277 resultados para clipped over-run
Resumo:
We have used a tandem pair of supersonic nozzles to produce clean samples of CH3OO radicals in cryogenic matrices. One hyperthermal nozzle decomposes azomethane (CH3NNCH3) to generate intense pulses of CH3 radicals, While the second nozzle alternately fires a burst Of O-2/Ar at the 20 K matrix. The CH3/O-2/20 K argon radical sandwich acts to produce target methylperoxyl radicals: CH3 + O-2 --> CH3OO. The absorption spectra of the radicals are monitored with a Fourier transform infrared spectrometer. We report 10 of the 12 fundamental infrared bands of the methylperoxyl radical CH3OO, (X) over tilde (2)A", in an argon matrix at 20 K. The experimental frequencies (cm(-1)) and polarizations follow: the a' modes are 3032, 2957, 1448, 1410, 1180, 1109, 90, 492, while the a" modes are 3024 and 1434. We cannot detect the asymmetric CH3 rocking mode, nu(11), nor the torsion, nu(12). The infrared spectra of (CH3OO)-O-18-O-18, (CH3OO)-C-13, and CD3OO have been measured as well in order to determine the isotopic shifts. The experimental frequencies, {nu}, for the methylperoxyl radicals are compared to harmonic frequencies, {omega}, resulting from a UB3LYP/6-311G(d,p) electronic structure calculation. Linear dichroism spectra were measured with photooriented radical samples in order to establish the experimental polarizations of most vibrational bands. The methylperoxyl radical matrix frequencies listed above are within +/-2% of the gas-phase vibrational frequencies. A final set of vibrational frequencies for the H radical, are recommended. See also http://ellison.colorado.edu/methylperoxyl.
Resumo:
It has been 21 years since the decision in Rogers v Whitaker and the legal principles concerning informed consent and liability for negligence are still strongly grounded in this landmark High Court decision. This paper considers more recent developments in the law concerning the failure to disclose inherent risks in medical procedures, focusing on the decision in Wallace v Kam [2013] HCA 19. In this case, the appellant underwent a surgical procedure that carried a number of risks. The surgery itself was not performed in a sub-standard way, but the surgeon failed to disclose two risks to the patient, a failure that constituted a breach of the surgeon’s duty of care in negligence. One of the undisclosed risks was considered to be less serious than the other, and this lesser risk eventuated causing injury to the appellant. The more serious risk did not eventuate, but the appellant argued that if the more serious risk had been disclosed, he would have avoided his injuries completely because he would have refused to undergo the procedure. Liability was disputed by the surgeon, with particular reference to causation principles. The High Court of Australia held that the appellant should not be compensated for harm that resulted from a risk he would have been willing to run. We examine the policy reasons underpinning the law of negligence in this specific context and consider some of the issues raised by this unusual case. We question whether some of the judicial reasoning adopted in this case, represents a significant shift in traditional causation principles.
Resumo:
PURPOSE To investigate changes in the characteristics of the corneal optics, total optics, anterior biometrics and axial length of the eye during a near task, in downward gaze, over 10 min. METHODS Ten emmetropes (mean - 0.14 ± 0.24 DS) and 10 myopes (mean - 2.26 ± 1.42 DS) aged from 18 to 30 years were recruited. To measure ocular biometrics and corneal topography in downward gaze, an optical biometer (Lenstar LS900) and a rotating Scheimpflug camera (Pentacam HR) were inclined on a custom built, height and tilt adjustable table. The total optics of the eye were measured in downward gaze with binocular fixation using a modified Shack-Hartmann wavefront sensor. Initially, subjects performed a distance viewing task at primary gaze for 10 min to provide a "wash-out" period for prior visual tasks. A distance task (watching video at 6 m) in downward gaze (25°) and a near task (watching video on a portable LCD screen with 2.5 D accommodation demand) in primary gaze and 25°downward gaze were then carried out, each for 10 min in a randomized order. During measurements, in dichoptic view, a Maltese cross was fixated with the right (untested) eye and the instrument’s fixation target was fixated with the subject’s tested left eye. Immediately after (0 min), 5 and 10 min from the commencement of each trial, measurements of ocular parameters were acquired in downward gaze. RESULTS Axial length exhibited a significant increase with downward gaze and accommodation over time (p<0.05). The greatest axial elongation was observed in downward gaze with 2.5 D accommodation after 10 min (mean change from baseline 23±3 µm). Downward gaze also caused greater changes in anterior chamber depth (ACD) and lens thickness (LT) with accommodation (ACD mean change -163±12µm at 10 min; LT mean change 173±17 µm at 10 min) compared to primary gaze with accommodation (ACD mean change -138±12µm at 10 min; LT mean change 131±15 µm at 10 min). Both corneal power and total ocular power changed by a small but significant amount with downward gaze (p<0.05), resulting in a myopic shift (~0.10 D) in the spherical power of the eye compared with primary gaze. CONCLUSION The axial length, anterior biometrics and ocular refraction change significantly with accommodation in downward gaze as a function of time. These findings provide new insights into the optical and bio-mechanical changes of the eye during typical near tasks.
