928 resultados para Secador flash
Resumo:
Time-resolved kinetic studies of silylene, SiH2, generated by laser flash photolysis of 1-silacyclopent-3-ene and phenylsilane, have been carried out to obtain rate constants for its bimolecular reactions with methanol, ethanol, 1-propanol, 1-butanol and 2-methyl-1-butanol. The reactions were studied in the gas phase over the pressure range 1-100 Torr in SF6 bath gas, at room temperature. In the study with methanol several buffer gases were used. All five reactions showed pressure dependences characteristic of third body assisted association reactions. The rate constant pressure dependences were modelled using RRKM theory, based on Eo values of the association complexes obtained by ab initio calculation (G3 level). Transition state models were adjusted to fit experimental fall-off curves and extrapolated to obtain k∞ values in the range 1.9 to 4.5 × 10-10 cm3 molecule-1 s-1. These numbers, corresponding to the true bimolecular rate constants, indicate efficiencies of between 16 and 67% of the collision rates for these reactions. In the reaction of SiH2 + MeOH there is a small kinetic component to the rate which is second order in MeOH (at low total pressures). This suggests an additional catalysed reaction pathway, which is supported by the ab initio calculations. These calculations have been used to define specific MeOH-for-H2O substitution effects on this catalytic pathway. Where possible our experimental and theoretical results are compared with those of previous studies.
Resumo:
Time-resolved kinetic studies of the reaction of silylene, SiH2, generated by 193 nm laser flash photolysis of silacyclopent-3-ene, have been carried out in the presence of ammonia, NH3. Second order kinetics were observed. The reaction was studied in the gas phase at 10 Torr total pressure in SF6 bath gas at each of the three temperatures, 299, 340 and 400 K. The second order rate constants (laser pulse energy of 60 mJ/pulse) fitted the Arrhenius equation: log(k/cm3 molecule-1 s-1) = (-10.37 ± 0.17) + (0.36 ± 1.12 kJ mol-1)/RTln10 Experiments at other pressures showed that these rate constants were unaffected by pressure in the range 10-100 Torr, but showed small decreases in value at 3 and 1 Torr. There was also a weak intensity dependence, with rate constants decreasing at laser pulse energies of 30 mJ/pulse. Ab initio calculations at the G3 level of theory, show that SiH2 + NH3 should form an initial adduct (donor-acceptor complex), but that energy barriers are too great for further reaction of the adduct. This implies that SiH2 + NH3 should be a pressure dependent association reaction. The experimental data are inconsistent with this and we conclude that SiH2 decays are better explained by reaction of SiH2 with the amino radical, NH2, formed by photodissociation of NH3 at 193 nm. The mechanism of this previously unstudied reaction is discussed.
Resumo:
In the first part of this paper (Ulbrich et al. 2003), we gave a description of the August 2002 rainfall events and the resultant floods, in particular of the flood wave of the River Elbe. The extreme precipitation sums observed in the first half of the month were primarily associated with two rainfall episodes. The first episode occurred on 6/7 August 2002. The main rainfall area was situated over Lower Austria, the south-western part of the Czech Republic and south-eastern Germany. A severe flash flood was produced in the Lower Austrian Waldviertel (`forest quarter’ ). The second episode on 11± 13 August 2002 most severely affected the Erz Mountains and western parts of the Czech Republic. During this second episode 312mm of rain was recorded between 0600GMT on 12 August and 0600GMT on 13 August at the Zinnwald weather station in the ErzMountains, which is a new 24-hour record for Germany. The flash floods resulting from this rainfall episode and the subsequent Elbe flood produced the most expensive weatherrelated catastrophe in Europe in recent decades. In this part of the paper we discuss the meteorological conditions and physical mechanisms leading to the two main events. Similarities to the conditions that led to the recent summer floods of the River Oder in 1997 and the River Vistula in 2001 will be shown. This will lead us to a consideration of trends in extreme rainfall over Europe which are found in numerical simulations of anthropogenic climate change.
