957 resultados para anion exchange capacity


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The mixed anion mineral parnauite Cu9[(OH)10|SO4|(AsO4)2].7H2O from two localities namely Cap Garonne Mine, Le Pradet, France and Majuba Hill mine, Pershing County, Nevada, USA has been studied by Raman spectroscopy. The Raman spectrum of the French sample is dominated by an intense band at 975 cm-1 assigned to the ν1 (SO4)2- symmetric stretching mode and Raman bands at 1077 and 1097 cm-1 may be attributed to the ν3 (SO4)2- antisymmetric stretching mode. Two Raman bands 1107 and 1126 cm-1 are assigned to carbonate CO32- symmetric stretching bands and confirms the presence of carbonate in the structure of parnauite. The comparatively sharp band for the Pershing County mineral at 976 cm-1 is assigned to the ν1 (SO4)2- symmetric stretching mode and a broad spectral profile centered upon 1097 cm-1 is attributed to the ν3 (SO4)2- antisymmetric stretching mode. Two intense bands for the Pershing County mineral at 851 and 810 cm-1 are assigned to the ν1 (AsO4)3- symmetric stretching and ν3 (AsO4)3- antisymmetric stretching modes. Two Raman bands for the French mineral observed at 725 and 777 cm-1 are attributed to the ν3 (AsO4)3- antisymmetric stretching mode. For the French mineral, a low intensity Raman band is observed at 869 cm-1 and is assigned to the ν1 (AsO4)3- symmetric stretching vibration. Chemical composition of parnauite remains open and the question may be raised is parnauite a solid solution of two or more minerals such as a copper hydroxy-arsenate and a copper hydroxy sulphate.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Intermediaries have introduced electronic services with varying success. One of the problems an intermediary faces is deciding what kind of exchange service it should offer to its customers and suppliers. For example, should it only provide a catalogue or should it also enable customers to order products? Developing the right exchange design is a complex undertaking because of the many design options on the one hand and the interests of multiple actors to be considered on the other. This is far more difficult than simple prescriptions like ‘creating a win-win situation’ suggest. We address this problem by developing design patterns for the exchanges between customers, intermediary, and suppliers related to role, linkage, transparency, and ovelty choices. For developing these design patterns, we studied four distinct electronic intermediaries and dentified exchange design choices that require trade-offs relating to the interests of customers, intermediary, and suppliers. The exchange design patterns contribute to the development of design theory for electronic intermediaries by filling a gap between basic business models and detailed business process designs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

While purporting to enhance Australia’s sustainability, the federal government’s Population Strategy rejects the assessment of the limiting factors to future population growth, thus avoiding urgent threshold issues such as resource depletion and environmental destruction. A more forward-thinking and whole-system perspective would assess and incorporate critical biophysical limits into governance processes with suitable prioritisation. It would encourage communities to examine their individual and collective responsibilities in the context of these limits in order to most equitably optimise outcomes; and it would employ both a resource-based examination of minimum population requirements, and an impact-based assessment of maximum thresholds. This carrying capacity approach to planning could help guide society towards a more sustainable future.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Some minerals are colloidal and are poorly diffracting . Vibrational spectroscopy offers one of the few methods for the assessment of the structure of these types of minerals. Among this group of minerals is zykaite with formula Fe4(AsO4)(SO4)(OH)•15H2O. The objective of this research is to determine the molecular structure of the mineral zykaite using vibrational spectroscopy. Raman and infrared bands are attributed to the AsO43-, SO42- and water stretching vibrations. The sharp band at 3515 cm-1 is assigned to the stretching vibration of the OH units. This mineral offers a mechanism for the formation of more crystalline minerals such as scorodite and bukovskyite. Arsenate ions can be removed from aqueous systems through the addition of ferric compounds such as ferric chloride. This results in the formation of minerals such as zykaite and pitticite (Fe3+,AsO4,SO4,H2O).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The mineral arsentsumebite Pb2Cu(AsO4)(SO4)(OH), a copper arsenate-sulfate hydroxide of the brackebuschite group has been characterised by Raman spectroscopy. The brackebuschite mineral group are a series of monoclinic arsenates, phosphates and vanadates of the general formula A2B(XO4)(OH,H2O), where A may be Ba, Ca, Pb, Sr, while B may be Al, Cu2+,Fe2+, Fe3+, Mn2+, Mn3+, Zn and XO4 may be AsO4, PO4, SO4,VO4. Bands are assigned to the stretching and bending modes of SO42- AsO43- and HOAsO3 units. Raman spectroscopy readily distinguishes between the two minerals arsentsumebite and tsumebite. Raman bands attributed to arsenate are not observed in the Raman spectrum of tsumebite. Phosphate bands found in the Raman spectrum of tsumebite are not found in the Raman spectrum of arsentsumebite. Raman spectroscopy readily distinguishes the two minerals tsumebite and arsentsumebite.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Some minerals are formed which show poorly defined X-ray diffraction patterns. Vibrational spectroscopy offers one of the few methods for the assessment of the structure of the oxyanions in such minerals. Among this group of minerals is mallestigite with formula Pb3Sb5+(SO4)(AsO4)(OH)6•3H2O. The objective of this research is to determine the molecular structure of the mineral mallestigite using vibrational spectroscopy. Raman and infrared bands are attributed to the AsO43- , SO42- and water stretching vibrations. Mallestigite is a mineral formed in ancient waste dumps such as occurs at Mallestiger, Carinthia, Austria and as such is a mineral of archaeological significance.