998 resultados para over firing


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The double burden of childhood undernutrition and adult-onset adiposity in transitioning societies poses a significant public health challenge. The development of suboptimal lean body mass (LBM) could partly explain the link between these two forms of malnutrition. This review examines the evidence on both the role of nutrition in “developmental programming” of LBM and the nutritional influences that affect LBM throughout the life course. Studies from developing countries assessing the relationship of early nutrition with later LBM provide important insights. Overall, the evidence is consistent in suggesting a positive association of early nutritional status (indicated by birth weight and growth during first 2 years) with LBM in later life. Evidence on the impact of maternal nutritional supplementation during pregnancy on later LBM is inconsistent. In addition, the role of nutrients (protein, zinc, calcium, vitamin D) that can affect LBM throughout the life course is described. Promoting optimal intakes of these important nutrients throughout the life course is important for reducing childhood undernutrition as well as for improving the LBM of adults.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Most previous work on unconditionally secure multiparty computation has focused on computing over a finite field (or ring). Multiparty computation over other algebraic structures has not received much attention, but is an interesting topic whose study may provide new and improved tools for certain applications. At CRYPTO 2007, Desmedt et al introduced a construction for a passive-secure multiparty multiplication protocol for black-box groups, reducing it to a certain graph coloring problem, leaving as an open problem to achieve security against active attacks. We present the first n-party protocol for unconditionally secure multiparty computation over a black-box group which is secure under an active attack model, tolerating any adversary structure Δ satisfying the Q 3 property (in which no union of three subsets from Δ covers the whole player set), which is known to be necessary for achieving security in the active setting. Our protocol uses Maurer’s Verifiable Secret Sharing (VSS) but preserves the essential simplicity of the graph-based approach of Desmedt et al, which avoids each shareholder having to rerun the full VSS protocol after each local computation. A corollary of our result is a new active-secure protocol for general multiparty computation of an arbitrary Boolean circuit.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Small and medium firms (SMEs) that operate in global markets are vulnerable to external shocks in uncertain, hostile and volatile business environments given their limited resources and inexperience. In such environments entrepreneurial firms respond by making strategic choices to mitigate such vulnerabilities. This research examines one such important strategic choice – entrepreneurial posturing and its link to financial performance in Finnish SMEs during the global financial crisis. Findings suggest that the dimensions of entrepreneurial posturing have a differential effect on firm performance depending upon the severity of the business environment as well as the firm’s degree of internationalization. Implications for theory and practice are discussed and directions for future research provided.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A non-translating, long duration thunderstorm downburst has been simulated experimentally and numerically by modelling a spatially stationary steady flow impinging air jet. Velocity profiles were shown to compare well with an upper-bound of velocity measurements reported for full-scale microbursts. Velocity speed-up over a range of topographic features in simulated downburst flow was also tested with comparisons made to previous work in a similar flow, and also boundary layer wind tunnel experiments. It was found that the amplification measured above the crest of topographic features in simulated downburst flow was up to 35% less than that observed in boundary layer flow for all shapes tested. From the computational standpoint we conclude that the Shear Stress Transport (SST) model performs the best from amongst a range of eddy-viscosity and second moment closures tested for modelling the impinging jet flow.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mammographic density (MD) is a strong heritable risk factor for breast cancer, and may decrease with increasing parity. However, the biomolecular basis for MD-associated breast cancer remains unclear, and systemic hormonal effects on MD-associated risk is poorly understood. This study assessed the effect of murine peripartum states on high and low MD tissue maintained in a xenograft model of human MD. Method High and low MD human breast tissues were precisely sampled under radiographic guidance from prophylactic mastectomy specimens of women. The high and low MD tissues were maintained in separate vascularised biochambers in nulliparous or pregnant SCID mice for 4 weeks, or mice undergoing postpartum involution or lactation for three additional weeks. High and low MD biochamber material was harvested for histologic and radiographic comparisons during various murine peripartum states. High and low MD biochamber tissues in nulliparous mice were harvested at different timepoints for histologic and radiographic comparisons. Results High MD biochamber tissues had decreased stromal (p = 0.0027), increased adipose (p = 0.0003) and a trend to increased glandular tissue areas (p = 