888 resultados para Applicazioni Mobile, iOS, Grand Central Dispatch, Design Pattern
Resumo:
The objective of this paper is to investigate the effects of channel surface wettability and temperature gradients on the boiling flow pattern in a single microchannel. The test section consists of a bottom silicon substrate bonded with a top glass cover. Three consecutive parts of an inlet fluid plenum, a central microchannel and an outlet fluid plenum were etched in the silicon substrate. The central microchannel had a width of 800 mu m and a depth of 30 mu m. Acetone liquid was used as the working fluid. High outlet vapor qualities were dealt with here. The flow pattern consists of a fluid triangle (shrinkage of the liquid films) and a connected long liquid rivulet, which is generated in the central microchannel in the timescale of milliseconds. The peculiar flow pattern is formed due to the following reasons: (1) the liquid rivulet tends to have a large contact area with the top hydrophilic channel surface of the glass cover, but a smaller contact area with the bottom silicon hydrophobic surface. (2) The temperature gradient in the chip width direction at the top channel surface of the glass cover not only causes the shrinkage of the liquid films in the central microchannel upstream, but also attracts the liquid rivulet populated near the microchannel centerline. (3) The zigzag pattern is formed due to the competition between the evaporation momentum forces at the vapor-liquid interfaces and the force due to the Marangoni effect. The former causes the rivulet to deviate from the channel centerline and the latter draws the rivulet toward the channel centerline. (4) The temperature gradient along the flow direction in the central microchannel downstream causes the breakup of the rivulet to form isolated droplets there. (5) Liquid stripes inside the upstream fluid triangle were caused by the small capillary number of the liquid film, at which the large surface tension force relative to the viscous force tends to populate the liquid film locally on the top glass cover surface.
Resumo:
A highly birefringent hollow-core photonic bandgap fiber based on Topas cyclic olefin copolymer is designed. The rhombic hollow-core with rounded corners is formed by omitting four central air holes of the cladding structure. The guided modes, birefringence and confinement loss of the fiber are investigated by using the full-vector finite element method. A high phase birefringence of the order of 10(-3), a group birefringence of the order of 10(-2) and confinement loss less than 0.1 dB/km are obtained at the central wavelength (1.55 mu m) range of the bandgap for fiber with seven rings of air holes in the cladding region. (C) 2010 Elsevier B.V. All rights reserved.
Resumo:
A linear accelerator as a new injector for the SSC (Separated Sector Cyclotron) of the HIRFL (Heavy ton Research Facility Lanzhou) is being designed. The DTL (Drift-Tube-Linac) has been designed to accelerate U-238(34+) from 0.140 MeV/u to 0.97 MeV/u. To the first accelerating tank which accelerates U-238(34+) to 0.54 MeV/u, the approach of Alternating-Phase-Focusing (APF) is applied. The phase array is obtained by coupling optimization software Dakota and beam optics code LINREV. With the hybrid of Multi-objective Genetic Algorithm (MOGA) and a pattern search method, an optimum array of asynchronous phases is determined. The final growth, both transversely and longitudinally, can meet the design requirements. In this paper, the deign optimization of the APF DTL is presented.
Resumo:
A novel method for the optimization of pH value and composition of mobile phase in HPLC using artificial neural networks and uniform design is proposed. As the first step. seven initial experiments were arranged and run according to uniform design. Then the retention behavior of the solutes is modeled using back-propagation neural networks. A trial method is used to ensure the predicting capability of neural networks. Finally, the optimal separation conditions can be found according to a global resolution function. The effectiveness of this method is validated by optimization of separation conditions for both basic and acidic samples.
Resumo:
Perciformes, the largest order of vertebrates with 20 suborders, is the most diverse fish order that dominates vertebrate ocean life. The complete mitochondrial control region (CR) of Trichiurus japonicus (Trichiuridae, Scombroidei) and Pampus sp. (Stromateidae, Stromateoidei) were amplified and sequenced. Together with data from GenBank, the tandem repeats in the mitochondrial CR from 48 species, which covered nine suborders of Perciformes, are reported in this study. The tandem repeats tend to be long in the suborder Percoidei and Stromateoidei. The identical repeats in 21 species of Cichlidae suggest a common origin and have existed before species divergence. Larimichthys crocea shows tandem repeats instead of the typical structure of the central conserved sequence blocks, which was first reported in Perciformes and vertebrates. This might have resulted from interruption of the polymerase activity during the H-strand synthesis. The four broader patterns presented here for the tandem repeats, including those in both the 5' and 3' ends, only in the either 5' or 3' end, and in the central conserved domain of the control region, will be useful for understanding the evolution of species.
