333 research outputs found

    Distribution function for seasonal and annual rainfall over India

    Get PDF
    Distribution functions for seasonal (southwest monsoon) and annual rainfall at 53 long-record stations in India have been obtained. It was found that the frequency distributions are right skewed. Tests for normality show that while normal distribution gives a good fit to seasonal and annual rainfall at stations in some parts of India it does not give a good fit to seasonal and annual rainfall at stations over the major portion of the country. Tests of goodness of fit of the Gamma distribution, however, clearly indicate that this distribution provides a good fit to seasonal and annual rainfall at stations in different parts of the country

    Conjunctions of Among Constraints

    Full text link
    Many existing global constraints can be encoded as a conjunction of among constraints. An among constraint holds if the number of the variables in its scope whose value belongs to a prespecified set, which we call its range, is within some given bounds. It is known that domain filtering algorithms can benefit from reasoning about the interaction of among constraints so that values can be filtered out taking into consideration several among constraints simultaneously. The present pa- per embarks into a systematic investigation on the circumstances under which it is possible to obtain efficient and complete domain filtering algorithms for conjunctions of among constraints. We start by observing that restrictions on both the scope and the range of the among constraints are necessary to obtain meaningful results. Then, we derive a domain flow-based filtering algorithm and present several applications. In particular, it is shown that the algorithm unifies and generalizes several previous existing results.Comment: 15 pages plus appendi

    Stock assessment of sciaenid resources of India

    Get PDF
    B e catches of Sew fishes decrensed froin 1'379 to 1980 and later increased in sages frum 1961 to 1984,1985 to 87 and 1988~089 . Gujantand Mahamshtra togehrwntribured 52%of zdal sdaenid calches along she wcsl coast. hi b.%h the states, the landings during tht: f~stfe w years showed an incmsing trend whercss during the remaining period, the catches and permrage eontnbuticn varied. Along the east coast dso i?r,e sciaenid landings showed annual fluctuations

    Marine Fish Calendar. 8. Veraval

    Get PDF
    The coastline of Gujarat, spread around 1,660 km is well known for its bombay duck and pomfret fisheries. Veraval located in the Saurashtra region forms one of the major fish landing centres. The average annual landing is around 50,000 t, forming about 20% of the catch of the Gujarat State. The peak landing period is from October to January by the trawlers. In Veraval it is observed that due to poor handling and storage facilities about 40% of the catch goes as trash fish and is used for manure and fish meal purpose

    An Efficient Local Search for Partial Latin Square Extension Problem

    Full text link
    A partial Latin square (PLS) is a partial assignment of n symbols to an nxn grid such that, in each row and in each column, each symbol appears at most once. The partial Latin square extension problem is an NP-hard problem that asks for a largest extension of a given PLS. In this paper we propose an efficient local search for this problem. We focus on the local search such that the neighborhood is defined by (p,q)-swap, i.e., removing exactly p symbols and then assigning symbols to at most q empty cells. For p in {1,2,3}, our neighborhood search algorithm finds an improved solution or concludes that no such solution exists in O(n^{p+1}) time. We also propose a novel swap operation, Trellis-swap, which is a generalization of (1,q)-swap and (2,q)-swap. Our Trellis-neighborhood search algorithm takes O(n^{3.5}) time to do the same thing. Using these neighborhood search algorithms, we design a prototype iterated local search algorithm and show its effectiveness in comparison with state-of-the-art optimization solvers such as IBM ILOG CPLEX and LocalSolver.Comment: 17 pages, 2 figure

    Quality of Service Centric Web Service Composition: Assessing Composition Impact Scale towards Fault Proneness

    Get PDF
    Service composition in service oriented architecture is an important activity. In regard to achieve the quality of service and secured activities from the web service compositions, they need to be verified about their impact towards fault proneness before deploying that service composition. Henceforth, here in this paper, we devised a novel statistical approach to assess the service composition impact scale towards fault proneness. The devised model explores the higher and lower ranges of the service composition impact scale, which is from the knowledge of earlier compositions that are notified as fault prone

    Exploring Predicate Based Access Control for Cloud Workflow Systems

    Get PDF
    Authentication and authorization are the two crucial functions of any modern security and access control mechanisms. Authorization for controlling access to resources is a dynamic characteristic of a workflow system which is based on true business dynamics and access policies. Allowing or denying a user to gain access to a resource is the cornerstone for successful implementation of security and controlling paradigms. Role based and attribute based access control are the existing mechanisms widely used. As per these schemes, any user with given role or attribute respectively is granted applicable privileges to access a resource. There is third approach known as predicate based access control which is less explored. We intend to throw light on this as it provides more fine-grained control over resources besides being able to complement with existing approaches. In this paper we proposed a predicate-based access control mechanism that caters to the needs of cloud-based workflow systems

    Hot Isostatic Pressing Technology for Defence and Space Applications

    Get PDF
    Hot isostatic pressing (HIP) technology has been established for the development of AISI-304 stainless steel and nickel base superalloy Inconel 718 integral turbine rotors, for liquid propulsion engine of Prithvi missile, and cryoengine of geostationary satellite launch vehicle (GSLV), respectively. Before making the full size rotors, the structure – property relationships in hot isostatic pressed (HIPed) 304 stainless steel and superalloy 718 were established. The HIPed steel and superalloy have shown near 100 per cent theoretical density, homogeneous, and fine grained microstructure. Their mechanical properties were found to be in agreement with those specified for the integral turbine rotors and hence, development of full size near net shaped integral turbine rotors was undertaken. The HIPed steel rotors subjected to the static engine tests have shown a satisfactory performance, and therefore a large number of rotors could be produced to fulfill the requirement of target labs. The HIP technology for the integral turbine rotors was found to be cost effective (about 50 per cent) over the conventional fabrication method which involves forging, machining, and welding of blades to the disk. The processing, structure, and properties of the HIPed 304 stainless steel and superalloy 718 in relation to the performance of integral turbine rotors for missile and space vehicle applications are discussed in this paper.Defence Science Journal, 2012, 62(1), pp.73-80, DOI:http://dx.doi.org/10.14429/dsj.62.37

    Privacy and Classification Of Analyzed Data Using EMD

    Get PDF
    In recent years many researchers issued on data publishing with recommended settings .But privacy is a key issue here. Existing techniques such as K-anonymity and L-diversity should not provide effective and sufficient results for privacy preserving in data publishing. So in this paper we propose tree base algorithm for providing security, In this technique we arrange the data in tree based format for closeness of a data publishing and for retrieving data in sequential order. Our techniques also improved more security to micro data publishing and retrieving relevant information from micro data using attribute disclosure
    corecore