306 resultados para unknown-input functional observability


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objectives The relationship between performance variability and accuracy in cricket fast bowlers of different skill levels under three different task conditions was investigated. Bowlers of different skill levels were examined to observe if they could adapt movement patterns to maintain performance accuracy on a bowling skills test. Design 8 national, 12 emerging and 12 junior pace bowlers completed an adapted version of the Cricket Australia bowling skills test, in which they performed 30 trials involving short (n = 10), good (n = 10), and full (n = 10) length deliveries. Methods Bowling accuracy was recorded by digitising ball position relative to the centre of a target. Performance measures were mean radial error (accuracy), variable error (consistency), centroid error (bias), bowling score and ball speed. Radial error changes across the duration of the skills test were used to record accuracy adjustment in subsequent deliveries. Results Elite fast bowlers performed better in speed, accuracy, and test scores than developing athletes. Bowlers who were less variable were also more accurate across all delivery lengths. National and emerging bowlers were able to adapt subsequent performance trials within the same bowling session for short length deliveries. Conclusions Accuracy and adaptive variability were key components of elite performance in fast bowling which improved with skill level. In this study, only national elite bowlers showed requisite levels of adaptive variability to bowl a range of lengths to different pitch locations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An increased interest in utilising groups of Unmanned Aerial Vehicles (UAVs) with heterogeneous capabilities and autonomy is presenting the challenge to effectively manage such during missions and operations. This has been the focus of research in recent years, moving from a traditional UAV management paradigm of n-to-1 (n operators for one UAV, with n being at least two operators) toward 1-to-n (one operator, multiple UAVs). This paper has expanded on the authors’ previous work on UAV functional capability framework, by incorporating the concept of Functional Level of Autonomy (F-LOA) with two configurations: The lower F-LOA configuration contains sufficient information for the operator to generate solutions and make decisions to address perturbation events. Alternatively, the higher F-LOA configuration presents information reflecting on the F-LOA of the UAV, allowing the operator to interpret solutions and decisions generated autonomously, and decide whether to veto from this decision.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Unlike most genera in the early-divergent angiosperm family Annonaceae, Pseuduvaria exhibits a diversity of floral sex expression. Most species are structurally andromonoecious (or possibly androdioecious), although the hermaphroditic flowers have been inferred to be functionally pistillate, with sterile staminodes. Pseuduvaria presents an ideal model for investigating the evolution of floral sex in early-divergent angiosperms, although detailed empirical studies are currently lacking. The phenology and pollination ecology of the Australian endemic species Pseuduvaria mulgraveana are studied in detail, including evaluations of floral scent chemistry, pollen viability, and floral visitors. Results showed that the flowers are pollinated by small diurnal nitidulid beetles and are protogynous. Pollen from both hermaphroditic and staminate flowers are shown to be equally viable. The structurally hermaphroditic flowers are nevertheless functionally pistillate as anther dehiscence is delayed until after petal abscission and hence after the departure of pollinators. This mechanism to achieve functional unisexuality of flowers has not previously been reported in angiosperms. It is known that protogyny is widespread amongst early-divergent angiosperms, including the Annonaceae, and is effective in preventing autogamy. Delayed anther dehiscence represents a further elaboration of this, and is effective in preventing geitonogamy since very few sexually mature flowers occur simultaneously in an individual. We highlight the necessity for field-based empirical interpretations of functional floral sex expression prior to evaluations of evolutionary processes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We demonstrated for the first time by ab initio density functional calculation and molecular dynamics simulation that C0.5(BN)0.5 armchair single-walled nanotubes (NT) are gapless semiconductors and can be spontaneously formed via the hybrid connection of graphene/BN Nanoribbons (GNR/BNNR) at room temperature. The direct synthesis of armchair C0.5(BN)0.5 via the hybrid connection of GNR/BNNR is predicted to be both thermodynamically and dynamically stable. Such novel armchair C0.5(BN)0.5 NTs possess enhanced conductance as that observed in GNRs. Additionally, the zigzag C0.5(BN)0.5 SWNTs are narrow band gap semiconductors, which may have potential application for light emission. In light of recent experimental progress and the enhanced degree of control in the synthesis of GNRs and BNNR, our results highlight an interesting avenue for synthesizing a novel specific type of C0.5(BN)0.5 nanotube (gapless or narrow direct gap semiconductor), with potentially important applications in BNC-based nanodevices.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The interaction of bare graphene nanoribbons (GNRs) was investigated by ab initio density functional theory calculations with both the local density approximation (LDA) and the generalized gradient approximation (GGA). Remarkably, two bare 8-GNRs with zigzag-shaped edges are predicted to form an (8, 8) armchair single-wall carbon nanotube (SWCNT) without any obvious activation barrier. The formation of a (10, 0) zigzag SWCNT from two bare 10-GNRs with armchair-shaped edges has activation barriers of 0.23 and 0.61 eV for using the LDA and the revised PBE exchange correlation functional, respectively, Our results suggest a possible route to control the growth of specific types SWCNT via the interaction of GNRs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The hydrogenation kinetics of Mg is slow, impeding its application for mobile hydrogen storage. We demonstrate by ab initio density functional theory (DFT) calculations that the reaction path can be greatly modified by adding transition metal catalysts. Contrasting with Ti doping, a Pd dopant will result in a very small activation barrier for both dissociation of molecular hydrogen and diffusion of atomic H on the Mg surface. This new computational finding supports for the first time by ab initio simulationthe proposed hydrogen spillover mechanism for rationalizing experimentally observed fast hydrogenation kinetics for Pd-capped Mg materials.