http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Photosynthesis and Water-Use Efficiency of Some Mangroves from Sundarbans, India
Nandy, Paramita,Ghose, Monoranjan 한국식물학회 2001 Journal of Plant Biology Vol.44 No.4
We studied seasonal fluctuations in the rates of photosynthesis, transpiration, PAR, and stomatal conductance for 16 species of true mangroves from the Sundarbans region of West Bengal. Soil salinity and pH were also measured. Leaf temperatures were almost always higher than the ambient temperature. We observed considerable seasonal (summer vs winter) as well as interspecific variations in photosynthesis, with the highest rates occurring in Heritiera fomes (13.21μ㏖ m^-2 s^-1) and Avicennia marina (11.8μ㏖ m^-2 s^-1), and the lowest in Nypa fruticans (1.56μ㏖ m^-2 s^-1) and Ceriops decandra (2.32μ㏖ m^-2 s^-1). In many species, an abrupt rise in leaf temperature retarded the photosynthetic process. In winter, the rate of transpiration and stomatal conductance reached their maxima in A. marina (4.83m㏖ m^-2 s^-1 and 124.23 m㏖ m^-2 s^-1, respectively) and their mimima in Excoecaria agallocha (1.85m㏖ m^-2 s^-1 and 49.19m㏖ m^-2 s^-1, respectively). In contrast, the maximum summer readings were recorded in E. agallocha (6.07m㏖ m^-2 s^-1 and 192.74m㏖ m^-2 s^-1 respectively).
Cyber Security Approaches for Industrial Control Networks
Dillabaugh, Craig,Nandy, Biswajit,Seddigh, Nabil,Wong, Kevin,Lee, Byoung-Joon (BJ) Korea Institute of Information Security and Crypto 2016 情報保護學會誌 Vol.26 No.6
Critical infrastructure (CI) such as the electrical grid, transportation systems and water resource systems are controlled by Industrial Control and SCADA (Supervisory Control and Data Acquisition) networks. During the last few years, cyber attackers have increasingly targeted such CI systems. This is of great concern because successful attacks have wide ranging impact and can cause widespread destruction and loss of life. As a result, there is a critical requirement to develop enhanced algorithms and tools to detect cyber threats for SCADA networks. Such tools have key differences with the tools utilized to detect cyber threats in regular IT networks. This paper discusses key factors which differentiate network security for SCADA networks versus regular IT networks. The paper also presents various approaches used for SCADA security and some of the advancements in the area.
Krishnatreya, Manigreeva,Nandy, Pintu,Rahman, Tashnin,Sharma, Jagannath Dev,Das, Anupam,Kataki, Amal Chandra,Das, Ashok Kumar,Das, Rajjjyoti Asian Pacific Journal of Cancer Prevention 2015 Asian Pacific journal of cancer prevention Vol.16 No.4
Background: Tongue cancer is one of the leading sites of cancer in our population. Aim: To evaluate the socio-demographic profiles and stages at diagnosis of oral tongue (OT) and base of tongue (BT) cancers, and identify any possible variations in characteristics. Materials and Methods: A retrospective analysis was conducted on tongue cancer cases, divided into OT and BT, registered at the hospital cancer registry of North-East India during January 2010 to May 2013. Cases were analyzed for age, gender, residential status and different levels of education for patients, the stage at diagnosis and presence of distant metastasis. Results: A total of 1,113 cases of tongue cancers were registered, 846(76.1%) of BT and 267(23.9%) of OT. While 33.9% of BT cancer patients were above 65 years of age, the figure for OT cancers was 18.4%, stages III and IV accounting for 90.8% and 77%, respectively. The relative risk for distant metastasis in OT cancers was 3.3 (95% CI 1.08-10.1, p=0.03). Conclusions: In the subsites of tongue cancers in our population, the majority arose from the base of tongue, these tending to occur in older individuals and presenting at late stage.
