489 resultados para Strong-Field Phenomena
Resumo:
To obtain accurate Monte Carlo simulations of small radiation fields, it is important model the initial source parameters (electron energy and spot size) accurately. However recent studies have shown that small field dosimetry correction factors are insensitive to these parameters. The aim of this work is to extend this concept to test if these parameters affect dose perturbations in general, which is important for detector design and calculating perturbation correction factors. The EGSnrc C++ user code cavity was used for all simulations. Varying amounts of air between 0 and 2 mm were deliberately introduced upstream to a diode and the dose perturbation caused by the air was quantified. These simulations were then repeated using a range of initial electron energies (5.5 to 7.0 MeV) and electron spot sizes (0.7 to 2.2 FWHM). The resultant dose perturbations were large. For example 2 mm of air caused a dose reduction of up to 31% when simulated with a 6 mm field size. However these values did not vary by more than 2 % when simulated across the full range of source parameters tested. If a detector is modified by the introduction of air, one can be confident that the response of the detector will be the same across all similar linear accelerators and the Monte Carlo modelling of each machine is not required.
Resumo:
Distributed-password public-key cryptography (DPwPKC) allows the members of a group of people, each one holding a small secret password only, to help a leader to perform the private operation, associated to a public-key cryptosystem. Abdalla et al. recently defined this tool [1], with a practical construction. Unfortunately, the latter applied to the ElGamal decryption only, and relied on the DDH assumption, excluding any recent pairing-based cryptosystems. In this paper, we extend their techniques to support, and exploit, pairing-based properties: we take advantage of pairing-friendly groups to obtain efficient (simulation-sound) zero-knowledge proofs, whose security relies on the Decisional Linear assumption. As a consequence, we provide efficient protocols, secure in the standard model, for ElGamal decryption as in [1], but also for Linear decryption, as well as extraction of several identity-based cryptosystems [6,4]. Furthermore, we strenghten their security model by suppressing the useless testPwd queries in the functionality.
Resumo:
This paper reviews a wide range of literature on environmental management in the field in Queensland, and analyzes this by period and by author. An episodic pattern of activities since European settlement is evident. Periods of exploration (pre-1950) and inventory- compilation (ca. 1950-1970) were followed by two decades of media and non-government organization campaigning (ca. 1970-1990), then an era dominated by government regulatory action (ca. 1990-2010). These eras dominated public perception of what was happening in environmental practice. They were delineated by historic ‘interventions’ (summarily, the end of World War II, the 1971 inflationary crisis, and computerization respectively).
Resumo:
Numeric set watermarking is a way to provide ownership proof for numerical data. Numerical data can be considered to be primitives for multimedia types such as images and videos since they are organized forms of numeric information. Thereby, the capability to watermark numerical data directly implies the capability to watermark multimedia objects and discourage information theft on social networking sites and the Internet in general. Unfortunately, there has been very limited research done in the field of numeric set watermarking due to underlying limitations in terms of number of items in the set and LSBs in each item available for watermarking. In 2009, Gupta et al. proposed a numeric set watermarking model that embeds watermark bits in the items of the set based on a hash value of the items’ most significant bits (MSBs). If an item is chosen for watermarking, a watermark bit is embedded in the least significant bits, and the replaced bit is inserted in the fractional value to provide reversibility. The authors show their scheme to be resilient against the traditional subset addition, deletion, and modification attacks as well as secondary watermarking attacks. In this paper, we present a bucket attack on this watermarking model. The attack consists of creating buckets of items with the same MSBs and determine if the items of the bucket carry watermark bits. Experimental results show that the bucket attack is very strong and destroys the entire watermark with close to 100% success rate. We examine the inherent weaknesses in the watermarking model of Gupta et al. that leave it vulnerable to the bucket attack and propose potential safeguards that can provide resilience against this attack.
