882 resultados para Design and ergonomic desing
Resumo:
Charge stripping is employed to produce multi-charged ions for injecting the cooling storage ring After penetrating through the carbon foil, the widened distribution of ion charge states poses a limit to the ion injection Therefore, the carbon foil plays a key role in the charge snipping injection In this paper, foul strippers for Heavy Ion Research Facility at Lanzhou (HIRFL) and Cooling Sun age Ring (CSR) are introduced The charge state distribution of the stripped ions is measured and the stripping efficiency of the foils is investigated The experimental results are consistent with the theoretical values
Resumo:
A 7 Tesla superconducting magnet with a clear warm bore of 156 mm in diameter has been developed for Lanzhou Penning Trap at the Institute of Modern Physics for high precision mass measurement. The magnet is comprised of 9 solenoid coils and operates in persistent mode with a total energy of 2.3 MJ. Due to the considerable amount of energy stored during persistent mode operation, the quench protection system is very important when designing and operating the magnet. A passive protection system based on a subdivided scheme is adopted to protect the superconducting magnet from damage caused by quenching. Cold diodes and resistors are put across the subdivision to reduce both the voltage and temperature hot spots. Computational simulations have been carried in Opera-quench. The designed quench protection circuit and the finite element method model for quench simulations are described; the time changing of temperature, voltage and current decay during the quench process is also analysed.
Resumo:
An optimization method based on uniform design in conjunction with genetic algorithm is described. According to the proposed method, the uniform design technique was applied to the design of starting experiments, which can reduce the number of experiments compared with traditional simultaneous methods, such as simplex. And genetic algorithm was used in optimization procedure, which can improve the rapidity of optimal procedure. The hierarchical chromatographic response function was modified to evaluate the separation equality of a chromatogram. An iterative procedure was adopted to search for the optimal condition to improve the accuracy of predicted retention and the quality of the chromatogram. The optimization procedure was tested in optimization of the chromatographic separation of 11 alkaloids in reversed-phase ion pair chromatography and satisfactory optimal result was obtained. (C) 2003 Elsevier B.V. All rights reserved.
Resumo:
The deliberate tailoring of hierarchical flowerlike gold microstructure (HFGMs) at the ultrathin level is an ongoing challenge and could introduce opportunities for new fabrication and application in many fields. In this paper. a templateless, surfactantless, electrochemical strategy for fabrication of ultrathin platinum-group metal coated HFGMs is proposed. HFGMs were prepared by simple electrodeposition on an indium tin oxide (ITO) substrate.
Resumo:
By using the bifunctional ligand, 8-hydroxyquinoline-functionalized organosilane (Q-Si), the new mesoporous material Q-MCM-41 covalently bonded with 8-hydroxyquinoline was synthesized. Through the ligand exchange reaction, the new near-infrared (NIR) luminescent mesoporous LnQ(3)-MCM-41 (Ln = Er, Nd, Yb) materials were prepared by linking the lanthanide quinolinate complexes to the ordered mesoporous Q-MCM-41 material. The LnQ(3)-MCM-41 materials were characterized by powder X-ray diffraction and N-2 adsorption/desorption, and they all show the characteristic mesoporous structure of MCM-41 with highly uniform pore size distributions.
Resumo:
Parallel shared-memory machines with hundreds or thousands of processor-memory nodes have been built; in the future we will see machines with millions or even billions of nodes. Associated with such large systems is a new set of design challenges. Many problems must be addressed by an architecture in order for it to be successful; of these, we focus on three in particular. First, a scalable memory system is required. Second, the network messaging protocol must be fault-tolerant. Third, the overheads of thread creation, thread management and synchronization must be extremely low. This thesis presents the complete system design for Hamal, a shared-memory architecture which addresses these concerns and is directly scalable to one million nodes. Virtual memory and distributed objects are implemented in a manner that requires neither inter-node synchronization nor the storage of globally coherent translations at each node. We develop a lightweight fault-tolerant messaging protocol that guarantees message delivery and idempotence across a discarding network. A number of hardware mechanisms provide efficient support for massive multithreading and fine-grained synchronization. Experiments are conducted in simulation, using a trace-driven network simulator to investigate the messaging protocol and a cycle-accurate simulator to evaluate the Hamal architecture. We determine implementation parameters for the messaging protocol which optimize performance. A discarding network is easier to design and can be clocked at a higher rate, and we find that with this protocol its performance can approach that of a non-discarding network. Our simulations of Hamal demonstrate the effectiveness of its thread management and synchronization primitives. In particular, we find register-based synchronization to be an extremely efficient mechanism which can be used to implement a software barrier with a latency of only 523 cycles on a 512 node machine.