Resumo:
In Baker Johnson Lawyers v Jorgensen [2002] QDC 205 McGill DCJ considered the meaning of a 'no win, no fee' retainer and concluded that, in the absence of qualification by agreement, solicitors retained on that basis were not entitled to recover costs exceeding the amount of any judgment or settlement.
Resumo:
As part of a wider study to develop an ecosystem-health monitoring program for wadeable streams of south-eastern Queensland, Australia, comparisons were made regarding the accuracy, precision and relative efficiency of single-pass backpack electrofishing and multiple-pass electrofishing plus supplementary seine netting to quantify fish assemblage attributes at two spatial scales (within discrete mesohabitat units and within stream reaches consisting of multiple mesohabitat units). The results demonstrate that multiple-pass electrofishing plus seine netting provide more accurate and precise estimates of fish species richness, assemblage composition and species relative abundances in comparison to single-pass electrofishing alone, and that intensive sampling of three mesohabitat units (equivalent to a riffle-run-pool sequence) is a more efficient sampling strategy to estimate reach-scale assemblage attributes than less intensive sampling over larger spatial scales. This intensive sampling protocol was sufficiently sensitive that relatively small differences in assemblage attributes (<20%) could be detected with a high statistical power (1-β > 0.95) and that relatively few stream reaches (<4) need be sampled to accurately estimate assemblage attributes close to the true population means. The merits and potential drawbacks of the intensive sampling strategy are discussed, and it is deemed to be suitable for a range of monitoring and bioassessment objectives.
Resumo:
The work investigates cheating prevention in secret sharing. It is argued that cheating is immune against cheating if the cheaters gain no advantage over honest participants by submitting invalid shares to the combiner. This work addresses the case when shares and the secret are taken from GF(pt). Two models are considered. The first one examines the case when cheaters consistently submit always invalid shares. The second modeldeal s with cheaters who submit a mixture of valid and invalid shares. For these two models, cheating immunity is defined, properties of cheating immune secret sharing are investigated and their constructions are given.
Resumo:
We consider the following problem: users in a dynamic group store their encrypted documents on an untrusted server, and wish to retrieve documents containing some keywords without any loss of data confidentiality. In this paper, we investigate common secure indices which can make multi-users in a dynamic group to obtain securely the encrypted documents shared among the group members without re-encrypting them. We give a formal definition of common secure index for conjunctive keyword-based retrieval over encrypted data (CSI-CKR), define the security requirement for CSI-CKR, and construct a CSI-CKR based on dynamic accumulators, Paillier’s cryptosystem and blind signatures. The security of proposed scheme is proved under strong RSA and co-DDH assumptions.
Resumo:
A well-known attack on RSA with low secret-exponent d was given by Wiener about 15 years ago. Wiener showed that using continued fractions, one can efficiently recover the secret-exponent d from the public key (N,e) as long as d < N 1/4. Interestingly, Wiener stated that his attack may sometimes also work when d is slightly larger than N 1/4. This raises the question of how much larger d can be: could the attack work with non-negligible probability for d=N 1/4 + ρ for some constant ρ > 0? We answer this question in the negative by proving a converse to Wiener’s result. Our result shows that, for any fixed ε > 0 and all sufficiently large modulus lengths, Wiener’s attack succeeds with negligible probability over a random choice of d < N δ (in an interval of size Ω(N δ )) as soon as δ > 1/4 + ε. Thus Wiener’s success bound d
Resumo:
We study the multicast stream authentication problem when an opponent can drop, reorder and inject data packets into the communication channel. In this context, bandwidth limitation and fast authentication are the core concerns. Therefore any authentication scheme is to reduce as much as possible the packet overhead and the time spent at the receiver to check the authenticity of collected elements. Recently, Tartary and Wang developed a provably secure protocol with small packet overhead and a reduced number of signature verifications to be performed at the receiver. In this paper, we propose an hybrid scheme based on Tartary and Wang’s approach and Merkle hash trees. Our construction will exhibit a smaller overhead and a much faster processing at the receiver making it even more suitable for multicast than the earlier approach. As Tartary and Wang’s protocol, our construction is provably secure and allows the total recovery of the data stream despite erasures and injections occurred during transmission.
