132 resultados para string breaking
Resumo:
Graphene has been reported with record-breaking properties which have opened up huge potential applications. A considerable research has been devoted to manipulate or modify the properties of graphene to target a more smart nanoscale device. Graphene and carbon nanotube hybrid structure (GNHS) is one of the promising graphene derivates, while their mechanical properties have been rarely discussed in literature. Therefore, such a studied is conducted in this paper basing on the large-scale molecular dynamics simulation. The target GNHS is constructed by considering two separate graphene layers that being connected by single-wall carbon nanotubes (SWCNTs) according to the experimental observations. It is found that the GNHSs exhibit a much lower yield strength, Young’s modulus, and earlier yielding comparing with a bilayer graphene sheet. Fracture of studied GNHSs is found to fracture located at the connecting region between carbon nanotubes (CNTs) and graphene. After failure, monatomic chains are normally observed at the front of the failure region, and the two graphene layers at the failure region without connecting CNTs will adhere to each other, generating a bilayer graphene sheet scheme (with a layer distance about 3.4 Å). This study will enrich the current understanding of the mechanical performance of GNHS, which will guide the design of GNHS and shed lights on its various applications.
Resumo:
Nanomaterials are prone to influence by chemical adsorption because of their large surface to volume ratios. This enables sensitive detection of adsorbed chemical species which, in turn, can tune the property of the host material. Recent studies discovered that single and multi-layer molybdenum disulfide (MoS2) films are ultra-sensitive to several important environmental molecules. Here we report new findings from ab inito calculations that reveal substantially enhanced adsorption of NO and NH3 on strained monolayer MoS2 with significant impact on the properties of the adsorbates and the MoS2 layer. The magnetic moment of adsorbed NO can be tuned between 0 and 1 μB; strain also induces an electronic phase transition between half-metal and metal. Adsorption of NH3 weakens the MoS2 layer considerably, which explains the large discrepancy between the experimentally measured strength and breaking strain of MoS2 films and previous theoretical predictions. On the other hand, adsorption of NO2, CO, and CO2 is insensitive to the strain condition in the MoS2 layer. This contrasting behavior allows sensitive strain engineering of selective chemical adsorption on MoS2 with effective tuning of mechanical, electronic, and magnetic properties. These results suggest new design strategies for constructing MoS2-based ultrahigh-sensitivity nanoscale sensors and electromechanical devices.
Resumo:
To this day, realizations in the standard-model of (lossy) trapdoor functions from discrete-log-type assumptions require large public key sizes, e.g., about Θ(λ 2) group elements for a reduction from the decisional Diffie-Hellman assumption (where λ is a security parameter). We propose two realizations of lossy trapdoor functions that achieve public key size of only Θ(λ) group elements in bilinear groups, with a reduction from the decisional Bilinear Diffie-Hellman assumption. Our first construction achieves this result at the expense of a long common reference string of Θ(λ 2) elements, albeit reusable in multiple LTDF instantiations. Our second scheme also achieves public keys of size Θ(λ), entirely in the standard model and in particular without any reference string, at the cost of a slightly more involved construction. The main technical novelty, developed for the second scheme, is a compact encoding technique for generating compressed representations of certain sequences of group elements for the public parameters.
Resumo:
Thirteen years ago, Kenichi Ohmae proclaimed that the world had become “borderless,” and the nation-state nothing more than a “bit actor” in a globalised economy. Around the same time, “interdisciplinarity” appeared as the prime strategy for breaking down the rigid stratifications of traditional disciplines, promising an equivalently borderless academe. However, despite the rhetoric of globalisation and interdisciplinarity, territorial boundaries—both physical and conceptual—remain in evidence and under contention...
