80 resultados para Weak Slope
Resumo:
Awareness to avoid losses and casualties due to rain-induced landslide is increasing in regions that routinely experience heavy rainfall. Improvements in early warning systems against rain-induced landslide such as prediction modelling using rainfall records, is urgently needed in vulnerable regions. The existing warning systems have been applied using stability chart development and real-time displacement measurement on slope surfaces. However, there are still some drawbacks such as: ignorance of rain-induced instability mechanism, mislead prediction due to the probabilistic prediction and short time for evacuation. In this research, a real-time predictive method was proposed to alleviate the drawbacks mentioned above. A case-study soil slope in Indonesia that failed in 2010 during rainfall was used to verify the proposed predictive method. Using the results from the field and laboratory characterizations, numerical analyses can be applied to develop a model of unsaturated residual soils slope with deep cracks and subject to rainwater infiltration. Real-time rainfall measurement in the slope and the prediction of future rainfall are needed. By coupling transient seepage and stability analysis, the variation of safety factor of the slope with time were provided as a basis to develop method for the real-time prediction of the rain-induced instability of slopes. This study shows the proposed prediction method has the potential to be used in an early warning system against landslide hazard, since the FOS value and the timing of the end-result of the prediction can be provided before the actual failure of the case study slope.
Resumo:
"Even though Corporate Social Responsibility (CSR) has become a widely accepted concept promoted by different stakeholders, business corporations' internal strategies, known as corporate self-regulation in most of the weak economies, respond poorly to this responsibility. Major laws relating to corporate regulation and responsibilities of these economies do not possess adequate ongoing influence to insist on corporate self-regulation to create a socially responsible corporate culture. This book describes how the laws relating to CSR could contribute to the inclusion of CSR principles at the core of the corporate self-regulation of these economies in general, without being intrusive in normal business practice. It formulates a meta-regulation approach to law, particularly by converging patterns of private ordering and state control in contemporary corporate law from the perspective of a weak economy. It proposes that this approach is suitable for alleviating regulators' limited access to information and expertise, inherent limitations of prescriptive rules, ensuring corporate commitment, and enhance the self-regulatory capacity of companies. This book describes various meta-regulation strategies for laws to link social values to economic incentives and disincentives, and to indirectly influence companies to incorporate CSR principles at the core of their self-regulation strategies. It investigates this phenomenon using Bangladesh as a case study."--publisher website
Resumo:
The semantic of the terms “sustainable development” and “corporate social responsibility” have changed over time to a point where these concepts have become two interrelated processes for ensuring the far-reaching development of society. Their convergence has given dimension to the environmental and corporate regulation mechanisms in strong economies. This article deals with the question of how the ethos of this convergence could be incorporated into the self-regulation of businesses in weak economies where nonlegal drivers are either inadequate or inefficient. It proposes that the policies for this incorporation should be based on the precepts of meta-regulation that have the potential to hold force majeure, economic incentives, and assistance-related strategies to reach an objective from the perspective of weak economies.
Resumo:
The microstructure of an artificial grain boundary in an YBa2Cu3O7-δ (YBCO) thin film grown on a (100)(110), [001]-tilt yttria-stabilized-zirconia (YSZ) bicrystal substrate has been studied using transmission electron microscopy (TEM). The orientation relationship between the YBCO film and the YSZ substrate was [001]YBCO∥[001]YSZ and [110]YBCO∥[100]YSZ for each half of the bicrystal film. However, the exact boundary geometry of the bicrystal substrate was not transferred to the film. The substrate boundary was straight while the film boundary was wavy. In several cases there was bending of the lattice confined within a distance of a few basal-plane lattice spacings from the boundary plane and microfaceting. No intergranular secondary phase was observed but about 25% of the boundary was covered by c-axis-tilted YBCO grains and a-axis-oriented grains, both of which were typically adjacent to CuO grains or surrounded by a thin Cu-rich amorphous layer.
Resumo:
Weak links were fabricated by pulsed laser deposition of YBa 2Cu3Ox thin films on Y-ZrO2 bicrystal substrates. They were formed by transferring the bicrystal boundary into the epitaxial film during the film growth. Their properties were determined by the misorientation angle ( theta ) between the two halves of the bicrystal. The transport properties of the weak links were studied as a function of theta and an exponential dependence of the weak link critical current density was observed for angles up to 45 degrees . Clear Josephson effects with good microwave and magnetic field response were observed.
Resumo:
We have studied weak links and dc-SQUIDs made from pulsed laser deposited YBa2Cu3O7-δ thin films on Y-ZrO 2 bicrystal substrates. The transport properties of the weak links were studied as a function of the misorientation angle (θ) between the two halves of the bicrystal and an exponential dependence of the weak link critical current density was observed for angles up to 40°at 77 K. Josephson effects with clear microwave and magnetic field responses were observed. An optimum dc-SQUID performance at 77 K was obtained for θ=32°. At this temperature, we achieved a periodic magnetic field response with a modulation depth of 12 μV.
Resumo:
A5/1 is a shift register based stream cipher which provides privacy for the GSM system. In this paper, we analyse the loading of the secret key and IV during the initialisation process of A5/1. We demonstrate the existence of weak key-IV pairs in the A5/1 cipher due to this loading process; these weak key-IV pairs may generate one, two or three registers containing all-zero values, which may lead in turn to weak keystream sequences. In the case where two or three registers contain only zeros, we describe a distinguisher which leads to a complete decryption of the affected messages.
