967 resultados para Binary systems
Resumo:
The binary A(8)B phase (prototype Pt(8)Ti) has been experimentally observed in 11 systems. A high-throughput search over all the binary transition intermetallics, however, reveals 59 occurrences of the A(8)B phase: Au(8)Zn(dagger), Cd(8)Sc(dagger), Cu(8)Ni(dagger), Cu(8)Zn(dagger), Hg(8)La, Ir(8)Os(dagger), Ir(8)Re, Ir(8)Ru(dagger), Ir(8)Tc, Ir(8)W(dagger), Nb(8)Os(dagger), Nb(8)Rh(dagger), Nb(8)Ru(dagger), Nb(8)Ta(dagger), Ni(8)Fe, Ni(8)Mo(dagger)*, Ni(8)Nb(dagger)*, Ni(8)Ta*, Ni(8)V*, Ni(8)W, Pd(8)Al(dagger), Pd(8)Fe, Pd(8)Hf, Pd(8)Mn, Pd(8)Mo*, Pd(8)Nb, Pd(8)Sc, Pd(8)Ta, Pd(8)Ti, Pd(8)V*, Pd(8)W*, Pd(8)Zn, Pd(8)Zr, Pt(8)Al(dagger), Pt(8)Cr*, Pt(8)Hf, Pt(8)Mn, Pt(8)Mo, Pt(8)Nb, Pt(8)Rh(dagger), Pt(8)Sc, Pt(8)Ta, Pt(8)Ti*, Pt(8)V*, Pt(8)W, Pt(8)Zr*, Rh(8)Mo, Rh(8)W, Ta(8)Pd, Ta(8)Pt, Ta(8)Rh, V(8)Cr(dagger), V(8)Fe(dagger), V(8)Ir(dagger), V(8)Ni(dagger), V(8)Pd, V(8)Pt, V(8)Rh, and V(8)Ru(dagger) ((dagger) = metastable, * = experimentally observed). This is surprising for the wealth of new occurrences that are predicted, especially in well-characterized systems (e.g., Cu-Zn). By verifying all experimental results while offering additional predictions, our study serves as a striking demonstration of the power of the high-throughput approach. The practicality of the method is demonstrated in the Rh-W system. A cluster-expansion-based Monte Carlo model reveals a relatively high order-disorder transition temperature.
Resumo:
We attempt to construct a unified evolutionary scheme that includes post-AGB systems, barium stars, symbiotics and related systems, explaining their similarities as well as their differences. Special attention is given to the comparison of the barium pollution and symbiotic phenomena. Finally, we outline a 'transient torus' evolutionary scenario that makes use of the various observational and theoretical hints and aims at explaining the observed characteristics of the relevant systems.
Resumo:
This paper describes work towards the deployment of flexible self-management into real-time embedded systems. A challenging project which focuses specifically on the development of a dynamic, adaptive automotive middleware is described, and the specific self-management requirements of this project are discussed. These requirements have been identified through the refinement of a wide-ranging set of use cases requiring context-sensitive behaviours. A sample of these use-cases is presented to illustrate the extent of the demands for self-management. The strategy that has been adopted to achieve self-management, based on the use of policies is presented. The embedded and real-time nature of the target system brings the constraints that dynamic adaptation capabilities must not require changes to the run-time code (except during hot update of complete binary modules), adaptation decisions must have low latency, and because the target platforms are resource-constrained the self-management mechanism have low resource requirements (especially in terms of processing and memory). Policy-based computing is thus and ideal candidate for achieving the self-management because the policy itself is loaded at run-time and can be replaced or changed in the future in the same way that a data file is loaded. Policies represent a relatively low complexity and low risk means of achieving self-management, with low run-time costs. Policies can be stored internally in ROM (such as default policies) as well as externally to the system. The architecture of a designed-for-purpose powerful yet lightweight policy library is described. A suitable evaluation platform, supporting the whole life-cycle of feasibility analysis, concept evaluation, development, rigorous testing and behavioural validation has been devised and is described.
