915 resultados para Springer briefs
Resumo:
Four nickel carbonate-bearing minerals from Australia have been investigated to study the effect of Ni for Mg substitution. The spectra of nullaginite, zaratite, widgiemoolthalite and takovite show three main features in the range of 26,720–25,855 cm−1 (ν1-band), 15,230–14,740 cm−1 (ν2-band) and 9,200–9,145 cm−1 (ν3-band) which are characteristic of divalent nickel in six-fold coordination. The Crystal Field Stabilization Energy (CFSE) of Ni2+ in the four carbonates is calculated from the observed 3A2g(3F) → 3T2g(3F) transition. CFSE is dependent on mineralogy, crystallinity and chemical composition (Al/Mg-content). The splitting of the ν1- and ν3-bands and non-Gaussian shape of ν3-band in the minerals are the effects of Ni-site distortion from regular octahedral. The effect of structural cation substitutions (Mg2+, Ni2+, Fe2+ and trivalent cations, Al3+, Fe3+) in the carbonate minerals is noticed on band shifts. Thus, electronic bands in the UV–Vis–NIR spectra and the overtones and combination bands of OH and carbonate ion in NIR show shifts to higher wavenumbers, particularly for widgiemoolthalite and takovite.
Resumo:
Natural iowaite, magnesium–ferric oxychloride mineral having light green color originating from Australia has been characterized by EPR, optical, IR, and Raman spectroscopy. The optical spectrum exhibits a number of electronic bands due to both Fe(III) and Mn(II) ions in iowaite. From EPR studies, the g values are calculated for Fe(III) and g and A values for Mn(II). EPR and optical absorption studies confirm that Fe(III) and Mn(II) are in distorted octahedral geometry. The bands that appear both in NIR and Raman spectra are due to the overtones and combinations of water and carbonate molecules. Thus EPR, optical, and Raman spectroscopy have proven most useful for the study of the chemistry of natural iowaite and chemical changes in the mineral.
Resumo:
The crystal structures of the 1:1 proton-transfer compounds of 4,5-dichlorophthalic acid with the aliphatic Lewis bases diisopropylamine and hexamethylenetetramine, viz. diisopropylaminium 2-carboxy-4,5-dichlorobenzoate (1) and hexamethylenetetraminium 2-carboxy-4,5-dichlorobenzoate hemihydrate (2), have been determined. Crystals of both 1 and 2 are triclinic, space group P-1, with Z = 2 in cells with a = 7.0299(5), b = 9.4712(7), c = 12.790(1)Å, α = 99.476(6), β = 100.843(6), γ = 97.578(6)o (1) and a = 7.5624(8), b = 9.8918(8), c = 11.5881(16)Å, α = 65.660(6), β = 86.583(4), γ = 86.987(8)o (2). In each, one-dimensional hydrogen-bonded chain structures are found: in 1 formed through aminium N+-H...Ocarboxyl cation-anion interactions. In 2, the chains are formed through anion carboxyl O...H-Obridging water interactions with the cations peripherally bound. In both structures, the hydrogen phthalate anions are essentially planar with short intra-species carboxylic acid O-H...Ocarboxyl hydrogen bonds [O…O, 2.381(3) Å (1) and 2.381(8) Å (2)].
Resumo:
The crystal structure of the modified unsymmetrically N, N'-substituted viologen chromophore, N-ethyl- N'-(2-phosphonoethyl)-4, 4'-bipyridinium dichloride 0.75 hydrate. (1) has been determined. Crystals are triclinic, space group P-1 with Z = 2 in a cell with a = 7.2550(1), b = 13.2038(5), c = 18.5752(7) Å, α = 86.495(3), β = 83.527(2), γ = 88.921(2)o. The two independent but pseudo-symmetrically related cations in the asymmetric unit form one-dimensional hydrogen-bonded chains through short homomeric phosphonic acid O-H...O links [2.455(4), 2.464(4)A] while two of the chloride anions are similarly strongly linked to phosphonic acid groups [O-H…Cl, 2.889(4), 2.896(4)Å]. The other two chloride anions together with the two water molecules of solvation (one with partial occupancy) form unusual cyclic hydrogen-bonded bis(Cl...water) dianion units which lie between the layers of bipyridylium rings of the cation chain structures with which they are weakly associated.