Resumo:
Record-breaking rainfall amounts and intensities were observed at several raingauges in central Europe during the first half of August 2002 (Fig. 1). They produced flash floods in small rivers in the Erz Mountains, the Bohemian Forest and in Lower Austria (see Fig. 2), followed by record-breaking floods of larger rivers fed from these areas. The Vltava submerged parts of the city of Prague on 13± 15 August, and subsequently the Elbe flooded parts of Dresden and further villages and towns located downstream. The gauge level of 9.40m measured at Dresden on 17 August 2002 is the highest level since 1275, exceeding the former maximum level of 8.77m recorded in 1845 (Grollmann and Simon 2002). Parts of the Danube catchment were also affected by severe flooding. There were 100 fatalities connected with the floods in central Europe, and the economic loss is estimated at 9 billion Euros for Germany (German government’s estimate), 3 billion Euros for Austria, and 2.5 billion Euros for the Czech Republic (estimates from Boyle 2002). The event thus replaced the European winter storm Lothar of December 1999 (Ulbrich et al. 2001) as the most expensive weather-related catastrophe in Europe in recent decades (see Cornford 2002). In this study, we give an overview of the exceptional rainfall experienced over wide areas on 12/13 August 2002, and the resulting floods. Further events during early August 2002, in particular the event on 6/7 August in Lower Austria, are briefly mentioned.
Resumo:
A holistic perspective on changing rainfall-driven flood risk is provided for the late 20th and early 21st centuries. Economic losses from floods have greatly increased, principally driven by the expanding exposure of assets at risk. It has not been possible to attribute rain-generated peak streamflow trends to anthropogenic climate change over the past several decades. Projected increases in the frequency and intensity of heavy rainfall, based on climate models, should contribute to increases in precipitation-generated local flooding (e.g. flash flooding and urban flooding). This article assesses the literature included in the IPCC SREX report and new literature published since, and includes an assessment of changes in flood risk in seven of the regions considered in the recent IPCC SREX report—Africa, Asia, Central and South America, Europe, North America, Oceania and Polar regions. Also considering newer publications, this article is consistent with the recent IPCC SREX assessment finding that the impacts of climate change on flood characteristics are highly sensitive to the detailed nature of those changes and that presently we have only low confidence1 in numerical projections of changes in flood magnitude or frequency resulting from climate change.
Resumo:
A flood warning system incorporates telemetered rainfall and flow/water level data measured at various locations in the catchment area. Real-time accurate data collection is required for this use, and sensor networks improve the system capabilities. However, existing sensor nodes struggle to satisfy the hydrological requirements in terms of autonomy, sensor hardware compatibility, reliability and long-range communication. We describe the design and development of a real-time measurement system for flood monitoring, and its deployment in a flash-flood prone 650 km2 semiarid watershed in Southern Spain. A developed low-power and long-range communication device, so-called DatalogV1, provides automatic data gathering and reliable transmission. DatalogV1 incorporates self-monitoring for adapting measurement schedules for consumption management and to capture events of interest. Two tests are used to assess the success of the development. The results show an autonomous and robust monitoring system for long-term collection of water level data in many sparse locations during flood events.
Resumo:
A wealth of literature suggests that emotional faces are given special status as visual objects: Cognitive models suggest that emotional stimuli, particularly threat-relevant facial expressions such as fear and anger, are prioritized in visual processing and may be identified by a subcortical “quick and dirty” pathway in the absence of awareness (Tamietto & de Gelder, 2010). Both neuroimaging studies (Williams, Morris, McGlone, Abbott, & Mattingley, 2004) and backward masking studies (Whalen, Rauch, Etcoff, McInerney, & Lee, 1998) have supported the notion of emotion processing without awareness. Recently, our own group (Adams, Gray, Garner, & Graf, 2010) showed adaptation to emotional faces that were rendered invisible using a variant of binocular rivalry: continual flash suppression (CFS, Tsuchiya & Koch, 2005). Here we (i) respond to Yang, Hong, and Blake's (2010) criticisms of our adaptation paper and (ii) provide a unified account of adaptation to facial expression, identity, and gender, under conditions of unawareness
Resumo:
Threat-relevant stimuli such as fear faces are prioritized by the human visual system. Recent research suggests that this prioritization begins during unconscious processing: A specialized (possibly subcortical) pathway evaluates the threat relevance of visual input, resulting in preferential access to awareness for threat stimuli. Our data challenge this claim. We used a continuous flash suppression (CFS) paradigm to present emotional face stimuli outside of awareness. It has been shown using CFS that salient (e.g., high contrast) and recognizable stimuli (faces, words) become visible more quickly than less salient or less recognizable stimuli. We found that although fearful faces emerge from suppression faster than other faces, this was wholly explained by their low-level visual properties, rather than their emotional content. We conclude that, in the competition for visual awareness, the visual system prefers and promotes unconscious stimuli that are more “face-like,” but the emotional content of a face has no effect on stimulus salience.