Resumo:
Offshore active faults, especially those in the deep sea, are very difficult to study because of the water and sedimentary cover. To characterize the nature and geometry of offshore active faults, a combination of methods must be employed. Generally, seismic profiling is used to map these faults, but often only fault-related folds rather than fracture planes are imaged. Multi-beam swath bathymetry provides information on the structure and growth history of a fault because movements of an active fault are reflected in the bottom morphology. Submersible and deep-tow surveys allow direct observations of deformations on the seafloor (including fracture zones and microstructures). In the deep sea, linearly aligned cold seep communities provide indirect evidence for active faults and the spatial migration of their activities. The Western Sagami Bay fault (WSBF) in the western Sagami Bay off central Japan is an active fault that has been studied in detail using the above methods. The bottom morphology, fractured breccias directly observed and photographed, seismic profiles, as well as distribution and migration of cold seep communities provide evidence for the nature and geometry of the fault. Focal mechanism solutions of selected earthquakes in the western Sagami Bay during the period from 1900 to 1995 show that the maximum compression trends NW-SE and the minimum stress axis strikes NE-SW, a stress pattern indicating a left-lateral strike-slip fault.
Resumo:
Geographic and vertical variations of size-fractionated (0.2-1 mu m, 1-10 mu m, and >10 mu m) Chlorophyll a (Chl.a) concentration, cyanobacteria abundance and heterotrophic bacteria abundance were investigated at 13 stations from 4 degrees S, 160 degrees W to 30 degrees N, 140 degrees E in November 1993. The results indicated a geographic distribution pattern of these parameters with instances of high values occurring in the equatorial region and offshore areas, and with instance of low values occurring in the oligotrophic regions where nutrients were almost undetectable. Cyanobacteria showed the highest geographic variation (ranging from 27x10(3) to 16,582x10(3) cell l(-1)), followed by Chl.a (ranging from 0.048 to 0.178 mu g l(-1)), and heterotrophic bacteria (ranging from 2.84x10(3) to 6.50 x 10(5) cell l(-1)). Positive correlations were observed between nutrients and Chl.a abundance. Correspondences of cyanobacteria and heterotrophic bacteria abundances to nutrients were less significant than that of Chl.a. The total Chl.a was accounted for 1.0-30.9%, 35.9-53.7%, and 28.1-57.3% by the >10 mu m, 1-10 mu m and 0.2-1 mu m fractions respectively. Correlation between size-fractionated Chl.a and nutrients suggest that the larger the cell size, the more nutrient-dependent growth and production of the organism. The ratio of pheophytin to chlorophyll implys that more than half of the > 10 mu m and about one third of the 1-10 mu m pigment-containing particles in the oligotrophic region were non-living fragments, while most of the 1-10 mu m fraction was living cells. In the depth profiles, cyanobacteria were distributed mainly in the surface layer, whereas heterotrophic bacteria were abundant from surface to below the euphotic zone. Chl.a peaked at the surface layer (0-20 m) in the equatorial area and at the nitracline (75-100 m) in the oligotrophic regions. Cyanobacteria were not the principle component of the picoplankton. The carbon biomass ratio of heterotroph to phytoplankton was greater than 1 in the eutrophic area and lower than 1 in oligotrophic waters.
Resumo:
依据生物利用中央模式发生器(Central pattern generator,CPG)的自激行为产生有节律的协调运动适应多种环境,基于循环抑制CPG建模理论设计了蛇形机器人CPG控制器模型,分析了单个神经元、循环抑制CPG以及该控制器模型的稳定性,并把该控制器应用到一个结合蛇形机器人“勘查者-Ⅰ”动力学特性的仿真模型,得到了实现蜿蜒运动的CPG控制器参数,进而研究了调节S波个数、身体构形曲率、蜿蜒运动速度以及运动轨迹曲率的CPG控制器参数设定策略。此外,“勘查者-Ⅰ”应用该CPG控制器的输出成功实现了蜿蜒运动。该研究结果为设计人工CPG控制器提供了一个可行的方法。
Resumo:
针对机器人控制领域中一类多输入多输出(MIMO)仿射非线性系统,提出了一种基于平衡流形的近似线性化状态反馈镇定算法,并用此算法解决了一类完整约束轮式移动机器人(WMR)的镇定问题.仿真分析表明,此方法不仅能够实现系统的镇定,而且降低了因平衡工作点变动给系统稳定性带来的影响,同时也大大地简化了对非线性系统的综合设计过程,具有良好的控制效果和实用性.