Resumo:
With the emergence of multi-cores into the mainstream, there is a growing need for systems to allow programmers and automated systems to reason about data dependencies and inherent parallelismin imperative object-oriented languages. In this paper we exploit the structure of object-oriented programs to abstract computational side-effects. We capture and validate these effects using a static type system. We use these as the basis of sufficient conditions for several different data and task parallelism patterns. We compliment our static type system with a lightweight runtime system to allow for parallelization in the presence of complex data flows. We have a functioning compiler and worked examples to demonstrate the practicality of our solution.
Resumo:
This chapter looks at issues of non-stationarity in determining when a transient has occurred and when it is possible to fit a linear model to a non-linear response. The first issue is associated with the detection of loss of damping of power system modes. When some control device such as an SVC fails, the operator needs to know whether the damping of key power system oscillation modes has deteriorated significantly. This question is posed here as an alarm detection problem rather than an identification problem to get a fast detection of a change. The second issue concerns when a significant disturbance has occurred and the operator is seeking to characterize the system oscillation. The disturbance initially is large giving a nonlinear response; this then decays and can then be smaller than the noise level ofnormal customer load changes. The difficulty is one of determining when a linear response can be reliably identified between the non-linear phase and the large noise phase of thesignal. The solution proposed in this chapter uses “Time-Frequency” analysis tools to assistthe extraction of the linear model.
Resumo:
Despite the important physiological role of periosteum in the pathogenesis and treatment of osteoporosis, little is known about the structural and cellular characteristics of periosteum in osteoporosis. To study the structural and cellular differences in both diaphyseal and metaphyseal periosteum of osteoporotic rats, samples from the right femur of osteoporotic and normal female Lewis rats were collected and tissue sections were stained with hematoxylin and eosin, antibodies or staining kit against tartrate resistant acid phosphatase (TRAP), alkaline phosphatase (ALP), vascular endothelial growth factor (VEGF), von Willebrand (vWF), tyrosine hydroxylase (TH) and calcitonin gene-related peptide (CGRP). The results showed that the osteoporotic rats had much thicker and more cellular cambial layer of metaphyseal periosteum compared with other periosteal areas and normal rats (P\0.001). The number of TRAP? osteoclasts in bone resorption pits, VEGF? cells and the degree of vascularization were found to be greater in the cambial layer of metaphyseal periosteum of osteoporotic rats (P\0.05), while no significant difference was detected in the number of ALP? cells between the two groups. Sympathetic nerve fibers identified by TH staining were predominantly located in the cambial layer of metaphyseal periosteum of osteoporotic rats. No obvious difference in the expression of CGRP between the two groups was found. In conclusion, periosteum may play an important role in the cortical bone resorption in osteoporotic rats and this pathological process may be regulated by the sympathetic nervous system.
Resumo:
A configurable process model describes a family of similar process models in a given domain. Such a model can be configured to obtain a specific process model that is subsequently used to handle individual cases, for instance, to process customer orders. Process configuration is notoriously difficult as there may be all kinds of interdependencies between configuration decisions.} In fact, an incorrect configuration may lead to behavioral issues such as deadlocks and livelocks. To address this problem, we present a novel verification approach inspired by the ``operating guidelines'' used for partner synthesis. We view the configuration process as an external service, and compute a characterization of all such services which meet particular requirements using the notion of configuration guideline. As a result, we can characterize all feasible configurations (i.\,e., configurations without behavioral problems) at design time, instead of repeatedly checking each individual configuration while configuring a process model.
Resumo:
The thermal analysis of euchroite shows two mass loss steps in the temperature range 100 to 105°C and 185 to 205°C. These mass loss steps are attributed to dehydration and dehydroxylation of the mineral. Hot stage Raman spectroscopy (HSRS) has been used to study the thermal stability of the mineral euchroite, a mineral involved in a complex set of equilibria between the copper hydroxy arsenates: euchroite Cu2(AsO4)(OH).3H2O → olivenite Cu2(AsO4)(OH) → strashimirite Cu8(AsO4)4(OH)4.5H2O → arhbarite Cu2Mg(AsO4)(OH)3. Hot stage Raman spectroscopy inolves the collection of Raman spectra as a function of the temperature. HSRS shows that the mineral euchroite decomposes between 125 and 175 °C with the loss of water. At 125 °C, Raman bands are observed at 858 cm-1 assigned to the ν1 AsO43- symmetric stretching vibration and 801, 822 and 871 cm-1 assigned to the ν3 AsO43- (A1) antisymmetric stretching vibration. A distinct band shift is observed upon heating to 275 °C. At 275 °C the four Raman bands are resolved at 762, 810, 837 and 862 cm-1. Further heating results in the diminution of the intensity in the Raman spectra and this is attributed to sublimation of the arsenate mineral. Hot stage Raman spectroscopy is most useful technique for studying the thermal stability of minerals especially when only very small amounts of mineral are available.
