126 research outputs found
Photoluminescence of an Al0.5Ga0.5As/GaAs multiple quantum well in the temperature range from 5 to 400 K
Photoluminescence (PL) of an unintentionally doped Al0.5Ga0.5As/GaAs multiple quantum well (MQW) has been measured at temperatures from 5 to 400 K. It was found that the ratio of the intensity of the n = 1 electron-light hole transition (1e-1lh) to that of the n = 1 electron-heavy hole transition (1e-1hh) can be described by an exponential function of reciprocal temperature. The excitation-power dependence of the 1e-1hh transition PL intensity measured at temperatures from 5 to 296 K in steps of 15–20 K showed that the relative contribution of free-carrier recombination gradually increases from 5 to 120 K and then remains constant. This tendency was confirmed by the temperature dependence of the energy difference between the 1e-1hh transition and the bulk GaAs band gap
Body and wake influences on the 3D flow close to a HAWT rotor
This work focuses on the hypothesis that flow three-dimensionality in the rotor proximity
is strongly affected by blade blockage and bound circulation.
The extent of flow three-dimensionality in the blade proximity needs to be assessed
particularly in sensitive regions such as the root and tip of the blade. Moreover the induction
needs to be decomposed into two components; that resulting due to the blade presence and
that due to the wake. In this regard, the estimation of bound vorticity is essential such that
its effects and those due to trailing vorticity can be understood.
To investigate the hypothesis, an experimental and a numerical approach is used. A
two bladed, 2m diameter rotor was tested in the Open Jet Facility at TU Delft measuring
6m×6.5m×13.5m using Stereo Particle Image Velocimetry (SPIV).
The flow field around the tested HAWT blade was successfully measured and the velocity
components around the entire blade were studied. The bound vorticity was measured using
the experimental data and compared well with the numerical measurements. The radial
flow, responsible for 3D effects was found to have high values not at the 100% span position
but rather at around 90% span. The flow components were also decomposed using the
potential flow model. Whilst the wake causes an increase in the flow three-dimensionality,
the blade effect was found to be indeed the opposite and hence to decrease the inductions
(and hence flow three-dimensionality).
While momentum approaches utilize correction functions to account for the finite nature
of the HAWT blade, we provide new understanding of the three-dimensional flow field which
may prove useful for future work in refining momentum formulations.peer-reviewe
SMP LSB Steganography with Enhanced Cover Image: A New Multi-Level Security Approach with Visual Cryptography
The main drawbacks associated with any existing steganography systems are, one, the distortion happens to the apparent view of the wrapper image after embedding and second the fewer hiding capacity of stego-image. When the confidential data is miniscule the system would be perfect. However, when the amount of secret data increases the disturbance caused is perceptible. Our aim with this proposed technique is to implement a stego system that gives maximum payload capacity with improved viscinity of the stego- image. With the slated objectives the proposed work try to maximize the security with high payload by enhancing the apparent view of the image so as to give no trace of hidden secret inside the cover.We propose a multi level security approach that uses visual cryptography for encryption to achieve security at first level and a brand new steganography method called Selected Matrices Pixels LSB [SMPLSB] at next level. In contrast to the distortion happens when hiding data inside a digital image, the projected technique enhances the host image quality while embedding. It finds a trivial location or less sensitive traits of the cover to embed the secret and make sure that embedding does not affect the original view of the image. The steps are repeated until the whole secret is hidden without disturbing the original view. Cover image preprocessing is also done to make the cover best suit for embedding.Our proposed approach cut short the chance ofsteg-analysis. It keeps a position map to assure the accurate fetching of hidden message. Higher PSN ratio of 50.1 dB, SSIM value of 1 and AAD 0.15050 show the projected method achieves good security with large payload
CASTE STRATIFICATION AND THE NARRATIVE OF UCHALYA: AN ANALYSIS OF LAXMAN GAIKWAD’S UCHALYA: THE BRANDED
The Book Uchalyas of Laxman Gaikwad and the Cast Stratification shown in the Book arediscussed in this article. Massive abuses of civil, political, economic, social, and culturalrights occur as a result of caste prejudice. It is frequently illegal in nations where it occurs,but due to a lack of enforcement and caste bias in the criminal system, victims are largelyunprotected. The book is the voice of those who have been marginalized and oppressed bymainstream Indian society, and who have been compelled to remain silent for a long time. Asa result, the article aims to investigate the nature of the Uchalya community's painful identityof being continually labeled as criminal, as well as the obstacles faced by the community as awhole in their daily lives. The British government has branded this group as criminal tribes.Finally, the book calls for the abolition of imposed social and legal limits, as well as socialjustice, rights, and many forms of reformation and transformation of the Uchalya community
FEMINISM IN ENGLISH LITERATURE OF THE 19TH AND 20TH CENTURIES
