3 resultados para synthesis technique
em Digital Commons at Florida International University
Resumo:
In broad terms — including a thief's use of existing credit card, bank, or other accounts — the number of identity fraud victims in the United States ranges 9-10 million per year, or roughly 4% of the US adult population. The average annual theft per stolen identity was estimated at $6,383 in 2006, up approximately 22% from $5,248 in 2003; an increase in estimated total theft from $53.2 billion in 2003 to $56.6 billion in 2006. About three million Americans each year fall victim to the worst kind of identity fraud: new account fraud. Names, Social Security numbers, dates of birth, and other data are acquired fraudulently from the issuing organization, or from the victim then these data are used to create fraudulent identity documents. In turn, these are presented to other organizations as evidence of identity, used to open new lines of credit, secure loans, “flip” property, or otherwise turn a profit in a victim's name. This is much more time consuming — and typically more costly — to repair than fraudulent use of existing accounts. ^ This research borrows from well-established theoretical backgrounds, in an effort to answer the question – what is it that makes identity documents credible? Most importantly, identification of the components of credibility draws upon personal construct psychology, the underpinning for the repertory grid technique, a form of structured interviewing that arrives at a description of the interviewee’s constructs on a given topic, such as credibility of identity documents. This represents substantial contribution to theory, being the first research to use the repertory grid technique to elicit from experts, their mental constructs used to evaluate credibility of different types of identity documents reviewed in the course of opening new accounts. The research identified twenty-one characteristics, different ones of which are present on different types of identity documents. Expert evaluations of these documents in different scenarios suggest that visual characteristics are most important for a physical document, while authenticated personal data are most important for a digital document. ^
Resumo:
Materials known as Mn+1AXn phases, where n is 1, 2, or 3, and M represents an early transition metal, A an A-group element, and X is either Carbon and/or Nitrogen [1], are fast becoming technologically important materials due to the interesting combination of unique properties. However, a lot of important information about the high temperature and high pressure behavior of many of these compounds is still missing, which needs to be determined systematically. ^ In this dissertation the synthesis of M2AC (M = Ti, V, Cr, Nb, Zr) and A = (Al, Sn, S) compounds by arc melting, vacuum sintering and piston cylinder synthesis is presented along with the synthesis of Zr 2SC, which has been synthesized for first time in bulk form, by piston cylinder technique. The microstructural analysis by electron microscopy and phase analysis by x-ray diffraction is presented next. Finally, a critical analysis of the behavior of these compounds under the application of extreme pressure (as high as 50 GPa) and temperature (≈ 1000°C) is presented. ^ The high pressure studies, up to 50 GPa, showed that these compounds were structurally intact and their bulk moduli ranged from 140 to 190 GPa. The high temperature studies in the inert atmosphere showed that the M 2SnC compounds were unstable above 650°C and the expansion along the a-axis was higher than that along the c-axis, unlike the other phases. M2SC compounds on the other hand showed negligible difference in the thermal expansion along the two axes. The oxidation study revealed that Ti2AC (Al, S) compounds had highest resistance to oxidation while the M2SnC compounds had the least. Furthermore, from the oxidation study of these compounds, which were short time oxidation experiments, it was found that all of these compounds oxidized to their respective binary oxides. ^
Resumo:
In broad terms — including a thief's use of existing credit card, bank, or other accounts — the number of identity fraud victims in the United States ranges 9-10 million per year, or roughly 4% of the US adult population. The average annual theft per stolen identity was estimated at $6,383 in 2006, up approximately 22% from $5,248 in 2003; an increase in estimated total theft from $53.2 billion in 2003 to $56.6 billion in 2006. About three million Americans each year fall victim to the worst kind of identity fraud: new account fraud. Names, Social Security numbers, dates of birth, and other data are acquired fraudulently from the issuing organization, or from the victim then these data are used to create fraudulent identity documents. In turn, these are presented to other organizations as evidence of identity, used to open new lines of credit, secure loans, “flip” property, or otherwise turn a profit in a victim's name. This is much more time consuming — and typically more costly — to repair than fraudulent use of existing accounts. This research borrows from well-established theoretical backgrounds, in an effort to answer the question – what is it that makes identity documents credible? Most importantly, identification of the components of credibility draws upon personal construct psychology, the underpinning for the repertory grid technique, a form of structured interviewing that arrives at a description of the interviewee’s constructs on a given topic, such as credibility of identity documents. This represents substantial contribution to theory, being the first research to use the repertory grid technique to elicit from experts, their mental constructs used to evaluate credibility of different types of identity documents reviewed in the course of opening new accounts. The research identified twenty-one characteristics, different ones of which are present on different types of identity documents. Expert evaluations of these documents in different scenarios suggest that visual characteristics are most important for a physical document, while authenticated personal data are most important for a digital document.