Resumo:
The effect of an ordered array of nanocones on a conducting substrate immersed in the plasma on the transport of the plasma ions is investigated. The real conical shape of the cones is rigorously incorporated into the model. The movement of 10^5 CH3+ ions in the plasma sheath modified by the nanocone array is simulated. The ions are driven by the electric fields produced by the sheath and the nanostructures. The surface charge density and the total charge on the nanotips with different aspect ratios are computed. The ion transport simulation provides important characteristics of the displacement and velocity of the ions. The relative ion distribution along the lateral surfaces of the carbon nanotips is computed as well. It is shown that a rigorous account of the realistic nanostructure shape leads to very different distribution of the ion fluxes on the nanostructured surfaces compared to the previously reported works. The ion flux distribution is a critical factor in the nucleation process on the substrate and determines the nanostructure growth patterns.
Resumo:
Passively protected railway crossings are a major rail safety issue in Australia. Such crossings cannot be upgraded as such crossings are too numerous and the cost involved is prohibitive. Advanced Driver Assistance Systems (ADAS) have been shown to improve road safety and are widely used. These systems could be a solution to improve safety of passively protected crossings at a lower cost. Such complementary ADAS could result in driver’s over-trust due to the absence of Humane Machine Interface reflecting the quality of the information or the state of the ADAS (failure status). This paper demonstrates that driver’s exposure to crossing exhibiting fail-safe and non-fail safe properties could result in improperly allocating trust between technologies. We conducted a driving simulator study where participants (N=58) were exposed to three types of level crossing warning system on passive and active crossings. The results show that a significant proportion of participants over-trust the ADAS. Such drivers exhibit the same driving performance with the ADAS as when exposed to infrastructure based active crossing protection. They do not take the necessary safety precautions as they have a faster speed approach, reduced number of gaze toward the rail tracks and fail to stop at the crossing.
Resumo:
An effective control of the ion current distribution over large-area (up to 103 cm2) substrates with the magnetic fields of a complex structure by using two additional magnetic coils installed under the substrate exposed to vacuum arc plasmas is demonstrated. When the magnetic field generated by the additional coils is aligned with the direction of the magnetic field generated by the guiding and focusing coils of the vacuum arc source, a narrow ion density distribution with the maximum current density 117 A m-2 is achieved. When one of the additional coils is set to generate the magnetic field of the opposite direction, an area almost uniform over the substrate of 103 cm2 ion current distribution with the mean value of 45 A m-2 is achieved. Our findings suggest that the system with the vacuum arc source and two additional magnetic coils can be effectively used for the effective, high throughput, and highly controllable plasma processing.
Resumo:
The catalytic activities, to the reduction of SO2 by CO, of clusters PtlAum (l + m = 2) with or without preadsorbing CO molecules are investigated using first-principles density functional theory. We find that the PtAu(CO)n (n = 1–3) clusters show more excellent catalytic properties than either pure metallic catalysts. Preadsorption of CO to the catalysts could effectively avoid platinum-based catalyst sulfur poisoning; as more CO molecules preadsorbed to the catalysts, the energy barriers for the carbonyl sulfide (COS) molecule’s desorption from the catalyst are remarkably decreased. We propose an ideal catalytic cycle to simultaneously get rid of SO2 and CO over the catalysts PtAu(CO)3.
Resumo:
A better understanding of the behaviour of prepared cane and bagasse, and the ability to model the mechanical behaviour of bagasse as it is squeezed in a milling unit to extract juice, would help identify how to improve the current process. There are opportunities to decrease bagasse moisture from a milling unit. The behaviour of bagasse in chutes is poorly understood. Previous investigations have shown that juice flow through bagasse obeys Darcy’s permeability law, that the grip of the rough surface of the grooves on the bagasse can be represented by the Mohr-Coulomb failure criterion for soils, and that the internal mechanical behaviour of the bagasse is critical state behaviour similar to that for sand and clay. Progress has been made in the last 11 years towards implementing a mechanical model for bagasse in finite element software. The objective is to be able to correctly simulate various simple mechanical loading conditions measured in the laboratory. Combining these behaviours together is thought to have a high probability of reproducing the complicated stress conditions in a milling unit. This paper reports on progress made towards modelling the fifth and final (and most challenging) of the simple loading conditions: the shearing of heavily over-consolidated bagasse, using a specific model for bagasse in a multi-element simulation.