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An environmentally sustainable and thus green business process is one that delivers organizational value whilst also exerting a minimal impact on the natural environment. Recent works from the field of Information Systems (IS) have argued that information systems can contribute to the design and implementation of sustainable business processes. While prior research has investigated how information systems can be used in order to support sustainable business practices, there is still a void as to the actual changes that business processes have to undergo in order to become environmentally sustainable, and the specific role that information systems play in enabling this change. In this paper, we provide a conceptualization of environmentally sustainable business processes, and discuss the role of functional affordances of information systems in enabling both incremental and radical changes in order to make processes environmentally sustainable. Our conceptualization is based on (a) a fundamental definition of the concept of environmental sustainability, grounded in two basic components:the environmental source and sink functions of any project or activity, and (b) the concept of functional affordances, which describe the potential uses originating in the material properties of information systems in relation to their use context. In order to illustrate the application of our framework and provide a first evaluation, we analyse two examples from prior research where information systems impacted on the sustainability of business processes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We report a comprehensive theoretical study on reaction of methane by Fe4 cluster. This Letter gains insight into the mechanism of the reaction and indicate the Fe4 cluster has strong catalytic effect on the activation reaction of methane. In detail, the results show the cleavage of the first C–H bond is both an energetically and kinetically favourable process and the breaking of the second C–H is the rate-determining step. Moreover, our Letter demonstrates that the different cluster size of iron can not only determine the catalytic activity of methane but also control the product selectivity.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Amphiphilic poly(ethylene glycol)-block-pol (dimethylsiloxane)-block-poly(ethylene glycol)(PEG-block-PDMS block-PEG) triblock copolymers have been successfully prepared via hydrosilylation using discrete and polydisperse PEG of various chain lengths. Facile synthesis of discrete PEG (dPEG) is achieved via systematic tosylation and etherification of lower glycols. Amphiphilicity of the dPEG block-PDMS-block-dPEG triblock copolymer is illustrated by dynamic light scattering (DLS) and measurement of the critical micelle concentration (CMC).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The practical number of charge carriers loaded is crucial to the evaluation of the capacity performance of carbon-based electrodes in service, and cannot be easily addressed experimentally. In this paper, we report a density functional theory study of charge carrier adsorption onto zigzag edge-shaped graphene nanoribbons (ZGNRs), both pristine and incorporating edge substitution with boron, nitrogen or oxygen atoms. All edge substitutions are found to be energetically favorable, especially in oxidized environments. The maximal loading of protons onto the substituted ZGNR edges obeys a rule of [8-n-1], where n is the number of valence electrons of the edge-site atom constituting the adsorption site. Hence, a maximum charge loading is achieved with boron substitution. This result correlates in a transparent manner with the electronic structure characteristics of the edge atom. The boron edge atom, characterized by the most empty p band, facilitates more than the other substitutional cases the accommodation of valence electrons transferred from the ribbon, induced by adsorption of protons. This result not only further confirms the possibility of enhancing charge storage performance of carbon-based electrochemical devices through chemical functionalization but also, more importantly, provides the physical rationale for further design strategies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Heteroatom doping on the edge of graphene may serve as an effective way to tune chemical activity of carbon-based electrodes with respect to charge carrier transfer in an aqueous environment. In a step towards developing mechanistic understanding of this phenomenon, we explore herein mechanisms of proton transfer from aqueous solution to pristine and doped graphene edges utilizing density functional theory. Atomic B-, N-, and O- doped edges as well as the native graphene are examined, displaying varying proton affinities and effective interaction ranges with the H3O+ charge carrier. Our study shows that the doped edges characterized by more dispersive orbitals, namely boron and nitrogen, demonstrate more energetically favourable charge carrier exchange compared with oxygen, which features more localized orbitals. Extended calculations are carried out to examine proton transfer from the hydronium ion in the presence of explicit water, with results indicating that the basic mechanistic features of the simpler model are unchanged.