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Most one-round key exchange protocols provide only weak forward secrecy at best. Furthermore, one-round protocols with strong forward secrecy often break badly when faced with an adversary who can obtain ephemeral keys. We provide a characterisation of how strong forward secrecy can be achieved in one-round key exchange. Moreover, we show that protocols exist which provide strong forward secrecy and remain secure with weak forward secrecy even when the adversary is allowed to obtain ephemeral keys. We provide a compiler to achieve this for any existing secure protocol with weak forward secrecy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The exchange pavilion offers a dialogue between two Expositions: 1998 in Brisbane and 2010 in Shanghai; and a chance to examine the impact that climate change will have on urban best practice outcomes in cities of the future. The Exchange exhibits the proposition that environmentally sustainable buildings need to interact responsively with a range of technical innovations to enable communities (and hence cities) to control and better manage their immediate environment. The 'Exchange' pavilion is a design experiment that integrates 3 key research elements: * An interactive digital exchange * A living green system wall (vertical and temporal) * A public urban star (horizontal and spatial) The proposition argues that the environmentally sustainability of any city is reliant on harnessing the full spectrum of intellectual and creative capital of the winder community (from universities to Government bodies to citizens) - a true knowledge city.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Just Fast Keying (JFK) is a simple, efficient and secure key exchange protocol proposed by Aiello et al. (ACM TISSEC, 2004). JFK is well known for its novel design features, notably its resistance to denial-of-service (DoS) attacks. Using Meadows’ cost-based framework, we identify a new DoS vulnerability in JFK. The JFK protocol is claimed secure in the Canetti-Krawczyk model under the Decisional Diffie-Hellman (DDH) assumption. We show that security of the JFK protocol, when reusing ephemeral Diffie-Hellman keys, appears to require the Gap Diffie-Hellman (GDH) assumption in the random oracle model. We propose a new variant of JFK that avoids the identified DoS vulnerability and provides perfect forward secrecy even under the DDH assumption, achieving the full security promised by the JFK protocol.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The mineral schlossmacherite (H3O,Ca)Al3(AsO4,PO4,SO4)2(OH)6 , a multi-cation-multi-anion mineral of the beudantite mineral subgroup has been characterised by Raman spectroscopy. The mineral and related minerals functions as a heavy metal collector and is often amorphous or poorly crystalline, such that XRD identification is difficult. The Raman spectra are dominated by an intense band at 864 cm-1, assigned to the symmetric stretching mode of the AsO43- anion. Raman bands at 809 and 819 cm-1 are assigned to the antisymmetric stretching mode of AsO43- . The sulphate anion is characterised by bands at 1000 cm-1 (ν1), and at 1031, 1082 and 1139 cm-1 (ν3). Two sets of bands in the OH stretching region are observed: firstly between 2800 and 3000 cm-1 with bands observed at 2850, 2868, 2918 cm-1 and secondly between 3300 and 3600 with bands observed at 3363, 3382, 3410, 3449 and 3537 cm-1. These bands enabled the calculation of hydrogen bond distances and show a wide range of H-bond distances.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A fundamental principle of the resource-based (RBV) of the firm is that the basis for a competitive advantage lies primarily in the application of bundles of valuable strategic capabilities and resources at a firm’s or supply chain’s disposal. These capabilities enact research activities and outputs produced by industry funded R&D bodies. Such industry lead innovations are seen as strategic industry resources, because effective utilization of industry innovation capacity by sectors such as the Australian beef industry are critical, if productivity levels are to increase. Academics and practitioners often maintain that dynamic supply chains and innovation capacity are the mechanisms most likely to deliver performance improvements in national industries.. Yet many industries are still failing to capitalise on these strategic resources. In this research, we draw on the resource-based view (RBV) and embryonic research into strategic supply chain capabilities. We investigate how two strategic supply chain capabilities (supply chain performance differential capability and supply chain dynamic capability) influence industry-led innovation capacity utilization and provide superior performance enhancements to the supply chain. In addition, we examine the influence of size of the supply chain operative as a control variable. Results indicate that both small and large supply chain operatives in this industry believe these strategic capabilities influence and function as second-order latent variables of this strategic supply chain resource. Additionally respondents acknowledge size does impacts both the amount of influence these strategic capabilities have and the level of performance enhancement expected by supply chain operatives from utilizing industry-led innovation capacity. Results however also indicate contradiction in this industry and in relation to existing literature when it comes to utilizing such e-resources.