As the centuries, the style of writing changed, and the need to talk about new things likesexuality, homosexuality, and the value of liberty became more clear. During the nineteenthcentury, writers began to talk about how important it was for women to be free and to berecognised. Because, for example, when women were finally able to vote and become morerespected in society, writers wrote more openly about new issues. This is also one of the bigchanges in the evolution of literature. Some of the topics in twentieth-century literature wouldhave been considered taboo in the 1800s, like the rejection of religion, homosexuality, andsexuality in general, as well as the rejection of religion
UNDERSTANDING VULNERABILITY OF ASV SYSTEMS TO SPOOFED SPEECH
Concerns regarding the spoofability of automatic speaker verification (ASV) technology canerode trust in it. dependability and act as a deterrent to its widespread use. Automaticspeaker verification (ASV) technologies have advanced to the point that the security sector isinterested in implementing them in actual systems of security The vulnerability of thesesystems to multiple direct and indirect access risks, on the other hand, diminishes the ASVauthentication process's effectiveness. According to our findings, proactive adversarialattacks have a major impact on understanding the weaknesses of ASV systems, which aredescribed throughout the study. At the time, conclusion of the research, we will explore somespecificattacks and how we may use this knowledge to develop security mechanisms againstadversarial attacks in general
Utilization, Issues, and Methods in Community-based Health Promotion
市町村における地域保健活動手法の活用実態を明らかにし、今後、各手法を活用していくために必要な教育環境を検討することを目的として、N県内市町村の保健婦代表者に質問紙による調査を実施した。主な結果は以下のとおりである。1.現在活用している手法は、『問題解決型』が5割、『地域づくり型』が2割、『コミュニティ・ミーティング』と『プリシード・プロシード・モデル』が1割であった。2.手法を活用している市町村では、6割以上が問題を感じていた。3.『問題解決型』は健康問題の明確化と優先順位決定の評価が高く、『地域づくり型』『プリシード・プロシード・モデル』『コミュニティ・ミーティング』は、住民の参加、住民のエンパワメントの評価が高かった。4.9割の市町村が今後手法を活用したいと考え、実践者や専門家による指導、手法の研修会を希望していた。The purpose of this study is to clarify the different methods and activities in community-based health promotion in N prefecture, and to seek a better educational environment for public health nurses. The survey was performed by questionnaire in 85 municipalities in N prefecture. The results were as follows; 1. Major types of methods used and their percentages: "Problem Solving Type" accounted for 50%; "SOJO Model Type" for 20%; "Community Meeting" for 10%; and "PRECEDE-PROCEED Model Type" for 10%. 2. Over 60% of municipalities reported awareness of the problems in practice. 3. The "Problem Solving type" is evaluated, as it clarifies the health problems and the priority decision making in practice. The "Community development type" and the "Community Meeting Type" are effective in promoting residents' participation and empowerment of health care. 4. 90% of municipalities wish to study and utilize some of the methods for the communitybased health promotion.departmental bulletin pape
APPLICATION OF FUJISAKI MODEL TO DERIVE FEATURES TO CAPTURE PROSODIC INFORMATION.
The usefulness of a model for characterising pitch profiles in voice signals is critical in awide range of application areas, but it is particularly important in natural-sounding text-tospeechsystems, which are becoming increasingly popular. Despite its simplicity, the Fujisakimodel has demonstrated remarkable accuracy across a wide range of languages. A muchmore difficult task is that of solving the inverse problem, i.e., extracting the input parametersthat formed an observed pitch contour, which has the potential to be very beneficial in thefield of automatic extraction of prosodic parameters from a given speech signal and could beof considerable importance A tiny sample of 100 male and female utterances from thenatural, USS, and HTS systems were used to establish the Fujisaki Model parametersspeakers was used. Both natural and synthetic speech are produced using the same textcontent
UTILIZATION OF AUTO ENCODERS AS A GENERALIZATION METHOD FOR ANTI-SPOOFING CLASSIFICATION
When training large neural networks, explicit generalisation procedures are required toensure that the model's predictions can be generalised. Auto-encoders now have a newgeneralisation result. As a result of the data's limited diversity, generalisation issues arisewhen developing models aimed at tackling these types of problems. Regularization is oftenadded by including a regularisation parameter in the objective function; however, in thispaper, we will provide an alternative regularisation approach that is equal to the onecommonly used. The fact that other regularisation strategies failed to eliminate overfittingimplies that these regularisation techniques may be used as a pre-processing step for otheralgorithms
FEMALE AVENGER: VIOLENCE, ABSURDITY, AND BLACK HUMOUR IN ROALD DAHL'S SHORT STORIES
Dahl's short stories criticise women's societal roles in the mid-nineteenth century. Dhalpresents women who defy standard gender boundaries and move from domestic to criminaldomains in startlingly horrible ways in one narrative after another. His female charactersdepict the "feminine mystique" — the inconsistencies and tensions those post-year yearswitnessed over gender roles in society. What appears to be a common and recurring conceptthat runs through all three elements of this triangle is revenge? Dahl introduces avengermodels in one storey after another. His female avenger is a picture of a woman who isobsessed with getting revenge and succeeds no matter what she does. In Dahl's short stories,the female avenger is a character who is mean and clever when she wants to get revenge onthe male protagonist, even though her actions are sometimes surprising and unexpected. Alot of people read Dahl's stories, and this one will look at three that show female avengers atwork. When we talk about some Dahl short stories, we'll pay attention to how the femaleavenger fits into Dahl's mix of black humour, absurdity, and violence
- …
