141 resultados para Exponential Splines


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Theoretical calculations of the C3HO potential surface at the CCSD(T)/aug-cc-pVDu/B3LYP/6-31G* level indicate that the three radicals HCCCO, CCCHO, and (cyclo-C3H)=O are stable, with HCCCO being the most stable of the three. A fourth isomer, CCHCO, is unstable with respect to cyclization to (cyclo-C3H)=O. Two isomers have been prepared by neutralization of charged precursors, formed as follows: (i) HCCCO, by HC drop C-C(O)-O+(H)(Me) --> HC3O+ + MeOH, and (ii) C2CHO, by (a) Me3SiC drop C-CHO + HO- --> C- drop C-CHO + Me3SiOH and (b) C- drop C-CH(OH)-C drop CH --> C- drop C-CHO + C2H2. A comparison of the CR and -NR+ spectra of -C2CHO indicate that C2CHO is (partially) rearranging to an isomer that shows significant formation of CO.(+) in the -NR+ spectrum of the anion. Ab initio calculations indicate that HCCCO is the product of the isomerism and that a proportion of these isomerized neutrals dissociate to CO and C2H. The neutral HCCCO may be formed by (i) synchronous rearrangement of C2CHO and/or (ii) stepwise rearrangement of C2CHO through (cyclo-C3H)=O. The second of these processes should have the higher rate, as it has the lower barrier in the rate-determining step and the higher Arrhenius pre-exponential A factor.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The gas phase degradation reactions of the chemical warfare agent (CWA) simulant, dimethyl methylphosphonate (DMMP), with the hydroperoxide anion (HOO(-)) were investigated using a modified quadrupole ion trap mass spectrometer. The HOO(-) anion reacts readily with neutral DMMP forming two significant product ions at m/z 109 and m/z 123. The major reaction pathways correspond to (i) the nucleophilic substitution at carbon to form \[CH(3)P(O)(OCH(3))O](-) (m/z 109) in a highly exothermic process and (ii) exothermic proton transfer. The branching ratios of the two reaction pathways, 89% and 11% respectively, indicate that the former reaction is significantly faster than the latter. This is in contrast to the trend for the methoxide anion with DMMP, where proton transfer dominates. The difference in the observed reactivities of the HOO(-) and CH(3)O(-) anions can be considered as evidence for an a-effect in the gas phase and is supported by electronic structure calculations at the B3LYP/aug-cc-pVTZ//B3LYP/6-31+G(d) level of theory that indicate the S(N)2(carbon) process has an activation energy 7.8 kJ mol(-1) lower for HOO(-) as compared to CH(3)O(-). A similar alpha-effect was calculated for nucleophilic addition-elimination at phosphorus, but this process an important step in the perhydrolysis degradation of CWAs in solution - was not observed to occur with DMMP in the gas phase. A theoretical investigation revealed that all processes are energetically accessible with negative activation energies. However, comparison of the relative Arrhenius pre-exponential factors indicate that substitution at phosphorus is not kinetically competitive with respect to the S(N)2(carbon) and deprotonation processes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Parametric ship roll resonance is a phenomenon where a ship can rapidly develop high roll motion while sailing in longitudinal waves. This effect can be described mathematically by periodic changes of the parameters of the equations of motion, which lead to a bifurcation. In this paper, the control design of an active u-tank stabilizer is carried out using Lyapunov theory. A nonlinear backstepping controller is developed to provide global exponential stability of roll. An extension of commonly used u-tank models is presented to account for large roll angles, and the control design is tested via simulation on a high-fidelity model of a vessel under parametric roll resonance.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The articles collected here in this special edition Epithelial-Mesenchymal (EMT) and Mesenchymal-Epithelial Transitions (MET) in Cancer provide a snapshot of the very rapidly progressing cinemascope of the involvement of these transitions in carcinoma progression. Pubmed analysis of EMT and cancer shows an exponential increase in the last few years in the number of papers and reviews published under these terms (Fig. 1). The last few years have seen these articles appearing in high calibre journals including Nature, Nature Cell Biology, Cancer Cell, PNAS, JNCI, JCI, and Cell, signaling the acceptance and quality of work in this field.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Technological maturity and the exponential growth of digital applications are contributing to lifestyle changes worldwide. Consequently, learning and teaching is demanding more effective sociotechnical interactions involving emerging technologies, as opposed to traditional, conventional face-to-face learning and teaching approaches. In this context, usability engineering is making significant contributions for improving computer and distance-based learning, both for learners and instructors, which have often been ignored when designing online learning and teaching applications. Usability testing is a central part of the human centered learning approach for developing sustainable STEM education from the socio-technological perspective. Our experiences with usability engineering and the impact of teaching low-cost rapid usability testing methods on knowledge translation from undergraduate to graduate courses to real-world practice (i.e. getting the methods out there in real use) are diverse and multi-modal. Our sample space has been hundreds of trained students who have learned how to do effective usability engineering in real-world situations at higher levels of realism (i.e. fidelity) and at a much lower cost than using traditional fixed usability labs. Furthermore, this low-cost rapid approach to usability engineering has been adopted by many of our graduates who are now managers, CIOs etc and who are using the methods routinely in their organizations in real world applications and scenarios. This knowledge has been used to improve design and implementation of a wide range of applications, including applications designed for teaching and learning.