Resumo:
Thermal analysis and differential thermal analysis offers a means of studying the desorption of acids such as stearic acid from clay surfaces. Both adsorption and chemisorption can be distinguished through the differences in the temperature of the mass losses. Increased adsorption is achievable by adsorbing onto a surfactant adsorbed montmorillonite. Stearic acid sublimes at 179 °C but when adsorbed upon montmorillonite sublimes at 207 and 248 °C. These mass loss steps are ascribed to the desorption of the stearic acid on the external surfaces of the organoclays and from the de-chemisorption from the surfactant held in the interlayer of the montmorillonite.
Resumo:
Since the Asian crisis, East Asian nations have strived to introduce corporate governance codes, directing companies how to best improve their corporate governance practices. However, these codes have not been universally accepted by East Asian companies. This study examines the adoption of major board-related corporate governance recommendations by large nonfinancial companies in seven East Asian nations and investigates whether improvements in these board governance mechanisms have been associated with increased operating performance and market value. The results indicate that family-owned companies started with worse board governance and have been least likely to improve their board governance since the crisis. Overall, bigger, faster growing, non-family-owned companies with less concentrated ownership have been more likely to improve their board governance. Splitting of the positions of Chairman and CEO, creation of audit and nomination committees and improvements in overall board governance were found to have a positive relationship with subsequent operating performance and/or market value.
Resumo:
To reduce the damage of phishing and spyware attacks, banks, governments, and other security-sensitive industries are deploying one-time password systems, where users have many passwords and use each password only once. If a single password is compromised, it can be only be used to impersonate the user once, limiting the damage caused. However, existing practical approaches to one-time passwords have been susceptible to sophisticated phishing attacks. ---------- We give a formal security treatment of this important practical problem. We consider the use of one-time passwords in the context of password-authenticated key exchange (PAKE), which allows for mutual authentication, session key agreement, and resistance to phishing attacks. We describe a security model for the use of one-time passwords, explicitly considering the compromise of past (and future) one-time passwords, and show a general technique for building a secure one-time-PAKE protocol from any secure PAKE protocol. Our techniques also allow for the secure use of pseudorandomly generated and time-dependent passwords.
Resumo:
We provide the first description of and security model for authenticated key exchange protocols with predicate-based authentication. In addition to the standard goal of session key security, our security model also provides for credential privacy: a participating party learns nothing more about the other party's credentials than whether they satisfy the given predicate. Our model also encompasses attribute-based key exchange since it is a special case of predicate-based key exchange.---------- We demonstrate how to realize a secure predicate-based key exchange protocol by combining any secure predicate-based signature scheme with the basic Diffie-Hellman key exchange protocol, providing an efficient and simple solution.
Resumo:
This full day workshop explores how insights from artefacts, created during data collecting and analysis, are translated into prototypes. It is particularly concerned with getting closer to people's experience of shaping a design space. The workshop draws inspiration from data-products resulting from interactions in natural, unbuilt places with the intention of supporting both those with work integrating understandings of such experiences into design and those interested in the way material provokes ideas and inspiration for design.
Resumo:
Recent years have seen an increased uptake of business process management technology in industries. This has resulted in organizations trying to manage large collections of business process models. One of the challenges facing these organizations concerns the retrieval of models from large business process model repositories. For example, in some cases new process models may be derived from existing models, thus finding these models and adapting them may be more effective than developing them from scratch. As process model repositories may be large, query evaluation may be time consuming. Hence, we investigate the use of indexes to speed up this evaluation process. Experiments are conducted to demonstrate that our proposal achieves a significant reduction in query evaluation time.