958 resultados para weak ferromagnetism
Resumo:
In this article, an enriched radial point interpolation method (e-RPIM) is developed for computational mechanics. The conventional radial basis function (RBF) interpolation is novelly augmented by the suitable basis functions to reflect the natural properties of deformation. The performance of the enriched meshless RBF shape functions is first investigated using the surface fitting. The surface fitting results have proven that, compared with the conventional RBF, the enriched RBF interpolation has a much better accuracy to fit a complex surface than the conventional RBF interpolation. It has proven that the enriched RBF shape function will not only possess all advantages of the conventional RBF interpolation, but also can accurately reflect the deformation properties of problems. The system of equations for two-dimensional solids is then derived based on the enriched RBF shape function and both of the meshless strong-form and weak-form. A numerical example of a bar is presented to study the effectiveness and efficiency of e-RPIM. As an important application, the newly developed e-RPIM, which is augmented by selected trigonometric basis functions, is applied to crack problems. It has been demonstrated that the present e-RPIM is very accurate and stable for fracture mechanics problems.
Resumo:
The Sudbury Basin is a non-cylindrical fold basin occupying the central portion of the Sudbury Impact Structure. The impact structure lends itself excellently to explore the structural evolution of continental crust containing a circular region of long-term weakness. In a series of scaled analogue experiments various model crustal configurations were shortened horizontally at a constant rate. In mechanically weakened crust, model basins formed that mimic several first-order structural characteristics of the Sudbury Basin: (1) asymmetric, non-cylindrical folding of the Basin, (2) structures indicating concentric shortening around lateral basin termini and (3) the presence of a zone of strain concentration near the hinge zones of model basins. Geometrically and kinematically this zone corresponds to the South Range Shear Zone of the Sudbury Basin. According to our experiments, this shear zone is a direct mechanical consequence of basin formation, rather than the result of thrusting following folding. Overall, the models highlight the structurally anomalous character of the Sudbury Basin within the Paleoproterozoic Eastern Penokean Orogen. In particular, our models suggest that the Basin formed by pure shear thickening of crust, whereas transpressive deformation prevailed elsewhere in the orogen. The model basin is deformed by thickening and non-cylindrical synformal buckling, while conjugate transpressive shear zones propagated away from its lateral tips. This is consistent with pure shear deformation of a weak circular inclusion in a strong matrix. The models suggest that the Sudbury Basin formed as a consequence of long-term weakening of the upper crust by meteorite impact.
Resumo:
Corporate governance (CG) denotes the rules of business decision-making and directs the internal mechanism of companies to follow the output of the rules. It includes the customs, policies, laws and institutions as a set of processes that affects the way in which a corporation is directed, administered or controlled.
Resumo:
The convergence of corporate social responsibility (CSR) and corporate governance (CG) has changed the corporate accountability mechanism. This has developed a socially responsible ‘corporate self-regulation’, a synthesis of governance and responsibility in the companies of strong economies. However, unlike in the strong economies, this convergence has not been visible in the companies of weak economies, where the civil society groups are unorganised, regulatory agencies are either ineffective or corrupt and the media and non-governmental organisations do not mirror the corporate conscience. Using the case of Bangladesh, this article investigates the convergence between CSR and CG in the self-regulation of companies in a less vigilant environment.
Resumo:
Polymeric graphitic carbon nitride materials have attracted increasing attention in recent years owning to their potential applications in energy conversion, environment protection, and so on. Here, from first-principles calculations, we report the electronic structure modification of graphitic carbon nitride (g-C3N4) in response to carbon doping. We showed that each dopant atom can induce a local magnetic moment of 1.0 μB in non-magnetic g-C3N4. At the doping concentration of 1/14, the local magnetic moments of the most stable doping configuration which has the dopant atom at the center of heptazine unit prefer to align in a parallel way leading to long-range ferromagnetic (FM) ordering. When the joint N atom is replaced by C atom, the system favors an antiferromagnetic (AFM) ordering at unstrained state, but can be tuned to ferromagnetism (FM) by applying biaxial tensile strain. More interestingly, the FM state of the strained system is half-metallic with abundant states at the Fermi level in one spin channel and a band gap of 1.82 eV in another spin channel. The Curie temperature (Tc) was also evaluated using a mean-field theory and Monte Carlo simulations within the Ising model. Such tunable electron spin-polarization and ferromagnetism are quite promising for the applications of graphitic carbon nitride in spintronics.
Resumo:
"Even though Corporate Social Responsibility (CSR) has become a widely accepted concept promoted by different stakeholders, business corporations' internal strategies, known as corporate self-regulation in most of the weak economies, respond poorly to this responsibility. Major laws relating to corporate regulation and responsibilities of these economies do not possess adequate ongoing influence to insist on corporate self-regulation to create a socially responsible corporate culture. This book describes how the laws relating to CSR could contribute to the inclusion of CSR principles at the core of the corporate self-regulation of these economies in general, without being intrusive in normal business practice. It formulates a meta-regulation approach to law, particularly by converging patterns of private ordering and state control in contemporary corporate law from the perspective of a weak economy. It proposes that this approach is suitable for alleviating regulators' limited access to information and expertise, inherent limitations of prescriptive rules, ensuring corporate commitment, and enhance the self-regulatory capacity of companies. This book describes various meta-regulation strategies for laws to link social values to economic incentives and disincentives, and to indirectly influence companies to incorporate CSR principles at the core of their self-regulation strategies. It investigates this phenomenon using Bangladesh as a case study."--publisher website
Resumo:
The semantic of the terms “sustainable development” and “corporate social responsibility” have changed over time to a point where these concepts have become two interrelated processes for ensuring the far-reaching development of society. Their convergence has given dimension to the environmental and corporate regulation mechanisms in strong economies. This article deals with the question of how the ethos of this convergence could be incorporated into the self-regulation of businesses in weak economies where nonlegal drivers are either inadequate or inefficient. It proposes that the policies for this incorporation should be based on the precepts of meta-regulation that have the potential to hold force majeure, economic incentives, and assistance-related strategies to reach an objective from the perspective of weak economies.