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Integer ambiguity resolution is an indispensable procedure for all high precision GNSS applications. The correctness of the estimated integer ambiguities is the key to achieving highly reliable positioning, but the solution cannot be validated with classical hypothesis testing methods. The integer aperture estimation theory unifies all existing ambiguity validation tests and provides a new prospective to review existing methods, which enables us to have a better understanding on the ambiguity validation problem. This contribution analyses two simple but efficient ambiguity validation test methods, ratio test and difference test, from three aspects: acceptance region, probability basis and numerical results. The major contribution of this paper can be summarized as: (1) The ratio test acceptance region is overlap of ellipsoids while the difference test acceptance region is overlap of half-spaces. (2) The probability basis of these two popular tests is firstly analyzed. The difference test is an approximation to optimal integer aperture, while the ratio test follows an exponential relationship in probability. (3) The limitations of the two tests are firstly identified. The two tests may under-evaluate the failure risk if the model is not strong enough or the float ambiguities fall in particular region. (4) Extensive numerical results are used to compare the performance of these two tests. The simulation results show the ratio test outperforms the difference test in some models while difference test performs better in other models. Particularly in the medium baseline kinematic model, the difference tests outperforms the ratio test, the superiority is independent on frequency number, observation noise, satellite geometry, while it depends on success rate and failure rate tolerance. Smaller failure rate leads to larger performance discrepancy.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Many students of calculus are not aware that the calculus they have learned is a special case (integer order) of fractional calculus. Fractional calculus is the study of arbitrary order derivatives and integrals and their applications. The article begins by stating a naive question from a student in a paper by Larson (1974) and establishes, for polynomials and exponential functions, that they can be deformed into their derivative using the μ-th order fractional derivatives for 0<μ<1. Through the power of Excel we illustrate the continuous deformations dynamically through conditional formatting. Some applications are discussed and a connection made to mathematics education.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper evaluates the performances of prediction intervals generated from alternative time series models, in the context of tourism forecasting. The forecasting methods considered include the autoregressive (AR) model, the AR model using the bias-corrected bootstrap, seasonal ARIMA models, innovations state space models for exponential smoothing, and Harvey’s structural time series models. We use thirteen monthly time series for the number of tourist arrivals to Hong Kong and Australia. The mean coverage rates and widths of the alternative prediction intervals are evaluated in an empirical setting. It is found that all models produce satisfactory prediction intervals, except for the autoregressive model. In particular, those based on the biascorrected bootstrap perform best in general, providing tight intervals with accurate coverage rates, especially when the forecast horizon is long.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A well-known attack on RSA with low secret-exponent d was given by Wiener about 15 years ago. Wiener showed that using continued fractions, one can efficiently recover the secret-exponent d from the public key (N,e) as long as d < N 1/4. Interestingly, Wiener stated that his attack may sometimes also work when d is slightly larger than N 1/4. This raises the question of how much larger d can be: could the attack work with non-negligible probability for d=N 1/4 + ρ for some constant ρ > 0? We answer this question in the negative by proving a converse to Wiener’s result. Our result shows that, for any fixed ε > 0 and all sufficiently large modulus lengths, Wiener’s attack succeeds with negligible probability over a random choice of d < N δ (in an interval of size Ω(N δ )) as soon as δ > 1/4 + ε. Thus Wiener’s success bound d 1/4. The known attacks in this class (by Verheul and Van Tilborg and Dujella) run in exponential time, so it is natural to ask whether there exists an attack in this class with subexponential run-time. Our second converse result answers this question also in the negative.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Several recently proposed ciphers, for example Rijndael and Serpent, are built with layers of small S-boxes interconnected by linear key-dependent layers. Their security relies on the fact, that the classical methods of cryptanalysis (e.g. linear or differential attacks) are based on probabilistic characteristics, which makes their security grow exponentially with the number of rounds N r r. In this paper we study the security of such ciphers under an additional hypothesis: the S-box can be described by an overdefined system of algebraic equations (true with probability 1). We show that this is true for both Serpent (due to a small size of S-boxes) and Rijndael (due to unexpected algebraic properties). We study general methods known for solving overdefined systems of equations, such as XL from Eurocrypt’00, and show their inefficiency. Then we introduce a new method called XSL that uses the sparsity of the equations and their specific structure. The XSL attack uses only relations true with probability 1, and thus the security does not have to grow exponentially in the number of rounds. XSL has a parameter P, and from our estimations is seems that P should be a constant or grow very slowly with the number of rounds. The XSL attack would then be polynomial (or subexponential) in N r> , with a huge constant that is double-exponential in the size of the S-box. The exact complexity of such attacks is not known due to the redundant equations. Though the presented version of the XSL attack always gives always more than the exhaustive search for Rijndael, it seems to (marginally) break 256-bit Serpent. We suggest a new criterion for design of S-boxes in block ciphers: they should not be describable by a system of polynomial equations that is too small or too overdefined.