Resumo:
Act2 is a highly concurrent programming language designed to exploit the processing power available from parallel computer architectures. The language supports advanced concepts in software engineering, providing high-level constructs suitable for implementing artificially-intelligent applications. Act2 is based on the Actor model of computation, consisting of virtual computational agents which communicate by message-passing. Act2 serves as a framework in which to integrate an actor language, a description and reasoning system, and a problem-solving and resource management system. This document describes issues in Act2's design and the implementation of an interpreter for the language.
Resumo:
Transport and its energetic and environmental impacts affect our daily lives. The transport sector is the backbone of the United Kingdom’s economy with 2.3 million people being employed in this sector. With a high dependency on transport for passengers and freight and with the knowledge that oil reserves are rapidly decreasing a solution has to be identified for conserving fuel. Passenger vehicles account for 61% of the transport fuel consumed in the U.K. and should be seen as a key area to tackle. Despite the introduction and development of electric powered cars, the widespread infrastructure that is required is not in place and has attributed to their slow uptake, as well as the fact that the electric car’s performance is not yet comparable with the conventional internal combustion engine. The benefits of the introduction of kinetic energy recovery systems to be used in conjunction with internal combustion engines and designed such that the system could easily be fitted into future passenger vehicles are examined. In this article, a review of automobile kinetic energy recovery system is presented. It has been argued that the ultracapacitor technology offers a sustainable solution. An optimum design for the urban driving cycle experienced in the city of Edinburgh has been introduced. The potential for fuel savings is also presented
Resumo:
Malicious software (malware) have significantly increased in terms of number and effectiveness during the past years. Until 2006, such software were mostly used to disrupt network infrastructures or to show coders’ skills. Nowadays, malware constitute a very important source of economical profit, and are very difficult to detect. Thousands of novel variants are released every day, and modern obfuscation techniques are used to ensure that signature-based anti-malware systems are not able to detect such threats. This tendency has also appeared on mobile devices, with Android being the most targeted platform. To counteract this phenomenon, a lot of approaches have been developed by the scientific community that attempt to increase the resilience of anti-malware systems. Most of these approaches rely on machine learning, and have become very popular also in commercial applications. However, attackers are now knowledgeable about these systems, and have started preparing their countermeasures. This has lead to an arms race between attackers and developers. Novel systems are progressively built to tackle the attacks that get more and more sophisticated. For this reason, a necessity grows for the developers to anticipate the attackers’ moves. This means that defense systems should be built proactively, i.e., by introducing some security design principles in their development. The main goal of this work is showing that such proactive approach can be employed on a number of case studies. To do so, I adopted a global methodology that can be divided in two steps. First, understanding what are the vulnerabilities of current state-of-the-art systems (this anticipates the attacker’s moves). Then, developing novel systems that are robust to these attacks, or suggesting research guidelines with which current systems can be improved. This work presents two main case studies, concerning the detection of PDF and Android malware. The idea is showing that a proactive approach can be applied both on the X86 and mobile world. The contributions provided on this two case studies are multifolded. With respect to PDF files, I first develop novel attacks that can empirically and optimally evade current state-of-the-art detectors. Then, I propose possible solutions with which it is possible to increase the robustness of such detectors against known and novel attacks. With respect to the Android case study, I first show how current signature-based tools and academically developed systems are weak against empirical obfuscation attacks, which can be easily employed without particular knowledge of