220 resultados para Lipped channel beams


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we have synthesized two novel diketopyrrolopyrrole (DPP) based donor-acceptor (D-A) copolymers poly{3,6-dithiophene-2-yl-2,5-di(2-octyl)- pyrrolo[3,4-c]pyrrole-1,4-dione-alt-1,5-bis(dodecyloxy)naphthalene} (PDPPT-NAP) and poly{3,6-dithiophene-2-yl-2,5-di(2-butyldecyl)-pyrrolo[3,4-c]pyrrole-1,4- dione-alt-2-dodecyl-2H-benzo[d][1,2,3]triazole} (PDPPT-BTRZ) via direct arylation organometallic coupling. Both copolymers contain a common electron withdrawing DPP building block which is combined with electron donating alkoxy naphthalene and electron withdrawing alkyl-triazole comonomers. The number average molecular weight (Mn) determined by gel permeation chromatography (GPC) for polymer PDPPT-NAP is around 23 400 g mol-1 whereas for polymer PDPPT-BTRZ it is 18 600 g mol-1. The solid state absorption spectra of these copolymers show a wide range of absorption from 400 nm to 1000 nm with optical band gaps calculated from absorption cut off values in the range of 1.45-1.30 eV. The HOMO values determined for PDPPT-NAP and PDPPT-BTRZ copolymers from photoelectron spectroscopy in air (PESA) data are 5.15 eV and 5.25 eV respectively. These polymers exhibit promising p-channel and ambipolar behaviour when used as an active layer in organic thin-film transistor (OTFT) devices. The highest hole mobility measured for polymer PDPPT-NAP is around 0.0046 cm2 V-1 s-1 whereas the best ambipolar performance was calculated for PDPPT-BTRZ with a hole and electron mobility of 0.01 cm2 V-1 s-1 and 0.006 cm2 V-1 s-1.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Secure protocols for password-based user authentication are well-studied in the cryptographic literature but have failed to see wide-spread adoption on the Internet; most proposals to date require extensive modifications to the Transport Layer Security (TLS) protocol, making deployment challenging. Recently, a few modular designs have been proposed in which a cryptographically secure password-based mutual authentication protocol is run inside a confidential (but not necessarily authenticated) channel such as TLS; the password protocol is bound to the established channel to prevent active attacks. Such protocols are useful in practice for a variety of reasons: security no longer relies on users' ability to validate server certificates and can potentially be implemented with no modifications to the secure channel protocol library. We provide a systematic study of such authentication protocols. Building on recent advances in modelling TLS, we give a formal definition of the intended security goal, which we call password-authenticated and confidential channel establishment (PACCE). We show generically that combining a secure channel protocol, such as TLS, with a password authentication protocol, where the two protocols are bound together using either the transcript of the secure channel's handshake or the server's certificate, results in a secure PACCE protocol. Our prototype based on TLS is available as a cross-platform client-side Firefox browser extension and a server-side web application which can easily be installed on deployed web browsers and servers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Aim: To examine evidence-based strategies that motivate appropriate action and increase informed decision-making during the response and recovery phases of disasters.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Why are consumers different: Heterogeneity in the way consumers categorise products and services – Snack Food Influenced by the individual needs, personal traits, values and goals – Blood Donation Consumers base their choices on information from external sources and prior experiences stored in memory. Intrinsic – prior experience Extrinsic – advertising, blogs, etc

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents a low-bandwidth multi-robot communication system designed to serve as a backup communication channel in the event a robot suffers a network device fault. While much research has been performed in the area of distributing network communication across multiple robots within a system, individual robots are still susceptible to hardware failure. In the past, such robots would simply be removed from service, and their tasks re-allocated to other members. However, there are times when a faulty robot might be crucial to a mission, or be able to contribute in a less communication intensive area. By allowing robots to encode and decode messages into unique sequences of DTMF symbols, called words, our system is able to facilitate continued low-bandwidth communication between robots without access to network communication. Our results have shown that the system is capable of permitting robots to negotiate task initiation and termination, and is flexible enough to permit a pair of robots to perform a simple turn taking task.