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Continuous monitoring of diesel engine performance is critical for early detection of fault developments in an engine before they materialize into a functional failure. Instantaneous crank angular speed (IAS) analysis is one of a few nonintrusive condition monitoring techniques that can be utilized for such a task. Furthermore, the technique is more suitable for mass industry deployments than other non-intrusive methods such as vibration and acoustic emission techniques due to the low instrumentation cost, smaller data size and robust signal clarity since IAS is not affected by the engine operation noise and noise from the surrounding environment. A combination of IAS and order analysis was employed in this experimental study and the major order component of the IAS spectrum was used for engine loading estimation and fault diagnosis of a four-stroke four-cylinder diesel engine. It was shown that IAS analysis can provide useful information about engine speed variation caused by changing piston momentum and crankshaft acceleration during the engine combustion process. It was also found that the major order component of the IAS spectra directly associated with the engine firing frequency (at twice the mean shaft rotating speed) can be utilized to estimate engine loading condition regardless of whether the engine is operating at healthy condition or with faults. The amplitude of this order component follows a distinctive exponential curve as the loading condition changes. A mathematical relationship was then established in the paper to estimate the engine power output based on the amplitude of this order component of the IAS spectrum. It was further illustrated that IAS technique can be employed for the detection of a simulated exhaust valve fault in this study.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We study the natural problem of secure n-party computation (in the passive, computationally unbounded attack model) of the n-product function f G (x 1,...,x n ) = x 1 ·x 2 ⋯ x n in an arbitrary finite group (G,·), where the input of party P i is x i  ∈ G for i = 1,...,n. For flexibility, we are interested in protocols for f G which require only black-box access to the group G (i.e. the only computations performed by players in the protocol are a group operation, a group inverse, or sampling a uniformly random group element). Our results are as follows. First, on the negative side, we show that if (G,·) is non-abelian and n ≥ 4, then no ⌈n/2⌉-private protocol for computing f G exists. Second, on the positive side, we initiate an approach for construction of black-box protocols for f G based on k-of-k threshold secret sharing schemes, which are efficiently implementable over any black-box group G. We reduce the problem of constructing such protocols to a combinatorial colouring problem in planar graphs. We then give two constructions for such graph colourings. Our first colouring construction gives a protocol with optimal collusion resistance t < n/2, but has exponential communication complexity O(n*2t+1^2/t) group elements (this construction easily extends to general adversary structures). Our second probabilistic colouring construction gives a protocol with (close to optimal) collusion resistance t < n/μ for a graph-related constant μ ≤ 2.948, and has efficient communication complexity O(n*t^2) group elements. Furthermore, we believe that our results can be improved by further study of the associated combinatorial problems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The social media statistics of South Africa reveal an exponential increase in the use of social media. Libraries, as part of a community, cannot ignore this! Social media provide libraries instant and direct connection with their members regardless their geographical location. This paper explores social media use in libraries. The establishment of social media for the SABC Media Libraries is discussed to demonstrate a practical implementation of social media in libraries and archives. Tips and resources, with specific mention to Twitter and Facebook, as well as social media etiquette and social media policy guidelines are supplied. The literature of published articles and Infographic show the changing role of librarians in the social media era and the need for librarians to keep learning and update their skills to accommodate users’ needs. The focus should now be on how well we do social media for the library, not on whether we should do it or not! Keywords: Social Media, Libraries, Web 2.0, Librarians, Archives, SABC, South Africa.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The social media statistics of South Africa reveal an exponential increase in the use of social media. Libraries, as part of a community, cannot ignore this! Social media provide libraries instant and direct connection with their members regardless their geographical location. This paper explores social media use in libraries. The establishment of social media for the SABC Media Libraries is discussed to demonstrate a practical implementation of social media in libraries and archives. Tips and resources, with specific mention to Twitter and Facebook, as well as social media etiquette and social media policy guidelines are supplied. The literature of published articles and Infographic show the changing role of librarians in the social media era and the need for librarians to keep learning and update their skills to accommodate users’ needs. The focus should now be on how well we do social media for the library, not on whether we should do it or not!

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Thin plate spline finite element methods are used to fit a surface to an irregularly scattered dataset [S. Roberts, M. Hegland, and I. Altas. Approximation of a Thin Plate Spline Smoother using Continuous Piecewise Polynomial Functions. SIAM, 1:208--234, 2003]. The computational bottleneck for this algorithm is the solution of large, ill-conditioned systems of linear equations at each step of a generalised cross validation algorithm. Preconditioning techniques are investigated to accelerate the convergence of the solution of these systems using Krylov subspace methods. The preconditioners under consideration are block diagonal, block triangular and constraint preconditioners [M. Benzi, G. H. Golub, and J. Liesen. Numerical solution of saddle point problems. Acta Numer., 14:1--137, 2005]. The effectiveness of each of these preconditioners is examined on a sample dataset taken from a known surface. From our numerical investigation, constraint preconditioners appear to provide improved convergence for this surface fitting problem compared to block preconditioners.