Resumo:
Distributed-password public-key cryptography (DPwPKC) allows the members of a group of people, each one holding a small secret password only, to help a leader to perform the private operation, associated to a public-key cryptosystem. Abdalla et al. recently defined this tool [1], with a practical construction. Unfortunately, the latter applied to the ElGamal decryption only, and relied on the DDH assumption, excluding any recent pairing-based cryptosystems. In this paper, we extend their techniques to support, and exploit, pairing-based properties: we take advantage of pairing-friendly groups to obtain efficient (simulation-sound) zero-knowledge proofs, whose security relies on the Decisional Linear assumption. As a consequence, we provide efficient protocols, secure in the standard model, for ElGamal decryption as in [1], but also for Linear decryption, as well as extraction of several identity-based cryptosystems [6,4]. Furthermore, we strenghten their security model by suppressing the useless testPwd queries in the functionality.
Resumo:
We introduce the notion of distributed password-based public-key cryptography, where a virtual high-entropy private key is implicitly defined as a concatenation of low-entropy passwords held in separate locations. The users can jointly perform private-key operations by exchanging messages over an arbitrary channel, based on their respective passwords, without ever sharing their passwords or reconstituting the key. Focusing on the case of ElGamal encryption as an example, we start by formally defining ideal functionalities for distributed public-key generation and virtual private-key computation in the UC model. We then construct efficient protocols that securely realize them in either the RO model (for efficiency) or the CRS model (for elegance). We conclude by showing that our distributed protocols generalize to a broad class of “discrete-log”-based public-key cryptosystems, which notably includes identity-based encryption. This opens the door to a powerful extension of IBE with a virtual PKG made of a group of people, each one memorizing a small portion of the master key.
Resumo:
Process models specify behavioral aspects by describing ordering constraints between tasks which must be accomplished to achieve envisioned goals. Tasks usually exchange information by means of data objects, i.e., by writing information to and reading information from data objects. A data object can be characterized by its states and allowed state transitions. In this paper, we propose a notion which checks conformance of a process model with respect to data objects that its tasks access. This new notion can be used to tell whether in every execution of a process model each time a task needs to access a data object in a particular state, it is ensured that the data object is in the expected state or can reach the expected state and, hence, the process model can achieve its goals.
Resumo:
The detection of line-like features in images finds many applications in microanalysis. Actin fibers, microtubules, neurites, pilis, DNA, and other biological structures all come up as tenuous curved lines in microscopy images. A reliable tracing method that preserves the integrity and details of these structures is particularly important for quantitative analyses. We have developed a new image transform called the "Coalescing Shortest Path Image Transform" with very encouraging properties. Our scheme efficiently combines information from an extensive collection of shortest paths in the image to delineate even very weak linear features. © Copyright Microscopy Society of America 2011.
Resumo:
This study evaluated the complexity of calcium ion exchange with sodium exchanged weak acid cation resin (DOW MAC-3). Exchange equilibria recorded for a range of different solution normalities revealed profiles which were represented by conventional “L” or “H” type isotherms at low values of equilibrium concentration (Ce) of calcium ions, plus a superimposed region of increasing calcium uptake was observed at high Ce values. The loading of calcium ions was determined to be ca. 53.5 to 58.7 g/kg of resin when modelling only the sorption curve created at low Ce values,which exhibited a well-defined plateau. The calculated calcium ion loading capacity for DOWMAC-3 resin appeared to correlate with the manufacturer's recommendation. The phenomenon of super equivalent ion exchange (SEIX) was observed when the “driving force” for the exchange process was increased in excess of 2.25 mmol calcium ions per gram of resin in the starting solution. This latter event was explained in terms of displacement of sodium ions from sodium hydroxide solution which remained in the resin bead following the initial conversion of the as supplied “H+” exchanged resin sites to the “Na+” version required for softening studies. Evidence for hydrolysis of a small fraction of the sites on the sodium exchanged resin surface was noted. The importance of carefully choosing experimental parameters was discussed especially in relation to application of the Langmuir–Vageler expression. This latter model which compared the ratio of the initial calcium ion concentration in solution to resin mass, versus final equilibrium loading of the calcium ions on the resin; was discovered to be an excellent means of identifying the progress of the calcium–sodium ion exchange process. Moreover, the Langmuir–Vageler model facilitated standardization of various calcium–sodium ion exchange experiments which allowed systematic experimental design.
Resumo:
Sediment samples were taken from six sampling sites in Bramble Bay, Queensland, Australia between February and November in 2012. They were analysed for a range of heavy metals including Al, Fe, Mn, Ti, Ce, Th, U, V, Cr, Co, Ni, Cu, Zn, As, Cd, Sb, Te, Hg, Tl and Pb. Fraction analysis, enrichment factors and Principal Component Analysis –Absolute Principal Component Scores (PCA-APCS) were carried out in order to assess metal pollution, potential bioavailability and source apportionment. Cr and Ni exceeded the Australian Interim Sediment Quality Guidelines at some sampling sites, while Hg was found to be the most enriched metal. Fraction analysis identified increased weak acid soluble Hg and Cd during the sampling period. Source apportionment via PCA-APCS found four sources of metals pollution, namely, marine sediments, shipping, antifouling coatings and a mixed source. These sources need to be considered in any metal pollution control measure within Bramble Bay.