechnology etc. is not new. However, there has been a growing demand for HPC over the past few years in other non - conventional areas like architecture, graphics design and even gaming. The prohibitive cost of HPC resources, which are considered to be the costliest in the world of computing, forces many not to use them. Especially in countries like India, where implementing an HPC infrastructure has many challenges, many genuine requirements are compromised. Currently only a handful number of organizations both in government and private enterprise can afford to establish HPC facilities of their own. So the biggest question, in the field of computing is that “Is HPC a dream for a common person's use?” Cloud computing, the future generation computing, could be one solution to realize such dreams. It is a very new concept in the field of computing characterized by three main entities - Software as a service, Platform as a service and Infrastructure as a service. However, it can be a true success if it can be made cost effective, easy to use and hassle free. In this paper we propose a payment model equivalent to prepaid cellular phone payment for HPC as a cloud services for common people.
Recently an object-oriented approach has been applied in the fields of finite element analysis with a view to treating the various complexities within these. It has been demonstrated that finite element software desig...
详细信息
Recently an object-oriented approach has been applied in the fields of finite element analysis with a view to treating the various complexities within these. It has been demonstrated that finite element software designed using an object-oriented approach can be significantly more robust than traditional codes. This paper describes a special kind of implementation of object-oriented programming which is rather hybrid in nature, in the development of a finite element code for engineering analysis of metal working problems using C++, and discusses the advantages of this approach.
Recently there has been growing interest in applying object-oriented approach to large-scale programs with a view to treating the various complexities within these. Software designed using an object-oriented approach ...
详细信息
Search for a key agreement algorithm not based on traditional number theoretic problem is a challenging area of research in information security. In this paper we present a new concept of key agreement, using synchron...
详细信息
Chaotic synchronization is a potential candidate for a stream cipher cryptosystem. However, many of the proposed schemes do not posses the required security level to be used in real implementations. One of the major t...
详细信息
暂无评论