6 resultados para Parental Origin
em Greenwich Academic Literature Archive - UK
Resumo:
An important factor for high-speed optical communication is the availability of ultrafast and low-noise photodetectors. Among the semiconductor photodetectors that are commonly used in today’s long-haul and metro-area fiber-optic systems, avalanche photodiodes (APDs) are often preferred over p-i-n photodiodes due to their internal gain, which significantly improves the receiver sensitivity and alleviates the need for optical pre-amplification. Unfortunately, the random nature of the very process of carrier impact ionization, which generates the gain, is inherently noisy and results in fluctuations not only in the gain but also in the time response. Recently, a theory characterizing the autocorrelation function of APDs has been developed by us which incorporates the dead-space effect, an effect that is very significant in thin, high-performance APDs. The research extends the time-domain analysis of the dead-space multiplication model to compute the autocorrelation function of the APD impulse response. However, the computation requires a large amount of memory space and is very time consuming. In this research, we describe our experiences in parallelizing the code in MPI and OpenMP using CAPTools. Several array partitioning schemes and scheduling policies are implemented and tested. Our results show that the code is scalable up to 64 processors on a SGI Origin 2000 machine and has small average errors.
Resumo:
Over the last three decades, the fire safety codes have been changing from a prescriptive approach to a performance-based one. Some countries, such as the USA, Sweden, New Zealand, Australia and the UK, are in an advanced stage of development and implementation of the performance-based codes. However, there are some difficulties in this process. Most of them are due to the uncertainties associated with fire design. For instance, one of the questions that need to be answered is how to select the most probable fire origin room (FOR)? On the other hand, to know where the FOR is located is also an important aspect in terms of forensic issues. Given that, to address this question is an important step for the establishment of fire designs (i.e., pre-fire phases) and also for fire investigations (i.e., post-fire phases). This paper proposes a methodology for selecting the FOR through the use of a mathematical multicriteria decision-making model: the analytical hierarchy process (AHP). The proposed method is then applied to a hypothetical study case. The results are presented and discussed in this paper.
Resumo:
Analysis of the generic attacks and countermeasures for block cipher based message authentication code algorithms (MAC) in sensor applications is undertaken; the conclusions are used in the design of two new MAC constructs Quicker Block Chaining MAC1 (QBC-MAC1) and Quicker Block Chaining MAC2 (QBC-MAC2). Using software simulation we show that our new constructs point to improvements in usage of CPU instruction clock cycle and energy requirement when benchmarked against the de facto Cipher Block Chaining MAC (CBC-MAC) based construct used in the TinySec security protocol for wireless sensor networks.
Resumo:
The paper first considers the role of Jungian ideas in relation to academic disciplines and to literary studies in particular. Jung is a significant resource in negotiating developments in literary theory because of his characteristic treatment of the ‘other’. The paper then looks at The Lion, the Witch and the Wardrobe (1950) by C.S. Lewis whose own construction of archetypes is very close to Jung’s. By drawing upon new post-Jungian work from Jerome Bernstein’s Living in the Borderland (2005), the novel is revealed to be intimately concerned with narratives of trauma and of origin. Indeed, a Jungian and post-Jungian approach is able to situate the text both within nature and in the historical traumas of war as well as the personal traumas of subjectivity. Where Bernstein connects his work to the postcolonial ethos of the modern Navajo shaman, this new weaving of literary and cultural theory points to the residue of shamanism within the arts of the West. [From the Publisher]
Resumo:
Purpose. To examine the thermal transition(s) between different polymorphic forms of Nifedipine and to define experimental conditions that lead to the generation of polymorph IV. Methods. Experiments were performed using a DSC 823e (Mettler Toledo). Nifedipine exists in four polymorphic forms, as well as an amorphous state. Examination of Nifedipine was conducted using the following method(s): cycle 1: 25ºC to 190ºC, 190ºC to 25ºC (formation of amorphous Nifedipine); cycle 2: 25ºC to X (60,70,80...150ºC), X to 25ºC; cycle 3: 25ºC to 190ºC and holding isothermally for 5 min between cycles (heating/cooling rate of 10ºC/min). Results. The amorphous state Nifedipine can sustain heating up to 90ºC without significant changes in its composition. Cycle 2 of amorphous material heated up to 90ºC shows only the glass transition at ~44ºC. In cycle 3 of the same material, a glass transition has been recorded at ~44ºC, followed by two exotherms (~100 and ~115ºC (crystallisation of polymorph III and II, respectively) and an endotherm (169ºC (melting of polymorphs I/II)). Samples that have been heated to temperatures between 100ºC and 120ºC in the second cycle showed a glass transition at ~44ºC and an additional exotherm at ~95ºC (crystallisation of polymorph III) on cooling a exotherm was observed at ~40ºC (crystallisation of polymorph IV). The same material showed no glass transition in cycle 3 but an endotherm at around 62ºC (melting of polymorph IV) an exotherm (~98ºC) and an endotherm (169ºC) melting of polymorph I/II. Heating the sample to a temperatures greater than 130ºC in cycle two results in a glass transition at ~44ºC, and two exotherms at ~102 and 125ºC (crystallisation of polymorphs III and I, respectively). Conclusions. DSC data suggests that polymorph IV can only be produced from amorphous or polymorph III samples. The presence of polymorph I or II drives the conversion of the less stable polymorphic form IV into the most stable form, I. Although form IV of Nifedipine can easily be created, following defined experimental conditions, it may only coexist with amorphous or polymorph III states. When polymorphs I and II are present in the sample polymorph IV cannot be etected.