Resumo:
A zone based systems design framework is described and utilised in the implementation of a message authentication code (MAC) algorithm based on symmetric key block ciphers. The resulting block cipher based MAC algorithm may be used to provide assurance of the authenticity and, hence, the integrity of binary data. Using software simulation to benchmark against the de facto cipher block chaining MAC (CBC-MAC) variant used in the TinySec security protocol for wireless sensor networks and the NIST cipher block chaining MAC standard, CMAC; we show that our zone based systems design framework can lead to block cipher based MAC constructs that point to improvements in message processing efficiency, processing throughput and processing latency.
Resumo:
Experimental data of the adsorption of reactive dyestuffs onto Filtrasorb 400 activated carbon (FS400) were determined in an equilibrium isotherm study. As most industrial wastewater contains more than one pollutant, an investigation into the effect of multisolute systems (using the unhydrolysed form of the reactive dyes) on the adsorption capacity was undertaken. Equilibrium isotherm models were employed to describe the adsorption capacities of single, binary and ternary dye solutions. The results of these analyses showed that adsorption of reactive dyes from single and multisolute systems can be successfully described by Langmuir, and Redlich–Peterson equilibrium isotherm models. Experimental data indicated that competitive adsorption for active sites on the carbon surface results in a reduction in the overall uptake capacity of the reactive dyes investigated.
Resumo:
Raman spectra of the ionic liquids, 1-butyl-3-methylimidazolium hexafluorophosphate ([C(4)mim][PF(6)]), 1-hexyl-3-methylimidazolium chloride ([C(6)mim]Cl), and 1-hexyl-3-methylimidazolium hexafluorophosphate ([C(6)mim][PF(6)]), and binary mixtures thereof, have been assigned using ab initio MP2 calculations. The previously reported anti and gauche forms of the [C(4)mim](+) cation have been observed, and this study reveals this to be a general feature of the long-chain I-alkyl derivatives. Analysis of mixtures Of [C(6)mim]Cl and [C(6)mim][PF(6)] has provided information on the nature of the hydrogen bonding between the imidazolium headgroup and the anions, and the invariance of the essentially 50:50 mixture of the predominant conformers informs on the nature of glass formation in these systems.
Resumo:
A long-standing and unverified prediction of binary star evolution theory is the existence of a population of white dwarfs accreting from substellar donor stars. Such systems ought to be common, but the difficulty of finding them, combined with the challenge of detecting the donor against the light from accretion, means that no donor star to date has a measured mass below the hydrogen burning limit. We applied a technique that allowed us to reliably measure the mass of the unseen donor star in eclipsing systems. We were able to identify a brown dwarf donor star, with a mass of 0.052 ± 0.002 solar mass. The relatively high mass of the donor star for its orbital period suggests that current evolutionary models may underestimate the radii of brown dwarfs.
Resumo:
We investigate the effects that star-spots have on the light curves of eclipsing binaries, and in particular how they may affect the accurate measurement of eclipse timings. Concentrating on systems containing a low-mass main-sequence star and a white dwarf, we find that if star-spots exhibit the Wilson depression they can alter the times of primary eclipse ingress and egress by several seconds for typical binary parameters and star-spot depressions. In addition, we find that the effect on the eclipse ingress/egress times becomes more profound for lower orbital inclinations. We show how it is possible, in principle, to determine estimates of both the binary inclination and the depth of the Wilson depression from light curve analysis.
Resumo:
The brightness of type Ia supernovae, and their homogeneity as a class, makes them powerful tools in cosmology, yet little is known about the progenitor systems of these explosions. They are thought to arise when a white dwarf accretes matter from a companion star, is compressed and undergoes a thermonuclear explosion(1-3). Unless the companion star is another white dwarf ( in which case it should be destroyed by the mass-transfer process itself), it should survive and show distinguishing properties. Tycho's supernova(4,5) is one of only two type Ia supernovae observed in our Galaxy, and so provides an opportunity to address observationally the identification of the surviving companion. Here we report a survey of the central region of its remnant, around the position of the explosion, which excludes red giants as the mass donor of the exploding white dwarf. We found a type G0 - G2 star, similar to our Sun in surface temperature and luminosity ( but lower surface gravity), moving at more than three times the mean velocity of the stars at that distance, which appears to be the surviving companion of the supernova.
