409 resultados para Dunkl-Bessel Transform
Resumo:
Exact solutions of partial differential equation models describing the transport and decay of single and coupled multispecies problems can provide insight into the fate and transport of solutes in saturated aquifers. Most previous analytical solutions are based on integral transform techniques, meaning that the initial condition is restricted in the sense that the choice of initial condition has an important impact on whether or not the inverse transform can be calculated exactly. In this work we describe and implement a technique that produces exact solutions for single and multispecies reactive transport problems with more general, smooth initial conditions. We achieve this by using a different method to invert a Laplace transform which produces a power series solution. To demonstrate the utility of this technique, we apply it to two example problems with initial conditions that cannot be solved exactly using traditional transform techniques.
Resumo:
Throughout a long and occasionally distinguished career first as a television sports correspondent, then chat show host (dramatically ended by the accidental homicide of a guest live on air), then rebirth as a radio presenter at North Norfolk Digital, Alan Partridge has navigated the stormy waters of the British media landscape, now achieving mainstream success on the big screen with a starring role in Steve Coogan’s Alpha Papa (Declan Lowney, 2013). A man who in his desperation for a television series of his own once sank so low as to pitch a show called Monkey Tennis to the BBC finally finds his inner hero in a film which, while presenting mainly as comedy, also contains a biting critique of trends in the British media with which all journalists and media practitioners in general will be familiar. Alpha Papa is a nostalgic, elegiac riff on the pleasures and values of local radio the way it used to be, exemplified by North Norfolk Digital’s stable of flawed, but endearing jocks – Wally Banter, Bruno Brooks, Dave Clifton (who in one scene recounts the depths to which he sank as an alcoholic, drug addicted wreck—“I woke up in a skip with someone else’s underpants in my mouth. I can laugh about it now …”), and Pat Farrell. 50- something Pat is sacked by the new owners of North Norfolk Digital, who in their efforts to transform the station into a “multiplatform content provider” going by the more Gen Yfriendly name of Shape (“the way you want it to be”), wish to replace him with a younger, brattish model lacking in taste and manners. Out go records by the likes of Glen Campbell and Neil Diamond (“You can keep Jesus Christ”, observes Partridge after playing Diamond’s Sweet Caroline in a demonstration of the crackling radio repartee for which he is by now renowned, “that was the king of the Jews”), in comes Roachford. Pat, grieving his dead wife Molly, finally snaps and turns the glitzy media launch of Shape into a hostage siege. Only Alan Partridge, it seems, can step in and talk Pat out of a looming catastrophe.
Resumo:
An encryption scheme is non-malleable if giving an encryption of a message to an adversary does not increase its chances of producing an encryption of a related message (under a given public key). Fischlin introduced a stronger notion, known as complete non-malleability, which requires attackers to have negligible advantage, even if they are allowed to transform the public key under which the related message is encrypted. Ventre and Visconti later proposed a comparison-based definition of this security notion, which is more in line with the well-studied definitions proposed by Bellare et al. The authors also provide additional feasibility results by proposing two constructions of completely non-malleable schemes, one in the common reference string model using non-interactive zero-knowledge proofs, and another using interactive encryption schemes. Therefore, the only previously known completely non-malleable (and non-interactive) scheme in the standard model, is quite inefficient as it relies on generic NIZK approach. They left the existence of efficient schemes in the common reference string model as an open problem. Recently, two efficient public-key encryption schemes have been proposed by Libert and Yung, and Barbosa and Farshim, both of them are based on pairing identity-based encryption. At ACISP 2011, Sepahi et al. proposed a method to achieve completely non-malleable encryption in the public-key setting using lattices but there is no security proof for the proposed scheme. In this paper we review the mentioned scheme and provide its security proof in the standard model. Our study shows that Sepahi’s scheme will remain secure even for post-quantum world since there are currently no known quantum algorithms for solving lattice problems that perform significantly better than the best known classical (i.e., non-quantum) algorithms.
Resumo:
Boolean functions and their Möbius transforms are involved in logical calculation, digital communications, coding theory and modern cryptography. So far, little is known about the relations of Boolean functions and their Möbius transforms. This work is composed of three parts. In the first part, we present relations between a Boolean function and its Möbius transform so as to convert the truth table/algebraic normal form (ANF) to the ANF/truth table of a function in different conditions. In the second part, we focus on the special case when a Boolean function is identical to its Möbius transform. We call such functions coincident. In the third part, we generalize the concept of coincident functions and indicate that any Boolean function has the coincidence property even it is not coincident.
Resumo:
This article will discuss the ways in which community service learning programs in music can foster meaningful collaborations between universities and Indigenous communities. Drawing on recent pedagogical literature on service learning and insights from a four-year partnership between Australian Indigenous musicians at the Winanjjikari Music Centre in Tennant Creek and music students from Queensland Conservatorium Griffith University, it will describe how such programs can facilitate significant cross-cultural exchanges between students and Indigenous communities. By drawing on observations and interview data from those involved in the project, this paper argues that these partnerships can both assist communities with activities such as cultural maintenance, and provide students with intercultural experiences that have the potential to transform their understandings of Indigenous culture.