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Compression is desirable for network applications as it saves bandwidth; however, when data is compressed before being encrypted, the amount of compression leaks information about the amount of redundancy in the plaintext. This side channel has led to successful CRIME and BREACH attacks on web traffic protected by the Transport Layer Security (TLS) protocol. The general guidance in light of these attacks has been to disable compression, preserving confidentiality but sacrificing bandwidth. In this paper, we examine two techniques - heuristic separation of secrets and fixed-dictionary compression|for enabling compression while protecting high-value secrets, such as cookies, from attack. We model the security offered by these techniques and report on the amount of compressibility that they can achieve.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis presents a novel idea for an adaptive prioritized cross-layer design (APCLD) control algorithm to achieve comprehensive channel congestion control for vehicular safety communication based on DSRC technology. An appropriate evaluation metric and two control parameters have been established. Simulation studies have evaluated the DSRC network performance in different traffic scenario and under different channel conditions. The APCLD algorithm is derived from the results of the simulation analysis.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The forthcoming NIST’s Advanced Hash Standard (AHS) competition to select SHA-3 hash function requires that each candidate hash function submission must have at least one construction to support FIPS 198 HMAC application. As part of its evaluation, NIST is aiming to select either a candidate hash function which is more resistant to known side channel attacks (SCA) when plugged into HMAC, or that has an alternative MAC mode which is more resistant to known SCA than the other submitted alternatives. In response to this, we perform differential power analysis (DPA) on the possible smart card implementations of some of the recently proposed MAC alternatives to NMAC (a fully analyzed variant of HMAC) and HMAC algorithms and NMAC/HMAC versions of some recently proposed hash and compression function modes. We show that the recently proposed BNMAC and KMDP MAC schemes are even weaker than NMAC/HMAC against the DPA attacks, whereas multi-lane NMAC, EMD MAC and the keyed wide-pipe hash have similar security to NMAC against the DPA attacks. Our DPA attacks do not work on the NMAC setting of MDC-2, Grindahl and MAME compression functions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study aimed to provide a detailed evaluation and comparison of a range of modulated beam evaluation metrics, in terms of their correlation with QA testing results and their variation between treatment sites, for a large number of treatments. Ten metrics including the modulation index (MI), fluence map complexity (FMC), modulation complexity score (MCS), mean aperture displacement (MAD) and small aperture score (SAS) were evaluated for 546 beams from 122 IMRT and VMAT treatment plans targeting the anus, rectum, endometrium, brain, head and neck and prostate. The calculated sets of metrics were evaluated in terms of their relationships to each other and their correlation with the results of electronic portal imaging based quality assurance (QA) evaluations of the treatment beams. Evaluation of the MI, MAD and SAS suggested that beams used in treatments of the anus, rectum, head and neck were more complex than the prostate and brain treatment beams. Seven of the ten beam complexity metrics were found to be strongly correlated with the results from QA testing of the IMRT beams (p < 0.00008). For example, Values of SAS (with MLC apertures narrower than 10 mm defined as “small”) less than 0.2 also identified QA passing IMRT beams with 100% specificity. However, few of the metrics are correlated with the results from QA testing of the VMAT beams, whether they were evaluated as whole 360◦ arcs or as 60◦ sub-arcs. Select evaluation of beam complexity metrics (at least MI, MCS and SAS) is therefore recommended, as an intermediate step in the IMRT QA chain. Such evaluation may also be useful as a means of periodically reviewing VMAT planning or optimiser performance.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

It is not uncommon to hear a person of interest described by their height, build, and clothing (i.e. type and colour). These semantic descriptions are commonly used by people to describe others, as they are quick to relate and easy to understand. However such queries are not easily utilised within intelligent surveillance systems as they are difficult to transform into a representation that can be searched for automatically in large camera networks. In this paper we propose a novel approach that transforms such a semantic query into an avatar that is searchable within a video stream, and demonstrate state-of-the-art performance for locating a subject in video based on a description.