Resumo:
The writing of award winning tartan noir author, Denise Mina, “crime queen of Glasgow” has been identified with “explicitly feminist politics,” and Mina herself claims, as a feminist, she wants to use crime fiction to present a “narrative about very disempowered people becoming empowered.” This paper explores how Mina’s avowed stance on feminism plays out in her novel, The Field of Blood (2005), and examines whether her concerns are reflected in the embodied actions of her young protagonist, would-be investigative journalist, Paddy Meehan. It asks whether Mina has succeeded in working against entrenched patriarchal codes of crime fiction’s dominant narrative construction or whether her feminist intentions have been undermined by traditional stereotypical conventions of the genre.
Resumo:
"This invaluable companion to The Mammals of Australia is intended to be taken out into the field and used in conjunction with the more comprehensive volume. Genuinely practical in the outdoors, the book includes accounts of 389 species and newly developed, comprehensive identification keys. The Field Companion is introduced by a Mammal Distribution Matrix, which provides a classified checklist of all mammals in Australia (including those extinguished since European settlement) and the distribution of extant species in each state and territory. Species accounts provide initial differentiation, and include notes on identification, size, abundance, habitat and federal list/status, photograph and distribution map, as well as key references, which provide quick access to all relevant state identification keys in the Field Companion and to the longer entry in The Mammals of Australia. The authors have developed separate keys, illustrated with detailed drawings and maps, for the six states and the Northern Territory, to simplify the identification process and allow the reader to confidently separate all mammal species, no matter how subtle the differences. With the addition of these identification keys, this book becomes more than a field guide - although it is intended primarily to be used outdoors - and allows the user to finish identification based on more obscure characteristics, which is an advantage for some hard-to-identify species groups."--Libraries Australia
Resumo:
In this paper, we provide the results of a field study of a Ubicomp system called CAM (Cooperative Artefact Memory) in a Product Design studio. CAM is a mobile-tagging based messaging system that allows designers to store relevant information onto their design artefacts in the form of messages, annotations and external web links. From our field study results, we observe that the use of CAM adds another shared ‘space’ onto these design artefacts – that are in their natural settings boundary objects themselves. In the paper, we provide several examples from the field illustrating how CAM helps in the design process.
Resumo:
Measurement of the moisture variation in soils is required for geotechnical design and research because soil properties and behavior can vary as moisture content changes. The neutron probe, which was developed more than 40 years ago, is commonly used to monitor soil moisture variation in the field. This study reports a full-scale field monitoring of soil moisture using a neutron moisture probe for a period of more than 2 years in the Melbourne (Australia) region. On the basis of soil types available in the Melbourne region, 23 sites were chosen for moisture monitoring down to a depth of 1500 mm. The field calibration method was used to develop correlations relating the volumetric moisture content and neutron counts. Observed results showed that the deepest “wetting front” during the wet season was limited to the top 800 to 1000 mm of soil whilst the top soil layer down to about 550mmresponded almost immediately to the rainfall events. At greater depths (550 to 800mmand below 800 mm), the moisture variations were relatively low and displayed predominantly periodic fluctuations. This periodic nature was captured with Fourier analysis to develop a cyclic moisture model on the basis of an analytical solution of a one-dimensional moisture flow equation for homogeneous soils. It is argued that the model developed can be used to predict the soil moisture variations as applicable to buried structures such as pipes.
Resumo:
We consider the following problem: members in a dynamic group retrieve their encrypted data from an untrusted server based on keywords and without any loss of data confidentiality and member’s privacy. In this paper, we investigate common secure indices for conjunctive keyword-based retrieval over encrypted data, and construct an efficient scheme from Wang et al. dynamic accumulator, Nyberg combinatorial accumulator and Kiayias et al. public-key encryption system. The proposed scheme is trapdoorless and keyword-field free. The security is proved under the random oracle, decisional composite residuosity and extended strong RSA assumptions.