Resumo:
The microstructure of an artificial grain boundary in an YBa2Cu3O7-δ (YBCO) thin film grown on a (100)(110), [001]-tilt yttria-stabilized-zirconia (YSZ) bicrystal substrate has been studied using transmission electron microscopy (TEM). The orientation relationship between the YBCO film and the YSZ substrate was [001]YBCO∥[001]YSZ and [110]YBCO∥[100]YSZ for each half of the bicrystal film. However, the exact boundary geometry of the bicrystal substrate was not transferred to the film. The substrate boundary was straight while the film boundary was wavy. In several cases there was bending of the lattice confined within a distance of a few basal-plane lattice spacings from the boundary plane and microfaceting. No intergranular secondary phase was observed but about 25% of the boundary was covered by c-axis-tilted YBCO grains and a-axis-oriented grains, both of which were typically adjacent to CuO grains or surrounded by a thin Cu-rich amorphous layer.
Resumo:
Weak links were fabricated by pulsed laser deposition of YBa 2Cu3Ox thin films on Y-ZrO2 bicrystal substrates. They were formed by transferring the bicrystal boundary into the epitaxial film during the film growth. Their properties were determined by the misorientation angle ( theta ) between the two halves of the bicrystal. The transport properties of the weak links were studied as a function of theta and an exponential dependence of the weak link critical current density was observed for angles up to 45 degrees . Clear Josephson effects with good microwave and magnetic field response were observed.
Resumo:
We have studied weak links and dc-SQUIDs made from pulsed laser deposited YBa2Cu3O7-δ thin films on Y-ZrO 2 bicrystal substrates. The transport properties of the weak links were studied as a function of the misorientation angle (θ) between the two halves of the bicrystal and an exponential dependence of the weak link critical current density was observed for angles up to 40°at 77 K. Josephson effects with clear microwave and magnetic field responses were observed. An optimum dc-SQUID performance at 77 K was obtained for θ=32°. At this temperature, we achieved a periodic magnetic field response with a modulation depth of 12 μV.
Resumo:
A5/1 is a shift register based stream cipher which provides privacy for the GSM system. In this paper, we analyse the loading of the secret key and IV during the initialisation process of A5/1. We demonstrate the existence of weak key-IV pairs in the A5/1 cipher due to this loading process; these weak key-IV pairs may generate one, two or three registers containing all-zero values, which may lead in turn to weak keystream sequences. In the case where two or three registers contain only zeros, we describe a distinguisher which leads to a complete decryption of the affected messages.
Resumo:
Zinc oxide (ZnO) that contains non-magnetic ionic dopants, such as nitrogen (N)-doped zinc oxide (ZnO:N), has been observed to exhibit ferromagnetism. Ferromagnetism is proposed to arise from the Coulomb excitation in the localized states that is induced by the oxygen vacancy, V O. A model based on the Coulomb excitation that is associated with the electron–phonon interaction theoretically explains the ferromagnetic mechanism of ZnO:N. This study reveals that the ferromagnetism will be induced by either deep localized states with a small V O concentration or shallow localized states with a high V O concentration. Additionally, electron–phonon coupling either suppresses the ferromagnetism that is induced by the deep donor states of V O or enhances the ferromagnetism that is induced by the shallow donor states of V O.
Resumo:
Distributed-password public-key cryptography (DPwPKC) allows the members of a group of people, each one holding a small secret password only, to help a leader to perform the private operation, associated to a public-key cryptosystem. Abdalla et al. recently defined this tool [1], with a practical construction. Unfortunately, the latter applied to the ElGamal decryption only, and relied on the DDH assumption, excluding any recent pairing-based cryptosystems. In this paper, we extend their techniques to support, and exploit, pairing-based properties: we take advantage of pairing-friendly groups to obtain efficient (simulation-sound) zero-knowledge proofs, whose security relies on the Decisional Linear assumption. As a consequence, we provide efficient protocols, secure in the standard model, for ElGamal decryption as in [1], but also for Linear decryption, as well as extraction of several identity-based cryptosystems [6,4]. Furthermore, we strenghten their security model by suppressing the useless testPwd queries in the functionality.
Resumo:
We introduce the notion of distributed password-based public-key cryptography, where a virtual high-entropy private key is implicitly defined as a concatenation of low-entropy passwords held in separate locations. The users can jointly perform private-key operations by exchanging messages over an arbitrary channel, based on their respective passwords, without ever sharing their passwords or reconstituting the key. Focusing on the case of ElGamal encryption as an example, we start by formally defining ideal functionalities for distributed public-key generation and virtual private-key computation in the UC model. We then construct efficient protocols that securely realize them in either the RO model (for efficiency) or the CRS model (for elegance). We conclude by showing that our distributed protocols generalize to a broad class of “discrete-log”-based public-key cryptosystems, which notably includes identity-based encryption. This opens the door to a powerful extension of IBE with a virtual PKG made of a group of people, each one memorizing a small portion of the master key.