903 resultados para Doctors Without Borders
Resumo:
Ti0.97Pt0.032+O1.97 and Ti0.97Pt0.034+O2 have been synthesized by a solution combustion method using alanine and glycine as the fuels, respectively. Both crystallize in anatase TiO2 structure with 15 nm average crystallite size. X-ray photoelectron spectroscopy (XPS) confirmed Pt ions are in the 2+ state in Ti0.97Pt0.03O1.97 (alanine) and 4+ state in Ti0.97Pt0.03O2 (glycine). The rate of CO oxidation occurring over Ti0.97Pt0.032+O1.97 (0.76 mu mol.g(-1).s(-1)) is similar to 10, times more than that over Ti0.97Pt0.034+O2 at 60 degrees C (0.08 mu mol.g(-1).s(-1)). A large shift in 100% hydrocarbons conversion to lower temperature was observed for Pt2+ ion-substituted TiO2 relative 10 that for Pt4+ ion-substituted TiO2. After reoxidation of the reduced compound by H-2 as well as CO, Pt ions are stabilized in mixed valences, 2+ and 4+ states. The role of oxide ion vacancy has been demonstrated by CO oxidation and H-2 + O-2 recombination reactions in the presence and absence of O-2. We analyze the activated lattice oxygens upon substitution of Pt2+ and Pt4+ ions in TiO2, using first-principles density functional theory (DFT) calculations with supercells of Ti31Pt1O63, Ti30Pt2O62, and Ti29Pt3O61 for Pt2+ ion substitution and Ti31Pt1O64, Ti30Pt2O62, and Ti29Pt3O61 for Pt4+ ion substitution in TiO2. We find that the local structure of Pt2+ ion has a distorted square planar geometry and that of Pt4+ ion has an octahedral geometry similar to that of Ti4+ ion in pure TiO2. The change in coordination of Pt2+ ion gives rise to weakly bonded oxygens, and these oxygens are involved in high rates of catalytic reaction. Thus, the high catalytic activity results from synergistic roles of Pt2+ ion and oxide ion vacancy and weakly bonded lattice oxygen.
Resumo:
We consider a two user fading Multiple Access Channel with a wire-tapper (MAC-WT) where the transmitter has the channel state information (CSI) to the intended receiver but not to the eavesdropper (eve). We provide an achievable secrecy sum-rate with optimal power control. We next provide a secrecy sum-rate with optimal power control and cooperative jamming (CJ). We then study an achievable secrecy sum rate by employing an ON/OFF power control scheme which is more easily computable. We also employ CJ over this power control scheme. Results show that CJ boosts the secrecy sum-rate significantly even if we do not know the CSI of the eve's channel. At high SNR, the secrecy sum-rate (with CJ) without CSI of the eve exceeds the secrecy sum-rate (without CJ) with full CSI of the eve.
Resumo:
Stainless steel of type AISI 316LN - one of the structural materials of fast neutron reactors - must have a long service life under conditions that subject it to different types of wear (galling, adhesion, fretting, and abrasion). Cobalt-based hard facings are generally avoided due to induced radioactivity. Nickel-based hard facings are strongly preferred instead. One alternative to both types of coatings is a hard-alloy coating of CrN. This article examines wear and friction characteristics during the sliding of uncoated steel SS316LN and the same steel with a CrN coating. In addition, a specially designed pin-on-disk tribometer is used to perform tests in a vacuum at temperatures of up to 1000 degrees C in order to study the effect of oxygen on the wear of these materials. The morphology of the wear surface and the structure of the subsurface were studied by scanning electron microscopy. The formation of an adhesion layer and the self-welding of mating parts are seen to take place in the microstructure at temperatures above 500 degrees C. It is also found that steel SS316LN undergoes shear strain during sliding wear. The friction coefficient depends on the oxygen content, load, and temperature, while the wear rate depends on the strain-hardening of the surface of the material being tested.
Resumo:
Feeding 9-10billion people by 2050 and preventing dangerous climate change are two of the greatest challenges facing humanity. Both challenges must be met while reducing the impact of land management on ecosystem services that deliver vital goods and services, and support human health and well-being. Few studies to date have considered the interactions between these challenges. In this study we briefly outline the challenges, review the supply- and demand-side climate mitigation potential available in the Agriculture, Forestry and Other Land Use AFOLU sector and options for delivering food security. We briefly outline some of the synergies and trade-offs afforded by mitigation practices, before presenting an assessment of the mitigation potential possible in the AFOLU sector under possible future scenarios in which demand-side measures codeliver to aid food security. We conclude that while supply-side mitigation measures, such as changes in land management, might either enhance or negatively impact food security, demand-side mitigation measures, such as reduced waste or demand for livestock products, should benefit both food security and greenhouse gas (GHG) mitigation. Demand-side measures offer a greater potential (1.5-15.6Gt CO2-eq. yr(-1)) in meeting both challenges than do supply-side measures (1.5-4.3Gt CO2-eq. yr(-1) at carbon prices between 20 and 100US$ tCO(2)-eq. yr(-1)), but given the enormity of challenges, all options need to be considered. Supply-side measures should be implemented immediately, focussing on those that allow the production of more agricultural product per unit of input. For demand-side measures, given the difficulties in their implementation and lag in their effectiveness, policy should be introduced quickly, and should aim to codeliver to other policy agenda, such as improving environmental quality or improving dietary health. These problems facing humanity in the 21st Century are extremely challenging, and policy that addresses multiple objectives is required now more than ever.
