85 resultados para ultra-fine grained microstructure


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Samples from the Callide Coal Measures, Queensland, Australia, containing the minor maceral, micrinite, have been studied using optical and electron-optical techniques to determine the precise compositional and structural nature of micrinite when in association with vitrinite macerals. Emphasis has been placed on direct spatial correlation of optical and electron-optical data due to the fine grain size (<1μm) of micrinite and its relatively low abundance compared with other macerals in the Callide Basin coals. Precise elemental, morphological and structural data, including electron diffraction, provides unambiguous evidence for the presence of kaolinite in the component known as micrinite. Indeed, micrinite consists predominantly of fine-grained kaolinite (>90 per cent of the component) and, as such, should not be considered a maceral.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Detailed analytical electron microscope analyses of four fine-grained chondritic porous interplanetary dust particles (IDPs)reveal the presence of titanium oxide Magneli phases, TinO2n-1 (n=4,5,6), and rare Ti-metal. The titanium minerals are indigenous to these chondritic IDPs. The association of Magneli phases, Ti-metal, and carbonaceous material in chondritic IDPs, along with the grain size distributions support in situ solid carbon gasification in these extraterrestrial particles. The active catalyst in this process is titanium metal that we infer may be of interstellar origin. This favorable catalysis uniquely leads to the formation of Magneli phases. As chondritic IDPs may be solid debris of short-period comets, our data indicate that nuclei of short-period comets may show distinctive chemical reactions that lead to Ti-mineral assemblages that typically include Magneli phases. The proposed model provides a plausible mechnism to explain the higher solid carbon content of chondritic IDPs relative to bulk carbon abundances typical for carbonaceous chondrite matrices that represent another type of more evolved, that is, metamorphosed, undifferentiated solar system bodies.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Analytical electron microscopy on individual grains from a portion of a chondritic porous interplanetary dust particle (aggregate W7029C1 from the NASA Johnson Space Center Cosmic Dust Collection) shows that layer silicates compose 50 percent of the silicate fraction examined. These layer silicates can be classified into two distinct crystallochemical groups: (1) fine-grained, polycrystalline smectite minerals; and (2) well-ordered, single crystals of kaolinite and Mg-poor talc. The layer silicates in this portion of sample W7029(asterisk)A are dissimilar to those described in other chondritic porous aggregates. The predominant layer silicate assemblage in W7029(asterisk)A indicates that heating of the aggregate during atmospheric entry was brief and probably to a temperature less than 300C. Comparison with terrestrial phyllosilicate occurrences suggests that some layer silicates in aggregate W7029(asterisk)A may have been formed by alteratiton from preexisting silicate minerals at low temperatures (less than 25C) after aggregate formation.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

CARBONACEOUS chondrites provide valuable information as they are the least altered examples of early Solar System material1. The matrix constitutes a major proportion of carbonaceous chondrites. Despite many past attempts, unambiguous identification of the minerals in the matrix has not been totally successful2. This is mainly due to the extremely fine-grained nature of the matrix phases. Recently, progress in the characterisation of these phases has been made by electron diffraction studies3,4. We present here the direct observation, by high resolution imaging, of phases in carbonaceous chondrite matrices. We used ion-thinned sections from the Murchison C2(M) meteorite for transmission electron microscopy. The Murchison matrix contains both ordered and disordered inter-growths of serpentine-like and brucite-like layers. Such mixed-layer structures are new types of layer silicates. © 1979 Nature Publishing Group.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The Analytical Electron Microscope (AEM), with which secondary X-ray emission from a thin (<150nm), electron-transparent material is measured, has rapidly become a versatile instrument for qualitative and quantitative elemental analyses of many materials, including minerals. With due regard for sources of error in experimental procedures, it is possible to obtain high spatial resolution (~20nm diameter) and precise elemental analyses (~3% to 5% relative) from many silicate minerals. In addition, by utilizing the orientational dependence of X-ray emission for certain multi-substituted crystal structures, site occupancies for individual elements within a unit cell can be determined though with lower spatial resolution. The relative ease with which many of these compositional data may be obtained depends in part on the nature of the sample, but, in general, is comparable to other solid state analytical techniques such as X-ray diffraction and electron microprobe analysis. However, the improvement in spatial resolution obtained with the AEM (up to two orders of magnitude in analysis diameter) significantly enhances interpretation of fine-grained assemblages in many terrestrial or extraterrestrial rocks.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In the last decade, smartphones have gained widespread usage. Since the advent of online application stores, hundreds of thousands of applications have become instantly available to millions of smart-phone users. Within the Android ecosystem, application security is governed by digital signatures and a list of coarse-grained permissions. However, this mechanism is not fine-grained enough to provide the user with a sufficient means of control of the applications' activities. Abuse of highly sensible private information such as phone numbers without users' notice is the result. We show that there is a high frequency of privacy leaks even among widely popular applications. Together with the fact that the majority of the users are not proficient in computer security, this presents a challenge to the engineers developing security solutions for the platform. Our contribution is twofold: first, we propose a service which is able to assess Android Market applications via static analysis and provide detailed, but readable reports to the user. Second, we describe a means to mitigate security and privacy threats by automated reverse-engineering and refactoring binary application packages according to the users' security preferences.