Resumo:
A physical and numerical steady flow impinging jet has been used to simulate the bulk characteristics of a downburst-like wind field. The influence of downdraft tilt and surface roughness on the ensuing wall jet flow has been investigated. It was found that a simulated downdraft impinging the surface at a non-normal angle has the potential for causing larger structural loads than the normal impingement case. It was also found that for the current impinging jet simulations, surface roughness played a minor role in determining the storm maximum wind structure, but this influence increased as the wall jet diverged. However, through comparison with previous research it was found that the influence of surface roughness is Reynolds number dependent and therefore may differ from that reported herein for full-scale downburst cases. Using the current experimental results an empirical model has been developed for laboratory-scale impinging jet velocity structure that includes the influence of both jet tilt and surface roughness.
Resumo:
A pulsed wall jet has been used to simulate the gust front of a thunderstorm downburst. Flow visualization, wind speed and surface pressure measurements were obtained. The characteristics of the hypothesized ring vortex of a full-scale downburst were reproduced at a scale estimated to be 1:3000.
Resumo:
High power, high frequency pulsed electric fields known as pulsed power (PP) has been applied recently in biology and medicine. However, little attention has been paid to investigate the application of pulse power in musculoskeletal system and its possible effect on functional behavior and biomechanical properties of bone tissue. This paper presents the first research investigating whether or not PP can be applied safely on bone tissue as a stimuli and what will be the possible effect of these signals on the characteristics of cortical bone by comparing the mechanical properties of this type of bone pre and post expose to PP and in comparison with the control samples. A positive buck‑boost converter was applied to generate adjustable high voltage, high frequency pulses (up to 500 V and 10 kHz). The functional behavior of bone in response to pulse power excitation was elucidated by applying compressive loading until failure. The stiffness, failure stress (strength) and the total fracture energy (bone toughness) were determined as a measure of the main bone characteristics. Furthermore, an ultrasonic technique was applied to determine and comprise bone elasticity before and after pulse power stimulation. The elastic property of cortical bone samples appeared to remain unchanged following exposure to pulse power excitation for all three orthogonal directions obtained from ultrasonic technique and similarly from the compression test. Nevertheless, the compressive strength and toughness of bone samples were increased when they were exposed to 66 h of high power pulsed electromagnetic field compared to the control samples. As the toughness and the strength of the cortical bone tissue are directly associated with the quality and integrity of the collagen matrix whereas its stiffness is primarily related to bone mineral content these overall results may address that although, the pulse power stimulation can influence the arrangement or the quality of the collagen network causing the bone strength and toughness augmentation, it apparently did not affect the mineral phase of the cortical bone material. The results also confirmed that the indirect application of high power pulsed electric field at 500 V and 10 kHz through capacitive coupling method was safe and did not destroy the bone tissue construction.
Resumo:
Unstable density-driven flow can lead to enhanced solute transport in groundwater. Only recently has the complex fingering pattern associated with free convection been documented in field settings. Electrical resistivity (ER) tomography has been used to capture a snapshot of convective instabilities at a single point in time, but a thorough transient analysis is still lacking in the literature. We present the results of a 2 year experimental study at a shallow aquifer in the United Arab Emirates that was designed to specifically explore the transient nature of free convection. ER tomography data documented the presence of convective fingers following a significant rainfall event. We demonstrate that the complex fingering pattern had completely disappeared a year after the rainfall event. The observation is supported by an analysis of the aquifer halite budget and hydrodynamic modeling of the transient character of the fingering instabilities. Modeling results show that the transient dynamics of the gravitational instabilities (their initial development, infiltration into the underlying lower-density groundwater, and subsequent decay) are in agreement with the timing observed in the time-lapse ER measurements. All experimental observations and modeling results are consistent with the hypothesis that a dense brine that infiltrated into the aquifer from a surficial source was the cause of free convection at this site, and that the finite nature of the dense brine source and dispersive mixing led to the decay of instabilities with time. This study highlights the importance of the transience of free convection phenomena and suggests that these processes are more rapid than was previously understood.