Iwan Setyawan,Nandy Putra,Imansyah Ibnu Hakim,Ridho Irwansyah 대한기계학회 2019 JOURNAL OF MECHANICAL SCIENCE AND TECHNOLOGY Vol.33 No.8
Loop heat pipe (LHP) is an effective two-phase heat transfer device that utilizes evaporation and condensation of a working fluid. LHP is widely used in a passive cooling system, highly reliable and a very high thermal conductive device. However, extreme power density can cause dry-out in the evaporator section of LHP and might hinder the performance of the cooling system. The purpose of this research is to design and manufacture a new prototype of LHP by modifying the conventional LHP. The modification was performed by adding a diaphragm pump, called hybrid loop heat pipe (HLHP). The experimental results show that the installation of pumps in the modified LHP was able to prevent the occurrence of a dry out and reduce the operating temperature. Under a constant conductance mode, the pump was activated for 20 minutes and succeded in forcing the system to a new stable condition with a significant temperature drop. These results indicate that HLHP is very promising as a two-phase cooling system that can be proposed for devices that produce high heat flux.
Synthesis and spectroscopic characterization of zinc ferrite nanoparticles
Arora, Shefali,Nandy, Subhajit,Latwal, Mamta,Pandey, Ganesh,Singh, Jitendra P.,Chae, Keun H. Techno-Press 2022 Advances in nano research Vol.13 No.5
Synthesis approaches usually affect the physical and chemical properties of ferrites. This helps ferrite materials to design them for desired applications. Some of these methods are mechanical milling, ultrasonic method, micro-emulsion, co-precipitation, thermal decomposition, hydrothermal, microwave-assisted, sol-gel, etc. These methods are extensively reviewed by taking example of ZnFe<sub>2</sub>O<sub>4</sub>. These methods also affect the microstructure and local structure of ferrite which ultimately affect the physical and chemical properties of ferrites. Various spectroscopic techniques such as Raman spectroscopy, Fourier Transform Infrared spectroscopy, Ultra Violet-Visible spectroscopy, Mossbauer spectroscopy, extended x-ray absorption fine structure, and electron paramagnetic resonance are found helpful to reveal this information. Hence, the basic principle and the usefulness of these techniques to find out appropriate information in ZnFe<sub>2</sub>O<sub>4</sub> nanoparticles is elaborated in this review.
Robust Path Tracking Control of Nonholonomic Wheeled Mobile Robot: Experimental Validation
Spandan Roy,Sambhunath Nandy,Ranjit Ray,Sankar Nath Shome 제어·로봇·시스템학회 2015 International Journal of Control, Automation, and Vol.13 No.4
The article addresses a robust control strategy for efficient path tracking of nonholonomic wheeled mobile robot (WMR) based on time delay approach. Depending on the application requirements, nonholonomic WMR system might be subjected to various payloads, which affects the overall system mass, inertia, position of center of mass and other hardware parameters statically or dynamically. Under such circumstances, accurate modeling of nonholonomic robots is difficult and challenging. The proposed controller negotiates uncertainties caused due to payload variations as well as associated disturbances and reduces modeling effort through approximation of the overall uncertainties with a composite function. It has been shown that the controller does not require any bounds on the uncertainties, thus providing unconstrained working paradigm. The controller is proposed for a nonholonomic WMR and its effectiveness is verified through simulation and experimentally while WMR is commanded to track various paths. The superior performance is also noted against adaptive sliding mode control law.
Cyber Security Approaches for Industrial Control Networks
C. Dillabaugh,B. Nandy,N. Seddigh,K. Wong,Byoung-Joon (BJ) Lee 한국정보보호학회 2016 情報保護學會誌 Vol.26 No.6
Critical infrastructure (CI) such as the electrical grid, transportation systems and water resource systems are controlled by Industrial Control and SCADA (Supervisory Control and Data Acquisition) networks. During the last few years, cyber attackers have increasingly targeted such CI systems. This is of great concern because successful attacks have wide ranging impact and can cause widespread destruction and loss of life. As a result, there is a critical requirement to develop enhanced algorithms and tools to detect cyber threats for SCADA networks. Such tools have key differences with the tools utilized to detect cyber threats in regular IT networks. This paper discusses key factors which differentiate network security for SCADA networks versus regular IT networks. The paper also presents various approaches used for SCADA security and some of the advancements in the area.