Resumo:
An encryption scheme is non-malleable if giving an encryption of a message to an adversary does not increase its chances of producing an encryption of a related message (under a given public key). Fischlin introduced a stronger notion, known as complete non-malleability, which requires attackers to have negligible advantage, even if they are allowed to transform the public key under which the related message is encrypted. Ventre and Visconti later proposed a comparison-based definition of this security notion, which is more in line with the well-studied definitions proposed by Bellare et al. The authors also provide additional feasibility results by proposing two constructions of completely non-malleable schemes, one in the common reference string model using non-interactive zero-knowledge proofs, and another using interactive encryption schemes. Therefore, the only previously known completely non-malleable (and non-interactive) scheme in the standard model, is quite inefficient as it relies on generic NIZK approach. They left the existence of efficient schemes in the common reference string model as an open problem. Recently, two efficient public-key encryption schemes have been proposed by Libert and Yung, and Barbosa and Farshim, both of them are based on pairing identity-based encryption. At ACISP 2011, Sepahi et al. proposed a method to achieve completely non-malleable encryption in the public-key setting using lattices but there is no security proof for the proposed scheme. In this paper we review the mentioned scheme and provide its security proof in the standard model. Our study shows that Sepahi’s scheme will remain secure even for post-quantum world since there are currently no known quantum algorithms for solving lattice problems that perform significantly better than the best known classical (i.e., non-quantum) algorithms.
Resumo:
Health promotion progresses a social justice and empowerment agenda and thus emphasises working with people to increase their control over their health. Certainly, Australia has experienced much success in this endeavour and is internationally recognised as a leader. However, health promotion has failed Indigenous Australians; a fact that is echoed in the health outcomes that ironically provide us with the “moral imperative” to act. Further investigation has also revealed health promotion’s foundation in colonial imaginings. Thus, this paper calls for the culture of health promotion to be examined as a risk factor for poor Indigenous health. To complement this call, this paper presents findings of an ethnographic study of Indigenous health promotion practice, undertaken from a postcolonial and critical whiteness framework. These findings provide a narrative of strength and innovative approaches, highlighting the value of Indigenous knowledge. These findings also contradict the biomedical tendency to construct culture as illness-producing. More broadly, this study’s findings entail important lessons for health promotion to consider, if it is to move beyond the rhetoric, to truly increase people’s control over their health.
Resumo:
This paper presents ongoing work toward constructing efficient completely non-malleable public-key encryption scheme based on lattices in the standard (common reference string) model. An encryption scheme is completely non-malleable if it requires attackers to have negligible advantage, even if they are allowed to transform the public key under which the related message is encrypted. Ventre and Visconti proposed two inefficient constructions of completely non-malleable schemes, one in the common reference string model using non-interactive zero-knowledge proofs, and another using interactive encryption schemes. Recently, two efficient public-key encryption schemes have been proposed, both of them are based on pairing identity-based encryption.
Resumo:
We show that it is possible to detect specifically adsorbed bacteriophage directly by breaking the interactions between proteins displayed on the phage coat and ligands immobilized on the surface of a quartz crystal microbalance (QCM). This is achieved through increasing the amplitude of oscillation of the QCM surface and sensitively detecting the acoustic emission produced when the bacteriophage detaches from the surface. There is no interference from nonspecifically adsorbed phage. The detection is quantitative over at least 5 orders of magnitude and is sensitive enough to detect as few as 20 phage. The method has potential as a sensitive and low-cost method for virus detection.
Resumo:
This paper will describe a community based research project examining the health and wellbeing of a sample of Aboriginal women in Australia, and present preliminary findings of a community needs analysis. The Shoalhaven Koori Women’s Study (SKWS) is being led by an Aboriginal woman based within Waminda, an Aboriginal women’s community controlled service located on the South Coast of NSW. The community needs analysis is the first stage of the SKWS, and aims to explore Aboriginal women’s perceptions and experiences of wellness and wellbeing, including issues related to their personal strengths, health and social priorities, support needs and that of their families. Thirty Aboriginal women were interviewed using a survey that included closed and open ended questions. Methods used to administer the survey included yarning and Dadirri (deep listening), two valid and culturally safe approaches for data collection with Aboriginal people. Adopting these approaches ensured Aboriginal protocols were maintained and upheld throughout the research process. This enabled scientific rigour while also ensuring activities were culturally safe. Key findings of the survey will be presented, and how Waminda is modifying service delivery to better respond to the health and social priorities of Aboriginal women in the Shoalhaven region will be discussed. Community feedback of survey results will occur to validate the analysis from the community perspective.