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Private data stored on smartphones is a precious target for malware attacks. A constantly changing environment, e.g. switching network connections, can cause unpredictable threats, and require an adaptive approach to access control. Context-based access control is using dynamic environmental information, including it into access decisions. We propose an "ecosystem-in-an-ecosystem" which acts as a secure container for trusted software aiming at enterprise scenarios where users are allowed to use private devices. We have implemented a proof-of-concept prototype for an access control framework that processes changes to low-level sensors and semantically enriches them, adapting access control policies to the current context. This allows the user or the administrator to maintain fine-grained control over resource usage by compliant applications. Hence, resources local to the trusted container remain under control of the enterprise policy. Our results show that context-based access control can be done on smartphones without major performance impact.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The study adopts a multi-dimensional construct of self-esteem to examine the relationship between self-perception and psychological adjustment in order to identify specific dimensions that discriminate between disturbed and non-disturbed groups. The disturbed group (n = 33) is derived from a clinical sample and are matched with a non-disturbed group (n = 33) of adolescents. Results indicate that dimensional self-concept scores are significantly lower for clinical subjects while there are no significant differences between groups on the mathematics, honesty, and physical ability dimensions. These findings provide a more fine grained understanding of the relationship between self-esteem and psychological adjustment and emphasize the need to examine self-esteem in terms of its particular dimensions.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Fine-grained matrices in carbonaceous chondrites and small, micron-sized inclusions in achondrites can be characterized effectively using high resolution transmission electron micro­scopy (HRTEM).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Many software applications extend their functionality by dynamically loading executable components into their allocated address space. Such components, exemplified by browser plugins and other software add-ons, not only enable reusability, but also promote programming simplicity, as they reside in the same address space as their host application, supporting easy sharing of complex data structures and pointers. However, such components are also often of unknown provenance and quality and may be riddled with accidental bugs or, in some cases, deliberately malicious code. Statistics show that such component failures account for a high percentage of software crashes and vulnerabilities. Enabling isolation of such fine-grained components is therefore necessary to increase the stability, security and resilience of computer programs. This thesis addresses this issue by showing how host applications can create isolation domains for individual components, while preserving the benefits of a single address space, via a new architecture for software isolation called LibVM. Towards this end, we define a specification which outlines the functional requirements for LibVM, identify the conditions under which these functional requirements can be met, define an abstract Application Programming Interface (API) that encompasses the general problem of isolating shared libraries, thus separating policy from mechanism, and prove its practicality with two concrete implementations based on hardware virtualization and system call interpositioning, respectively. The results demonstrate that hardware isolation minimises the difficulties encountered with software based approaches, while also reducing the size of the trusted computing base, thus increasing confidence in the solution’s correctness. This thesis concludes that, not only is it feasible to create such isolation domains for individual components, but that it should also be a fundamental operating system supported abstraction, which would lead to more stable and secure applications.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This chapter focuses on learning and assessment as social and cultural practices situated within national and international policy contexts of educational change. Classroom assessment was researched using a conceptualization of knowing in action, or the ‘generative dance’. Fine-grained analyses of interactivity between students, and between teacher and student/s, and their patterns of participation in assessment and learning were conducted. The findings offer original insights into how learners draw on explicit and tacit forms of knowing in order to successfully participate in learning. Assessment is re-imagined as a dynamic space in which teachers learn about their students as they learn with their students, and where all students can be empowered to find success.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper introduces a parallel implementation of an agent-based model applied to electricity distribution grids. A fine-grained shared memory parallel implementation is presented, detailing the way the agents are grouped and executed on a multi-threaded machine, as well as the way the model is built (in a composable manner) which is an aid to the parallelisation. Current results show a medium level speedup of 2.6, but improvements are expected by incor-porating newer distributed or parallel ABM schedulers into this implementa-tion. While domain-specific, this parallel algorithm can be applied to similarly structured ABMs (directed acyclic graphs).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper presents a new framework for distributed intrusion detection based on taint marking. Our system tracks information flows between applications of multiple hosts gathered in groups (i.e., sets of hosts sharing the same distributed information flow policy) by attaching taint labels to system objects such as files, sockets, Inter Process Communication (IPC) abstractions, and memory mappings. Labels are carried over the network by tainting network packets. A distributed information flow policy is defined for each group at the host level by labeling information and defining how users and applications can legally access, alter or transfer information towards other trusted or untrusted hosts. As opposed to existing approaches, where information is most often represented by two security levels (low/high, public/private, etc.), our model identifies each piece of information within a distributed system, and defines their legal interaction in a fine-grained manner. Hosts store and exchange security labels in a peer to peer fashion, and there is no central monitor. Our IDS is implemented in the Linux kernel as a Linux Security Module (LSM) and runs standard software on commodity hardware with no required modification. The only trusted code is our modified operating system kernel. We finally present a scenario of intrusion in a web service running on multiple hosts, and show how our distributed IDS is able to report security violations at each host level.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The present invention relates to methods for producing very fine-grained particulate material. In particular, the present invention relates to method for producing oxide materials of very fine-grained particulate material.