Resumo:
The Design Patterns book [GOF95] presents 24 time-tested patterns that consistently appear in well-designed software systems. Each pattern is presented with a description of the design problem the pattern addresses, as well as sample implementation code and design considerations. This paper explores how the patterns from the "Gang of Four'', or "GOF'' book, as it is often called, appear when similar problems are addressed using a dynamic, higher-order, object-oriented programming language. Some of the patterns disappear -- that is, they are supported directly by language features, some patterns are simpler or have a different focus, and some are essentially unchanged.
Resumo:
Malicious software (malware) have significantly increased in terms of number and effectiveness during the past years. Until 2006, such software were mostly used to disrupt network infrastructures or to show coders’ skills. Nowadays, malware constitute a very important source of economical profit, and are very difficult to detect. Thousands of novel variants are released every day, and modern obfuscation techniques are used to ensure that signature-based anti-malware systems are not able to detect such threats. This tendency has also appeared on mobile devices, with Android being the most targeted platform. To counteract this phenomenon, a lot of approaches have been developed by the scientific community that attempt to increase the resilience of anti-malware systems. Most of these approaches rely on machine learning, and have become very popular also in commercial applications. However, attackers are now knowledgeable about these systems, and have started preparing their countermeasures. This has lead to an arms race between attackers and developers. Novel systems are progressively built to tackle the attacks that get more and more sophisticated. For this reason, a necessity grows for the developers to anticipate the attackers’ moves. This means that defense systems should be built proactively, i.e., by introducing some security design principles in their development. The main goal of this work is showing that such proactive approach can be employed on a number of case studies. To do so, I adopted a global methodology that can be divided in two steps. First, understanding what are the vulnerabilities of current state-of-the-art systems (this anticipates the attacker’s moves). Then, developing novel systems that are robust to these attacks, or suggesting research guidelines with which current systems can be improved. This work presents two main case studies, concerning the detection of PDF and Android malware. The idea is showing that a proactive approach can be applied both on the X86 and mobile world. The contributions provided on this two case studies are multifolded. With respect to PDF files, I first develop novel attacks that can empirically and optimally evade current state-of-the-art detectors. Then, I propose possible solutions with which it is possible to increase the robustness of such detectors against known and novel attacks. With respect to the Android case study, I first show how current signature-based tools and academically developed systems are weak against empirical obfuscation attacks, which can be easily employed without particular knowledge of the targeted systems. Then, I examine a possible strategy to build a machine learning detector that is robust against both empirical obfuscation and optimal attacks. Finally, I will show how proactive approaches can be also employed to develop systems that are not aimed at detecting malware, such as mobile fingerprinting systems. In particular, I propose a methodology to build a powerful mobile fingerprinting system, and examine possible attacks with which users might be able to evade it, thus preserving their privacy. To provide the aforementioned contributions, I co-developed (with the cooperation of the researchers at PRALab and Ruhr-Universität Bochum) various systems: a library to perform optimal attacks against machine learning systems (AdversariaLib), a framework for automatically obfuscating Android applications, a system to the robust detection of Javascript malware inside PDF files (LuxOR), a robust machine learning system to the detection of Android malware, and a system to fingerprint mobile devices. I also contributed to develop Android PRAGuard, a dataset containing a lot of empirical obfuscation attacks against the Android platform. Finally, I entirely developed Slayer NEO, an evolution of a previous system to the detection of PDF malware. The results attained by using the aforementioned tools show that it is possible to proactively build systems that predict possible evasion attacks. This suggests that a proactive approach is crucial to build systems that provide concrete security against general and evasion attacks.
Resumo:
‘Work on the move’ is a design, process-driven methodology, which uses multiple locations within an outdoors setting and movement between locations, all of which function as learning places, confined to a specified time period. Between 2012 and 2015, a team of international Higher Education product design educators (all members of Carousel, a co-operation of Erasmus members in Zwolle, Edinburgh, Nantes, Rome, Kortrijk and Oslo), industry professionals and product design students developed and tested four case studies. Each case study was conducted in a different international location and was constructed with a different focus, to help define and refine a definitive working methodology. ‘Work on the move’ explores the influence of ‘place’ upon design, in terms of the impact it has on productivity and creative problem-solving, when working away from the traditional studio/office-based environment. It also explores the significance of shared place, when working directly with a client in situ, and experiencing the place-based influences upon their businesses. While identifying location as part of the design process, the study also seeks to understand the effects of time restriction and working in transit upon creativity and productivity, within the context of specific projects.
Resumo:
Enot, D. and King, R. D. (2003) Application of Inductive Logic Programming to Structure-Based Drug Design. 7th European Conference on Principles and Practice of Knowledge Discovery in Databases (PKDD '03). Springer LNAI 2838 p156-167