0.076) after murine postpartum involution. Stromal areas decreased (p = 0.042), while glandular (p = 0.001) and adipose areas (p = 0.009) increased in high MD biochamber tissues during lactation. A difference in radiographic density was observed in high (p = 0.0021) or low MD biochamber tissues (p = 0.004) between nulliparous, pregnant and involution groups. No differences in tissue composition were observed in high or low MD biochamber tissues maintained for different durations, although radiographic density increased over time. Conclusion High MD biochamber tissues had measurable histologic changes after postpartum involution or lactation. Alterations in radiographic density occurred in biochamber tissues between different peripartum states and over time. These findings demonstrate the dynamic nature of the human MD xenograft model, providing a platform for studying the biomolecular basis of MD-associated cancer risk. © 2013 Springer Science+Business Media New York.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Similarity solutions are carried out for flow of power law non-Newtonian fluid film on unsteady stretching surface subjected to constant heat flux. Free convection heat transfer induces thermal boundary layer within a semi-infinite layer of Boussinesq fluid. The nonlinear coupled partial differential equations (PDE) governing the flow and the boundary conditions are converted to a system of ordinary differential equations (ODE) using two-parameter groups. This technique reduces the number of independent variables by two, and finally the obtained ordinary differential equations are solved numerically for the temperature and velocity using the shooting method. The thermal and velocity boundary layers are studied by the means of Prandtl number and non-Newtonian power index plotted in curves.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We have used a tandem pair of supersonic nozzles to produce clean samples of CH3OO radicals in cryogenic matrices. One hyperthermal nozzle decomposes azomethane (CH3NNCH3) to generate intense pulses of CH3 radicals, While the second nozzle alternately fires a burst Of O-2/Ar at the 20 K matrix. The CH3/O-2/20 K argon radical sandwich acts to produce target methylperoxyl radicals: CH3 + O-2 --> CH3OO. The absorption spectra of the radicals are monitored with a Fourier transform infrared spectrometer. We report 10 of the 12 fundamental infrared bands of the methylperoxyl radical CH3OO, (X) over tilde (2)A", in an argon matrix at 20 K. The experimental frequencies (cm(-1)) and polarizations follow: the a' modes are 3032, 2957, 1448, 1410, 1180, 1109, 90, 492, while the a" modes are 3024 and 1434. We cannot detect the asymmetric CH3 rocking mode, nu(11), nor the torsion, nu(12). The infrared spectra of (CH3OO)-O-18-O-18, (CH3OO)-C-13, and CD3OO have been measured as well in order to determine the isotopic shifts. The experimental frequencies, {nu}, for the methylperoxyl radicals are compared to harmonic frequencies, {omega}, resulting from a UB3LYP/6-311G(d,p) electronic structure calculation. Linear dichroism spectra were measured with photooriented radical samples in order to establish the experimental polarizations of most vibrational bands. The methylperoxyl radical matrix frequencies listed above are within +/-2% of the gas-phase vibrational frequencies. A final set of vibrational frequencies for the H radical, are recommended. See also http://ellison.colorado.edu/methylperoxyl.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

PURPOSE To investigate changes in the characteristics of the corneal optics, total optics, anterior biometrics and axial length of the eye during a near task, in downward gaze, over 10 min. METHODS Ten emmetropes (mean - 0.14 ± 0.24 DS) and 10 myopes (mean - 2.26 ± 1.42 DS) aged from 18 to 30 years were recruited. To measure ocular biometrics and corneal topography in downward gaze, an optical biometer (Lenstar LS900) and a rotating Scheimpflug camera (Pentacam HR) were inclined on a custom built, height and tilt adjustable table. The total optics of the eye were measured in downward gaze with binocular fixation using a modified Shack-Hartmann wavefront sensor. Initially, subjects performed a distance viewing task at primary gaze for 10 min to provide a "wash-out" period for prior visual tasks. A distance task (watching video at 6 m) in downward gaze (25°) and a near task (watching video on a portable LCD screen with 2.5 D accommodation demand) in primary gaze and 25°downward gaze were then carried out, each for 10 min in a randomized order. During measurements, in dichoptic view, a Maltese cross was fixated with the right (untested) eye and the instrument’s fixation target was fixated with the subject’s tested left eye. Immediately after (0 min), 5 and 10 min from the commencement of each trial, measurements of ocular parameters were acquired in downward gaze. RESULTS Axial length exhibited a significant increase with downward gaze and accommodation over time (p<0.05). The greatest axial elongation was observed in downward gaze with 2.5 D accommodation after 10 min (mean change from baseline 23±3 µm). Downward gaze also caused greater changes in anterior chamber depth (ACD) and lens thickness (LT) with accommodation (ACD mean change -163±12µm at 10 min; LT mean change 173±17 µm at 10 min) compared to primary gaze with accommodation (ACD mean change -138±12µm at 10 min; LT mean change 131±15 µm at 10 min). Both corneal power and total ocular power changed by a small but significant amount with downward gaze (p<0.05), resulting in a myopic shift (~0.10 D) in the spherical power of the eye compared with primary gaze. CONCLUSION The axial length, anterior biometrics and ocular refraction change significantly with accommodation in downward gaze as a function of time. These findings provide new insights into the optical and bio-mechanical changes of the eye during typical near tasks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In Baker Johnson Lawyers v Jorgensen [2002] QDC 205 McGill DCJ considered the meaning of a 'no win, no fee' retainer and concluded that, in the absence of qualification by agreement, solicitors retained on that basis were not entitled to recover costs exceeding the amount of any judgment or settlement.