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, an important security attribute called key compromise impersonation (KCI) resilience has been completely ignored for the case of GKE protocols. Informally, a protocol is said to provide KCI resilience if the compromise of the long-term secret key of a protocol participant A does not allow the adversary to impersonate an honest participant B to A. In this paper, we argue that KCI resilience for GKE protocols is at least as important as it is for 2PKE protocols. Our first contribution is revised definitions of security for GKE protocols considering KCI attacks by both outsider and insider adversaries. We also give a new proof of security for an existing two-round GKE protocol under the revised security definitions assuming random oracles. We then show how to achieve insider KCIR in a generic way using a known compiler in the literature. As one may expect, this additional security assurance comes at the cost of an extra round of communication. Finally, we show that a few existing protocols are not secure against outsider KCI attacks. The attacks on these protocols illustrate the necessity of considering KCI resilience for GKE protocols.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Key establishment is a crucial cryptographic primitive for building secure communication channels between two parties in a network. It has been studied extensively in theory and widely deployed in practice. In the research literature a typical protocol in the public-key setting aims for key secrecy and mutual authentication. However, there are many important practical scenarios where mutual authentication is undesirable, such as in anonymity networks like Tor, or is difficult to achieve due to insufficient public-key infrastructure at the user level, as is the case on the Internet today. In this work we are concerned with the scenario where two parties establish a private shared session key, but only one party authenticates to the other; in fact, the unauthenticated party may wish to have strong anonymity guarantees. We present a desirable set of security, authentication, and anonymity goals for this setting and develop a model which captures these properties. Our approach allows for clients to choose among different levels of authentication. We also describe an attack on a previous protocol of Øverlier and Syverson, and present a new, efficient key exchange protocol that provides one-way authentication and anonymity.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

New knowledge has raised a concern about the cost-ineffective design methods and the true performance of railroad prestressed concrete ties. Because of previous knowledge deficiencies, railway civil and track engineers have been aware of the conservative design methods for structural components in any railway track that rely on allowable stresses and material strength reductions. In particular, railway sleeper (or railroad tie) is an important component of railway tracks and is commonly made of prestressed concrete. The existing code for designing such components makes use of the permissible stress design concept, whereas the fiber stresses over cross sections at initial and final stages are limited by some empirical values. It is believed that the concrete ties complying with the permissible stress concept possess unduly untapped fracture toughness, based on a number of proven experiments and field data. Collaborative research run by the Australian Cooperative Research Centre for Railway Engineering and Technologies (Rail CRC) was initiated to ascertain the reserved capacity of Australian railway prestressed concrete ties that were designed using the existing design code. The findings have led to the development of a new limit-states design concept. This paper highlights the conventional and the new limit-states design philosophies and their implication to both the railway community and the public. © 2011 American Society of Civil Engineers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In June 2011, a research project team from the Institute for Ethics, Governance and Law (IEGL), Queensland University of Technology, the United Nations University, and the Australian Government’s Asia Pacific Civil-Military Centre of Excellence (APCMCOE) held three Capacity-Building Workshops (the Workshops) on the Responsibility to Protect (R2P) and the Protection of Civilians (POC) in Armed Conflict in Manila, Kuala Lumpur, and Jakarta. The research project is funded by the Australian Responsibility to Protect Fund, with support from APCMCOE. Developments in Libya and Cote d’Ivoire and the actions of the United Nations Security Council have given new significance to the relationship between R2P and POC, providing impetus to the relevance and application of the POC principle recognised in numerous Security Council resolutions, and the R2P principle, which was recognised by the United Nations General Assembly in 2005 and, now, by the Security Council. The Workshops considered the relationship between R2P and POC. The project team presented the preliminary findings of their study and sought contributions and feedback from Workshop participants. Prior to the Workshops, members of the project team undertook interviews with UN offices and agencies, international organisations (IOs) and non-government organisations (NGOs) in Geneva and New York as part of the process of mapping the relationship between R2P and POC. Initial findings were considered at an Academic-Practitioner Workshop held at the University of Sydney in November 2010. In addition to an extensive literature review and a series of academic publications, the project team is preparing a practical guidance text (the Guide) on the relationship between R2P and POC to assist the United Nations, governments, regional bodies, IOs and NGOs in considering and applying appropriate protection strategies. It is intended that the Guide be presented to the United Nations Secretariat in New York in early 2012. The primary aim of the Workshops was to test the project’s initial findings among an audience of diplomats, military, police, civilian policy-makers, practitioners, researchers and experts from within the region. Through dialogue and discussion, the project team gathered feedback – comments, questions, critique and suggestions – to help shape the development of practical guidance about when, how and by whom R2P and POC might be implemented.