Resumo:
This project develops and evaluates a model of curriculum design that aims to assist student learning of foundational disciplinary ‘Threshold Concepts’. The project uses phenomenographic action research, cross-institutional peer collaboration and the Variation Theory of Learning to develop and trial the model. Two contrasting disciplines (Physics and Law) and four institutions (two research-intensive and two universities of technology) were involved in the project, to ensure broad applicability of the model across different disciplines and contexts. The Threshold Concepts that were selected for curriculum design attention were measurement uncertainty in Physics and legal reasoning in Law. Threshold Concepts are key disciplinary concepts that are inherently troublesome, transformative and integrative in nature. Once understood, such concepts transform students’ views of the discipline because they enable students to coherently integrate what were previously seen as unrelated aspects of the subject, providing new ways of thinking about it (Meyer & Land 2003, 2005, 2006; Land et al. 2008). However, the integrative and transformative nature of such threshold concepts make them inherently difficult for students to learn, with resulting misunderstandings of concepts being prevalent...
Resumo:
Aromatic radicals form in a variety of reacting gas-phase systems, where their molecular weight growth reactions with unsaturated hydrocarbons are of considerable importance. We have investigated the ion-molecule reaction of the aromatic distonic N-methyl-pyridinium-4-yl (NMP) radical cation with 2-butyne (CH3C CCH3) using ion trap mass spectrometry. Comparison is made to high-level ab initio energy surfaces for the reaction of NMP and for the neutral phenyl radical system. The NMP radical cation reacts rapidly with 2-butyne at ambient temperature, due to the apparent absence of any barrier. The activated vinyl radical adduct predominantly dissociates via loss of a H atom, with lesser amounts of CH3 loss. High-resolution Fourier transform ion cyclotron resonance (FT-ICR) mass spectrometry allows us to identify small quantities of the collisionally deactivated reaction adduct. Statistical reaction rate theory calculations (master equation/RRKM theory) on the NMP + 2-butyne system support our experimental findings, and indicate a mechanism that predominantly involves an allylic resonance-stabilized radical formed via H atom shuttling between the aromatic ring and the C-4 side-chain, followed by cyclization and/or low-energy H atom beta-scission reactions. A similar mechanism is demonstrated for the neutral phenyl radical (Ph center dot)+2-butyne reaction, forming products that include 3-methylindene. The collisionally deactivated reaction adduct is predicted to be quenched in the form of a resonance-stabilized methylphenylallyl radical. Experiments using a 2,5-dichloro substituted methyl-pyridiniumyl radical cation revealed that in this case CH3 loss from the 2-butyne adduct is favoured over H atom loss, verifying the key role of ortho H atoms, and the shuttling mechanism, in the reactions of aromatic radicals with alkynes. As well as being useful phenyl radical analogues, pyridiniumyl radical cations may form in the ionosphere of Titan, where they could undergo rapid molecular weight growth reactions to yield polycyclic aromatic nitrogen hydrocarbons (PANHs).
Resumo:
This paper presents ongoing work toward constructing efficient completely non-malleable public-key encryption scheme based on lattices in the standard (common reference string) model. An encryption scheme is completely non-malleable if it requires attackers to have negligible advantage, even if they are allowed to transform the public key under which the related message is encrypted. Ventre and Visconti proposed two inefficient constructions of completely non-malleable schemes, one in the common reference string model using non-interactive zero-knowledge proofs, and another using interactive encryption schemes. Recently, two efficient public-key encryption schemes have been proposed, both of them are based on pairing identity-based encryption.
Resumo:
The M¨obius transform of Boolean functions is often involved in cryptographic design and analysis. As studied previously, a Boolean function f is said to be coincident if it is identical with its M¨obius transform fμ, i.e., f = fμ...
Resumo:
This paper presents the results of a qualitative action-research inquiry into how a highly diverse cohort of post-graduate students could develop significant capacity in sustainable development within a single unit (course), in this case a compulsory component of four built environment masters programs. The method comprised applying threshold learning theory within the technical discipline of sustainable development, to transform student understanding of sustainable business practice in the built environment. This involved identifying a number of key threshold concepts, which once learned would provide a pathway to having a transformational learning experience. Curriculum was then revised, to focus on stepping through these targeted concepts using a scaffolded, problem-based-learning approach. Challenges included a large class size of 120 students, a majority of international students, and a wide span of disciplinary backgrounds across the spectrum of built environment professionals. Five ‘key’ threshold learning concepts were identified and the renewed curriculum was piloted in Semester 2 of 2011. The paper presents details of the study and findings from a mixed-method evaluation approach through the semester. The outcomes of this study will be used to inform further review of the course in 2012, including further consideration of the threshold concepts. In future, it is anticipated that this case study will inform a framework for rapidly embedding sustainability within curriculum.