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The work investigates cheating prevention in secret sharing. It is argued that cheating is immune against cheating if the cheaters gain no advantage over honest participants by submitting invalid shares to the combiner. This work addresses the case when shares and the secret are taken from GF(pt). Two models are considered. The first one examines the case when cheaters consistently submit always invalid shares. The second modeldeal s with cheaters who submit a mixture of valid and invalid shares. For these two models, cheating immunity is defined, properties of cheating immune secret sharing are investigated and their constructions are given.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We consider the following problem: users in a dynamic group store their encrypted documents on an untrusted server, and wish to retrieve documents containing some keywords without any loss of data confidentiality. In this paper, we investigate common secure indices which can make multi-users in a dynamic group to obtain securely the encrypted documents shared among the group members without re-encrypting them. We give a formal definition of common secure index for conjunctive keyword-based retrieval over encrypted data (CSI-CKR), define the security requirement for CSI-CKR, and construct a CSI-CKR based on dynamic accumulators, Paillier’s cryptosystem and blind signatures. The security of proposed scheme is proved under strong RSA and co-DDH assumptions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We study the multicast stream authentication problem when an opponent can drop, reorder and inject data packets into the communication channel. In this context, bandwidth limitation and fast authentication are the core concerns. Therefore any authentication scheme is to reduce as much as possible the packet overhead and the time spent at the receiver to check the authenticity of collected elements. Recently, Tartary and Wang developed a provably secure protocol with small packet overhead and a reduced number of signature verifications to be performed at the receiver. In this paper, we propose an hybrid scheme based on Tartary and Wang’s approach and Merkle hash trees. Our construction will exhibit a smaller overhead and a much faster processing at the receiver making it even more suitable for multicast than the earlier approach. As Tartary and Wang’s protocol, our construction is provably secure and allows the total recovery of the data stream despite erasures and injections occurred during transmission.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The effect of an ordered array of nanocones on a conducting substrate immersed in the plasma on the transport of the plasma ions is investigated. The real conical shape of the cones is rigorously incorporated into the model. The movement of 10^5 CH3+ ions in the plasma sheath modified by the nanocone array is simulated. The ions are driven by the electric fields produced by the sheath and the nanostructures. The surface charge density and the total charge on the nanotips with different aspect ratios are computed. The ion transport simulation provides important characteristics of the displacement and velocity of the ions. The relative ion distribution along the lateral surfaces of the carbon nanotips is computed as well. It is shown that a rigorous account of the realistic nanostructure shape leads to very different distribution of the ion fluxes on the nanostructured surfaces compared to the previously reported works. The ion flux distribution is a critical factor in the nucleation process on the substrate and determines the nanostructure growth patterns.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Passively protected railway crossings are a major rail safety issue in Australia. Such crossings cannot be upgraded as such crossings are too numerous and the cost involved is prohibitive. Advanced Driver Assistance Systems (ADAS) have been shown to improve road safety and are widely used. These systems could be a solution to improve safety of passively protected crossings at a lower cost. Such complementary ADAS could result in driver’s over-trust due to the absence of Humane Machine Interface reflecting the quality of the information or the state of the ADAS (failure status). This paper demonstrates that driver’s exposure to crossing exhibiting fail-safe and non-fail safe properties could result in improperly allocating trust between technologies. We conducted a driving simulator study where participants (N=58) were exposed to three types of level crossing warning system on passive and active crossings. The results show that a significant proportion of participants over-trust the ADAS. Such drivers exhibit the same driving performance with the ADAS as when exposed to infrastructure based active crossing protection. They do not take the necessary safety precautions as they have a faster speed approach, reduced number of gaze toward the rail tracks and fail to stop at the crossing.