Resumo:
The world is in the midst of a biodiversity crisis, threatening essential goods and services on which humanity depends. While there is an urgent need globally for biodiversity research, growing obstacles are severely limiting biodiversity research throughout the developing world, particularly in Southeast Asia. Facilities, funding, and expertise are often limited throughout this region, reducing the capacity for local biodiversity research. Although western scientists generally have more expertise and capacity, international research has sometimes been exploitative ``parachute science,'' creating a culture of suspicion and mistrust. These issues, combined with misplaced fears of biopiracy, have resulted in severe roadblocks to biodiversity research in the very countries that need it the most. Here, we present an overview of challenges to biodiversity research and case studies that provide productive models for advancing biodiversity research in developing countries. Key to success is integration of research and education, a model that fosters sustained collaboration by focusing on the process of conducting biodiversity research as well as research results. This model simultaneously expands biodiversity research capacity while building trust across national borders. It is critical that developing countries enact policies that protect their biodiversity capital without shutting down international and local biodiversity research that is essential to achieve the long-term sustainability of biodiversity, promoting food security and economic development.
Self-organized public key management in MANETs with enhanced security and without certificate-chains
Resumo:
In the self-organized public key management approaches, public key verification is achieved through verification routes constituted by the transitive trust relationships among the network principals. Most of the existing approaches do not distinguish among different available verification routes. Moreover, to ensure stronger security, it is important to choose an appropriate metric to evaluate the strength of a route. Besides, all of the existing self-organized approaches use certificate-chains for achieving authentication, which are highly resource consuming. In this paper, we present a self-organized certificate-less on-demand public key management (CLPKM) protocol, which aims at providing the strongest verification routes for authentication purposes. It restricts the compromise probability for a verification route by restricting its length. Besides, we evaluate the strength of a verification route using its end-to-end trust value. The other important aspect of the protocol is that it uses a MAC function instead of RSA certificates to perform public key verifications. By doing this, the protocol saves considerable computation power, bandwidth and storage space. We have used an extended strand space model to analyze the correctness of the protocol. The analytical, simulation, and the testbed implementation results confirm the effectiveness of the proposed protocol. (c) 2014 Elsevier B.V. All rights reserved.
Resumo:
Since its induction, the selective-identity (sID) model for identity-based cryptosystems and its relationship with various other notions of security has been extensively studied. As a result, it is a general consensus that the sID model is much weaker than the full-identity (ID) model. In this paper, we study the sID model for the particular case of identity-based signatures (IBS). The main focus is on the problem of constructing an ID-secure IBS given an sID-secure IBS without using random oracles-the so-called standard model-and with reasonable security degradation. We accomplish this by devising a generic construction which uses as black-box: i) a chameleon hash function and ii) a weakly-secure public-key signature. We argue that the resulting IBS is ID-secure but with a tightness gap of O(q(s)), where q(s) is the upper bound on the number of signature queries that the adversary is allowed to make. To the best of our knowledge, this is the first attempt at such a generic construction.
Resumo:
Given a connected outerplanar graph G of pathwidth p, we give an algorithm to add edges to G to get a supergraph of G, which is 2-vertex-connected, outerplanar and of pathwidth O(p). This settles an open problem raised by Biedl 1], in the context of computing minimum height planar straight line drawings of outerplanar graphs, with their vertices placed on a two-dimensional grid. In conjunction with the result of this paper, the constant factor approximation algorithm for this problem obtained by Biedl 1] for 2-vertex-connected outerplanar graphs will work for all outer planar graphs. (C) 2014 Elsevier B.V. All rights reserved.
Resumo:
A new generator topology for microhydel power plants, capable of unsupervised operation, is proposed. While conventional microhydel plants operate at constant speed with switched ballast loads, the proposed generator, based on the wound rotor induction machine, operates at variable speed and does away with the need for ballast loads. This increases reliability and substantially decreases system costs and setup times. The proposed generator has a simplified decoupled control structure with stator-referenced voltage control similar to a conventional synchronous generator, and rotor-side frequency control that is facilitated by rotating electronics mounted on the rotor. While this paper describes an isolated plant, the topology can also be tailored for distributed generation enabling conversion of the available hydraulic power into useful electrical power when the grid is present, and supplying local loads in the event of grid outage.