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Many software applications extend their functionality by dynamically loading executable components into their allocated address space. Such components, exemplified by browser plugins and other software add-ons, not only enable reusability, but also promote programming simplicity, as they reside in the same address space as their host application, supporting easy sharing of complex data structures and pointers. However, such components are also often of unknown provenance and quality and may be riddled with accidental bugs or, in some cases, deliberately malicious code. Statistics show that such component failures account for a high percentage of software crashes and vulnerabilities. Enabling isolation of such fine-grained components is therefore necessary to increase the stability, security and resilience of computer programs. This thesis addresses this issue by showing how host applications can create isolation domains for individual components, while preserving the benefits of a single address space, via a new architecture for software isolation called LibVM. Towards this end, we define a specification which outlines the functional requirements for LibVM, identify the conditions under which these functional requirements can be met, define an abstract Application Programming Interface (API) that encompasses the general problem of isolating shared libraries, thus separating policy from mechanism, and prove its practicality with two concrete implementations based on hardware virtualization and system call interpositioning, respectively. The results demonstrate that hardware isolation minimises the difficulties encountered with software based approaches, while also reducing the size of the trusted computing base, thus increasing confidence in the solution’s correctness. This thesis concludes that, not only is it feasible to create such isolation domains for individual components, but that it should also be a fundamental operating system supported abstraction, which would lead to more stable and secure applications.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality and integrity protection to messages. This approach is more efficient than applying a two-step process of providing confidentiality for a message by encrypting the message, and in a separate pass providing integrity protection by generating a Message Authentication Code (MAC). AE using symmetric ciphers can be provided by either stream ciphers with built in authentication mechanisms or block ciphers using appropriate modes of operation. However, stream ciphers have the potential for higher performance and smaller footprint in hardware and/or software than block ciphers. This property makes stream ciphers suitable for resource constrained environments, where storage and computational power are limited. There have been several recent stream cipher proposals that claim to provide AE. These ciphers can be analysed using existing techniques that consider confidentiality or integrity separately; however currently there is no existing framework for the analysis of AE stream ciphers that analyses these two properties simultaneously. This thesis introduces a novel framework for the analysis of AE using stream cipher algorithms. This thesis analyzes the mechanisms for providing confidentiality and for providing integrity in AE algorithms using stream ciphers. There is a greater emphasis on the analysis of the integrity mechanisms, as there is little in the public literature on this, in the context of authenticated encryption. The thesis has four main contributions as follows. The first contribution is the design of a framework that can be used to classify AE stream ciphers based on three characteristics. The first classification applies Bellare and Namprempre's work on the the order in which encryption and authentication processes take place. The second classification is based on the method used for accumulating the input message (either directly or indirectly) into the into the internal states of the cipher to generate a MAC. The third classification is based on whether the sequence that is used to provide encryption and authentication is generated using a single key and initial vector, or two keys and two initial vectors. The second contribution is the application of an existing algebraic method to analyse the confidentiality algorithms of two AE stream ciphers; namely SSS and ZUC. The algebraic method is based on considering the nonlinear filter (NLF) of these ciphers as a combiner with memory. This method enables us to construct equations for the NLF that relate the (inputs, outputs and memory of the combiner) to the output keystream. We show that both of these ciphers are secure from this type of algebraic attack. We conclude that using a keydependent SBox in the NLF twice, and using two different SBoxes in the NLF of ZUC, prevents this type of algebraic attack. The third contribution is a new general matrix based model for MAC generation where the input message is injected directly into the internal state. This model describes the accumulation process when the input message is injected directly into the internal state of a nonlinear filter generator. We show that three recently proposed AE stream ciphers can be considered as instances of this model; namely SSS, NLSv2 and SOBER-128. Our model is more general than a previous investigations into direct injection. Possible forgery attacks against this model are investigated. It is shown that using a nonlinear filter in the accumulation process of the input message when either the input message or the initial states of the register is unknown prevents forgery attacks based on collisions. The last contribution is a new general matrix based model for MAC generation where the input message is injected indirectly into the internal state. This model uses the input message as a controller to accumulate a keystream sequence into an accumulation register. We show that three current AE stream ciphers can be considered as instances of this model; namely ZUC, Grain-128a and Sfinks. We establish the conditions under which the model is susceptible to forgery and side-channel attacks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Amonia borane (AB) has been identified as a potential candidate highcapacity hydrogen storage material. This work probes the adsorption and dissociation of AB inside and outside single-walled carbon nanotubes (SWCNTs) within the framework of density functional theory. The dissociation barriers of AB have been calculated and compared with that of the isolated AB molecule. On the basis of the present calculations, no notable improvement results from SWCNT confinement; on the contrary, the dissociation barrier slightly increases with respect to isolated AB.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

First principle calculations for a hexagonal (graphene-like) boron nitride (g-BN) monolayer sheet in the presence of a boron-atom vacancy show promising properties for capture and activation of carbon dioxide. CO2 is found to decompose to produce an oxygen molecule via an intermediate chemisorption state on the defect g-BN sheet. The three stationary states and two transition states in the reaction pathway are confirmed by minimum energy pathway search and frequency analysis. The values computed for the two energy barriers involved in this catalytic reaction after enthalpy correction indicate that the catalytic reaction should proceed readily at room temperature.