Resumo:
Interferences from the spatially adjacent non-target stimuli evoke ERPs during non-target sub-trials and lead to false positives. This phenomenon is commonly seen in visual attention based BCIs and affects the performance of BCI system. Although, users or subjects tried to focus on the target stimulus, they still could not help being affected by conspicuous changes of the stimuli (flashes or presenting images) which were adjacent to the target stimulus. In view of this case, the aim of this study is to reduce the adjacent interference using new stimulus presentation pattern based on facial expression changes. Positive facial expressions can be changed to negative facial expressions by minor changes to the original facial image. Although the changes are minor, the contrast will be big enough to evoke strong ERPs. In this paper, two different conditions (Pattern_1, Pattern_2) were used to compare across objective measures such as classification accuracy and information transfer rate as well as subjective measures. Pattern_1 was a “flash-only” pattern and Pattern_2 was a facial expression change of a dummy face. In the facial expression change patterns, the background is a positive facial expression and the stimulus is a negative facial expression. The results showed that the interferences from adjacent stimuli could be reduced significantly (P<;0.05) by using the facial expression change patterns. The online performance of the BCI system using the facial expression change patterns was significantly better than that using the “flash-only” patterns in terms of classification accuracy (p<;0.01), bit rate (p<;0.01), and practical bit rate (p<;0.01). Subjects reported that the annoyance and fatigue could be significantly decreased (p<;0.05) using the new stimulus presentation pattern presented in this paper.
An operationally simple sonogashira reaction for an undergraduate organic chemistry laboratory class
Resumo:
An operationally simple, reliable, and cheap Sonogashira reaction suitable for an undergraduate laboratory class that can be completed within a day-long (8 h) laboratory session has been developed. Cross-coupling is carried out between 2-methyl-3-butyn-2-ol and various aryl iodides using catalytic amounts of bis-(triphenylphosphine)palladium(II) dichloride, with copper(I) iodide as a cocatalyst, in triethylamine at room temperature, so a range of products can be prepared within a single group and results compared. The coupling itself is usually complete within 1.5 h and is easily monitored by TLC, leaving up to 6 h for purification and characterization. Purification is by “mini flash column chromatography” through a plug of silica encased in the barrel of a plastic syringe, so the procedure is amenable to large class sizes.
Resumo:
Lightning flash rates, RL, are modulated by corotating interaction regions (CIRs) and the polarity of the heliospheric magnetic field (HMF) in near-Earth space. As the HMF polarity reverses at the heliospheric current sheet (HCS), typically within a CIR, these phenomena are likely related. In this study, RL is found to be significantly enhanced at the HCS and at 27 days prior/after. The strength of the enhancement depends on the polarity of the HMF reversal at the HCS. Near-Earth solar and galactic energetic particle fluxes are also ordered by HMF polarity, though the variations qualitatively differ from RL, with the main increase occurring prior to the HCS crossing. Thus, the CIR effect on lightning is either the result of compression/amplification of the HMF (and its subsequent interaction with the terrestrial system) or that energetic particle preconditioning of the Earth system prior to the HMF polarity change is central to solar wind lightning coupling mechanism.
Resumo:
A Universal Serial Bus (USB) Mass Storage Device (MSD), often termed a USB flash drive, is ubiquitously used to store important information in unencrypted binary format. This low cost consumer device is incredibly popular due to its size, large storage capacity and relatively high transfer speed. However, if the device is lost or stolen an unauthorized person can easily retrieve all the information. Therefore, it is advantageous in many applications to provide security protection so that only authorized users can access the stored information. In order to provide security protection for a USB MSD, this paper proposes a session key agreement protocol after secure user authentication. The main aim of this protocol is to establish session key negotiation through which all the information retrieved, stored and transferred to the USB MSD is encrypted. This paper not only contributes an efficient protocol, but also does not suffer from the forgery attack and the password guessing attack as compared to other protocols in the literature. This paper analyses the security of the proposed protocol through a formal analysis which proves that the information is stored confidentially and is protected offering strong resilience to relevant security attacks. The computational cost and communication cost of the proposed scheme is analyzed and compared to related work to show that the proposed scheme has an improved tradeoff for computational cost, communication cost and security.