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cold-formed steel members have many advantages over hot-rolled steel members. However, they are susceptible to various buckling modes at stresses below the yield stress of the member because of their relatively high width-to-thickness ratio. Web crippling is a form of localized failure mode that can occur when the members are subjected to transverse high concentrated loadings and/or reactions. The four common loading conditions are the end-one-flange (EOF), interior-one-flange (IOF), end-two-flange (ETF) and interior-two-flange (ITF) loadings. Recently a test method has been proposed by AISI to obtain the web crippling capacities under these four loading conditions. Using this test method 42 tests were conducted in this research to investigate the web crippling behaviour and strengths of unlipped channels with stocky webs under ETF and ITF cases. DuraGal sections having a nominal yield stress of 450 MPa were tested with different web slenderness and bearing lengths. The flanges of these channel sections were not fastened to the supports. In this research the suitability of the currently available design rules for unlipped channels subject to web crippling was investigated, and suitable modifications were proposed where necessary. In addition to this, a new design rule was proposed based on the direct strength method to predict the web crippling capacities of tested beams. This paper presents the details of this experimental study and the results.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose This study aims to gain a clearer understanding of digital channel design. The emergence of new technologies has revolutionised the way companies interact and engage with customers. The driver for this research was the suggestion that practitioners feel they do not possess the skills to understand and exploit new digital channel opportunities. To gain a clearer understanding of digital channel design, this paper addresses the research question: What digital channels do companies from a wide range of industries and sectors use? Design/methodology/approach A content analysis of 100 international companies was conducted with multiple data sources to form a typology of digital “touchpoints”. The appropriateness of a digital channel typology for this study was for developing rigorous and useful concepts for clarifying and refining the meaning of digital channels. Findings This study identifies what digital channels companies globally currently employ and explores the related needs across industries. A total of 34 digital touchpoints and 4 typologies of digital channels were identified across 16 industries. This research helps to identify the relationship between digital channels and enabling the connections with industry. Research limitations/implications The findings contribute to the growing research area of digital channels. The typology of digital channels is a useful starting point for developing a systematic, theory-based study for enabling the development of broader, comprehensive theories of digital channels. Practical implications Typologies and touchpoints are outlined in relation to industry, company objectives and customer needs to allow businesses to seize opportunities and optimise performance through individual touchpoints. A digital channel model as a key outcome of this research guides practitioners on what touchpoint to implement through an interrelated understanding of industry, company and customer needs. Originality/value This is the first paper to explore a range of industries in relation to their use of digital channels using a unique content analysis. Contributions include clarifying and refining digital channel meaning; identifying and refining the hierarchical relations among digital channels(typologies); and establishing typology and industry relationship model.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study investigated a potential source of inaccuracy for diode measurements in modulated beams; the effect of diode housing asymmetry on measurement results. The possible effects of diode housing asymmetry on the measurement of steep dose gradients were evaluated by measuring 5x5 cm2 beam profiles, with three cylindrical diodes and two commonly used ionization chambers, with each dosimeter positioned in a 3D scanning water tank with its stem perpendicular to the beam axis (horizontal) and parallel to the direction of scanning. The resulting profiles were used to compare the penumbrae measured with the diode stem pointing into (equivalent to a “stem-first” setup) and out of the field (equivalent to a “stem-last” setup) in order to evaluate the effects of dosimeter alignment and thereby identify the effects of dosimeter asymmetry. The stem-first and stem-last orientations resulted in differences of up to 0.2 mm in the measured 20-80% penumbra widths and differences of up to 0.4 mm in the off axis position of the 90% isodose. These differences, which are smaller than previously reported for older model dosimeters, were apparent in the profile results for both diodes and small volume ionization chambers. As an extension to this study, the practical use of all five dosimeters was exemplified by measuring point doses in IMRT test beams. These measurements showed good agreement (within 2%) between the diodes and the small volume ionization chamber, with all of these dosimeters being able to identify a region 3% under-dosage which was not identified by a larger volume (6 mm diameter) ionization chamber. The results of this work should help to remove some of the barriers to the use of diodes for modulated radiotherapy dosimetry in the future.