Resumo:
The last few years have brought an increasing interest in the chemistry of rite interstellar and circumstellar environs. Many of the molecular species discovered in remote galactic regions have been dubbed 'non-terrestrial' because of their unique structures (Thaddeus et al, 1993). These findings have provided a challenge to chemists in many differing fields to attempt to generate these unusual species in the laboratory of particular recent interest have been the unsaturated hydrocarbon families, CnH and CnH2, which have been pursued by a number of diverse methodologies. A wine range of heterocumulenes, including CnO, HCnO, CnN, HCnN, CnS, HCnS, CnSi and HCnSi have also provided intriguing targets for laboratory experiments. Strictly the term cumulene refers to a class of compounds that possess a series of adjacent double bonds, with allene representing the simplest example (H2C=C=CH2). However for many of the non-terrestrial molecules presented here, the carbon chain cannot be described in terms of a single simple valence structure, and so we use the terms cumulene and heterocumulene in a more general sense: to describe molecular species that contain an unsaturated polycarbon chain. Mass spectrometry has proved an invaluable tool in the quest for interstellar cumulenes and heterocumulenes in the laboratory it has the ability in its many forms, to (i) generate charged analogs of these species in the gas phase, (ii) probe their connectivity, ion chemistry, and thermochemistry, and (iii) in some cases, elucidate the neutrals themselves. Here, we will discuss the progress of these studies to this time. (C) 1999 John Wiley & Sons, Inc.
Resumo:
A BPMN model is well-structured if splits and joins are always paired into single-entry-single-exit blocks. Well-structuredness is often a desirable property as it promotes readability and makes models easier to analyze. However, many process models found in practice are not well-structured, and it is not always feasible or even desirable to restrict process modelers to produce only well-structured models. Also, not all processes can be captured as well-structured process models. An alternative to forcing modelers to produce well-structured models, is to automatically transform unstructured models into well-structured ones when needed and possible. This talk reviews existing results on automatic transformation of unstructured process models into structured ones.
Resumo:
Traction force microscopy (TFM) is commonly used to estimate cells’ traction forces from the deformation that they cause on their substrate. The accuracy of TFM highly depends on the computational methods used to measure the deformation of the substrate and estimate the forces, and also on the specifics of the experimental set-up. Computer simulations can be used to evaluate the effect of both the computational methods and the experimental set-up without the need to perform numerous experiments. Here, we present one such TFM simulator that addresses several limitations of the existing ones. As a proof of principle, we recreate a TFM experimental set-up, and apply a classic 2D TFM algorithm to recover the forces. In summary, our simulator provides a valuable tool to study the performance, refine experimentally, and guide the extraction of biological conclusions from TFM experiments.
Resumo:
In recent years, interest in tissue engineering and its solutions has increased considerably. In particular, scaffolds have become fundamental tools in bone graft substitution and are used in combination with a variety of bio-agents. However, a long-standing problem in the use of these conventional scaffolds lies in the impossibility of re-loading the scaffold with the bio-agents after implantation. This work introduces the magnetic scaffold as a conceptually new solution. The magnetic scaffold is able, via magnetic driving, to attract and take up in vivo growth factors, stem cells or other bio-agents bound to magnetic particles. The authors succeeded in developing a simple and inexpensive technique able to transform standard commercial scaffolds made of hydroxyapatite and collagen in magnetic scaffolds. This innovative process involves dip-coating of the scaffolds in aqueous ferrofluids containing iron oxide nanoparticles coated with various biopolymers. After dip-coating, the nanoparticles are integrated into the structure of the scaffolds, providing the latter with magnetization values as high as 15 emu g�1 at 10 kOe. These values are suitable for generating magnetic gradients, enabling magnetic guiding in the vicinity and inside the scaffold. The magnetic scaffolds do not suffer from any structural damage during the process, maintaining their specific porosity and shape. Moreover, they do not release magnetic particles under a constant flow of simulated body fluids over a period of 8 days. Finally, preliminary studies indicate the ability of the magnetic scaffolds to support adhesion and proliferation of human bone marrow stem cells in vitro. Hence, this new type of scaffold is a valuable candidate for tissue engineering applications, featuring a novel magnetic guiding option.
Resumo:
Millions flock to their computers, consoles, mobile phones, tablets, and social networks each day to play World of Warcraft, Farmville, Scrabble, and countless other games, generating billions in sales each year. The careful and skillful construction of these games is built on decades of research into human motivation and psychology: A well-designed game goes right to the motivational heart of the human psyche. In For the Win, authors Kevin Werbach and Dan Hunter argue persuasively that gamemakers need not be the only ones benefiting from game design. Werbach and Hunter are lawyers and World of Warcraft players who created the world’s first course on gamification at the Wharton School of the University of Pennsylvania. In their book, they reveal how game thinking—addressing problems like a game designer—can motivate employees and customers and create engaging experiences that can transform your business. For the Win reveals how a wide range of companies are successfully using game thinking. It also offers an explanation of when gamifying makes the most sense and a 6-step framework for using games for marketing, productivity enhancement, innovation, employee motivation, customer engagement, and more. In this informative guide, Werbach and Hunter reveal how game thinking can yield winning solutions to real-world business problems. Let the games begin!