Resumo:
A recent field campaign in southwest England used numerical modeling integrated with aircraft and radar observations to investigate the dynamic and microphysical interactions that can result in heavy convective precipitation. The COnvective Precipitation Experiment (COPE) was a joint UK-US field campaign held during the summer of 2013 in the southwest peninsula of England, designed to study convective clouds that produce heavy rain leading to flash floods. The clouds form along convergence lines that develop regularly due to the topography. Major flash floods have occurred in the past, most famously at Boscastle in 2004. It has been suggested that much of the rain was produced by warm rain processes, similar to some flash floods that have occurred in the US. The overarching goal of COPE is to improve quantitative convective precipitation forecasting by understanding the interactions of the cloud microphysics and dynamics and thereby to improve NWP model skill for forecasts of flash floods. Two research aircraft, the University of Wyoming King Air and the UK BAe 146, obtained detailed in situ and remote sensing measurements in, around, and below storms on several days. A new fast-scanning X-band dual-polarization Doppler radar made 360-deg volume scans over 10 elevation angles approximately every 5 minutes, and was augmented by two UK Met Office C-band radars and the Chilbolton S-band radar. Detailed aerosol measurements were made on the aircraft and on the ground. This paper: (i) provides an overview of the COPE field campaign and the resulting dataset; (ii) presents examples of heavy convective rainfall in clouds containing ice and also in relatively shallow clouds through the warm rain process alone; and (iii) explains how COPE data will be used to improve high-resolution NWP models for operational use.
Resumo:
A new generation of high-resolution (1 km) forecast models promises to revolutionize the prediction of hazardous weather such as windstorms, flash floods, and poor air quality. To realize this promise, a dense observing network, focusing on the lower few kilometers of the atmosphere, is required to verify these new forecast models with the ultimate goal of assimilating the data. At present there are insufficient systematic observations of the vertical profiles of water vapor, temperature, wind, and aerosols; a major constraint is the absence of funding to install new networks. A recent research program financed by the European Union, tasked with addressing this lack of observations, demonstrated that the assimilation of observations from an existing wind profiler network reduces forecast errors, provided that the individual instruments are strategically located and properly maintained. Additionally, it identified three further existing European networks of instruments that are currently underexploited, but with minimal expense they could deliver quality-controlled data to national weather services in near–real time, so the data could be assimilated into forecast models. Specifically, 1) several hundred automatic lidars and ceilometers can provide backscatter profiles associated with aerosol and cloud properties and structures with 30-m vertical resolution every minute; 2) more than 20 Doppler lidars, a fairly new technology, can measure vertical and horizontal winds in the lower atmosphere with a vertical resolution of 30 m every 5 min; and 3) about 30 microwave profilers can estimate profiles of temperature and humidity in the lower few kilometers every 10 min. Examples of potential benefits from these instruments are presented.
Resumo:
Given capacity limits, only a subset of stimuli 1 give rise to a conscious percept. Neurocognitive models suggest that humans have evolved mechanisms that operate without awareness and prioritize threatening stimuli over neutral stimuli in subsequent perception. In this meta analysis, we review evidence for this ‘standard hypothesis’ emanating from three widely used, but rather different experimental paradigms that have been used to manipulate awareness. We found a small pooled threat-bias effect in the masked visual probe paradigm, a medium effect in the binocular rivalry paradigm and highly inconsistent effects in the breaking continuous flash suppression paradigm. Substantial heterogeneity was explained by the stimulus type: the only threat stimuli that were robustly prioritized across all three paradigms were fearful faces. Meta regression revealed that anxiety may modulate threat biases, but only under specific presentation conditions. We also found that insufficiently rigorous awareness measures, inadequate control of response biases and low level confounds may undermine claims of genuine unconscious threat processing. Considering the data together, we suggest that uncritical acceptance of the standard hypothesis is premature: current behavioral evidence for threat-sensitive visual processing that operates without awareness is weak.