Resumo:
Conventional approaches of digital modulation schemes make use of amplitude, frequency and/or phase as modulation characteristic to transmit data. In this paper, we exploit circular polarization (CP) of the propagating electromagnetic carrier as modulation attribute which is a novel concept in digital communications. The requirement of antenna alignment to maximize received power is eliminated for CP signals and these are not affected by linearly polarized jamming signals. The work presents the concept of Circular Polarization Modulation for 2, 4 and 8 states of carrier and refers them as binary circular polarization modulation (BCPM), quaternary circular polarization modulation (QCPM) and 8-state circular polarization modulation (8CPM) respectively. Issues of modulation, demodulation, 3D symbol constellations and 3D propagating waveforms for the proposed modulation schemes are presented and analyzed in the presence of channel effects, and they are shown to have the same bit error performance in the presence of AWGN compared with conventional schemes while provide 3dB gain in the flat Rayleigh fading channel.
Resumo:
Privacy region protection in video surveillance systems is an active topic at present. In previous research, a binary mask mechanism has been developed to indicate the privacy region; however this incurs a significant bitrate overhead. In this paper, an adaptive binary mask is proposed to represent the privacy region. In a practical privacy region protection application, in which the privacy region typically occupies less than half of the overall frame and is rectangular or approximately rectangular, the proposed adaptive binary mask can effectively reduce the bitrate overhead. The proposed method can also be easily applied to the FMO mechanism of H.264/AVC, providing both error resilience and a lower bitrate overhead.
Resumo:
In the present work, the solid–liquid–liquid equilibrium in the binary system of diethylamine (1) and ionic liquid (2) 1-methyl-3-ethylimidazolium bis(trifluoromethylsulfonyl)imide and solid–liquid equilibrium in system 1-methyl-3-butylimidazolium bis(trifluoromethylsulfonyl)imide was studied. Phase equilibrium was determined experimentally by means of a polythermic method. These data were then used to determine the activity coefficients for both ionic liquids. For the pure diethylamine the enthalpy of fusion was determined by differential scanning calorimetry, because to the best of our knowledge, this data is not yet reported in the open literature, a contrario of pure ionic liquids tested during this work.
Resumo:
The recently-discovered ability of small logical molecules to recognize edges is exploited to achieve outline drawing from binary templates. Outlines of arbitrary curvature, several colours and thicknesses down to 1 mm are drawn in around 30 min or less by employing a common laboratory two-colour ultraviolet lamp. The outlines and the light dose-driven XOR logic with fluorescence output or ‘off-on-off’ action which is observed in the irradiated regions are modelled by combining foundational principles of photochemistry, acid-base neutralization and diffusion.
Resumo:
O tema principal desta tese é o problema de cancelamento de interferência para sistemas multi-utilizador, com antenas distribuídas. Como tal, ao iniciar, uma visão geral das principais propriedades de um sistema de antenas distribuídas é apresentada. Esta descrição inclui o estudo analítico do impacto da ligação, dos utilizadores do sistema, a mais antenas distribuídas. Durante essa análise é demonstrado que a propriedade mais importante do sistema para obtenção do ganho máximo, através da ligação de mais antenas de transmissão, é a simetria espacial e que os utilizadores nas fronteiras das células são os mais bene ciados. Tais resultados são comprovados através de simulação. O problema de cancelamento de interferência multi-utilizador é considerado tanto para o caso unidimensional (i.e. sem codi cação) como para o multidimensional (i.e. com codi cação). Para o caso unidimensional um algoritmo de pré-codi cação não-linear é proposto e avaliado, tendo como objectivo a minimização da taxa de erro de bit. Tanto o caso de portadora única como o de multipla-portadora são abordados, bem como o cenário de antenas colocadas e distribuidas. É demonstrado que o esquema proposto pode ser visto como uma extensão do bem conhecido esquema de zeros forçados, cuja desempenho é provado ser um limite inferior para o esquema generalizado. O algoritmo é avaliado, para diferentes cenários, através de simulação, a qual indica desempenho perto do óptimo, com baixa complexidade. Para o caso multi-dimensional um esquema para efectuar "dirty paper coding" binário, tendo como base códigos de dupla camada é proposto. No desenvolvimento deste esquema, a compressão com perdas de informação, é considerada como um subproblema. Resultados de simulação indicam transmissão dedigna proxima do limite de Shannon.