the targeted systems. Then, I examine a possible strategy to build a machine learning detector that is robust against both empirical obfuscation and optimal attacks. Finally, I will show how proactive approaches can be also employed to develop systems that are not aimed at detecting malware, such as mobile fingerprinting systems. In particular, I propose a methodology to build a powerful mobile fingerprinting system, and examine possible attacks with which users might be able to evade it, thus preserving their privacy. To provide the aforementioned contributions, I co-developed (with the cooperation of the researchers at PRALab and Ruhr-Universität Bochum) various systems: a library to perform optimal attacks against machine learning systems (AdversariaLib), a framework for automatically obfuscating Android applications, a system to the robust detection of Javascript malware inside PDF files (LuxOR), a robust machine learning system to the detection of Android malware, and a system to fingerprint mobile devices. I also contributed to develop Android PRAGuard, a dataset containing a lot of empirical obfuscation attacks against the Android platform. Finally, I entirely developed Slayer NEO, an evolution of a previous system to the detection of PDF malware. The results attained by using the aforementioned tools show that it is possible to proactively build systems that predict possible evasion attacks. This suggests that a proactive approach is crucial to build systems that provide concrete security against general and evasion attacks.
Resumo:
The Activity in GEriatric acute CARe (AGECAR) is a randomised control trial to assess the effectiveness of an intrahospital strength and walk program during short hospital stays for improving functional capacity of patients aged 75 years or older. Patien
Resumo:
http://www.archive.org/details/japanesewomenspe032256mbp
Resumo:
To evaluate the effects of chronic lead exposure on the nervous system in adults, a set of neurobehavioural and electrophysiological tests was administered to 99 lead exposed foundry employees and 61 unexposed workers. Current and past blood lead concentrations were used to estimate the degree of lead absorption; all previous blood lead concentrations had been less than or equal to 90 micrograms/100 ml. Characteristic signs (such as wrist extensor weakness) or symptoms (such as colic) of lead poisoning were not seen. Sensory conduction in the sural nerve was not affected. By contrast, various neurobehavioural functions deteriorated with increasing lead burden. Workers with blood lead concentrations between 40 and 60 micrograms/100 ml showed impaired performance on tests of verbal concept formation, visual/motor performance, memory, and mood. Thus impairment in central nervous system function in lead exposed adults occurred in the absence of peripheral nervous system derangement and increased in severity with increasing lead dose.
Resumo:
Statistical Rate Monotonic Scheduling (SRMS) is a generalization of the classical RMS results of Liu and Layland [LL73] for periodic tasks with highly variable execution times and statistical QoS requirements. The main tenet of SRMS is that the variability in task resource requirements could be smoothed through aggregation to yield guaranteed QoS. This aggregation is done over time for a given task and across multiple tasks for a given period of time. Similar to RMS, SRMS has two components: a feasibility test and a scheduling algorithm. SRMS feasibility test ensures that it is possible for a given periodic task set to share a given resource without violating any of the statistical QoS constraints imposed on each task in the set. The SRMS scheduling algorithm consists of two parts: a job admission controller and a scheduler. The SRMS scheduler is a simple, preemptive, fixed-priority scheduler. The SRMS job admission controller manages the QoS delivered to the various tasks through admit/reject and priority assignment decisions. In particular, it ensures the important property of task isolation, whereby tasks do not infringe on each other. In this paper we present the design and implementation of SRMS within the KURT Linux Operating System [HSPN98, SPH 98, Sri98]. KURT Linux supports conventional tasks as well as real-time tasks. It provides a mechanism for transitioning from normal Linux scheduling to a mixed scheduling of conventional and real-time tasks, and to a focused mode where only real-time tasks are scheduled. We overview the technical issues that we had to overcome in order to integrate SRMS into KURT Linux and present the API we have developed for scheduling periodic real-time tasks using SRMS.