Resumo:
Current organic semiconductors for organic photovoltaics (OPV) have relative dielectric constants (relative permittivities, epsilon(r)) in the range of 2-4. As a consequence, Coulombically bound electron-hole pairs (excitons) are produced upon absorption of light, giving rise to limited power conversion efficiencies. We introduce a strategy to enhance epsilon(r) of well-known donors and acceptors without breaking conjugation, degrading charge carrier mobility or altering the transport gap. The ability of ethylene glycol (EG) repeating units to rapidly reorient their dipoles with the charge redistributions in the environment was proven via density functional theory (DFT) calculations. Fullerene derivatives functionalized with triethylene glycol side chains were studied for the enhancement of epsilon(r) together with poly(p-phenylene vinylene) and diketo-pyrrolopyrrole based polymers functionalized with similar side chains. The polymers showed a doubling of epsilon(r) with respect to their reference polymers in identical backbone. Fullerene derivatives presented enhancements up to 6 compared with phenyl-C-61-butyric acid methyl ester (PCBM) as the reference. Importantly, the applied modifications did not affect the mobility of electrons and holes and provided excellent solubility in common organic solvents.
Resumo:
Conditions for the existence of heterochromatic Hamiltonian paths and cycles in edge colored graphs are well investigated in literature. A related problem in this domain is to obtain good lower bounds for the length of a maximum heterochromatic path in an edge colored graph G. This problem is also well explored by now and the lower bounds are often specified as functions of the minimum color degree of G - the minimum number of distinct colors occurring at edges incident to any vertex of G - denoted by v(G). Initially, it was conjectured that the lower bound for the length of a maximum heterochromatic path for an edge colored graph G would be 2v(G)/3]. Chen and Li (2005) showed that the length of a maximum heterochromatic path in an edge colored graph G is at least v(G) - 1, if 1 <= v(G) <= 7, and at least 3v(G)/5] + 1 if v(G) >= 8. They conjectured that the tight lower bound would be v(G) - 1 and demonstrated some examples which achieve this bound. An unpublished manuscript from the same authors (Chen, Li) reported to show that if v(G) >= 8, then G contains a heterochromatic path of length at least 120 + 1. In this paper, we give lower bounds for the length of a maximum heterochromatic path in edge colored graphs without small cycles. We show that if G has no four cycles, then it contains a heterochromatic path of length at least v(G) - o(v(G)) and if the girth of G is at least 4 log(2)(v(G)) + 2, then it contains a heterochromatic path of length at least v(G) - 2, which is only one less than the bound conjectured by Chen and Li (2005). Other special cases considered include lower bounds for the length of a maximum heterochromatic path in edge colored bipartite graphs and triangle-free graphs: for triangle-free graphs we obtain a lower bound of 5v(G)/6] and for bipartite graphs we obtain a lower bound of 6v(G)-3/7]. In this paper, it is also shown that if the coloring is such that G has no heterochromatic triangles, then G contains a heterochromatic path of length at least 13v(G)/17)]. This improves the previously known 3v(G)/4] bound obtained by Chen and Li (2011). We also give a relatively shorter and simpler proof showing that any edge colored graph G contains a heterochromatic path of length at least (C) 2015 Elsevier Ltd. All rights reserved.
Resumo:
Organisms quickly learn about their surroundings and display synaptic plasticity which is thought to be critical for their survival. For example, fruit flies Drosophila melanogaster exposed to highly enriched social environment are found to show increased synaptic connections and a corresponding increase in sleep. Here we asked if social environment comprising a pair of same-sex individuals could enhance sleep in the participating individuals. To study this, we maintained individuals of D. melanogaster in same-sex pairs for a period of 1 to 4 days, and after separation, monitored sleep of the previously socialized and solitary individuals under similar conditions. Males maintained in pairs for 3 or more days were found to sleep significantly more during daytime and showed a tendency to fall asleep sooner as compared to solitary controls (both measures together are henceforth referred to as ``sleep-enhancement''). This sleep phenotype is not strain-specific as it is observed in males from three different ``wild type'' strains of D. melanogaster. Previous studies on social interaction mediated sleep-enhancement presumed `waking experience' during the interaction to be the primary underlying cause; however, we found sleep-enhancement to occur without any significant increase in wakefulness. Furthermore, while sleep-enhancement due to group-wise social interaction requires Pigment Dispersing Factor (PDF) positive neurons; PDF positive and CRYPTOCHROME (CRY) positive circadian clock neurons and the core circadian clock genes are not required for sleep-enhancement to occur when males interact in pairs. Pair-wise social interaction mediated sleep-enhancement requires dopamine and olfactory signaling, while visual and gustatory signaling systems seem to be dispensable. These results suggest that socialization alone (without any change in wakefulness) is sufficient to cause sleep-enhancement in fruit fly D. melanogaster males, and that its neuronal control is context-specific.