Resumo:
We show that it is possible to detect specifically adsorbed bacteriophage directly by breaking the interactions between proteins displayed on the phage coat and ligands immobilized on the surface of a quartz crystal microbalance (QCM). This is achieved through increasing the amplitude of oscillation of the QCM surface and sensitively detecting the acoustic emission produced when the bacteriophage detaches from the surface. There is no interference from nonspecifically adsorbed phage. The detection is quantitative over at least 5 orders of magnitude and is sensitive enough to detect as few as 20 phage. The method has potential as a sensitive and low-cost method for virus detection.
Resumo:
This paper compares costuming practices in Baz Luhrmann’s Australia (2008) and John Hillcoat’s The Proposition (2005) and argues that high production values, such as in the blockbuster Australia, are not neutral mechanisms of production, but powerful prescriptive elements which do not result in a successful representation of cultural specificity. Australia is a typical blockbuster, it employs a large number of extras, it features compelling landscape shots, has been shot across four different locations and sets, and, importantly, is an international production with the 20th Century Fox. The film’s costumes were designed by Catherine Martin, who received an Oscar nomination in 2009. While global exposure of fashion in film and through celebrities’ endorsements has consolidated a historical synergy between the fashion industry and Hollywood, the Australian film and fashion industries have had a very limited exchange. Baz Luhrmann’s film is Australia’s first instance of promo-costuming and use of tie-in labels (Ferragamo, R.M.Williams, Prada, Paspaley). Catherine Martin thoroughly researched 1930s women’s wear, indigenous and stockmen’s clothing, and set up to make all costumes with a large team of costumiers and seamstresses, striving for authenticity. The Proposition won its costume designer Margot Wilson an AFI in 2005 for best costume, but compared to Australia the story, location and costumes are far harsher. Filmed around Winton in far west Queensland, the director John Hillcoat and Director of Photography Benoit Delhomme were insistent about realism, and emphasising the harshness of the Australian landscape. The realism of the costumes was derived from the fabrics and manufacturing, as well as the way they were shot, with the actors often wearing two or three layers of heavy wool during days of shooting in 50 degree heat, and the details of making and breaking down. The implication is that both films are culturally specific as they both deal with an Australian story. However, Australia is clearly produced according to a Hollywood blockbuster model, and closely matches Hollywood’s narrative and aesthetic characteristics, while The Proposition is a more modest film that eschews these conventions of beauty and glossed history. Despite its western genre-orientation, The Proposition is more successful than Australia when it comes to costuming, because its costumes are not only functional to the narrative, but, in Roland Barthes’ words, they also fulfil a prestation. This prestation highlights the social and cultural conflicts on which colonial Australia was founded, instead of gilding, and gliding, over them.
Resumo:
In its intervention at the 10th session of the United Nations Permanent Forum on Indigenous Issues 2010, the World Indigenous Network Higher Education Consortium (WINHEC) acknowledged that despite a history of protracted but limited attempts by Governments globally to address the low participation and graduation rates of Indigenous peoples from higher education at post graduate level, this continues to be an area of considerable concern. This paper speaks to the development of an innovative academic process that profiles the ground breaking work of WINHEC and a cohort of Indigenous academics in developing academic programs designed to address this systemic failure. The concept of these programs was endorsed in 2006 at a WINHEC conference where Indigenous representatives from across the world met to discuss in part, historical and contempory impediments to Indigenous success within higher education. The goal of WINHEC has been to develop a nested suite of inventive postgraduate awards founded within the scholarship of Indigenous Knowledge which encapsulates an epistemological approach. This has been a ground breaking process that has included collaborative and intellectual contributions of Indigenous academics from diverse cultural nations across the globe and, in particular, Australia. In 2012 the culmination of this dream and the suite of courses developed, honours and embrace the uniqueness of Indigenous Knowledge and the cultural integrity of Indigenous Leadership.
Resumo:
In January 2011 a swollen Brisbane River broke its banks flooding riverside houses and buildings. The river’s water spread and rose up through storm water drains inundating some 20 000 houses in low-lying land. As the water receded those residents affected by the floods returned to their homes to assess the damage. While some people breathed a sigh of relief others were devastated by the overwhelming damage to their homes and personal belongings. Over the next few weeks the landscape of Brisbane was altered not merely by the mud and debris left by the torrent of water, but by the piles of domestic contents occupying Brisbane streets. Beds, toys, cabinets, plasterboard, tiles and household furniture lined curbsides waiting for collection. Later they would accumulate in public parks and sports centres to await disposal, momentarily creating an unsettling landscape of discarded domestic interiors. While most houses remained standing the heart breaking repercussions were evident in their interiority. Thousands of volunteers flocked to help those affected by the floods to purge the damage left by the water – removing wall and floor linings, discarding furniture and spoilt belongings. In her paper on Hurricane Katrina, Julieanna Preston wrote, ‘What anthropological evidence would we find as we followed their migration – heaps left by the side of the road, the physical weight overcoming the personal value…’ For many of the post flood restored homes and buildings entire interiors have been replaced, eradicating any trace of the significant event that disturbed them only months earlier. There were artifacts that would have survived the floods - furniture of solid timber – these were discarded and with them the patina that marked an important event in history. The patina is beyond technological reproducibility, and as Walter Benjamin writes, this being the whole premise of genuineness. It is the role of the French Polisher to maintain the true wear of the artefact for it is the patina that is most valuable in its ability to narrate the history of a piece. In 2012 two separate exhibitions in Brisbane will take place to display a selected collection of flood-damaged artefacts. This orchestrated way to commemorate the damage left by floods may be a method to compensate for the haste in which the damage was purged from the city. This need for exhibiting damaged artifacts illustrates Andreas Huyssen’s point that "…today memory is understood as a mode of re-presentation and as belonging to the present." This research looks at the dying trade of the French Polisher through conversations and a visual study of flood damaged furniture. The research also investigates the personal loss of artifacts through intimate stories shared by flood victims. This paper seeks to understand why so much was discarded and celebrate what remains.
Resumo:
With the increasing importance of Application Domain Specific Processor (ADSP) design, a significant challenge is to identify special-purpose operations for implementation as a customized instruction. While many methodologies have been proposed for this purpose, they all work for a single algorithm chosen from the target application domain. Such algorithm-specific approaches are not suitable for designing instruction sets applicable to a whole family of related algorithms. For an entire range of related algorithms, this paper develops a methodology for identifying compound operations, as a basis for designing “domain-specific” Instruction Set Architectures (ISAs) that can efficiently run most of the algorithms in a given domain. Our methodology combines three different static analysis techniques to identify instruction sequences common to several related algorithms: identification of (non-branching) instruction sequences that occur commonly across the algorithms; identification of instruction sequences nested within iterative constructs that are thus executed frequently; and identification of commonly-occurring instruction sequences that span basic blocks. Choosing different combinations of these results enables us to design domain-specific special operations with different desired characteristics, such as performance or suitability as a library function. To demonstrate our approach, case studies are carried out for a family of thirteen string matching algorithms. Finally, the validity of our static analysis results is confirmed through independent dynamic analysis experiments and performance improvement measurements.
Resumo:
As a concept, the magic circle is in reality just 4 years old. Whilst often accredited to Johan Huizinga (1955), the modern usage of term in truth belongs to Katie Salen and Eric Zimmerman. It became in academia following the publication of “Rules of Play” in 2003. Because of the terminologyused, it carries with it unhelpful preconceptions that the game world, or play-space, excludes reality. In this paper, I argue that Salen and Zimmerman (2003) have taken a term used as an example, and applied a meaning to it that was never intended, based primarily upon definitions given by other authors, namely Apter (1991) and Sniderman (n.d.). I further argue that the definition itself contains a logical fallacy, which has prevented the full understanding of the definition in later work. Through a study of the literature in Game Theory, and examples of possible issues which could arise in contemporary games, I suggest that the emotions of the play experience continue beyond the play space, and that emotions from the “real world” enter it with the participants. I consider a reprise of the Stanley Milgram Obedience Experiment (2006), and what that tells us about human emotions and the effect that events taking place in a virtual environment can have upon them. I evaluate the opinion espoused by some authors of there being different magic circles for different players, and assert that this is not a useful approach to take when studying games, because it prevents the analysis of a game as a single entity. Furthermore I consider the reasons given by other authors for the existence of the Magic Circle, and I assert that the term “Magic Circle” should be discarded, that it has no relevance to contemporary games, and indeed it acts as a hindrance to the design and study of games. I conclude that the play space which it claims to protect from the courts and other governmental authorities would be better served by the existing concepts of intent, consent, and commonly accepted principles associated with international travel.